DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010
|
|
|
- Tiffany Curtis
- 10 years ago
- Views:
Transcription
1 DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1
2 1 Introduction This document is intended to describe the forming the Identity Component of the pan Canadian Identity Management and Authentication Framework. The is intended to be used as a standardized tool by jurisdictions to develop processes to verify and validate the identity of individuals that can be evaluated against a common set of Assurance Levels defined in the pan Canadian Assurance Model. This is expected to enhance the ability of Identity Management Services to interoperate between jurisdictions and improve the consistency of the experiences of citizens and businesses when interfacing with Identity Management Services in Canada regardless of the jurisdiction or level of government. 1.1 Pan Canadian Identity Management and Authentication Framework The Identity Component is one of seven components identified in the Pan Canadian Identity Management Framework. The diagram below depicts the Identity Component in the context of the overall Identity Management and Authentication Framework. An initial description of the Identity Component is provided in section A.7 of the Annex of the Pan Canadian Strategy for Identity Management. This document expands upon and enhances the initial description. Pan Canadian Identity Management & Authentication Framework Page 2
3 The Pan Canadian Strategy for Identity Management identified six areas that the Identity Component should address: 1. Identity Context Identity Context is the situation or context in which an identity (or person) operates (i.e., as a parent, patient, business representative, etc.). 2. Separation of Identity Contexts or Roles It should be possible to separate a person s professional identity from personal or other identities. It may be beneficial to group users with similar contexts into categories to simplify deployment and management of Identity Management Services. 3. Identity Types or User Groups As a starting point, three different identity contexts should be considered by defining three user groups Citizen Government identities (external individuals), Business Government Identities (external organizations) and Government Government identities (internal individuals). 4. Applicable Identity Attributes by Type Attributes are qualities or characteristics of individuals or organizations. A collection of attributes can be used to verify or validate the identity of an individual. 5. The Identity lifecycle the identity lifecycle establishes stages for the creation, use, termination and archival of physical and electronic credentials that apply to each identity type. 6. Agents, dependents and designates/delegates The Identity Component should also deal with the issue of agency, dependants, designates and delegates. Section A6 of the Annex of the Pan Canadian Identity Management Framework describes the initial description of the Assurance Component, which also addresses certain Identity Assurance Components. The Pan Canadian Assurance Model document primarily addresses these components, however, in implementing the pan Canadian Strategy for Identity Management, specific elements of Identity are addressed in this document. This document further enhances and expands upon section A6.1. Identity Assurance and section A6.5 Registration. 1.2 Document Status This is a draft document under development by the Working Group for the Identity Management Steering Committee. Please contact the document editor with questions or comments as appropriate: Michael Crerar Director of Information Security Policy and Planning Corporate Information Security Office Government of Alberta [email protected] Pan Canadian Identity Management & Authentication Framework Page 3
4 2 Document Overview As described in the Pan Canadian Assurance Model draft, Identity Assurance is the level of confidence that the client is really who they claim to be. This document, the, elaborates three separate areas: The Identity Attributes that characterize an individual. Identity Attributes are generally asserted by (or about) an individual. The Authentication Processes that are applied against Identity Attributes to verify the accuracy of an assertion or validate the assertion against an attribute that has been verified The criteria used to evaluate the Identity Assurance Level resulting from Authentication Processes The underlying artifacts and concepts are: Identity Management Assurance model Describes the concept of identity assurance and credential assurance and the relationship between them. Describes the fact that there are Levels within each assurance category. Describes the parties and roles involved in the assurance activities: standards authority, Authoritative Party, Relying Party, Client The Pan Canadian Assurance Model is one identity management assurance model. Jurisdictions may want to create their own Pan Canadian Identity Management & Authentication Framework Page 4
5 profile of the Identity Management Assurance Model. E.g. Alberta has created its IdM&A Directive which sets the IdM Assurance model for Alberta. Identity information attribute assertions The assertions and classes of assertion to be authenticated. This includes all the typical identity information elements such as legal name, date of birth, address of record, citizenship and so on. Also includes identity relationship assertions for guardianship, trustee, family unit, and so on This may be a data element or data model standard. E.g. data format for names, date of birth, etc. Identity Authentication processes a.k.a. Identity Proofing processes These are the business processes that are applied to verify identity attribute assertions. Each business process can be compared against a set of criteria to categorize which assurance level the process meets. The result of identity authentication processes is the identity assurance level for the identity information attribute or assertion The processes are performed by Authoritative Parties Identity Management Assurance Standard This is the set of criteria that comprise the Identity Management Assurance Standard. The identity authentication processes are evaluated against a set of criteria with parameters that rise in stringency as the target assurance level rises. The criteria should be independent of the business processes and based on how strongly the accuracy or correctness of an attribute can be trusted. 3 Definitions The Definition of Key Terms found in section 5 of the Pan Canadian Assurance Model should be referenced. This section identifies several terms to augment those terms. Pan Canadian Identity Management & Authentication Framework Page 5
