Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School.

Slides:



Advertisements
Similar presentations
S.O.S. eHealth Project Open eHealth initiative for a European large scale pilot of patient summary and electronic prescription Daniel Forslund, Head of.
Advertisements

Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.
Red Flag Rules: What they are? & What you need to do
Stephen Upton – 2 June 2005EURIM Personal Identity Working Group Secure identity – a personal view Stephen Upton Office: Mobile:
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
User Perception and Acceptance of Biometrics M. Angela Sasse Professor of Human-Centred Technology Department of Computer Science University College London,
FAL Programme Presentation to ACI July 2004 Mary McMunn Chief FAL section Presentation to ACI July 2004 Mary McMunn Chief FAL section.
New Products for the Public Sector The products that will change your work life Presented by: Derek O’Halloran Date: 14 th June 2007.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
Deferred Action for Childhood Arrivals DACA Prepared by Raúl Z. Moreno Deferred Action Help Center 4290 E. Ashlan Ave Fresno, CA Phone
©1999 Addison Wesley Longman Slide 13.1 Information System Security and Control 13.
Prepared by Raúl Z. Moreno Deferred Action Help Center 1551 E. Shaw Ste. 107 Fresno, CA Phone Website.
The Health and Social Services Access Card: What will it mean for Australians? Financial Literacy, Banking and Identity Conference 25th and 26th October.
Identity & Access Management DCS 861 Team2 Kirk M. Anne Carolyn Sher-Decaustis Kevin Kidder Joe Massi John Stewart.
FIT3105 Smart card based authentication and identity management Lecture 4.
1 Information and Systems Security/Compliance Security Day The Information and Systems Security/Compliance Program Dave Kovarik.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
P O L I C E D E P A R T M E N T  Biometric passport – Passport Act – Issuing a biometric passport – Development project  Biometric Passport To Biometric.
LOGO MIRJANA SEKULOVSKA, PhD, DEPUTY MINISTER OF INFORMATION SOCIETY Republic of Macedonia Ministry of Information Society.
Identity, privacy and technology: DNA fingerprints, identity cards, and CCTV HI 269 Week 5.
FAL/12 Agenda item 1 FAL Programme : Introduction Agenda item 1 FAL Programme : Introduction.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
1 1 General preconditions Training workshop on ¨censuses using administrative registers in Geneva 21 May 2012 Harald Utne, Statistics Norway
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
The Biometric Applications Commissioner Balancing Security and Facilitating Procedures at Border Crossings Frontex, October 2013 Biometric Applications.
Immigration and Nationality Directorate Registered Traveller Programmes GLOBAL BORDER SECURITY CONFERENCE San Antonio, TEXAS 8 – 10 May 2007 Peter Graham.
30/09/09Copyright - The Earl of Erroll1 Lord Erroll - Merlin Member of the HOUSE of LORDS - an Independent Peer PITCOMParliamentary Information Technology.
AUTHENTICATION IN AN INTERNET ENVIRONMENT Dominick E. Nigro NCUA Information Systems Officer.
Challenges to a Canadian Identity Policy: Learning from International Experiences Krista Boa, Andrew Clement & Gus Hosein Identity Project - Canada 7th.
Garry Compton Manager Government Authentication ANTA Workshop 05/08/03 Canberra, Australia An update on Commonwealth Authentication.
Security Challenges Facing Seaport Operations Day 1 - Module 3.
Australia’s Implementation of the People Trafficking Protocol Presentation by Sandra Bennett International Crime Branch Australian Government Attorney-General’s.
Witness Protection in Malaysia Andrew Khoo Co-Chair, Human Rights Committee Bar Council Malaysia.
Prevent Information and Overview Updated October 2013, Education Office.
1 Book Cover Here SECTION III SPECIAL TOPICS Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014, Elsevier Inc.
Regional Workshop on International Migration Statistics Cairo, Egypt 30/6/2009-3/7/2009.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
THE MALAYSIAN ELECTRONIC PASSPORT
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Civil Registration Protecting Refugees and IDPs Preventing Statelessness 7 th Annual Symposia on Statistical Development (ASSD) Cape Town, South Africa.
Law and Morality CLN4U. Functions of the Criminal Code Preventing harm to people and property Preventing harm to people and property Preventing action.
1 The Privacy Impact Assessment Guidelines Guy Herriges Manager, Information and Privacy Office of the Corporate Chief Strategist, MBS November 2000.
Compliance: Sponsor management George Shirley Assistant Director – PBS Sponsorship 17 February 2012.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Understanding Privacy An Overview of our Responsibilities.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Privacy and ‘Big Data’: the European perspective Human Subjects’ Protections in the Digital Age: IRB, Privacy and Big Data Peter Elias, University of Warwick.
THE MALAYSIAN ELECTRONIC PASSPORT
Smart Data infrastructure
National Electoral Register
Paperless & Cashless Poland Program overview
Biometric technology: The beginning of a digital era
Maltese Presidency of the Council of the European Union
Unique Identification Number Project
Inter operability of e-GP System
Civil Registration Process: Place, Time, Cost, Late Registration
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
UNHCR United Nations High Commissioner for Refugees
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Legal Framework for Civil Registration, Vital Statistics
Identity Theft Prevention Program Training
Identity & Access Management
Regional Initiatives – South Asia Civil Registration Group (CR8)
Agenda item 1 FAL Programme : Introduction
E-identities (and e-signatures)
Pacific Regional Workshop on Legal Identity and Identity Security 8-10th July 2019 Perspectives on accelerating progress on universal legal identity.
RECORDING AND DOCUMENTING IMMIGRATION CONTROLS
Presentation transcript:

