SlideShare ist ein Scribd-Unternehmen logo
1 von 22
IDENTITY
MANAGEMENT IN E-
GOVERNMENT
Ioannis Iglezakis,
Associate Professor,
Aristotle University, Faculty of Law
The development of e-
Government in the EU
• Top priority issue - The European eGovernment
Action Plan 2011-2015
• the use of information and communication
technologies in public administration combined with
organisational change and new skills in order to
improve public services and democratic processes
and strengthen support to public policies
Identity management in
eGovernment
• Key aspect: processes that are involved in the
provision of eGovernment services rely profoundly
on secure identification policies
Definition of Identity
management
• the set of policies, rules, mechanisms, processes and
applications that deal with identifying individuals in
a system (an application, a network, or an
organisation) and controlling their access to
resources within that system by associating user
rights and restrictions with the established identity.
• The objective of identity management is to improve
productivity and security while lowering costs
associated with managing users and their identities,
attributes, and credentials
Components of Identity
management
• Authentication: the process of establishing the validity of a
user attempting to gain access to a service. Authentication
methods include: user name and password; token; biometrics;
digital certificates (PKI, smart cards).
• Access control (or authorisation): the process of limiting users’
access to resources and data they have specific permissions to
use.
• Accounting: the process of keeping track of a user's activity
while accessing the service or the network resources.
• User management: the process of activating and de-activating
users’ identities and access permissions
Use of eIDMS
• An eIDMS basically serves the identification and
authentication of users of governmental services.
• Identification:
• registration process: it consists in the process of using
already given attributes of an entity to establish an
identity for that entity;
• per se identification process: it consists in the
verification of the identity of an entity
Use of eIDMS
• Authentication is the verification of a claim by an
entity, which may also involve identification. In the
framework of eGovernment it has great importance,
as it is the basic requirement for accessing electronic
services.
• A request for authentication requires that an
asserting entity presents some form of evidence to
prove that it is in fact who it claims to be.
Use of eIDMS
• Authentication on the basis of the following data:
• User name/ password
• Passport or ID card /biometric reference data and citizens
registers
• Administration cards and reference databases
• eHealth cards and reference data of health insurance holders
• Digital Signature Cards and PKI
• authorization = determining the permissions of an entity that
requests the execution of a defined action, that is, to: ‘read’,
‘modify’, ‘create’ and/or ‘delete’.
Specific Issues with regard to
eIDMS
• No consistent approach as regards interoperability
• The systems adopted by EU various Member States
employ varied technologies for hardware tokens
(smart-cards, mobile phones, etc.), biometrics
(fingerprint, facial, etc.) and digital signatures.
• Lack of trust of other Member States’ certification
services
• Prohibition, de jure or de facto, of the use of
authentication or authorization from other MS
Specific Issues with regard to
eIDMS
• Lack of privacy, conceived as lack of control over
personal data;
• Lack of transparency, as the processing of personal
data is not clear in its full extent;
• Lack of auditability of the system;
• Lack of enforceability of privacy and data protection
rights
Regulation No 910/2014 on Electronic
Identification and Trust Services
It creates a European internal market for electronic identification
and electronic trust services, including:
• electronic signatures;
• Time stamping;
• Electronic seal;
• Electronic delivery;
• Legal admissibility of electronic documents to ensure their
authenticity and integrity;
• Website authentication.
Regulation 210/2014
• Mutual recognition of eID schemes – Requirements:
• (a) the electronic identification means is issued under an electronic
identification scheme that is included in the list published by the
Commission;
• (b) the assurance level of the electronic identification means
corresponds to an assurance level equal to or higher than the
assurance level required by the relevant public sector body to access
that service online in the first Member State, provided that the
assurance level of that electronic identification means corresponds to
the assurance level substantial or high;
• (c) the relevant public sector body uses the assurance level substantial
or high in relation to accessing that service online. In case, however,
the assurance level is low, it is not mandatory to recognise an eID
scheme.
Regulation 910/2014
• An electronic identification is eligible for notification
if it meets certain criteria, e.g., that the eID means
are issued by the notifying Member State or under a
mandate from that State or are recognized by that, it
can be used to access at least one service provided by
