SlideShare una empresa de Scribd logo
1 de 42
Access Cards and Identity Management  Is It Worthwhile? Presenter Robert Bromwich   BBA  CQU 2008 RMAA Conference Sydney NSW Australia
Presentation  Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Objectives ,[object Object]
Presentation Objectives ,[object Object],[object Object]
Presentation and Paper Scope  ,[object Object],[object Object],[object Object]
Australian System  Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Legislative Basis ,[object Object],[object Object],[object Object]
Aims of Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of Scheme (#1) ,[object Object],[object Object]
Interaction with AGAF ,[object Object],[object Object]
United States of America System Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
REAL-ID Legislative Basis ,[object Object],[object Object]
REAL-ID Program Aims  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Program Consequences  ,[object Object],[object Object],[object Object],[object Object]
REAL-ID Program Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REAL-ID Implementation ,[object Object],[object Object],[object Object]
REAL-ID Key Dates ,[object Object],[object Object],[object Object],[object Object]
United Kingdom System Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Basis of Scheme ,[object Object],[object Object],[object Object]
Purpose of Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information held by system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Program Implementation ,[object Object],[object Object],[object Object]
Interplay of Identity Theft and Identity Schemes or … . How to confuse the government without really trying
Identity Theft Defined ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft Defined ,[object Object],[object Object],[object Object],[object Object],[object Object]
Systems Commonality  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Data Breaches ,[object Object],[object Object]
Examples of Data Breaches ,[object Object]
Identity Theft Costs - Targets ,[object Object],[object Object],[object Object]
Identity Theft Costs - Financial ,[object Object],[object Object],[object Object]
Individual Program Cost Comparison US$11 billion (NCSL/NGA/AAMVA 2007) state incurred REAL ID External Costs Official Cost and Savings Program
Individual Program Cost Comparison A$15 billion (ACCI 2005) A$1 billion cost A$3 billion saving (over 10 years) HWAC External Costs Official Costs Program
Individual Program Cost Comparison £12 billion to £18 billion (LSE 2006) £5.612 billion cost (over 10 years, Nov 2007) UK ID Card External Costs Official Cost and Savings Program
Identity Theft Costs - Awareness ,[object Object],[object Object],[object Object]
The Big Question Is it Worthwhile?
Laws of Data Smog as they apply to identity cards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Laws of Data Smog as they apply to identity cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Laws of Data Smog as they apply to identity cards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Program Effectiveness ,[object Object],[object Object]
Program Effectiveness ,[object Object]
Identity Theft Counter Prevention Strategies ,[object Object],[object Object],[object Object]
Presentation Conclusion

Más contenido relacionado

La actualidad más candente

Right to Information Act, 2005
Right to Information Act, 2005Right to Information Act, 2005
Right to Information Act, 2005
student
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
Patton Boggs LLP
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.feature
Divya Gigy
 
Role of PIOs and APIOs
Role of PIOs and APIOsRole of PIOs and APIOs
Role of PIOs and APIOs
Kapoor Rakesh
 
Right_to_Information_overview
Right_to_Information_overviewRight_to_Information_overview
Right_to_Information_overview
rtizindabad
 
Presentation 01
Presentation 01Presentation 01
Presentation 01
vindya
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes Off
Patton Boggs LLP
 

La actualidad más candente (20)

Right to Information Act, 2005
Right to Information Act, 2005Right to Information Act, 2005
Right to Information Act, 2005
 
Right To Information (RTI)
Right To Information (RTI)Right To Information (RTI)
Right To Information (RTI)
 
Fasten Your Belts for #GDPR
Fasten Your Belts for #GDPRFasten Your Belts for #GDPR
Fasten Your Belts for #GDPR
 
Fasten Your Belts for GDPR
Fasten Your Belts for GDPRFasten Your Belts for GDPR
Fasten Your Belts for GDPR
 
The Conversation Continues: Where International Data Transfers Stand
The Conversation Continues: Where International Data Transfers Stand The Conversation Continues: Where International Data Transfers Stand
The Conversation Continues: Where International Data Transfers Stand
 
Right to Information Act(RTI)
Right to Information Act(RTI)Right to Information Act(RTI)
Right to Information Act(RTI)
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
 
