Federal Ministry of the Interior Berlin, 15 March 2016. Integrated Identity Management for Travel, Migration and Security in Europe



Similar documents
Smart Borders and Law Enforcement Access: Legitimacy, Effectiveness, and Proportionality

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

Changes in Schengen visa application process

J O I N T D E C L A R A T I O N

Technical Study on Smart Borders Cost Analysis. Final Report

COMMISSION STAFF WORKING PAPER IMPACT ASSESSMENT. Accompanying document to the PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Public Consultation on the Smart Borders Package

COMMISSION STAFF WORKING PAPER SUMMARY OF THE IMPACT ASSESSMENT. Accompanying the document

Smart Borders: Comparing the Use of New Technology in Border Controls in the US and the EU

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt

Presentation on the Commission s Technical Study on Smart Borders. LIBE Hearing 23 February 2015

Analysis. Smart borders: fait accompli?

UNHCR Working Paper A REVISED EU PRONG PROPOSAL

Council of the European Union Brussels, 5 April 2016 (OR. en)

ANNEX. to the COMMISSION IMPLEMENTING DECISION

epp european people s party

Technical Study on Smart Borders. Final Report

Delegations will find attached the conclusions adopted by the European Council at the above meeting.

Security Audit VIS Central System. Summary Report

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Technical Study on Smart Borders. Final Report

Enterprise Resource Planning Analysis of Business Intelligence & Emergence of Mining Objects

I have asked for asylum in the EU which country will handle my claim?

How To Be A Successful Member Of The European Agency For Security And Safety

ROADMAP TOWARDS A VISA-FREE REGIME WITH TURKEY

Minister Shatter presents Presidency priorities in the JHA area to European Parliament

OUTCOME OF THE COUNCIL MEETING. 3422nd Council meeting. Justice and Home Affairs. Brussels, 9 November 2015 P R E S S

COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT. Accompanying the document PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

e-sens Electronic Simple European Networked Services Rome,

MODERNIZING IT PLATFORMS SUCCESSFULLY HOW PLATFORM RENEWAL PROJECTS CREATE VALUE

FINGERPRINTING. Table of Contents

Making Your Direct Mail Matter

COMMISSION RECOMMENDATION. of on a European resettlement scheme

Council of the European Union Brussels, 24 November 2014 (OR. en)

ALDE BLUEPRINT FOR A NEW EUROPEAN AGENDA ON MIGRATION

I have asked for asylum in the EU which country will handle my claim?

Explanatory note on the Hotspot approach

Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

REGULATIONS Official Journal of the European Union L 243/1

FAQs Electronic residence permit

Implementing Storage Virtualization: Elements of a Successful Project

GREEK ACTION PLAN ON ASYLUM AND MIGRATION MANAGEMENT EXECUTIVE SUMMARY

eu-lisa Annual Activity Report

Introduction to CCTNS. (Crime & Criminal Tracking and Network System)

Cost Reduction and Cost Containment Initiatives: Not an All or Nothing Value Proposition By Gary Friedman, President, Cost Containment Specialists

Council of the European Union Brussels, 13 November 2015 (OR. en)

Technical Understanding

Policy on Migration and Diasporas in Georgia

THE CONCEPT of State Migration Policy

Tallinn, Estonia. Regulation (EU) No 1077/2011 of the European Parliament and of the Council of 25 October 2011, OJ L 286,

Access Rights Management. Only much Smarter.

12002/15 PO/es 1 DG D 1B

Board of Member States ERN implementation strategies

Analysis. 11 Years of Eurodac

A Common European Asylum System. Home Affairs

Take Your Team Mobile with Xamarin

TRIO PRESIDENCY OF BULGARIA, CROATIA AND THE CZECH REPUBLIC 18-MONTH WORK PROGRAMME. 1 July December 2016

SUPPLY CHAIN SECURITY: THE CUSTOMS COMMUNITY S RESPONSE

Academic Staff Mobility as an Integral Part of the Internationalisation Strategy of Higher Education Institutions DAAD, Berlin 14 December 2012

Line of Business Solutions Complement Large Scale Postmodern ERP Deployment Strategies by Cultura Technologies

Cloud Computing Survey Perception of the companies. DPDP - Macedonia

Test Automation Architectures: Planning for Test Automation

National Health Research Policy

THE REFUGEE HACKATHON 23/10 DUTCH DESIGN WEEK COPYRIGHT 2015 VANBLEND. ALL RIGHTS RESERVED.