a public service body, the eID means and the eID
scheme meet the requirements of at least one of the
aforementioned assurance levels, etc.
Regulation 910/2014 –
Notification:
• (a) a description of the electronic identification scheme, including its assurance
levels and the issuer or issuers of electronic identification means under the
scheme;
• (b) the applicable supervisory regime and information on the liability regime
with respect to the following: (i) the party issuing the electronic identification
means; and (ii) the party operating the authentication procedure;
• (c) the authority or authorities responsible for the electronic identification
scheme;
• (d) information on the entity or entities which manage the registration of the
unique person identification data;
• (e) a description of how the requirements set out in the implemaenting acts are
met;
• (f) a description of authentication; (g) arrangements for suspension or
revocation of either the notified electronic identification scheme or
authentication or the compromised parts concerned.
Interoperability
• To fully implement the provisions on recognition of eIDs, it is
provided for that national eID schemes notified must be
interoperable. Criteria of the interoperability framework:
• (a) it aims to be technology neutral and does not discriminate
between any specific national technical solutions for electronic
identification within a Member State; (b) it follows European
and international standards, where possible; (c) it facilitates the
implementation of the principle of privacy by design; and (d) it
ensures that personal data is processed in accordance with
Directive 95/46/EC.
Data Protection
• The Proposal for an EU Data Protection Regulation, however,
provides for the principles of data protection by design and by default
(Article 23)
• The controller shall, both at the time of the determination of the
means for processing and at the time of the processing itself,
implement appropriate technical and organisational measures and
procedures in such a way that the processing will meet the
requirements of the legal framework and ensure the protection of the
rights of the data subject. And also, he/she should implement
mechanisms for ensuring that, by default, only those personal data are
processed which are necessary for each specific purpose of the
processing and are especially not collected or retained beyond the
minimum necessary for those purposes, both in terms of the amount
of the data and the time of their storage.
Data Protection Principles
• Fair and Lawful Processing: personal data must be processed fairly
and lawfully;
• Purpose specification and purpose limitation: personal data must be
adequate, relevant and not excessive in relation to the purposes for
which they are collected and/or further processed;
• Data minimization: personal data must be accurate and, where
necessary, kept up to date; every reasonable step must be taken to
ensure that data which are inaccurate or incomplete, having regard to
the purposes for which they were collected or for which they are
further processed, are erased or rectified;
• Data Preservation: personal data must be kept in a form which
permits identification of data subjects for no longer than is necessary
for the purposes for which the data were collected or for which they
are further processed;
Data Protection
• Furthermore, data processing must be in accordance
with the rights of data subjects, which are
established with the Directive, i.e., the right to
information, the right of access to data, the right to
object and the right to oppose to automated
individual decisions
• it is crucial to ensure that users are informed about
the privacy implications of using such systems.
• this requirement could hinder the deployment of
single sign-on services
Data Protection
• multi-layered information notices: i) the short notice,
which must offer the core information (identity of
the controller and purposes of processing) and any
additional information which in view of the
particular circumstances of the case must be
provided beforehand to ensure a fair processing, ii)
the condensed notice, which provides all relevant
information required, and iii) the full notice, which
includes all national legal requirements and
specificities.
Control over personal data –
two tendencies
• one considering that citizens must keep their data
under control at all stages of the administrative
procedures, and that they must have an information
feedback on the data exchanges concerning any
decision taken about them.
• The second tendency consists in considering that
administrative simplification necessarily operates at
the price of a certain loss of control of the user’s
own personal data
Data protection
• defining roles and responsibilities is necessary in
such situations where personal data are processed in
cooperation between participants in an identity
management system.
• The Art. 29 Working Party suggests to consider all
participating sites in an identity management
scheme as controllers in respect of their own
processing operations.
Conclusion
The transformation of the public administration in
the 21st century is a key issue for an efficient state
and an open democratic society.