6 Determination of Assurance captures the stringency of the decision making process (or the adjudication). These requirements may include and range from blanket operational approval to separation of duties or authorized officers, etc. Validation is the process that uses objective evidence to confirm that the information being used or presented is the same as the information collected at the outset (refer to verification). Verification is the process that uses objective evidence to confirm the truth or accuracy of a fact or claim (ensures that the information collected at the outset is truthful and accurate) 4 Identity Assurance Levels The Identity Assurance Levels from Table 4 in the Pan Canadian Assurance Model are used as part of the. These are reproduced here for reference purposes. Identity Assurance Level None Level 1 Level 2 Level 3 Level 4 Identity Assurance Level Description No confidence required that the client is really who they claim to be or that the client is claiming a stolen or fictitious identity. Little confidence required that the client is really who they claim to be or that the client is claiming a stolen or fictitious identity. Some confidence required that the client is really who they claim to be or that the client is claiming a stolen or fictitious identity. High confidence required that the client is really who they claim to be or that the client is claiming a stolen or fictitious identity. Very high confidence required that the client is really who they claim to be or that the client is claiming a stolen or fictitious identity. 5 Identity Attribute Information 5.1 Identity Attribute Categorization Identity attributes can be organized into three categories: 1) Biographical attributes that provide an account of an individual s life such as Name, Date of Birth, Place of Birth, Gender, Mother s Maiden Name. 2) Biometric attributes that provide an account of an individual s physical characteristics such as an Iris Pattern, Fingerprint, Face, Voice, or Finger Veins. 3) Assigned attributes that have been assigned to an individual by a third party such as Social Insurance Number, Passport Number, Birth Registration Number, or Student Identification Number. Pan Canadian Identity Management & Authentication Framework Page 6
7 5.2 Identity Attribute Context The provides for separation of Identity Contexts and specifically considers three categories of identities or users. Each category may be further divided or additional categories may be established by jurisdictions as required. The three categories of users specifically considered are: 1) Citizen to Government (C2G) This category which is sometimes referred to as external individuals includes all individuals who request or receive services from government. 2) Business to Government (B2G) This category which is sometimes referred to as external organizations includes businesses and other external organizations (societies, not for profit organizations) that interact with government. In some jurisdictions, this may also include the broader public sector (e.g. school boards, health authorities, etc.). The business or external organization is generally accountable for all actions of individuals acting on its behalf. 3) Government to Government (G2G) This category which is sometimes referred to as internal individuals includes government employees, or other individuals acting in that capacity (e.g., contractors, business partners or other affiliates that provide services on behalf of government). 6 Authentication Processes for Identity Attributes Where verification of a real world identity is required by the registration process (i.e., for Medium level identification or higher), proof of identity (or assurance of an identity claim) is commonly established by relying on authoritative parties. There are two primary ways that organizations rely on authoritative parties when verifying identity claims (and sometimes both methods are used): 1) Evidence Based Identity Proofing An assertion of an identity attribute is assured through the presentation and verification of documentary evidence that has been issued by an authoritative party (e.g., a citizen or business representative presents government issued photographic documentation at a counter). This document standardizes what constitutes acceptable evidence and what documents are authoritative on which identity attributes. 2) Authoritative Party Based Identity Proofing An assertion of an identity attribute is assured through direct verification or validation by an authoritative party (e.g., Vital Statistics Agency, Revenue Canada) and/or corroborated by a trusted third party professional (e.g., lawyer, doctor, minister). The verification process may involve the exchange or confirmation of shared secrets. This document standardizes what and/or who constitutes an authoritative party. An assertion of a identity attributes can assured by comparing the asserted attribute with an attribute on documentary evidence issued by an authoritative party or by direct verification or validation by an authoritative party. In practice, often biographic and biometric identity attributes are assured by comparing the asserted attribute with an attribute on documentary evidence. For example, where name or date of birth attributes are assured, a comparison of the asserted attributes with name and date of birth attributes on a birth certificate can be compared. Where the facial image attribute is assured, the asserted attribute and the facial image on a provincial motor vehicle license are compared. Pan Canadian Identity Management & Authentication Framework Page 7
