SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Sharing Best Practices for
Success
Xavier Fricout, Deputy Board Member,
Secure Identity Alliance
World eIDCongress, September 2013
2
Introducing the Secure Identity Alliance
• The Secure Identity Alliance is committed to helping public bodies across the
world deliver e-government services to citizens through the widespread
adoption of secure e-document technologies.
• Founded in March 2013 by leading eDocument and eService Companies
• Members at date:
World eID Congress 2013
3
Its Objectives
Accelerate the transition to smart eDocuments to support an open,
interoperable and efficient roll-out of eGovernment online services by:
 Describe and promote use cases of convenient value-added eGovernment
services
 Share experiences and best practices between industry and governments
modernizing their services, in particular towards ensuring the privacy of
end-users’ personal information
 Promote standardization of relevant and appropriate industry specifications
 Make recommendations on the most up-to-date means to properly address
the governments identity and privacy challenges
• eDocument hardware, software and secure printing technologies, materials and physical security
expertise
• Deliver the level of confidence and assurance needed for the rapid adoption of eServices that can
be trusted by citizens
 Provide consistent reference information on security, identity and privacy
challenges in a transparent manner
World eID Congress 2013
In short, the Secure Identity Alliance offers a trusted partner for governments
when defining their eDocument strategies and implementing associated
eGovernment services.
4
Its Workgroups
World eID Congress 2013
DIGITAL IDENTITY
Government ID
versus commercial
ID
• State of the Art
• Vision
• Path to vision
eDOCUMENT SECURITY
Best practices in
full value chain for
eDocument
security
• State of the Art
• Vision
• Path to vision
5
Best Practices in eDocument Security Workgroup
It’s about defining the best solution based on the
factorsthatneed to beconsidered of:
 Usages and environment / convenience, privacy, durability
 Best practice in securitymeasures and features
 Real threatstowardsdefendingsecuritymeasures and
features
 Appropriate international standards and regulations
 Service levels and customer service
 Logistics
 Overallcost of the solution
World eID Congress 2013
6
@
Environmental factors – Big data
World eID Congress 2013
Cell phone N
Address
Interests
Purchase history
Health Status
Blood group
Insurance
Address
Tax status
Social security
Birthday
Birthplace
Gender
Nationality
Credit rating
Income
Address
Travel habits
Work details
7
Environmentalfactors – Standards &Regulation
 “an online environment where individuals
and organizations will be able to trust each other
because they follow agreed upon standards to obtain
and authenticate their digital identities.” NSTIC
 Regulations
 NSTIC in the US (National Program Office of the
National Strategy for Trusted Identities in
Cyberspace)
 e-IDAS in Europe (regulation on eIdentification,
eAuthentication and eSignatures and Trusted
Services)
 National specific initiatives: Sweden, Estonia, etc.
 Standards: CEN, ETSI, ICAO, ISO, GixelIN and others
 Initiatives : GSMA Mobile ID
World eID Congress 2013
8
The Security Awareness Model
Introducing
World eID Congress 2013
9
Data, material flow & support services during
life time secure credential
World eID Congress 2013
Document
delivery
Document
usage
Design document
Security Optical
Procurement
materials
Manufacturing
blank document
Secure environment Controlled varieties
Transport
blank document
DATAFLOW
Entitlement
Post
issuance
mngt
Data
preparation
SUPPORT PROCESS
IT security
Reject/waste handling
(remake process)
Enrolment
Personalization
Document/
Document Issuance
Biographical data protection
Logical Security
MATERIALFLOW
Treatment
Materials and
Blanks
Facility
Security
10
The Secure Awareness Model
 Based on real world expertise,
experience and best practice
 Based on use cases
 Use of historical data
 Visionary level of future state
development
 Will incorporate self assessment
scheme for end users to define their
current development status.
 Will provide users a report to define
their next steps in improving their
solution
 Will incorporate anonymous reports to
provide position in region / world
 SIA Maturity Index Creation eg. Wasada
University Model
World eID Congress 2013
Waseda Model
11
Whatmakes the model unique
SIAis a global organization
SIAcovers the full lifecycle of secure documents
includingphysical and logicalsecurity
SIAis an expert throughits collective heritage and expertise
SIAis a trustedpartner: makingrecommendations for the
interest of governments and citizens/ non profit
Timeline: first draft of the model availableat cartes’13
World eID Congress 2013
12
Interested to participate?
Governmentagenciesinterested in participating in the model
first draftcan contact the Secure Documents Workgroup
Chairman:
 Neil Rudeforth atneil.rudeforth@secureidentityalliance.org
Actors of the Secure Identityinterested to join the Alliance
can contact the Secretary General or the Marketing &
Communication Consultant:
 Jean-Claude Perrin atjean-
claude.perrin@secureidentityalliance.org
 Stéphanie de
Labriolleatstephanie.delabriolle@secureidentityalliance.org
World eID Congress 2013
www.secureidentityalliance.org
Xavier Fricout, DeputyBoardMember, Secure Identity
– xavier.fricout@secureidentityalliance.org
Thank You

Weitere ähnliche Inhalte

Was ist angesagt?

CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONCIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
ijcsit
 
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EUENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
IJNSA Journal
 

Was ist angesagt? (20)

CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONCIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
 
Coalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and ChallengesCoalition of IoT and Blockchain: Rewards and Challenges
Coalition of IoT and Blockchain: Rewards and Challenges
 
eA11: Clive Holdsworth - Regulating digital accessibility and encouraging com...
eA11: Clive Holdsworth - Regulating digital accessibility and encouraging com...eA11: Clive Holdsworth - Regulating digital accessibility and encouraging com...
eA11: Clive Holdsworth - Regulating digital accessibility and encouraging com...
 
Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway Interner of Things Iinsurance gateway
Interner of Things Iinsurance gateway
 
IRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using BlockchainIRJET- Food Supply Chain Management using Blockchain
IRJET- Food Supply Chain Management using Blockchain
 
IoT and Its Applications
IoT and Its ApplicationsIoT and Its Applications
IoT and Its Applications
 
PKI IN Government Identity Management Systems
PKI IN Government Identity Management SystemsPKI IN Government Identity Management Systems
PKI IN Government Identity Management Systems
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...Fog computing security and privacy issues, open challenges, and blockchain so...
Fog computing security and privacy issues, open challenges, and blockchain so...
 
E-governance-and-Security
E-governance-and-SecurityE-governance-and-Security
E-governance-and-Security
 
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUESCAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
CAN BLOCKCHAIN BE A SOLUTION TO IOT TECHNICAL AND SECURITY ISSUES
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
Information Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis ApproachInformation Retrieval based on Cluster Analysis Approach
Information Retrieval based on Cluster Analysis Approach
 
IoE Public Sector
IoE Public SectorIoE Public Sector
IoE Public Sector
 
From Reactive to Proactive City Driving trust through transparency and fair u...
From Reactive to Proactive City Driving trust through transparency and fair u...From Reactive to Proactive City Driving trust through transparency and fair u...
From Reactive to Proactive City Driving trust through transparency and fair u...
 
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EUENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
ENABLERS TO BOOST BLOCKCHAIN ADOPTION IN EU
 
An Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoTAn Introduction AI, Blockchain and IoT
An Introduction AI, Blockchain and IoT
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing
 
IRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public SectorsIRJET-Overview of Blockchain Technology in Government/Public Sectors
IRJET-Overview of Blockchain Technology in Government/Public Sectors
 
Presentation of ethical and social issues of ict
Presentation of ethical and social issues of ictPresentation of ethical and social issues of ict
Presentation of ethical and social issues of ict
 

Ähnlich wie Sharing best practices for success

Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
Turvallisuus2013
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
Dr Lendy Spires
 

Ähnlich wie Sharing best practices for success (20)

Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15Dsci data protection outlook annual report 2014-15
Dsci data protection outlook annual report 2014-15
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn BehrensCIS 2015- User-centric Privacy of Identity- Jenn Behrens
CIS 2015- User-centric Privacy of Identity- Jenn Behrens
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Future of digital identity Programme summary - 15 dec 2018 lr
Future of digital identity  Programme summary - 15 dec 2018 lrFuture of digital identity  Programme summary - 15 dec 2018 lr
Future of digital identity Programme summary - 15 dec 2018 lr
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
 
Transformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital IdentityTransformation from Identity Stone Age to Digital Identity
Transformation from Identity Stone Age to Digital Identity
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017Data Portability & Application Portability - Cloud Security Expo 2017
Data Portability & Application Portability - Cloud Security Expo 2017
 
Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014Digital id-toolkit-for-africa-2014
Digital id-toolkit-for-africa-2014
 
Managing identity for the future how everybody can win - david alexander - ...
Managing identity for the future   how everybody can win - david alexander - ...Managing identity for the future   how everybody can win - david alexander - ...
Managing identity for the future how everybody can win - david alexander - ...
 
Seclore Corporate Profile
Seclore Corporate ProfileSeclore Corporate Profile
Seclore Corporate Profile
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Sharing best practices for success