Weitere ähnliche Inhalte

Was ist angesagt?

The information technology act
The information technology actThe information technology act
The information technology actDhii Raymond
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000Naveen Kumar C
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesSneha J Chouhan
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Parth Patel
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Povo News
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012John Macasio
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008ValueMentor Consulting
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Nanda Mohan Shenoy
 
Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson LLP
 
Spice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy UpdateSpice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy UpdateMathew Chacko
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docxDr. Arun Verma
 

Was ist angesagt? (19)

The information technology act
The information technology actThe information technology act
The information technology act
 
IT act 2000
IT act 2000 IT act 2000
IT act 2000
 
The information technology act 2000
The information technology act 2000The information technology act 2000
The information technology act 2000
 
Indian IT Act 2000
Indian IT Act 2000Indian IT Act 2000
Indian IT Act 2000
 
Cyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studiesCyber Law and Information Technology Act 2000 with case studies
Cyber Law and Information Technology Act 2000 with case studies
 
Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)Information technology ACT - 2000 (Legal Aspect of Business)
Information technology ACT - 2000 (Legal Aspect of Business)
 
Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017Zimbabwe's cybercrime & cybersecurity bill 2017
Zimbabwe's cybercrime & cybersecurity bill 2017
 
Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012Cyber Crime Prevention Act 2012
Cyber Crime Prevention Act 2012
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Information Technology Amendment Act 2008
Information Technology Amendment Act 2008Information Technology Amendment Act 2008
Information Technology Amendment Act 2008
 
Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017Browne Jacobson - Administrative and public law - October 2017
Browne Jacobson - Administrative and public law - October 2017
 
It act 2000
It act 2000It act 2000
It act 2000
 
Spice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy UpdateSpice Route Legal Data Protection & Privacy Update
Spice Route Legal Data Protection & Privacy Update
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
It act 2000
It act 2000It act 2000
It act 2000
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Objectives of the it act.docx
Objectives of the it act.docxObjectives of the it act.docx
Objectives of the it act.docx
 

Andere mochten auch

Intro to-html-backbone-angular
Intro to-html-backbone-angularIntro to-html-backbone-angular
Intro to-html-backbone-angularzonathen
 
Intro to-html-backbone
Intro to-html-backboneIntro to-html-backbone
Intro to-html-backbonezonathen
 
Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Jnasslander
 
Papers 201 iglezakis-presentation-en-v001
Papers 201 iglezakis-presentation-en-v001Papers 201 iglezakis-presentation-en-v001
Papers 201 iglezakis-presentation-en-v001ioannis iglezakis
 
Linkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundLinkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundJnasslander
 

Andere mochten auch (7)

Intro to-html-backbone-angular
Intro to-html-backbone-angularIntro to-html-backbone-angular
Intro to-html-backbone-angular
 
Intro to-html-backbone
Intro to-html-backboneIntro to-html-backbone
Intro to-html-backbone
 
Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]Casestudy Bersin Pfizer Red Hat[1]
Casestudy Bersin Pfizer Red Hat[1]
 
Digital Libraries
Digital LibrariesDigital Libraries
Digital Libraries
 
E book competition
E book competitionE book competition
E book competition
 
Papers 201 iglezakis-presentation-en-v001
Papers 201 iglezakis-presentation-en-v001Papers 201 iglezakis-presentation-en-v001
Papers 201 iglezakis-presentation-en-v001
 
Linkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathundLinkedin rekryteringslösningar lathund
Linkedin rekryteringslösningar lathund
 

Ähnlich wie Identitymanagment

Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRajeswari Anand
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTJahid Khan Rahat
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideBlack Duck by Synopsys
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce ApplicationMufaddal Nullwala
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeBoyarMiller
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management Black Duck by Synopsys
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.pptreenu40
 
New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management Jerika Phelps
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementBlack Duck by Synopsys
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshellInitio
 

Ähnlich wie Identitymanagment (20)

Raji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.pptRaji unit3 ppt_blaw_bba.ppt
Raji unit3 ppt_blaw_bba.ppt
 
Carrie Peter
Carrie Peter Carrie Peter
Carrie Peter
 
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDASPPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
PPT - SIGMA-GIZ Academies - Topic 2 - DGconnect eIDAS
 
