Integrated Electronic User and Access Management in the Belgian Public, Social and Health Care Sector Frank Robben General manager Crossroads Bank for.

Slides:



Advertisements
Similar presentations
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Advertisements

Module N° 4 – ICAO SSP framework
WTO, Trade and Environment Division
E-ID and identity management aspects in the Belgian social sector Frank Robben General Manager Crossroads Bank for Social Security General Manager SmalS-MvM.
The data retention directive: data protection aspects Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg 375 B-1040.
1 Global Real Estate Valuation Policy Update: the European Perspective The principle: the EU Treaty does not provide the European institutions with direct.
Workshop on registered electronic mail policies and implementations (ETT 57074) Ankara, –
Security and Interoperability Danny De Cock January 16th, 2012 Moldova Slides: godot.be/slidesgodot.be/slides.
Data-Sharing and Governance Consultation ANALYSIS OF RESPONSES.
Crossroads Bank for Social Security & eHealth platform How federal institutions support Belgian social and health care sector.
A vision on electronic cooperation in the Belgian health care sector, based on the experience in the social sector, and the role of the Be-Health platform.
Conditions for an effective and efficient E-government Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Some initiatives of the Belgian government in order to stimulate E-government Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
The Crossroads Bank for Social Security, a model for the health care sector ? Frank Robben General manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
IS Audit Function Knowledge
ZHRC/HTI Financial Management Training
Ministry of Transport, Information Technology and Communications Technological base: Interoperability Tsvetanka Kirilova Ministry of TITC Bulgaria.
E-government in the Belgian social security sector: a successful combination of back- office integration and an e-portal solution Crossroads Bank for Social.
Internal Auditing and Outsourcing
National Smartcard Project Work Package 8 – Security Issues Report.
Belgian proposal of an organization model for an electronic identity card Frank Robben General Manager Crossroads Bank for Social Security Sint-Pieterssteenweg.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Opinion about the draft privacy regulation of the EC Frank Robben General manager eHealth-platform Willebroekkaai 38 B-1000 Brussels
Strategic importance of identity and access management (IAM) The case of the Belgian social and health sector Frank Robben General manager Crossroads Bank.
HIPAA PRIVACY AND SECURITY AWARENESS.
Österreich 2006 Austria 2006 Autriche 2006 Präsidentschaft der Europäischen Union Presidency of the European Union Présidence de L’Union européenne ★★★★★★
THE STATUS OF SECONDMENT  Poland is a country whose workers are mainly sent to other countries of the European Union or European.
How can I trust the rest of Europe ? Requirements and a possible organisation with regard to epSOS and eHealth Frank Robben General manager eHealth platform.
Be-Health as a driving force of electronic cooperation in the Belgian health care sector, based on the experience in the social sector Frank Robben General.
Electronic information exchange within the Belgian social sector coordinated by the Crossroads Bank for Social Security Frank Robben General manager Crossroads.
Recognition: the national centre and the ENIC Network Seminar on the recognition of qualifications Baku, 22 April 2005 Gunnar Vaht Head of the Estonian.
Implementation of EU Electronic Communication Directives.
Electronic identity management for eGovernment Conceptual framework and objectives Frank Robben General manager Crossroads Bank for Social Security Strategic.
Integrated services delivery based on eGovernment Frank Robben General manager Crossroads Bank for Social Security & eHealth-platform Sint-Pieterssteenweg.
Integrated information management in the Belgian social sector Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
Name Position Organisation Date. What is data integration? Dataset A Dataset B Integrated dataset Education data + EMPLOYMENT data = understanding education.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Some identification needs related to workers’ mobility eGovernment – eIDM ad hoc group meeting 4-5 May 2006 CBSS Crossroads Bank for Social Security Frank.
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
A vision on electronic cooperation in the Belgian health care sector, based on the experience in the social sector, and the role of the Be-Health platform.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
Is Service Oriented Architecture delivering its promise ? The case of the Crossroads Bank for Social Security Frank Robben General manager Crossroads Bank.
The pillars of E-government Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public Service for ICT Sint-Pieterssteenweg.
Data protection as an integral part of OOP implementations: The Austrian approach Peter Kustor.
Data protection and European citizens’ initiatives
1 The Future Role of the Food and Veterinary Office M.C. Gaynor, Director, FVO EUROPEAN COMMISSION HEALTH & CONSUMER PROTECTION DIRECTORATE-GENERAL Directorate.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Back office integration for better E-government services Crossroads Bank for Social Security Frank Robben General manager Crossroads Bank for Social Security.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
E-government in the Belgian social sector, co-ordinated by the Crossroads Bank for Social Security Frank Robben General manager Crossroads Bank for Social.
Evaluation of restrictions: art. 15 and art TAIEX Seminar on the EU Service Directive, 3 May 2007 Carlos Almaraz.
Privacy and Personal Information. WHAT YOU WILL LEARN: What personal information is. General guidelines for the collection of personal information. Your.
A model for electronic data exchange in the public sector Kruispuntbank van de Sociale Zekerheid Banque Carrefour de la Sécurité sociale KSZ-BCSS Frank.
CLAUDIA PANAIT TAIEX Expert – European Commission Legal Adviser Ministry of Health, ROMANIA.
Consumers, Health, Agriculture and Food Executive Agency 3rd Health Programme The Electronic Submission System (JA 2015) Georgios MARGETIDIS.
Harmonised use of accreditation for assessing the competence of various Conformity Assessment Bodies Dr Andreas Steinhorst, EA ERA workshop 13 April 2016,
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 6 CH 5 ISO MANAGEMENT RESPONSIBILITY Philippe Bauwin Medical.
Shared Services and Third Party Assurance: Panel May 19, 2016.
-1- WORKSHOP ON DATA PROTECTION AND DATA TRANSFERS TO THIRD COUNTRIES Technical and organizational security measures Skopje, 16 May - 17 May 2011 María.
Efficient and secure transborder exchange of patient data
General Data Protection Regulation
Public private partnership concerning user and access management (UAM): the vision of the federal
Proposal for a Regulation on medical devices and Proposal for a Regulation on in vitro diagnostic medical devices Key Provisions and GIRP Assessment.
Dashboard eHealth services: actual mockup
A practice testimony on the implementation of information security and data protection at the Crossroads Bank for Social Security and the eHealth platform.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
The supervision of personal data processing by EU institutions and bodies => data protection and privacy, why it matters, for you as citizens and as EU.
Towards a frictionless social security
Presentation transcript:

Integrated Electronic User and Access Management in the Belgian Public, Social and Health Care Sector Frank Robben General manager Crossroads Bank for Social Security CEO Smals Sint-Pieterssteenweg 375 B-1040 Brussels Website CBSS: Personal website:

2 Frank Robben Structure of the presentation General overview of user and access management Basic concepts related to user and access management Choices made in Belgium –Identification –Overall Information Security and Privacy Protection Policy –Policy Enforcement Model –User Management for citizens, professionals and companies –Access Management –Principle of “Circles of Trust“ Transnational aspects –Needs –Proposal of a method –Proposal of concrete objectives Conclusion

3 Frank Robben General Overview 3 Target Groups –Citizens –Professionals –Companies and their service providers Different Aspects –User Management Registration of the identity Authentication of the identity Registration of characteristics and mandates Verification of characteristics and mandates –Access Management Registration of authorizations Verification of authorizations

4 Frank Robben User Management: Basic Concepts Identity –A number or a set of attributes of an entity that allows to know precisely who or what the entity (physical person, company,…) is –An entity has only one identity, but this identity can be determined by several numbers or sets of attributes Characteristic –An attribute of an entity, other than the attributes determining its identity, such as a capacity, a function in an organisation, a professional qualification,... –An entity can have several characteristics

5 Frank Robben User Management: Basic Concepts Mandate –A right granted by an identified entity to another identified entity to perform well-defined legal actions in her name and for her account –Is essentially a relationship between two entities –An entity can grant several mandates to several entities Registration –The process of determining the identity, a characteristic of an entity or a mandate of an entity with sufficient certainty, before putting at the disposal means by which the identity can be authenticated, or the characteristic or the mandate can be verified