The Council is invited to approve the draft Conclusions on Counter-Terrorism, as set out in the annex.


COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL

E-Government Practices and Future Direction in Sweden

IoT R&I on IoT integration and platforms INTERNET OF THINGS FOCUS AREA

W204 - LMS Consolidation, Underlying Design More Important Than Platform

INFORMATION CONNECTED

HOW TO TURN 9 RETAIL IT CHALLENGES INTO 9 BUSINESS OPPORTUNITIES

G DATA TechPaper #0275. G DATA Network Monitoring

(AGENDA -OVERVIEW OF THE DAY) 1. COOPERATION IN THE FIELD OF POLICIES 2. COMMUNITY PROGRAMMES 3. OTHER COMMUNITY INSTRUMENTS

Interstage: Fujitsu s Application Platform Suite

ID Security Made in Germany Holistic Solutions for Biometric Systems and Identity Documents

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Visa Europe Our response to the European Commission s proposed regulation of interchange fees for card-based payment transactions

ISA Work Programme SECTION I

Proposal for a DECISION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Methodological norms for the application of the Government Emergency Ordinance no. 105/ 2001 regarding the Romanian state border

PRIME IDENTITY MANAGEMENT CORE

Government data. collection. Are people at risk? European. Monograph SIS II - VIS - EURODAC - ECRIS

There are several reasons why I decided to apply for the position of Director of the European Centre for Disease Prevention and Control.

Student Tracking & Auto Relay Systems (STARS) Integrating student and transportation asset tracking with intelligent Geographic Information Systems

2nd End-User Group Meeting on 3D Face Recognition

A EUROPE THAT WORKS EUROPEAN LIBERALS ARE THE FIRST TO ADOPT ELECTION MANIFESTO

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL. Progress Report on the Implementation of the hotspots in Greece

Application development = documentation processing

European Central Bank Secretariat Division Kaiserstrasse 29 D Frankfurt am Main Germany

ACTION PLAN FOR LITHUANIAN PARTICIPATION IN THE INTERNATIONAL INITIATIVE OPEN GOVERNMENT PARTNERSHIP

Enterprise Architecture for Communication Service Providers: Aligning Business Goals to IT

Table of contents: ***

BORDER SECURITY AND MANAGEMENT CONCEPT

Abstract. White Paper on Application Modernization 1

Human mobility and displacement tracking

FAQs - New German ID Card. General

Position Paper Cross Border e-logistics

Transcription:

Federal Ministry of the Interior Berlin, 15 March 2016 Integrated Identity Management for Travel, Migration and Security in Europe I. Abstract Given the challenges that the EU faces in terms of crises and the influx of refugees, it is of utmost importance to share information in the fields of travel, migration and security. New efforts must be made to fix the existing flaws in the information-sharing process at EU level. These flaws are not the result of a lack of systems or institutions. Instead, existing information resources and channels must be strengthened, connected and used more actively. Multiple collection, registration and storage of personal data should be avoided. Avoiding redundancies leads to better data quality and data minimization, which is imperative in terms of both security and data protection. In the EU, different systems are currently used to register data related to travel, migration and security (Eurodac, VIS, SIS, Prüm, API). There are plans to launch new systems (PNR, Smart Borders). The European Agency for Large-Scale IT Systems, eu-lisa, has been established to operate those systems that are based on central procedures (Eurodac, VIS, SIS) or future systems (Smart Borders; service provider for PNR, if necessary). Other systems (Prüm, PNR, API) are decentralized by design so that, for member states, overall access to information is more difficult, not possible at all or possible only in certain legal circumstances when additional steps to match information have been taken. However, central data systems are not compatible with each other. As a result, information that is collected for the same or similar purposes or even contains largely the same data cannot be combined. This may lead to blind spots in Europe's security architecture. Integrated solutions for entry and exit checks and travel into, out of and within the Schengen area are therefore necessary. Just like in the field of e-government, the once-only-principle should also be consistently applied and legally, operationally and technically implemented in the field of public security to ensure practical operability (no obstruction of travel of bona fide travellers; no restriction of the freedom of movement; better data quality by avoiding redundancies) and data minimization (the same data should not be collected twice).