The general data protection act overview
The general data protection act overviewThe general data protection act overview
The general data protection act overview
 
INFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACTINFORMATION Communication Technology (ICT) ACT
INFORMATION Communication Technology (ICT) ACT
 
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_KaskPPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
PPT - SIGMA-GIZ Academies - Topic 2 - eID_Kask
 
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
BoyarMiller – To Shred or Not to Shred: Document Retention Policies and Spoli...
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical GuideFLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
eDem&eGov 2014
eDem&eGov 2014eDem&eGov 2014
eDem&eGov 2014
 
New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management New Security Legislation & It's Implications for OSS Management
New Security Legislation & It's Implications for OSS Management
 
IT ACT 2000.ppt
IT ACT 2000.pptIT ACT 2000.ppt
IT ACT 2000.ppt
 
New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management New Security Legislation & Its Implications for OSS Management
New Security Legislation & Its Implications for OSS Management
 
New Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS ManagementNew Security Legislation and its Implications for OSS Management
New Security Legislation and its Implications for OSS Management
 
Ppt
PptPpt
Ppt
 
GDPR in a nutshell
GDPR in a nutshellGDPR in a nutshell
GDPR in a nutshell
 

Mehr von ioannis iglezakis

Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile appsioannis iglezakis
 
τεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωντεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωνioannis iglezakis
 
Κανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας ΔεδομενωνΚανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας Δεδομενωνioannis iglezakis
 
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνεξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνioannis iglezakis
 
Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος ioannis iglezakis
 
Δυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουΔυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουioannis iglezakis
 
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδατο νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδαioannis iglezakis
 
Intellectual property issues for start ups
Intellectual property issues for start upsIntellectual property issues for start ups
Intellectual property issues for start upsioannis iglezakis
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...ioannis iglezakis
 
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...ioannis iglezakis
 
Elektronischer Geschäftsverkehr
Elektronischer GeschäftsverkehrElektronischer Geschäftsverkehr
Elektronischer Geschäftsverkehrioannis iglezakis
 

Mehr von ioannis iglezakis (12)

Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile apps
 
τεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριωντεχνολογιες & ασφαλεια πληροφοριων
τεχνολογιες & ασφαλεια πληροφοριων
 
Κανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας ΔεδομενωνΚανονισμος Προστασιας Δεδομενων
Κανονισμος Προστασιας Δεδομενων
 
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκωνεξελίξεις στη διαδικτυακή πώληση φαρμάκων
εξελίξεις στη διαδικτυακή πώληση φαρμάκων
 
Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος Όροι χρησης ηλεκτρονικου καταστηματος
Όροι χρησης ηλεκτρονικου καταστηματος
 
Δυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύουΔυσφήμηση ιατρών μέσω του διαδικτύου
Δυσφήμηση ιατρών μέσω του διαδικτύου
 
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδατο νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
το νομικό πλαίσιο του ηλεκτρονικού χρήματος στην ελλάδα
 
Hate speech on the internet
Hate speech on the internetHate speech on the internet
Hate speech on the internet
 
Intellectual property issues for start ups
Intellectual property issues for start upsIntellectual property issues for start ups
Intellectual property issues for start ups
 
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
The Right To Be Forgotten in the Google Spain Case (case C-131/12): A Clear V...
 
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
Προστασία προσωπικών δεδομένων στις υπηρεσίες κοινωνικής δικτύωσης με βάση τη...
 