8 There may be processes where biometric or biographic attributes are assured by direct verification or validation by an authoritative party. For example, a trusted party may validate an assertion that a facial image is that of an individual known to the trusted party. Assigned attributes are often assured by either method. 6.1 Identity Attribute Examples This section identifies some examples of biometric, biographic and assigned identity attributes that are used during identity verification processes Biographic Identity Attributes This section identifies some biographic identity attributes that are used during identity verification processes. 1. Legal Name 2. Date of Birth 3. Place of Birth 4. Gender Biometric Identity Attributes This section identifies some biometric identity attributes that are used during identity verification processes. 1. Face or Facial Image 2. Fingerprint 3. Iris Pattern Assigned Identity Attributes This section identifies some assigned identity attributes that are used during identity verification processes. 1. Motor Vehicle Operator License Number 2. Provincial Health Care Insurance Number 3. Social Services Benefit Number 4. Code or Phrase provided to individual out of band 5. Assigned or Calculated value known by an individual or organization but not likely known by others 6.2 Strong and Weak Factors Identity attributes may be presented individually, but in most cases presented as a combination that can be presented as a piece of documentary evidence or directly verified or validated by an authoritative party. For example, an Alberta provincial Health Insurance Card contains: Name Pan Canadian Identity Management & Authentication Framework Page 8
9 Date of Birth Gender Personal Health Number A particular combination of identity attributes can be treated as a single factor used in an identity verification process. The strength of a factor is determined by what identity attributes can be verified or validated using that factor and the level of certainty that those identity attributes are accurate. A factor used in an identity verification process should: Be created or managed by a documented process under authority of a Policy, Legislation or Regulation; Be subject to routine review and audit; and Have a clearly defined purpose or use. A strong factor should have the following characteristics: Includes at least one biometric identity attribute or at least one assigned attribute where there is a high level of confidence that the attribute is only known to the individual or organization assigned the attribute and the issuer of the attribute; and Be widely used by most provincial governments (and possibly other levels of governments or private sector organizations); Be embodied in documentary evidence where it is difficult to forge and possible to detect tampering or forgery attempts. If a factor is not a strong factor, it should be treated as a weak factor. Some examples of strong factors are: Provincial Motor Vehicle Operators License Provincial Identity Card (with photo) Canadian Passport Provincial Health Care Insurance Card (with photo) Pass code or phrase provided to an individual out of band Documentary evidence issued by other jurisdictions (within Canada and international) may be treated as strong factors provided they have the characteristics of a strong factor. For example, motor vehicle operators licenses issued by jurisdictions outside Canada may be accepted as strong factors but may be subjected to further investigation or assessment to confirm their legitimacy. An identity verification process may require more than one factor be involved in verifying or validating identity attributes. When more than one factor is required, factors should be independent from one another. This means that factors should be created or managed by different authoritative parties. For Pan Canadian Identity Management & Authentication Framework Page 9
10 example, one factor may be managed by Alberta Registries and another managed by Alberta Sustainable Resource Development. 7 Criteria for Verifying or Validating Identity Attributes This section identifies the what identity attributes should be asserted in order to achieve a specific level of assurance and identifies the criteria for verifying or validating identity attributes at each level of assurance. The criteria established requires that the factors that comprise an assertion be of greater quality and represent multiple sources in order to meet greater levels of Identity Assurance. The following table represents the overall criteria. The table describes four sets or criteria that must be considered. 1) Attribute Categorization. What attributes are acceptable? Biographic, Biometric or Assigned? 2) What evidence must be provided to communicate the identity attributes? 3) What authentication processes must be applied to verify or validate the identity attributes? 4) Determination of Assurance. Who makes the final decision to approve that and individual or organization has met the requirements of an identity verification process? For the 4 levels of identity assurance, the processes of verification and validation are based upon a combination of and will have differing requirements for factor types, factor independence and factor strength. Attribute Categorization Level 1 Level 2 Level 3 Level 4 Biographic: Biographic: Biographic: Biographic: Biometric: Biometric: Biometric: Biometric: Assigned: Assigned: Assigned: Assigned: Evidence Any factor 1 strong factor 2 strong factors or 1 strong factor and 2 weak factors 3 strong factors or 2 strong factors and 2 weak factors elements) Validation and Verification Process No validation or verification required In person Verified and validated by authorized official. Remote Automated In person Verified by authorized official. Validated against source record. In person Verified by authorized official. Validated against source record. Pan Canadian Identity Management & Authentication Framework Page 10
