© fedict 2008. All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Advanced Piloting Cruise Plot.
JCAHO –A HIPAA Business Associate National HIPAA Summit
Working with MS-ACCESS IS 240 – Database Management Lecture #2 – Assoc. Prof. M. E. Kabay, PhD, CISSP Norwich University
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market (COM( final) {SWD(2012)
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-12G 1 RXQ Customer Enrollment Using a Registration Agent Process Flow Diagram (Switch) Customer Supplier Customer authorizes Enrollment.
Document #07-2I RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) (mod 7/25 & clean-up 8/20) Customer Supplier.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Residents’ register service under the Ministry of the Interior
Activity 1………….Why Do You Need A Bank?
Activity 1………….Why Do You Need A Bank? Activity 2………The Many Services of a Bank Activity 3…The ABCs of a Chequing Account Activity 4………Opening a Chequing.
ABC Technology Project
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
VOORBLAD.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Bundesamt für Sicherheit in der Informationstechnik EESSI - WS May , 2000, Paris, Folie 1/18Klaus J. Keus, BSI Electronic Signatures in Germany,
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Addition 1’s to 20.
25 seconds left…...
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Intracellular Compartments and Transport
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Immunobiology: The Immune System in Health & Disease Sixth Edition
Essential Cell Biology
Weekly Attendance by Class w/e 6 th September 2013.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Immunobiology: The Immune System in Health & Disease Sixth Edition
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
© 2007 BST. All rights reserved. Confidential Information. SLU – 1 PDS_139 (0503) L2 Applying Problem- Solving Tools.
1 Budapest, June 14, Cross border communication among registers - Practical aspects - Yves Gonner Managing director - Trade and Companies Register.
Workshop on registered electronic mail policies and implementations Ankara, March 2015 Davide Mula The use of electronic signatures.

The Austrian Governmental eDelivery System Technical Aspects Ankara, March 17th, 2015 Christian Maierhofer, EGIZ The E-Government Innovation Center is.
Respecting Privacy in Global Networks/ Guernsey, Wednesday 11 th April, Paula Ortiz López Spanish Data Protection Agency.
Legal Issues on PKI & qualified electronic certificates. THIBAULT VERBIEST Attorney-at-law at the Brussels and Paris Bar Professor at the Universities.
Designing and Implementing Secure ID Management Systems: BELGIUM’s Experience Washington - September 27 th, 2010 Frank LEYMAN © fedict All rights.
Country Update: Austria Herbert Leitold Secure Information Technology Center - Austria
© Fedict All rights reserved Fedict and e-government in Belgium Bert Beyl - Sam Van den Eynde Euro India summit - 14/10/2011.
Presentation transcript:

© fedict All rights reserved Legal aspects Belgian electronic identity card Samoera Jacobs – November 2008

© fedict All rights reserved 2 > Content of the eID > Digital certificates > eID and privacy

© fedict All rights reserved 3 Legal aspects Belgian electronic identity card Content of the eID

© fedict All rights reserved 4 Content of the eID > From a visual point of view, the information shown will be the same as on the present identity card: name first 2 Christian names first letter of third Christian name nationality place and date of birth sex place of issue start and end dates of validity card number owners photograph owners signature National Register Number Visual identification of the owner

© fedict All rights reserved 5 Content of the eID > From an electronic point of view, the data on the chip is the same as the information printed on the card, plus: address identity and signature keys identity and signature certificate Certificate Service Provider security information (chip number, signature for identity data, etc.) > No other data is stored, no data container Electronic identification of the owner

© fedict All rights reserved 6 authentication data capture signature Content of the eID

© fedict All rights reserved 7 Content of the eID PIN protectedUse without PIN ID ADDRESS authentication digital signature RRN SIGN RRN SIGN RRN SIGN RRN SIGN PKIIDENTITY private public authentication data capture signature

© fedict All rights reserved 8 Content of the eID eID as a tool (mean) to read efficiently, without mistakes identification data. takes time unefficient prone to error fast efficient exact copy

© fedict All rights reserved 9 Content of the eID

© fedict All rights reserved 10 authentication data capture signature Content of the eID

© fedict All rights reserved 11 Content of the eID eID as a tool for strong authentication (in the electronic world) Hi Jan ! Hi Peter ! physical world online world …

© fedict All rights reserved 12 Content of the eID !! The PIN usage for authentication is done ONCE until card is removed !!