Identity Cards: Strategy, Implementation & Challenges A Melodrama in Three Parts Simon Davies Director, Privacy International Visiting Fellow, London School of Economics

PART 1 (almost) everything you ever wanted to know about identity systems….

Why introduce a national ID system? Combating crime & terrorism Reducing welfare and tax fraud Tackling illegal immigration and illegal working Combating identity theft Providing more efficient service delivery Enabling secure commercial transactions Travel authorization & border control Electoral registration and voting Proof of age Emergency Medical Information

What types of ID system are used? Paper-based documents (Low maintenance cost but susceptible to forgery) Readable plastic card systems (Moderate cost, durable, major forgery potential) “Smart” integrated systems (High cost, wide functionality, potentially low threat of forgery)

Key elements of an integrated “Smart” ID system THE REGISTER A central population register THE CODE A unique numerical identifier THE CARD An obligatory, multi-purpose ID card LEGAL OBLIGATIONS. Requirements in law to disclose the card or to report card transactions to government. ADMINISTRATIVE CONVERGENCE The number and the Card register are used by a variety of agencies and organisations as their administrative basis. CROSS NOTIFICATION Agencies are often required to notify each other of changes to a person's details.

The 4 components of registration Document ID Current Active Status Biographical Biometric ID Footprints

The 4 components of registration Document ID Current Active Status Biographical Biometric ID Footprints

PART II Issues of public concern

Receiving her first ID card

Seven Deadly Issues Can ID cards combat crime and terrorism? Will ID cards reduce tax evasion & welfare fraud? Can ID cards help to control illegal immigration? Do ID cards cause an increase in State powers? Do ID cards create discrimination? Will an ID card become an internal passport? What are the privacy implications of an ID card?

Government’s idea of a “worst case scenario” public reaction

The real Worst Case Scenario

PART III The burning questions that must be answered

The burning questions Is a national integrated ID system really necessary? Will the system create deep social division or broad national cohesion? What happens to those who do not, or cannot, conform? Is a national biometric system perilous for freedom & privacy? How can we prevent the risk of future dangers from such a system? How can we engage a genuine public debate?