11 verification, validated against source record. Remote Automated verification. Remote Not permitted. Determination of Assurance (adjudication) Departmental/ Agency authority Blanket Operational Authority Validated against source record Authorized Officer (s) Authorized Officer (s) Separation of duties 7.1 Level One (Little Confidence) Evidence In Person Public Verification Self assertion of ID Remote Public Verification Phone # or e mail Verification In Person Public Verification Accept assertion Remote Public Verification Call phone # Send confirmation e mail and receive positive acknowledgement 7.2 Level Two (Some Confidence) Evidence In Person Public Verification Primary Government photo ID Remote Public Verification Submits reference of and attests to current possession of at least one primary Government photo ID, and Pan Canadian Identity Management & Authentication Framework Page 11
12 2nd Government photo ID, or Student/employee ID # Financial account # Utility account # and Additional verifiable personal information that at a min. must include; Name that matches photo ID Date of birth Current address or personal telephone # Verification 7.3 Level Three(High Confidence Evidence Verification 7.4 Level Four (Very High Confidence) Evidence Verification Pan Canadian Identity Management & Authentication Framework Page 12
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or
SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals
Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals and protect people, information, buildings, countries
Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,
This document is scheduled to be published in the Federal Register on 09/05/2013 and available online at http://federalregister.gov/a/2013-21491, and on FDsys.gov Billing Code 3510-13 DEPARTMENT OF COMMERCE
BC SERVICES CARD DIRECTION
BC SERVICES CARD DIRECTION TO: THE PROVINCIAL IDENTITY INFORMATION SERVICES PROVIDER DIRECTION: 1/12 SUBJECT: Direction to the Provincial Identity Information Services Provider respecting the BC Services
The Leading Provider of Identity Solutions and Services in the U.S.
THE IDENTITY COMPANY The Leading Provider of Identity Solutions and Services in the U.S. MorphoTrust USA MorphoTrust USA Our Value Uniquely Identifying Individuals: MorphoTrust is entrusted to ensure that
esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?
esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents
Digital Records Preservation Procedure No.: 6701 PR2
Digital Records Preservation Procedure No.: 6701 PR2 Policy Reference: Category: Department Responsible: Current Approved Date: 6700 Records Management Information Management Records Management and Privacy
NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
PERSONAL IDENTITY INFORMATION DIRECTION
PERSONAL IDENTITY INFORMATION DIRECTION TO: THE INSURANCE CORPORATION OF BRITISH COLUMBIA DIRECTION: 1/13 SUBJECT: Direction on Identity-Proofing Applicants for the BC Services Card AUTHORITY: This direction
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Learning English with CBC Radio Living in Alberta. Identity Theft
Learning English with CBC Radio Living in Alberta Identity Theft by Maroro Zinyemba Project Manager: Justine Light Daylight Consulting Inc. Integration Enhancement Lesson: Identity Theft CLB Level: 6 CLB
An affidavit is a document containing a statement that the deponent swears to be true to the best of their knowledge.
Affidavit An affidavit is a document containing a statement that the deponent swears to be true to the best of their knowledge. The commissioner then signs as confirmation that the oath or affirmation
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0. April 28, 2013
Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0 April 28, 2013 Prepared by: Office of the Comptroller of the Currency (OCC) Security & Compliance Services (SCS) DOCUMENT
Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center
Life After PIV Authentication In Federated Spaces Presented to Card Tech/Secure Tech By Lynne Prince Defense Manpower Data Center Interoperability with HSPD12 Capability PIV provides a secure common credential,
IDIM Privacy Enhancing Features Summary Identity Information Management Project (IDIM) Integration Infrastructure Program (IIP) Office of the CIO
IDIM Privacy Enhancing Features Summary Identity Information Management Project (IDIM) Integration Infrastructure Program (IIP) Contact: Peter Watkins Phone: 250 387-2184 Email: [email protected]
Application of Biometric Technology Solutions to Enhance Security
Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher
Provincial IDIM Program BC Services Card Project Identity Assurance Services Solution Architecture Overview
Provincial IDIM Program BC Services Card Project Identity Assurance Services Version: 0.6 2014-03-14 Document Information Document title IAS Document file name IAS Solution Architecture Introduction.docx
2. Privacy Policy Guidance Memorandum 2008-02, OHS Policy Regarding Privacy Impact Assessments (December 30, 2008)
3/30/2016 IV. Definitions 1. Privacy Policy Guidance Memorandum 2008-01, The Fair Information Practice Principles: Framework for Privacy Policy at the Department of Homeland Security (December 29, 2008)
1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.