6 Frank Robben User Management: Basic Concepts Authentication of the Identity –The process of checking whether the identity that an entity pretends to have in order to use an electronic service, corresponds to the real identity –The authentication of the identity can be done based on the verification of Knowledge (e.g. a password) Possession (e.g. a certificate on an electronically readable card) Biometrical characteristics A combination of those

7 Frank Robben User Management: Basic Concepts Verification of a characteristic or a mandate –The process of checking whether a characteristic or a mandate that an entity pretends to have in order to use an electronic service, corresponds to a real characteristic or mandate of that entity –The verification of a characteristic or a mandate can be done by The same kind of means as those used for the authentication of the identity Or, after the authentication of the identity, by consulting a database (authentic source) that contains information about characteristics of mandates related to identified entities

8 Frank Robben Access Management: Basic Concepts Authorization –A permission to an entity to perform a defined action or to use a defined service Authorization Group –A group of authorizations Role –A group of authorizations or authorization groups related to a specific service Role Based Access –A method of assigning authorizations to entities by means of authorization groups and roles, in order to simplify the management of authorizations and their assignment to entities Authorization (Group) Role Entity Service

9 Frank Robben Choices made in Belgium Identification Overall Information Security and Privacy Protection Policy Policy Enforcement Model User Management for –Citizens –Professionals –Companies Access Management Principle of “Circles of Trust“

10 Frank Robben Identification Identification number for every citizen and every company –Characteristics Unique –Every entity in principle only has one identification number –The same identification number is not assigned to several entities Exhaustive –Every entity to be identified has an identification number Stable over time –Identification number should not contain variable characterics of the identified entity –Identification number should not contain references to the identification number or characteristics of other entities –Identification number should not change when a quality or characteristic of the identified entity changes

11 Frank Robben Identification Art. 8, 7 Directive 95/46/EC: "Member States shall determine the conditions under which a national identification number or any other identifier of general application may be processed" –Evolution towards meaningless identification numbers –Unique identification numbers of citizens can only be used by instances authorized by a sectoral committee of the national privacy commission –In some sensitive sectors (e.g. justice, health, …), the identification number can be a specific number derived from the unique number of the citizen –Regulation on interconnection of personal data Registration of the identity of citizens by the municipalities Registration of the identity of companies by company counters

12 Frank Robben Overall Security and Privacy Protection Policy Overall policy on information security and privacy protection for eGovernment –Security, integrity and confidentiality of government information are ensured by integrating ICT measures with structural, organizational, physical, personnel screening and other security measures according to agreed policies –Every public institution has an information security and privacy protection department with an advising, documenting, stimulating and control mission –Personal information is only used for purposes compatible with the purposes of the collection of the information –Personal information is only accessible to authorized institutions and users according to business needs, legislative or policy requirements

13 Frank Robben Overall Security and Privacy Protection Policy Overall policy on information security and privacy protection for eGovernment –The communication of personal information by government bodies to third parties has to be authorized by the competent sectoral committee of the privacy commission, designated by Parliament, after having checked whether the communication conditions (e.g. purpose limitation, proportionality) are met –The authorizations to communicate personal information are public –Every actual electronic communication of personal information by a government body is preventively checked on compliance with the existing authorizations by an independent institution managing the interoperability framework used for the communication (clearing house function) –Every concrete electronic communication of personal information by a government body is logged by the clearing house, to be able to trace possible abuse afterwards

14 Frank Robben Overall Security and Privacy Protection Policy Overall policy on information security and privacy protection for eGovernment –Every time information is used to take a decision, the used information is communicated to the concerned person together with the decision –Every person has right to access and correct his own personal data

15 Frank Robben Policy Enforcement Model Information Request/Reply Policy Retrieval Authentic Source Information Request/Reply Policy Repository Manager Policy Management Authentic Source Policy Enforcement (PEP) Action on application Decision Request Decision Reply Action on application PERMITTED Action on application DENIED User Application Policy Decision (PDP) Policy Administration (PAP) Policy Information (PIP) Policy Information (PIP)