Elektronischer Geschäftsverkehr
Elektronischer GeschäftsverkehrElektronischer Geschäftsverkehr
Elektronischer Geschäftsverkehr
 

Kürzlich hochgeladen

如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General ProcedureBridgeWest.eu
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGPRAKHARGUPTA419620
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书Fir L
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...James Watkins, III JD CFP®
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 

Kürzlich hochgeladen (20)

如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Cleades Robinson's Commitment to Service
Cleades Robinson's Commitment to ServiceCleades Robinson's Commitment to Service
Cleades Robinson's Commitment to Service
 
Debt Collection in India - General Procedure
Debt Collection in India  - General ProcedureDebt Collection in India  - General Procedure
Debt Collection in India - General Procedure
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKING
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 25 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
如何办理美国加州大学欧文分校毕业证(本硕)UCI学位证书
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...The Active Management Value Ratio: The New Science of Benchmarking Investment...
The Active Management Value Ratio: The New Science of Benchmarking Investment...
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 

Identitymanagment

  • 1. IDENTITY MANAGEMENT IN E- GOVERNMENT Ioannis Iglezakis, Associate Professor, Aristotle University, Faculty of Law
  • 2. The development of e- Government in the EU • Top priority issue - The European eGovernment Action Plan 2011-2015 • the use of information and communication technologies in public administration combined with organisational change and new skills in order to improve public services and democratic processes and strengthen support to public policies
  • 3. Identity management in eGovernment • Key aspect: processes that are involved in the provision of eGovernment services rely profoundly on secure identification policies
  • 4. Definition of Identity management • the set of policies, rules, mechanisms, processes and applications that deal with identifying individuals in a system (an application, a network, or an organisation) and controlling their access to resources within that system by associating user rights and restrictions with the established identity. • The objective of identity management is to improve productivity and security while lowering costs associated with managing users and their identities, attributes, and credentials
  • 5. Components of Identity management • Authentication: the process of establishing the validity of a user attempting to gain access to a service. Authentication methods include: user name and password; token; biometrics; digital certificates (PKI, smart cards). • Access control (or authorisation): the process of limiting users’ access to resources and data they have specific permissions to use. • Accounting: the process of keeping track of a user's activity while accessing the service or the network resources. • User management: the process of activating and de-activating users’ identities and access permissions
  • 6. Use of eIDMS • An eIDMS basically serves the identification and authentication of users of governmental services. • Identification: • registration process: it consists in the process of using already given attributes of an entity to establish an identity for that entity; • per se identification process: it consists in the verification of the identity of an entity
  • 7. Use of eIDMS • Authentication is the verification of a claim by an entity, which may also involve identification. In the framework of eGovernment it has great importance, as it is the basic requirement for accessing electronic services. • A request for authentication requires that an asserting entity presents some form of evidence to prove that it is in fact who it claims to be.
  • 8. Use of eIDMS • Authentication on the basis of the following data: • User name/ password • Passport or ID card /biometric reference data and citizens registers • Administration cards and reference databases • eHealth cards and reference data of health insurance holders • Digital Signature Cards and PKI • authorization = determining the permissions of an entity that requests the execution of a defined action, that is, to: ‘read’, ‘modify’, ‘create’ and/or ‘delete’.
  • 9. Specific Issues with regard to eIDMS • No consistent approach as regards interoperability • The systems adopted by EU various Member States employ varied technologies for hardware tokens (smart-cards, mobile phones, etc.), biometrics (fingerprint, facial, etc.) and digital signatures. • Lack of trust of other Member States’ certification services • Prohibition, de jure or de facto, of the use of authentication or authorization from other MS
  • 10. Specific Issues with regard to eIDMS • Lack of privacy, conceived as lack of control over personal data; • Lack of transparency, as the processing of personal data is not clear in its full extent; • Lack of auditability of the system; • Lack of enforceability of privacy and data protection rights
  • 11. Regulation No 910/2014 on Electronic Identification and Trust Services It creates a European internal market for electronic identification and electronic trust services, including: • electronic signatures; • Time stamping; • Electronic seal; • Electronic delivery; • Legal admissibility of electronic documents to ensure their authenticity and integrity; • Website authentication.