+ Expiration date + Agency card serial number (back of card) + Issuer identification (back of card). The PIV Card may also bear the following optional components: + Agency name and/or department + Department
Introduction to Online Identity Management By Thomas J. Smedinghoff 1
Introduction to Online Identity Management By Thomas J. Smedinghoff 1 1. Identity Management Basics... 3 (a) Identification... 4 (1) Scope and Accuracy... 5 (2) Issuance of Credential... 6 (b) Authentication...
esign Online Digital Signature Service
esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities
Veda: Fraud Focus Group Forum
Veda: Fraud Focus Group Forum Identity Crime Trends, Risks and Solutions Dr Russell G Smith Principal Criminologist Outline Identity crime concepts The scope of identity crime Identity crime taxonomies
Identity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS
SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS The number of people in need of medical care in the world is continuously increasing, as evidenced by the evolving demographic outlook in both developed
Government of Canada Update. Municipal CIO Summit April 10-12, 2014 Banff, AB
Government of Canada Update Municipal CIO Summit April 10-12, 2014 Banff, AB Outline Government of Canada Update Road Map & Policy Architecture Cyber Authentication Statistics Usage Statistics to date
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
BLUEPRINT FOR THE FEDERATION OF IDENTITY MANAGEMENT
BLUEPRINT FOR THE FEDERATION OF IDENTITY MANAGEMENT Identity Policy and Programs (IPP) June 7, 2010 - Draft Page 1 of 29 TABLE OF CONTENTS BLUEPRINT FOR THE...4 Executive Summary...4 FEDERATION OF IDENTITY
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System Issued by: Stuart Frisch, Senior Component Official for Privacy Reviewed by: Vance E. Hitch,
Report to the Council of Australian Governments. A Review of the National Identity Security Strategy
Report to the Council of Australian Governments A Review of the National Identity Security Strategy 2012 Report to COAG - Review of the National Identity Security Strategy 2012 P a g e i Table of contents
Digital Identity Management
Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University [email protected] Digital Identity Management What is DI? Digital identity (DI)
Auditor General of Canada to the House of Commons
2009 Report of the Auditor General of Canada to the House of Commons Managing Identity Information Office of the Auditor General of Canada The Report is available on our website at www.oag-bvg.gc.ca. For
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
Tasmanian Government Identity and Access Management Toolkit
Tasmanian Government Identity and Access Management Toolkit Summary January 2010 Department of Premier and Cabinet For further information on the Toolkit, contact the Office of egovernment: [email protected]
VENDOR / CONTRACTOR. Privacy Basics
VENDOR / CONTRACTOR Privacy Basics Introduction Premera s mission is to provide our customers with peace of mind about their healthcare. This requires that everyone who works with or for Premera (the Company
Service Alberta BUSINESS PLAN 2010 13
Service Alberta BUSINESS PLAN 2010 13 Service Alberta BUSINESS PLAN 2010-13 ACCOUNTABILITY STATEMENT The business plan for the three years commencing April 1, 2010 was prepared under my direction in accordance
This Instruction implements Department of Homeland Security (DHS) Directive 110-01, Privacy Policy for Operational Use of Social Media.