© fedict All rights reserved 13 authentication data capture signature Content of the eID

© fedict All rights reserved 14 !! The PIN usage for signature is requested each time for a signature !!

© fedict All rights reserved 15 Content of the eID > Belgian ID card Act of 19 July 1991 (amended by Act of 25 March 2003 to introduce electronic identity cards) > Article 6 §2 : other content can only be added by law. No intention to have a data container -> access key model > eID valid for 5 years > 24/7 helpdesk in case of loss, theft, destruction

© fedict All rights reserved 16 eID : the access key model home banking, online opening of accounts, … proof of membership SSO, … Healthcare e.g. SIS drivers licence student cards, e- learning, … … e-commerce

© fedict All rights reserved 17 Legal aspects Belgian electronic identity card Digital certificates

© fedict All rights reserved 18 Digital certificates > eID contains two digital certificates: one for electronic signature one for authentication

© fedict All rights reserved 19 Digital certificates > European Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community Framework for Electronic Signatures. > The two main objectives: free internal market for electronic signatures and certification services (all electronic signatures, all certification services, all signature products) legal effect of electronic signatures (under certain conditions, for specific purposes, with many exceptions)

© fedict All rights reserved 20 Digital certificates > Authorisation (mandatory) is forbidden, accreditation (voluntary) is allowed, supervision is obliged. > General principle: legal effect + admissibility as evidence for all electronic signatures. > Second principle: certain electronic signatures get the same legal effect as hand-written signature.

© fedict All rights reserved 21 Digital certificates > Liability for CSP > Respect of Data Protection Directive > National law determines in which fields electronic documents and electronic signatures can be used > Standardization work to clarify the requirements of the annexes of the Directive

© fedict All rights reserved 22 Digital certificates > Belgian E-Sign act of 20 October 2000 on the introduction of telecommunication means and the use of electronic signatures > Evidence; non-discrimination principle > New article 1322, 2 Civil law, For the purpose of this article, a signature can also mean data in electronic form which can be attributed to a certain person and which demonstrate the integrity of the content of the document

© fedict All rights reserved 23 Digital certificates > Belgian CSP act of 9 July 2001 to create a legal framework for the usage of electronic signatures and certification services > Article 4 § 5: The qualified electronic signature is the only type of signature that will automatically be given the same legal value as a handwritten signature. A qualified signature is an advanced electronic signature based on a qualified certificate and produced by a secure signature creation device.

© fedict All rights reserved 24 Digital certificates > Digital certificates on Belgian eID cards Issued by an accredited Cerification Authority Allow signatures with same legal value as handwritten signatures > Signature function not activated for minors > Authentication and signature data not activated if citizen does not want to

© fedict All rights reserved 25 Legal aspects Belgian electronic identity card eID and privacy

© fedict All rights reserved 26 eID and privacy > Visual control of the eID Only obliged to show the eID in restricted cases (legal authorities such as police) Article 1 Royal Decree 25 March 2003 on electronic identity cards

© fedict All rights reserved 27 eID and privacy > Electronic control of the eID Strictly regulated, only by Royal Decree Article 6 § 4 ID card Act

© fedict All rights reserved 28 eID and privacy > Use of national identification number Act of 8 August 1983 (amended by Act of 25 March) Use of national identification number only after authorisation of Sectoral Committee (Privacy Commission) and only for specific groups (Belgian public authorities, public and private entities for fulfulling a task of general interest, subcontractors of Belgian public authorities, Notary public and baillif, Pharmacists, Lawyers)

© fedict All rights reserved 29 eID and privacy > Rights as a citizen Access right to data on eID and data in National Register of identification data (via eID, via municipality) Correction right (mistakes or incomplete information) Information right Everyone who accessed data in National Register of identification data during last 6 months

© fedict All rights reserved 30 > Questions > Samoera Jacobs >