16 Frank Robben Policy Enforcement Point (PEP) Intercepts the request for authorization with all available information about the user, the requested action, the resources and the environment Passes on the request for authorization to the Policy Decision Point (PDP) and extracts a decision regarding authorization Grants access to the application and provides relevant credentials Policy Enforcement (PEP) Action on application Decision Request Decision Reply Action on application PERMITTED Action on application DENIED User Application Policy Decision (PDP)

17 Frank Robben Policy Decision Point (PDP) Based on the request for authorization received, retrieves the appropriate authorization policy from the Policy Administration Point(s) (PAP) Evaluates the policy and, if necessary, retrieves the relevant information from the Policy Information Point(s) (PIP) Takes the authorization decision (permit/deny/not applicable) and sends it to the PEP Information Request/Reply Policy Retrieval Information Request/Reply Decision Request Decision Reply Policy Decision (PDP) Policy Administration (PAP) Policy Information (PIP) Policy Enforcement (PEP)

18 Frank Robben Policy Administration Point (PAP) Environment to store and manage authorization policies by authorised person(s) appointed by the application managers Puts authorization policies at the disposal of the PDP Policy Retrieval Policy Repository Manager Authorization Management Policy Decision (PDP) Policy Administration (PAP)

19 Frank Robben Policy Information Point (PIP) Puts information at the disposal of the PDP in order to evaluate authorization policies (authentic sources with characteristics, mandates, etc.) Information Request/Reply Authentic Source Information Request/Reply Authentic Source Policy Decision (PDP) Policy Information (PIP) Policy Information (PIP)

20 Frank Robben APPLICATIONS AuthorisationAuthen- tication PEP Role Mapper USER PAP ‘’Kephas’’ Role Mapper DB PDP Role Provider PIP Attribute Provider Role Provider DB UMAF PIP Attribute Provider DB XYZ WebApp XYZ APPLICATIONS AuthorisationAuthen- tication PEP Role Mapper USER WebApp XYZ PIP Attribute Provider PAP ‘’Kephas’’ Role Mapper DB PDP Role Provider Role Provider DB Management VAS PIP Attribute Provider DB XYZ PIP Attribute Provider DB Gerechts- deurwaar- ders PIP Attribute Provider DB Mandaten Be-Health APPLICATIONS AuthorisationAuthen- tication PEP Role Mapper USER PAP ‘’Kephas’’ Provider DB Mandaten Social sector (CBSS) Non social FPS (FedICT) Management VAS DB XYZ Architecture

21 Frank Robben Citizens LevelRegistration Identity citizens Authentication Identity citizens Services 0None Public information/services 1Online by input national identification number, number of the identity card and number of the social security card User number and password chosen by the user Lowly sensitive information/services 2Level 1 + with URL for activation sent to an address mentioned by the citizen and paper token sent to the residence of the citizen as registered in the national register Level 1 + input of an arbitrarily asked string mentioned on the paper token (contains 24 strings) Medium sensitive information/services 3Physical visit at the municipality in order to get the eID Authentication certificate of the EID + password per session Highly sensitive information/services 4Physical visit at the municipality in order to get the eID Authentication certificate of the EID + signature certificate on the EID + password per transaction Services requiring an electronic signature

22 Frank Robben eID

23 Frank Robben Citizen token

24 Frank Robben Citizens At the moment, a citizen only has access to –Public information and services –Non-public services regarding himself Thus, only need of –Registration of the identity –Authentication of the identity at a level adapted to the sensitivity degree of the service (For the time being) no need for –Verification of characteristics –Verification of mandates

25 Frank Robben Professionals Who? –Employees of public services and social security institutions –Specific professions: health care providers (medical doctors, pharmacists,…), notaries, bailiffs, accountants,… –... Registration and authentication of the identity –In principle same system as the citizens system –For employees of public services and social security institutions, the paper token at level 2 is sent to the information security officer of the public service or the social security institution that employs the employee and is delivered to the employee by this information security officer