II. Current situation At EU level, there are currently five systems and tools that are also intended to check third-country nationals entering or staying in the Schengen area. Legal acts for two more EU systems intended to collect, store and process information on travellers are being prepared at the moment. 1. Multiple collection of the same information Certain basic data (alphanumeric data such as name, first name, etc. and biometric data such as fingerprints) are collected separately for each system. This is not in line with the data protection principle of data minimization. Storing the same information multiple times increases the risk of errors and insufficient data maintenance and, as a result, leads to poor data quality. Multiple data collection makes processes more complex, slows them down and increases costs to the detriment of the authorities collecting data and the travellers concerned who are especially interested in swift and smooth procedures. Especially in terms of border crossings, the first control line is highly time-critical; manual data collection must be kept to a minimum. 2. No information networks Since information is stored separately (in a silo-like manner), it is not possible to recognize connections quickly and reliably. Authorities do not know what they know. It is not possible for them to create an overall picture by combining individual data fragments. Especially when it comes to dynamic migration movements (e.g. during the current refugee situation), available information is combined only in a fragmented, delayed and rather accidental manner, which creates dangerous knowledge gaps. 3. No flexibility As a result of the silo-like information architecture, every system discussed here is a complex large-scale IT system. It is extremely expensive to set up and operate such systems. From a technical perspective, synergies cannot be realized. Adding (or removing) individual elements requires a comprehensive re-design. Implementation processes take years and make it impossible to respond to new challenges in a flexible way. These redundancies are also of operational, legal and political character. The same discussions (e.g. on the registration of biometric characteristics, access requirements for security authorities) take place repeatedly, lead to a distorted political and public

perception and often result in unrealistic restrictions that considerably limit the practical use. III. Corrective To counteract the fragmentation of the European system landscape and the multiple collection of the same data, this approach seeks to combine the relevant systems in an integrated identity management for travel, information and security. 1. Objective According to the principle of modularity, the systems will be combined in an integrated system architecture. The core module will contain the basic data on the traveller (i.e. alphanumeric and biometric data). Other information and specific features of the different systems (e.g. visa data, PNR) will be stored in specific modules. The core module and the specific modules are connected with each other so that the respective data sets are linked in such a way that they provide the required information.

SIS data... bio metric data Visa data alphanumeric basic data RTP data PNR / API EES data Figure 1: Objective of the approach 2. Advantages "Once Only" Single collection and multiple use Data minimization Avoidance of redundancies and quality improvement Optimized processes for authorities and bona fide travellers, swift implementation, lower costs Information networks Combination of information that has previously been stored separately Creation of an overall picture on the basis of the information available in the fields of travel, migration and security Security authorities are enabled to fully grasp the situation even in times of dynamic migration movements Flexibility Easy further development by adding or removing individual elements Resource-efficient development, cost-effective operation of processes Easier way of finding compromises, extended political room for action

3. Need for action It is necessary to reflect on these issues with a view to developing [in the long run] a modular and integrated identity management for travel, migration and security that combines the previous systems. From a legal, operational and technical perspective, this project is complex and will have to be gradually applied to existing and newly introduced systems. It must be examined whether the desired degree of informationsharing requires the centralization of decentralized systems (Prüm, PNR). All of these considerations should be guided by the desire to reduce unnecessary bureaucratic burdens for travellers and security authorities (once-only-principle). When it comes to implementation, state-of-the-art computational approaches (such as the universal messaging format UMF) must be taken into account.