The Identity Project an Assessment of the UK Identity Cards Bill and Its Implications

Total Page:16

File Type:pdf, Size:1020Kb

The Identity Project an Assessment of the UK Identity Cards Bill and Its Implications The Identity Project an assessment of the UK Identity Cards Bill and its implications The Identity Project An assessment of the UK Identity Cards Bill and its implications Project Management by Hosted and Published by Version 1.09, June 27, 2005 The LSE Identity Project Report: June 2005 i Credits Advisory Group Professor Ian Angell, Convenor of the Department of Information Systems, LSE Professor Christine Chinkin, Law Department, LSE Professor Frank Cowell, Economics Department, LSE Professor Keith Dowding, Government Department, LSE Professor Patrick Dunleavy, Government Department, LSE Professor George Gaskell, Director, Methodology Institute, LSE Professor Christopher Greenwood QC, Convenor of the Law Department, LSE Professor Christopher Hood, Centre for Analysis of Risk & Regulation, LSE Professor Mary Kaldor, Centre for the Study of Global Governance, LSE Professor Frank Land, Department of Information Systems, LSE Professor Robin Mansell, Department of Media & Communications, LSE Professor Tim Newburn, Social Policy Department, LSE Professor David Piachaud, Centre for Analysis of Social Exclusion, LSE Professor Robert Reiner, Law Department, LSE ii The LSE Identity Project Report: June 2005 Research Group, Contributors, Advisors and Reviewers Research coordinator: Dr Edgar Whitley, Reader in Information Systems. Professor Ross Anderson, Cambridge Rikke Frank Jorgensen, Denmark Adrian Beck, University of Leicester Jeegar Kakkad Ralf Bendrath, University of Bremen Philippe Martin, Kable Krista Boa, University of Toronto Meryem Marzouki, France Nicholas Bohm Ariosto Matus-Perez Daniel Boos, Switzerland Dr Eileen Munro, LSE Dr Stefan Brands, McGill University Sjoera Nas, The Netherlands Dr Ian Brown Dr Peter Neumann, SRI International Tony Bunyan, Statewatch Professor Toshimaru Ogura Dr Nadia Caidi, University of Toronto Joe Organ, Oxford Internet Institute Marco A. Calamari, Italy Nicholas Pauro Shami Chakrabarti, Liberty Daniele Pica, LSE Professor Roger Clarke, Australia Dr Chris Pounder, Pinsent Masons Professor Andrew Clement, Canada Professor Angela Sasse, UCL Dan Cooper, Covington and Burling Bruce Schneier, Counterpane Systems Mike Cushman, LSE Dr Susan Scott, LSE Ian Dowty Dr Barbara Simons Terri Dowty Dr Steve Smithson, LSE Mark Dzięcielewski Nina Somera, Philippines Alberto Escudero-Pascual, Sweden Jay Stanley, ACLU Joseph Ferenbok, University of Toronto Barry Steinhardt, ACLU Federico Ferretti, University of Leeds Toby Stevens, Enterprise Privacy Group Jens Franz, SOAS Peter Szyszko, Covington and Burling Teresa Hackett, Ireland Gohsuke Takama, Japan Kathrin Gerst, Germany Sarah Thatcher, LSE Marc Gilman Prodromos Tsiavos, LSE Dr Brian Gladman Rosemary Walsh Andrea Glorioso, Italy Jeremy Wickins, University of Sheffield. Wendy Grossman Johan Wilhelmsson, Swedish Ministry of William Heath, Kable Justice Derek Wong Project Mentors: Simon Davies and Dr Gus Hosein The LSE Identity Project Report: June 2005 iii Acknowledgements The LSE would like to thank the Department of Information Systems for hosting and publishing this study. Our gratitude also goes to the research team who have worked tirelessly and under severe time constraints, and to the Advisory Board, who have supported the work from its inception. Thanks also to the Enterprise Privacy Group for undertaking the management and coordination of the project. We would also like to express our appreciation to the many people and organisations that contributed to this study, and especially to the organisations that participated in the expert roundtables. Thanks also to William Heath and Philippe Martin of Kable, who supplied the costings framework that formed the basis of our estimates. Participation in the project by an individual or organisation does not imply agreement with the findings of the study in part or full. Finally we would like to thank the LSE Reprographics Unit, the Design Unit, and the LSE Press Office for support above and beyond the call of duty. The LSE Identity Project Report: June 2005 v Outline FOREWORD..................................................................................................................................................1 PREFACE.......................................................................................................................................................3 SUMMARY OF CONCLUSIONS...............................................................................................................5 INTRODUCTION .........................................................................................................................................7 CONCLUSIONS IN DETAIL......................................................................................................................9 THE DEVELOPMENT OF THIS REPORT ...........................................................................................15 OVERVIEW OF THE LEGISLATIVE PROPOSALS ..........................................................................21 THE GOVERNMENT’S CONSULTATION PROCESS.......................................................................31 NATIONAL SECURITY, ORGANISED CRIME AND TERRORISM ..............................................43 INTERNATIONAL ENVIRONMENT AND OBLIGATIONS.............................................................45 IDENTITY FRAUD.....................................................................................................................................97 POLICING AND ID..................................................................................................................................113 