26 Frank Robben Professionals Registration of characteristics and mandates –Designation by the government, for every (type of) characteristic(s) or mandate(s), of an appropriate body (called the registration authority) that has the responsibility to register the characteristic or the mandate with sufficient certainty –Storage of the characteristic or the mandate by the registration authority into an authentic source (PIP) accessible to all interested parties Verification of characteristics and mandates –Consultation of the relevant authentic sources (PIP) accessible to all interested parties –In case of use of the paper token, also arbitrarily requested string mentioned on the paper token

27 Frank Robben Companies LevelIdentity Registration of mandataries of companies Identity Authentication of mandataries of companies Services 0None Public information/services 1Local administrator: signed (electronic) form to the National Office for Social Security by the company for whom the person acts as a local administrator other mandataries: registration by the local administrator User number and password chosen by the user Lowly or medium sensitive information/services 2Physical visit at the municipality in order to get the eID Authentication certificate on the eID + password per session Highly sensitive information/services 3Physical visit at the municipality in order to get the eID Authentication certificate on the eID + signature certificate on the eID + password per transaction Services requiring an electronic signature

28 Frank Robben Registration of Mandates for Companies Authentic source (PIP) at the National Office for Social Security accessible to all interested parties containing –For every company, the mandate of his local administrator to use certain information/services in the name of the company –For every company, any mandates of external service providers (social secretariats, accountants, …) to use certain information/services in the name of the company –For every service provider, the mandate of his local administrator to use certain information/services in the name of the service provider –Possibility for the local administrator to designate sub-local administrators for clusters of information/services –Possibility for the (sub-)local administrators of companies/service providers to grant mandates to other employees of the company/service provider to use certain information/services in the name of the company/service provider

29 Frank Robben Authorizations Registration –Storage in an authentic source of authorization rules (PAP) by the provider of the electronic service, specifying which types of processing may be executed related to the service under which conditions (e.g. characteristics, mandates, …) during which periods of time Verification –Consultation of the relevant authentic sources of authorizations (PAP) accessible to all interested parties

30 Frank Robben How to Choose a Security Level? Responsibility of the provider of an electronic service under supervision of the Privacy Commission Based on a risk assessment and dependent from a.o. –The type of processing: communication, consultation, alteration,… –The scope of the service: does the processing only concern the user or also concern other persons ? –The degree of sensitivity of the data processed –The possible impact of the processing On top of the security level, the use of an electronic signature might be needed in order to preserve the provider of the service against disputes In the social sector and the federal government: decision of the Board of Directors of the Crossroads Bank for Social Security set down in a user regulation

31 Frank Robben Principle of “Circles of Trust" Aim –To avoid unnecessary centralization –To avoid unnecessary threats to the protection of the privacy –To avoid multiple similar controls and registration of loggings Method: division of tasks between the entities associated with the electronic service, including clear agreements on –Who is in charge of which authentications, verifications and controls by which means –How the results of the authentications, verifications and controls can be safely exchanged electronically between the entities concerned –Who keeps which log files –How to ensure that in case of an investigation, on one’s own initiative or in response to a complaint, a complete tracing can be realized in order to know which physical person has used which service or transaction concerning which citizen or company, when, through which channel and for which purposes

32 Frank Robben Transnational Aspects Huge need to be able to electronically –Identify and authenticate the identity of all relevant foreign entities (physical persons, companies, …) –Verify the relevant characteristics of the foreign entities –Verify that an entity has been mandated by another foreign entity to perform a legal action Need to implement the objective and related actions from the inter-ministerial statement about eGovernment in the EU issued on 24th November 2005

33 Frank Robben Inter-ministerial statement “By 2010 European citizens and business shall be able to benefit from secure means of electronic identification that maximise user convenience while respecting data protection regulations. Such means shall be made available under the responsibility of the Member States, but recognised across the EU.”

34 Frank Robben Inter-ministerial Statement: Actions “Member States will, during 2006, agree a process and roadmap for achieving the electronic identity objectives and address the national and European legal barriers to the achievement of the electronic identity objectives; work in this area is essential for public administrations to deliver personalised electronic services with no ambiguity as to the user’s identity.” “Member States will, over the period , work towards the mutual recognition of national electronic identities by testing, piloting and implementing suitable technologies and methods.”