Right To Information Act 2005
Right To Information Act 2005Right To Information Act 2005
Right To Information Act 2005
 
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentUSA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.feature
 
Role of PIOs and APIOs
Role of PIOs and APIOsRole of PIOs and APIOs
Role of PIOs and APIOs
 
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
 
Right_to_Information_overview
Right_to_Information_overviewRight_to_Information_overview
Right_to_Information_overview
 
The collection of statistics act, 2008
The collection of statistics act, 2008The collection of statistics act, 2008
The collection of statistics act, 2008
 
Presentation 01
Presentation 01Presentation 01
Presentation 01
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes Off
 
The Right To Information Act (RTI), 2005
 The Right To Information Act (RTI), 2005 The Right To Information Act (RTI), 2005
The Right To Information Act (RTI), 2005
 
RTI - Rakesh Dubbudu
RTI - Rakesh DubbuduRTI - Rakesh Dubbudu
RTI - Rakesh Dubbudu
 
Regulatory Compliance in Colombia
Regulatory Compliance in ColombiaRegulatory Compliance in Colombia
Regulatory Compliance in Colombia
 

Similar a Access Cards and Identity Management - is it worthwhile?

httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 

Similar a Access Cards and Identity Management - is it worthwhile? (20)

CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
 
Global Evolution of Data Sharing
Global Evolution of Data SharingGlobal Evolution of Data Sharing
Global Evolution of Data Sharing
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Fbi sec inform
Fbi sec informFbi sec inform
Fbi sec inform
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
02_Exthand.pptx
02_Exthand.pptx02_Exthand.pptx
02_Exthand.pptx
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for Government
 
Digital – blue skies or a perfect storm for the taxman capgemini consulting...
Digital – blue skies or a perfect storm for the taxman   capgemini consulting...Digital – blue skies or a perfect storm for the taxman   capgemini consulting...
Digital – blue skies or a perfect storm for the taxman capgemini consulting...
 
Digital blue skies or a perfect storm for the taxman - our take on the impa...
Digital   blue skies or a perfect storm for the taxman - our take on the impa...Digital   blue skies or a perfect storm for the taxman - our take on the impa...
Digital blue skies or a perfect storm for the taxman - our take on the impa...
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
 
Cyber Insurance as Digital Strategy
Cyber Insurance as Digital StrategyCyber Insurance as Digital Strategy
Cyber Insurance as Digital Strategy
 
Digital – Blue Skies or a Perfect Storm for the Taxman?
Digital – Blue Skies or a Perfect Storm for the Taxman?Digital – Blue Skies or a Perfect Storm for the Taxman?
Digital – Blue Skies or a Perfect Storm for the Taxman?
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
The Panama Papers: What now for Jersey?
The Panama Papers: What now for Jersey? The Panama Papers: What now for Jersey?
The Panama Papers: What now for Jersey?
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Access Cards and Identity Management - is it worthwhile?

  • 1. Access Cards and Identity Management Is It Worthwhile? Presenter Robert Bromwich BBA CQU 2008 RMAA Conference Sydney NSW Australia
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Interplay of Identity Theft and Identity Schemes or … . How to confuse the government without really trying
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Individual Program Cost Comparison US$11 billion (NCSL/NGA/AAMVA 2007) state incurred REAL ID External Costs Official Cost and Savings Program
  • 32. Individual Program Cost Comparison A$15 billion (ACCI 2005) A$1 billion cost A$3 billion saving (over 10 years) HWAC External Costs Official Costs Program
  • 33. Individual Program Cost Comparison £12 billion to £18 billion (LSE 2006) £5.612 billion cost (over 10 years, Nov 2007) UK ID Card External Costs Official Cost and Savings Program
  • 34.
  • 35. The Big Question Is it Worthwhile?
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.

Notas del editor

  1. Introduction slide
  2. Presentation overview
  3. Presentation overview
  4. Presentation overview
  5. Presentation scope
  6. Australian Welfare Access Card introduction
  7. HWAC Introduction
  8. HWAC overview
  9. HWAC Program elements
  10. HWAC interaction with AGAF