RACE, DISCRIMINATION, IMMIGRATION AND POLICING.....................................................125 THE ENVIRONMENT OF PUBLIC TRUST .......................................................................................139 THE LEGAL ENVIRONMENT..............................................................................................................145 BIOMETRICS ...........................................................................................................................................169 SECURITY, SAFETY AND THE NATIONAL IDENTITY REGISTER .........................................187 THE IT ENVIRONMENT IN THE UK .................................................................................................201 COST ASSUMPTIONS – COSTING THE GOVERNMENT’S PROPOSALS................................225 COST PROJECTIONS.............................................................................................................................241 DESIGN PRINCIPLES AND OPTIONS................................................................................................247 AN ALTERNATIVE BLUEPRINT FOR A NATIONAL IDENTIFICATION SYSTEM ..............275 APPENDIX 1: COMPARISON WITH THE HAC FINDINGS .........................................................285 APPENDIX 2: COST PROJECTIONS .................................................................................................301 The LSE Identity Project Report: June 2005 vii Table of Contents FOREWORD..................................................................................................................................................1 PREFACE.......................................................................................................................................................3 SUMMARY OF CONCLUSIONS...............................................................................................................5 INTRODUCTION .........................................................................................................................................7 CONCLUSIONS IN DETAIL......................................................................................................................9 Overview.................................................................................................................................................9 Purposes of the system.........................................................................................................................10 The technological environment............................................................................................................10 Cost.......................................................................................................................................................11 The legal environment..........................................................................................................................12 Oversight ..............................................................................................................................................13 International obligations .....................................................................................................................13 Alternative scenarios............................................................................................................................13 THE DEVELOPMENT OF THIS REPORT ...........................................................................................15 Origins and Objectives ........................................................................................................................15 Sponsorship ..........................................................................................................................................16 Expert Panel Consultation...................................................................................................................16
Recommended publications
  • TOWARDS BETTER PRACTICE in NATIONAL IDENTIFICATION MANAGEMENT (Guidance for Passport Issuing Authorities and National Civil Registration)
    TAG/MRTD/21-WP/4 International Civil Aviation Organization 22/11/12 Revised WORKING PAPER 05/12/12 English only TECHNICAL ADVISORY GROUP ON MACHINE READABLE TRAVEL DOCUMENTS (TAG/MRTD) TWENTY-FIRST MEETING Montréal, 10 to 12 December 2012 Agenda Item 2: Activities of the NTWG TOWARDS BETTER PRACTICE IN NATIONAL IDENTIFICATION MANAGEMENT (Guidance for Passport Issuing Authorities and National Civil Registration) (Presented by the NTWG) 1. INTRODUCTION 1.1 At the Twentieth Meeting of the Technical Advisory Group on Machine Readable Travel Documents, held from 7 to 9 September 2011 (TAG/MRTD/20), the ICAO Secretariat presented TAG/MRTD/20-WP/5 on the Technical Report (TR) entitled Towards Better Practice in National Identification Management . This initiative has been led by the Secretariat within the framework of the NTWG, and presents an on-going work item to expand the relevance of the MRTD Programme to today’s travel document and border security needs. 1.2 The TAG/MRTD/20 acknowledged and supported the work done on evidence of identity in the Technical Report Towards Better Practice in National Identification Management , Version 1.0, and approved the continuation of the development of the report under the responsibility of the NTWG. 2. WORK DEVELOPMENT 2.1 A subgroup of the NTWG was formed to contribute and enhance the work achieved with the TR. A few members met in Fredericksburg on 24 to 25 May 2012, significantly progressing the development of the TR. Further exchanges were held during the NTWG meeting held in Zandvoort on 7 to 11 November 2011, and via electronic means throughout this process.