35 Frank Robben Some Use Cases Individual residing in Member State A is temporarily employed (posted) in Member State B –The employer or his representative has to ask for authorization from the competent social security institution of Member State A –The competent social security institution of Member State A (electronically) sends an E101-form to the competent social security institution of Member State B => Need for (interrelated) identification of the employer, his representative and the employee in both Member States, need for authentication of the characteristic "employer" and need for authentication of the mandate of the representative

36 Frank Robben Some Use Cases Individual residing in Member State A works, studies or looks for work in Member State B => need for (interrelated) identification of the individual in both Member States Individual residing in Member State A simultaneously works in various other Member States => need for (interrelated) identification of the individual in all Member States Individual residing in Member State A needs health care in member State B (form E111, (e)EHIC) => need for (interrelated) identification of the individual in both Member States

37 Frank Robben Some Use Cases Individual residing in Member State A has to exchange (in an electronic way) data with public authorities in Member State B => need for (interrelated) identification of the individual in both Member States Employer or his representative residing in Member State A has to exchange (in an electronic way) data about his employees with public authorities in Member State B => need for (interrelated) identification in both Member States of the employer, his representative and the employees, need for authentication of the characteristic of "employer" and need for authentication of the mandate of the representative

38 Frank Robben Proposal of a Method Method of Open Coordination –The Member States and the European Commission define common objectives and a common timing to meet the objectives –Each Member State makes a national action plan in order to meet the objectives within the agreed time frame –Each Member State periodically reports to the European Commission about the national status questionis in meeting the objectives and about the execution of the national action plan –The European Commission makes a sound synthesis of the national reports –If needed, the European Commission proposes, based on the recommendations of the Member States, amendments to adjust the objectives –The European Commission organises the exchange of best practices between Member States

39 Frank Robben Proposal of Concrete Objectives Internationally, authentication levels are established in relation to identity, characteristics and mandates Each country has registration procedures for establishing the identity of individuals residing in their own country, according to the internationally established authentication levels Each country has registration procedures for establishing the identity of legal entities and actual associations that are established in their own country, according to the internationally established authentication levels

40 Frank Robben Proposal of Concrete Objectives Each country makes available to each individual, each legal entity and each actual association for whom/which the identity is established in accordance with the registration procedures, the means by which the concerned entity can produce and prove its identity (whether or not in a particular context) locally or remotely, verbally, visually and electronically on the territory of the country in question, without that entity’s identity being confused with the identity of another individual person, legal entity or actual association in that country

41 Frank Robben Proposal of Concrete Objectives Each country has registration procedures for establishing the type of characteristics indicated by an internationally accredited body, according to the internationally established authentication levels Each country has registration procedures for establishing the mandate of an individual to represent a legal entity or actual association, and the other types of mandates that are indicated by an internationally accredited body, according to the internationally established authentication levels

42 Frank Robben Proposal of Concrete Objectives Each country has the necessary systems to produce and prove the characteristics and mandates of individuals, legal entities and actual associations that have been established according to the registration procedures (whether or not in a particular context), locally or remotely, verbally, visually and electronically on the territory of the country in question, either with the permission of the concerned entity or in accordance with a statutory or legal provision

43 Frank Robben Proposal of Concrete Objectives Under the coordination of the European Commission, the Member States of the EU develop EU standards and specifications to ensure the semantic and technical interoperability of resources for producing and proving electronically the identity, characteristics and mandates through or in relation to individuals, legal entities and actual associations on the territory of other Member States

44 Frank Robben Conclusion An integrated system for user and access management for citizens, professionals and companies exists in Belgium Based on a well coordinated assignment of tasks to the most appropriate bodies Accessible via open standards The system permits the use of common basic services without loss of autonomy The system permanently evolves according to ever changing user requirements

45 Frank Robben More information Personal website Frank Robben – Website Crossroads Bank for Social Security – Website Smals – Website Federal Public Service for Information and Communication Technology (FedICT) – Electronic identity card –

you! Any questions?