  • 1. Sharing Best Practices for Success Xavier Fricout, Deputy Board Member, Secure Identity Alliance World eIDCongress, September 2013
  • 2. 2 Introducing the Secure Identity Alliance • The Secure Identity Alliance is committed to helping public bodies across the world deliver e-government services to citizens through the widespread adoption of secure e-document technologies. • Founded in March 2013 by leading eDocument and eService Companies • Members at date: World eID Congress 2013
  • 3. 3 Its Objectives Accelerate the transition to smart eDocuments to support an open, interoperable and efficient roll-out of eGovernment online services by:  Describe and promote use cases of convenient value-added eGovernment services  Share experiences and best practices between industry and governments modernizing their services, in particular towards ensuring the privacy of end-users’ personal information  Promote standardization of relevant and appropriate industry specifications  Make recommendations on the most up-to-date means to properly address the governments identity and privacy challenges • eDocument hardware, software and secure printing technologies, materials and physical security expertise • Deliver the level of confidence and assurance needed for the rapid adoption of eServices that can be trusted by citizens  Provide consistent reference information on security, identity and privacy challenges in a transparent manner World eID Congress 2013 In short, the Secure Identity Alliance offers a trusted partner for governments when defining their eDocument strategies and implementing associated eGovernment services.
  • 4. 4 Its Workgroups World eID Congress 2013 DIGITAL IDENTITY Government ID versus commercial ID • State of the Art • Vision • Path to vision eDOCUMENT SECURITY Best practices in full value chain for eDocument security • State of the Art • Vision • Path to vision
  • 5. 5 Best Practices in eDocument Security Workgroup It’s about defining the best solution based on the factorsthatneed to beconsidered of:  Usages and environment / convenience, privacy, durability  Best practice in securitymeasures and features  Real threatstowardsdefendingsecuritymeasures and features  Appropriate international standards and regulations  Service levels and customer service  Logistics  Overallcost of the solution World eID Congress 2013
  • 6. 6 @ Environmental factors – Big data World eID Congress 2013 Cell phone N Address Interests Purchase history Health Status Blood group Insurance Address Tax status Social security Birthday Birthplace Gender Nationality Credit rating Income Address Travel habits Work details
  • 7. 7 Environmentalfactors – Standards &Regulation  “an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities.” NSTIC  Regulations  NSTIC in the US (National Program Office of the National Strategy for Trusted Identities in Cyberspace)  e-IDAS in Europe (regulation on eIdentification, eAuthentication and eSignatures and Trusted Services)  National specific initiatives: Sweden, Estonia, etc.  Standards: CEN, ETSI, ICAO, ISO, GixelIN and others  Initiatives : GSMA Mobile ID World eID Congress 2013
  • 8. 8 The Security Awareness Model Introducing World eID Congress 2013
  • 9. 9 Data, material flow & support services during life time secure credential World eID Congress 2013 Document delivery Document usage Design document Security Optical Procurement materials Manufacturing blank document Secure environment Controlled varieties Transport blank document DATAFLOW Entitlement Post issuance mngt Data preparation SUPPORT PROCESS IT security Reject/waste handling (remake process) Enrolment Personalization Document/ Document Issuance Biographical data protection Logical Security MATERIALFLOW Treatment Materials and Blanks Facility Security
  • 10. 10 The Secure Awareness Model  Based on real world expertise, experience and best practice  Based on use cases  Use of historical data  Visionary level of future state development  Will incorporate self assessment scheme for end users to define their current development status.  Will provide users a report to define their next steps in improving their solution  Will incorporate anonymous reports to provide position in region / world  SIA Maturity Index Creation eg. Wasada University Model World eID Congress 2013 Waseda Model
  • 11. 11 Whatmakes the model unique SIAis a global organization SIAcovers the full lifecycle of secure documents includingphysical and logicalsecurity SIAis an expert throughits collective heritage and expertise SIAis a trustedpartner: makingrecommendations for the interest of governments and citizens/ non profit Timeline: first draft of the model availableat cartes’13 World eID Congress 2013
  • 12. 12 Interested to participate? Governmentagenciesinterested in participating in the model first draftcan contact the Secure Documents Workgroup Chairman:  Neil Rudeforth atneil.rudeforth@secureidentityalliance.org Actors of the Secure Identityinterested to join the Alliance can contact the Secretary General or the Marketing & Communication Consultant:  Jean-Claude Perrin atjean- claude.perrin@secureidentityalliance.org  Stéphanie de Labriolleatstephanie.delabriolle@secureidentityalliance.org World eID Congress 2013
  • 13. www.secureidentityalliance.org Xavier Fricout, DeputyBoardMember, Secure Identity – xavier.fricout@secureidentityalliance.org Thank You

Hinweis der Redaktion

  1. And can be complex.One has to take into account standards and regulations (international and regional):- NSTIC in the US (National Program Office of the National Strategy for Trusted Identities in Cyberspace) e-IDAS in Europe (regulation on eIdentification, eAuthentication and eSignatures and Trusted Services)National specific initiatives: Sweden, Estonia, etc.Standards also apply (CEN, ETSI, ICAO, ISO, GixelIN and others) For instance ICAO Identification Programme for Travel (2015-16)Other organizations initiatives eg. GSMA on Mobile IdentityOur Members are active individually in all these organizations. The road to interoperability, usability, convenience is long and this is why best practices need to be exchanged, security standards done.In this context, it is necessary for the industry to have a forum where collective actions can be designed and implemented to address these questions of common interest in this field and focused on Government/ Public Bodies programmes