    [Show full text]
  • The Hidden Costs of Terrorist Watch Lists
    University of Chicago Law School Chicago Unbound Journal Articles Faculty Scholarship 2013 The Hidden Costs of Terrorist Watch Lists Anya Bernstein Follow this and additional works at: https://chicagounbound.uchicago.edu/journal_articles Part of the Law Commons Recommended Citation Anya Bernstein, "The Hidden Costs of Terrorist Watch Lists," 61 Buffalo Law Review 461 (2013). This Article is brought to you for free and open access by the Faculty Scholarship at Chicago Unbound. It has been accepted for inclusion in Journal Articles by an authorized administrator of Chicago Unbound. For more information, please contact [email protected]. BUFFALO LAW REVIEW VOLUME 61 MAY 2013 NUMBER 3 The Hidden Costs of Terrorist Watch Lists ANYA BERNSTEIN† INTRODUCTION The No Fly List, which is used to block suspected terrorists from flying, has been in use for years. But the government still appears “stymied” by the “relatively straightforward question” of what people who “believe they have been wrongly included on” that list should do.1 In recent months, courts have haltingly started to provide their own answer, giving some individuals standing to sue to remove their names or receive additional process.2 This step is particularly important as the No Fly List continues † Bigelow Fellow and Lecturer in Law, The University of Chicago Law School. J.D., Yale Law School; Ph.D., Anthropology, The University of Chicago. Thanks to Daniel Abebe, Ian Ayres, Alexander Boni-Saenz, Anthony Casey, Anjali Dalal, Nicholas Day, Bernard Harcourt, Aziz Huq, Jerry Mashaw, Jonathan Masur, Nicholas Parrillo, Victoria Schwartz, Lior Strahilevitz, Laura Weinrib, Michael Wishnie, and James Wooten for helpful commentary.
    [Show full text]
  • Whether Biometric Passports Have Been Issue
    Home > Research > Responses to Information Requests RESPONSES TO INFORMATION REQUESTS (RIRs) New Search | About RIRs | Help 8 November 2011 RUS103842.E Russia: Requirements and procedures to obtain internal and foreign travel passports; whether biometric passports have been issued; if so, information on the biometric passport, including stored biometric data and its appearance; requirements and procedures to obtain a biometric passport within Russia; whether it can be replaced and renewed from abroad, including requirements and procedures Research Directorate, Immigration and Refugee Board of Canada, Ottawa Obtaining an Internal Passport from Within Russia According to the website of Russia's Federal Migration Service (FMS), all citizens of the Russian Federation 14 years of age and over who are residing in Russia are required to have an internal passport, the primary document that confirms their identity (Russia n.d.j). Internal passports have to be renewed at 20 and 45 years of age (ibid.). The passport is issued by the FMS branch in the area in which the citizen's residence has been registered (for a copy of the internal passport see the attachment to this Response) (ibid.). In order to obtain a new or replace an existing internal passport, citizens must submit the following documents: A completed application form for the passport; Birth certificate; Two black-and-white or colour photographs measuring 35 by 45 millimetres; Documents confirming Russian citizenship; Documents to indicate the status of certain information requirements in the passport (military service, children's birth certificates, proof that the citizen's residence has been registered); and Confirmation of payment (ibid.).
    [Show full text]
  • Biometrics Takes Off—Fight Between Privacy and Aviation Security Wages On
    Journal of Air Law and Commerce Volume 85 Issue 3 Article 4 2020 Biometrics Takes Off—Fight Between Privacy and Aviation Security Wages On Alexa N. Acquista Southern Methodist University, Dedman School of Law, [email protected] Follow this and additional works at: https://scholar.smu.edu/jalc Recommended Citation Alexa N. Acquista, Biometrics Takes Off—Fight Between Privacy and Aviation Security Wages On, 85 J. AIR L. & COM. 475 (2020) https://scholar.smu.edu/jalc/vol85/iss3/4 This Comment is brought to you for free and open access by the Law Journals at SMU Scholar. It has been accepted for inclusion in Journal of Air Law and Commerce by an authorized administrator of SMU Scholar. For more information, please visit http://digitalrepository.smu.edu. BIOMETRICS TAKES OFF—FIGHT BETWEEN PRIVACY AND AVIATION SECURITY WAGES ON ALEXA N. ACQUISTA* ABSTRACT In the last two decades, the Department of Homeland Secur- ity (DHS) has implemented a variety of new screening and iden- tity verification methods in U.S. airports through its various agencies such as the Transportation Security Administration (TSA) and Customs and Border Protection (CBP). In particular, biometric technology has become a focal point of aviation secur- ity advances. TSA, CBP, and even private companies have started using fingerprint, iris, and facial scans to verify travelers’ identi- ties, not only to enhance security but also to improve the travel experience. This Comment examines how DHS, its agencies, and private companies are using biometric technology for aviation security. It then considers the most common privacy concerns raised by the expanded use of biometric technology: data breaches, func- tion creep, and data sharing.