I. Purpose Department of Homeland Security DHS Directives System Instruction Number: 110-01-001 Revision Number: 00 Issue Date: 6/8/2012 PRIVACY POLICY FOR OPERATIONAL USE OF SOCIAL MEDIA This Instruction
The Manitoba Identification Card. Secure proof of age, identity and Manitoba residency
The Manitoba Identification Card Secure proof of age, identity and Manitoba residency The Manitoba Identification Card A voluntary option for Manitoba residents The Manitoba Identification Card is a voluntary,
11 Date of issue YYYY-MM-DD. If you are married, is your spouse a Canadian citizen or permanent resident?
Citizenship Immigration Canada Citoyenneté et Immigration Canada PROTECTED WHEN COMPLETED - B PAGE 1 OF 4 VERIFICATION OF STATUS (VOS) REPLACEMENT OF AN IMMIGRATION DOCUMENT (To be completed returned with
UNCITRAL United Nations Commission on International Trade Law Introduction to the law of electronic signatures
Introduction to the law of electronic signatures Luca Castellani Head, Regional Centre for Asia and the Pacific UNCITRAL Secretariat Incheon, Republic of Korea Outline 1. Methods and technologies for electronic
For Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
Understanding Digital Signature And Public Key Infrastructure
Understanding Digital Signature And Public Key Infrastructure Overview The use of networked personnel computers (PC s) in enterprise environments and on the Internet is rapidly approaching the point where
MANITOBA DENTAL ASSOCIATION 202-1735 Corydon Avenue, Winnipeg, MB, R3N 0K4 www.manitobadentist.ca
MANITOBA DENTAL ASSOCIATION INSTRUCTIONAL GUIDE FOR COMPLETING DENTAL ASSISTANT REGISTRATION APPLICATION FORM MANITOBA DENTAL ASSOCIATION 202-1735 Corydon Avenue, Winnipeg, MB, R3N 0K4 www.manitobadentist.ca
AADHAAR E-KYC SERVICE
UIDAI Unique Identification Authority of India Planning Commission, Govt. of India, 3rd Floor, Tower II, Jeevan Bharati Building, Connaught Circus, New Delhi 110001 AADHAAR E-KYC SERVICE NOVEMBER 2012
Administrative Procedures Memorandum A2005
Page 1 of 12 Date of Issue: June 2014 Original Date of Issue: Subject: References: Links: Contact: June 2014 RECORDS AND INFORMATION MANAGEMENT Policy 2196 Records and Information Management Policy 2197
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
DHS / UKvisas Project
for the DHS / UKvisas Project November 14, 2007 Contact Point Elizabeth Gaffin Associate Counsel United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
How To Manage Records And Information Management In Alberta
8. RECORDS AND INFORMATION MANAGEMENT Overview This chapter is intended to help public bodies understand how good records and information management practices assist in the effective administration of
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program
for the Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program DHS/ICE/PIA-015(h) January 15, 2016 Contact Point Peter Edge Executive Associate Director, Homeland Security
Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014
Standards for Identity & Authentication Catherine J. Tilton 17 September 2014 Purpose of these standards Wide deployment of authentication technologies that may be used in a global context is heavily dependent
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS
White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services Over the past decade, the demands on government agencies to share information across the federal, state and local levels
TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD)
International Civil Aviation Organization WORKING PAPER TAG/MRTD/21-WP/4 22/11/12 Revised 05/12/12 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-FIRST MEETING
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
PERSONAL IDENTITY INFORMATION DIRECTION
PERSONAL IDENTITY INFORMATION DIRECTION TO: THE MEDICAL SERVICES COMMISSION DIRECTION: 3/12 SUBJECT: Direction on Identity-Proofing Individuals for the Purposes of Enrollment or Renewing Enrollment in
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Day-to-Day Banking. Opening a Personal Deposit Account or Cashing a Federal Government Cheque at Scotiabank. Cheque Holding Policy
Day-to-Day Banking Opening a Personal Deposit Account or Cashing a Federal Government Cheque at Scotiabank Cheque Holding Policy Opening A Personal Deposit Account We make it easy to open a personal deposit
THE LEADING EDGE OF BORDER SECURITY
THE LEADING EDGE OF BORDER SECURITY RECORD-BREAKING TRAVEL CREATING NEW CHALLENGES TIM KLABUNDE Entrust Datacard; Director, Government Vertical Marketing THE ERA OF THE MOBILE IDENTITY In an increasingly
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
Passenger Protect Program Transport Canada
AUDIT REPORT OF THE PRIVACY COMMISSIONER OF CANADA Passenger Protect Program Transport Canada Section 37 of the Privacy Act 2009 AUDIT OF PASSENGER PROTECT PROGRAM, TRANSPORT CANADA The audit work reported