  • 12. Regulation 210/2014 • Mutual recognition of eID schemes – Requirements: • (a) the electronic identification means is issued under an electronic identification scheme that is included in the list published by the Commission; • (b) the assurance level of the electronic identification means corresponds to an assurance level equal to or higher than the assurance level required by the relevant public sector body to access that service online in the first Member State, provided that the assurance level of that electronic identification means corresponds to the assurance level substantial or high; • (c) the relevant public sector body uses the assurance level substantial or high in relation to accessing that service online. In case, however, the assurance level is low, it is not mandatory to recognise an eID scheme.
  • 13. Regulation 910/2014 • An electronic identification is eligible for notification if it meets certain criteria, e.g., that the eID means are issued by the notifying Member State or under a mandate from that State or are recognized by that, it can be used to access at least one service provided by a public service body, the eID means and the eID scheme meet the requirements of at least one of the aforementioned assurance levels, etc.
  • 14. Regulation 910/2014 – Notification: • (a) a description of the electronic identification scheme, including its assurance levels and the issuer or issuers of electronic identification means under the scheme; • (b) the applicable supervisory regime and information on the liability regime with respect to the following: (i) the party issuing the electronic identification means; and (ii) the party operating the authentication procedure; • (c) the authority or authorities responsible for the electronic identification scheme; • (d) information on the entity or entities which manage the registration of the unique person identification data; • (e) a description of how the requirements set out in the implemaenting acts are met; • (f) a description of authentication; (g) arrangements for suspension or revocation of either the notified electronic identification scheme or authentication or the compromised parts concerned.
  • 15. Interoperability • To fully implement the provisions on recognition of eIDs, it is provided for that national eID schemes notified must be interoperable. Criteria of the interoperability framework: • (a) it aims to be technology neutral and does not discriminate between any specific national technical solutions for electronic identification within a Member State; (b) it follows European and international standards, where possible; (c) it facilitates the implementation of the principle of privacy by design; and (d) it ensures that personal data is processed in accordance with Directive 95/46/EC.
  • 16. Data Protection • The Proposal for an EU Data Protection Regulation, however, provides for the principles of data protection by design and by default (Article 23) • The controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures and procedures in such a way that the processing will meet the requirements of the legal framework and ensure the protection of the rights of the data subject. And also, he/she should implement mechanisms for ensuring that, by default, only those personal data are processed which are necessary for each specific purpose of the processing and are especially not collected or retained beyond the minimum necessary for those purposes, both in terms of the amount of the data and the time of their storage.
  • 17. Data Protection Principles • Fair and Lawful Processing: personal data must be processed fairly and lawfully; • Purpose specification and purpose limitation: personal data must be adequate, relevant and not excessive in relation to the purposes for which they are collected and/or further processed; • Data minimization: personal data must be accurate and, where necessary, kept up to date; every reasonable step must be taken to ensure that data which are inaccurate or incomplete, having regard to the purposes for which they were collected or for which they are further processed, are erased or rectified; • Data Preservation: personal data must be kept in a form which permits identification of data subjects for no longer than is necessary for the purposes for which the data were collected or for which they are further processed;
  • 18. Data Protection • Furthermore, data processing must be in accordance with the rights of data subjects, which are established with the Directive, i.e., the right to information, the right of access to data, the right to object and the right to oppose to automated individual decisions • it is crucial to ensure that users are informed about the privacy implications of using such systems. • this requirement could hinder the deployment of single sign-on services
  • 19. Data Protection • multi-layered information notices: i) the short notice, which must offer the core information (identity of the controller and purposes of processing) and any additional information which in view of the particular circumstances of the case must be provided beforehand to ensure a fair processing, ii) the condensed notice, which provides all relevant information required, and iii) the full notice, which includes all national legal requirements and specificities.
  • 20. Control over personal data – two tendencies • one considering that citizens must keep their data under control at all stages of the administrative procedures, and that they must have an information feedback on the data exchanges concerning any decision taken about them. • The second tendency consists in considering that administrative simplification necessarily operates at the price of a certain loss of control of the user’s own personal data
  • 21. Data protection • defining roles and responsibilities is necessary in such situations where personal data are processed in cooperation between participants in an identity management system. • The Art. 29 Working Party suggests to consider all participating sites in an identity management scheme as controllers in respect of their own processing operations.
  • 22. Conclusion The transformation of the public administration in the 21st century is a key issue for an efficient state and an open democratic society.