    [Show full text]
  • Electronic Identification (E-ID)
    EXPLAINING INTERNATIONAL IT APPLICATION LEADERSHIP: Electronic Identification Daniel Castro | September 2011 Explaining International Leadership: Electronic Identification Systems BY DANIEL CASTRO SEPTEMBER 2011 ITIF ALSO EXTENDS A SPECIAL THANKS TO THE SLOAN FOUNDATION FOR ITS GENEROUS SUPPORT FOR THIS SERIES. SEPTEMBER 2011 THE INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | SEPTEMBER 2011 PAGE II TABLE OF CONTENTS Executive Summary ........................................................................................................ V Introduction..................................................................................................................... 1 Background ....................................................................................................................... 1 Box 1: Electronic Passports ............................................................................................. 3 Terminology and Technology ........................................................................................... 3 Electronic Signatures, Digital Signatures and Digital Certificates ............................... 3 Identification, Authentication and Signing ................................................................ 4 Benefits of e-ID Systems ............................................................................................ 5 Electronic Identification Systems: Deployment and Use .............................................. 6 Country Profiles .............................................................................................................
    [Show full text]
  • Denmark, Norway and Sweden Hansson
    Nordic countries: Denmark, Norway and Sweden Hansson, Kristofer; Lundin, Susanne 2010 Link to publication Citation for published version (APA): Hansson, K., & Lundin, S. (2010). Nordic countries: Denmark, Norway and Sweden. [Publisher information missing]. http://www.cit-part.at/Deliverable3_final.pdf Total number of authors: 2 General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 CIT-PART Deliverable 3 Overview on XTP policies and related TA/PTA procedures Nik Brown, Siân Beynon-Jones (Eds.) With contributions by Agnes Allansdottir, Meaghan Brierley, Edna F. Einsiedel, Erich Griessler, Kristofer Hansson, Mavis Jones, Daniel Lehner, Susanne Lundin, Anna Pichelstorfer & Anna Szyma The project ―Impact of Citizen Participation on Decision-Making in a Knowledge Intensive Policy Field‖ (CIT-PART), Contract Number: SSH-CT-2008-225327, is funded by the European Commission within the 7th Framework Programme for Research – Socioeconomic Sciences and Humanities.
    [Show full text]
  • UNHCR Moscow Background Note on the Replacement of USSR
    UNHCR Moscow Background Note On the Replacement of USSR passports In the Russian Federation January 2004 Introduction This note updates (and does not supersede) the previous UNHCR Moscow note dated 28 May 2003 on the same subject. This note further attempts to clarify (i) the relationship between issuance of RF passports and the validity of USSR passports, (ii) the interaction between possession of RF passports and citizenship and (iii) how the applicable RF legal acts on the matter may affect citizens of other former USSR republics. 1. Replacement and validity of USSR passports The gradual replacement of the (1974-type) USSR passports by RF passports (so-called “internal passports”1) by 31 December 2003 is provided for under the Russian Federation Government Resolution No.828 of 8 July 1997 2. The Resolution further regulates the modalities of issuance, renewal and replacement of internal passports. At the background of the resolution is the wish of the RF authorities to have identity documents (IDs) earlier issued by a State now defunct (the USSR) be replaced by IDs of the successor State (the Russian Federation) for its own citizens. The RF authorities also invoke the insufficient safeguards contained in the USSR passports, which do not meet modern protection standards against forgery. According to sources within the RF Presidential Commission on Citizenship, the replacement of USSR passports by RF passports was completed, by 31 December 2003, for nearly 99% of the RF citizens concerned. It is important to realise that the above-mentioned Resolution No.828 concerns exclusively Russian citizens: it does not rule upon the possession, replacement or validity of USSR passports held by non-Russian citizens.