Identity Cards Act 2006
Identity Cards Act 2006 CHAPTER 15 Explanatory Notes have been produced to assist in the understanding of this Act and are available separately 6 50 Identity Cards Act 2006 CHAPTER 15 CONTENTS Registration
REAL ID Act Title II H.R.1268
H.R.1268 Emergency Supplemental Appropriations Act for Defense, the Global War on Terror, and Tsunami Relief, 2005 (Enrolled as Agreed to or Passed by Both House and Senate) TITLE II--IMPROVED SECURITY
Smart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
PRIVACY IMPACT ASSESSMENT (PIA) For the
PRIVACY IMPACT ASSESSMENT (PIA) For the Naval Audit Service Information Management System (NASIMS) Department of the Navy - DON/AA - NAVAUDSVC SECTION 1: IS A PIA REQUIRED? a. Will this Department of Defense
United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT)
for the Conversion to 10-Fingerprint Collection for the United States Visitor and Immigrant Status Indicator Technology Program (US-VISIT) November 15, 2007 Contact Point Barbara M. Harrison, Acting Privacy
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
Trustis FPS Healthcare Certificate Services Enrolment Requirements Acceptable Evidence in Support of an Application for a Digital Certificate
Trustis FPS Healthcare Certificate Services Enrolment Requirements Acceptable Evidence in Support of an Application for a Digital Certificate Important Notice: If you are an organisation that is already
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
Business Information Form
Head Office One Westmount Road North P.O. Box 1603 Stn. Waterloo, Waterloo Ontario N2J 4C7 TF 1.800.668.4095 T 519.886.5210 Fax 1.519.883.7404 Business Information Form Applicant/Owner (first, last) Application/Policy
Overseas: NOTES. Application for an Australian Passport. Your checklist. Keep your passport safe at all times.
Application for an Australian Passport Overseas: NOTES Who can apply for an Australian passport? All Australian citizens can apply if you have any questions or doubts about your Australian citizenship,
Registration and Licensure as a Pharmacy Technician
Registration and Licensure as a Pharmacy Technician For applicants who have studied in Canada or worked in the field of pharmacy and are not licensed to practise as a pharmacy technician in any jurisdiction.
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009
MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if
SUBJECT: Directive-Type Memorandum (DTM) 09-012, Interim Policy Guidance for DoD Physical Access Control
UNDER SECRETARY OF DEFENSE 5000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-5000 INTELLIGENCE December 8, 2009 Incorporating Change 5, Effective March 3, 2015 MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Directive-Type
Grande Prairie Public School District #2357 Student Registration Form
Grande Prairie Public School District #2357 Student Registration Form STUDENT INFORMATION SCHOOL ID: ENROLLING IN GRADE: LEGAL LAST NAME LEGAL FIRST NAME LEGAL MIDDLE NAME(S) PREFERRED LAST NAME PREFERRED
CLIENT IDENTIFICATION AND VERIFICATION RULES
CLIENT IDENTIFICATION AND VERIFICATION RULES INTRODUCTION The Rules require lawyers to follow certain client identification and verification procedures when retained by a client. The Rules also require
Establishing your identity
Establishing your identity Documents you need for a: Driver s licence Identification card Enhanced driver s licence Enhanced identification card The first time you apply for a Manitoba driver s licence,
All you need to know about the electronic residence permit (eat)
All you need to know about the electronic residence permit (eat) www.bamf.de/eaufenthaltstitel Contents Contents 1 The electronic residence permit 5 2 Photo and fingerprints 7 3 Additional provisions
Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies
Frequently Asked Questions: Identity Theft Red Flags and Address Discrepancies The staff of the Board of Governors of the Federal Reserve System (FRB), Federal Deposit Insurance Corporation (FDIC), National
Statewatch Briefing ID Cards in the EU: Current state of play
Statewatch Briefing ID Cards in the EU: Current state of play Introduction In March 2010, the Council Presidency sent out a questionnaire to EU Member States and countries that are members of the socalled
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
Pacific University. Policy Governing. Identity Theft Prevention Program. Red Flag Guidelines. Approved June 10, 2009
Pacific University Policy Governing Identity Theft Prevention Program Red Flag Guidelines Approved June 10, 2009 Program adoption Pacific University developed this identity Theft Prevention Program ( Program
Registration and Licensure as a Pharmacy Technician
Registration and Licensure as a Pharmacy Technician For applicants who are currently licensed to practise as a pharmacy technician in a Canadian jurisdiction outside New Brunswick. Please read all pages