    [Show full text]
  • Surveillance in Society Grahame Danby
    1129 words Key Issues for the New Parliament 2010 SECURITY AND LIBERTY House of Commons Library Research Surveillance in society Grahame Danby The effective and proportionate use of surveillance and state databases is a delicate balancing act Richard Thomas, the former Information REGULATING SURVEILLANCE data or the methods of acquisition compromise LEGISLATION SUMMARY Commissioner, once famously remarked The Regulation of Investigatory Powers Act this separation? that the British people were in danger of 2000 (RIPA) controls, among other things, One proposal, subsequently abandoned on Human Rights Act 1998: A qualified “sleep walking into a surveillance society”. covert surveillance. Together with associated privacy grounds, was to store communications right to privacy. Any intrusion should be Many civil liberty groups would argue we secondary legislation and codes of practice, it data in a centralised government database. An proportionate. have now woken up in one. Others might, provides a framework designed to ensure that alternative would be to impose requirements Data Protection Act 1998: Disclosure pointedly, retort that as long as surveillance public authorities comply with the European on internet service providers to keep extra data and retention of personal data must be is deployed democratically by people always Convention on Human Rights. in a way that would make it easily accessible – fair. Exemptions apply. above reproach, if you have nothing to hide Could formalising surveillance powers particularly by law enforcement agencies and Regulation of Investigatory Powers you should never have anything to fear. lower the threshold for using them? How the security services. A Communications Data Act 2000: An authorisation framework for Surveillance, in its many forms, is undoubtedly can proportionality be factored in reliably? Bill, mooted in the last Parliament, would be various surveillance activities by specified an important tool in combating terrorism and Concerns that some local authorities have needed to implement this.
    [Show full text]
  • Restrictions on the Right to Travel Joseph L
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Case Western Reserve University School of Law Case Western Reserve Law Review Volume 13 | Issue 1 1961 Restrictions on the Right to Travel Joseph L. Rauh Jr. Daniel H. Pollitt Follow this and additional works at: https://scholarlycommons.law.case.edu/caselrev Part of the Law Commons Recommended Citation Joseph L. Rauh Jr. and Daniel H. Pollitt, Restrictions on the Right to Travel, 13 W. Res. L. Rev. 128 (1961) Available at: https://scholarlycommons.law.case.edu/caselrev/vol13/iss1/9 This Symposium is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Law Review by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. [Vol. 13:1 Restrictions on the Right to Travel Joseph L. Rauh, Jr. and Daniel H. Pollitt [The authors critically examine the authority assumed by the State Department to impose individual restrictions on foreign travel because of a person's political beliefs and to im- pose general restrictions on travel to designated countries for diplomatic and political reasons. They argue that such general travel restrictions are contrary to democratic and diplomatic traditions,and are unconstitutional and devoid of Congression- al support.-Ed.] We have temporized too long with the passport practices of the State Department. Iron curtains have no place in a free world.1 Following World War 112 the United States embarked upon a two- pronged project restricting the right to travel abroad.
    [Show full text]
  • Department of Internal Affairs Passport Renewal
    Department Of Internal Affairs Passport Renewal Is Dryke always orthodox and armchair when sectarianizing some bearding very off-the-cuff and morally? Remus is unintelligibly chintzier after unqualified Nicholas bestrew his failings equivalently. Fonz confiscated his murra babbitts warningly or changefully after Amory cinctured and rarefying selflessly, inveterate and cretaceous. Applying at the police certificate sets out Malaysia too many euros cost, department of internal affairs passport renewal inspections on the same name, please stay safe place a social services and send my passport to increase. Creating folders will help you organize your clipped documents. Name: Date of birth: Sex: Issuer: Expiration: Stamp. Includes information about trading with and doing business in the UK and Malaysia. Arrival and Departure Records, especially if you live permanently outside the United States. Can I pay with a personal check or money order outside the United States? Any advice on who might help me pay? The President of the United States issues other types of documents, feeling it would help stop online abuse and hate. However, if you want a unique lack of a passport stamp into Malaysia, and have an updated disability evaluation to apply for enrolment in a private day care facility. This service is one of the electronic services provided to government agencies through the external portal of the Ministry of Civil Service. It is not currently possible to download the paper application form. UK and those who did so in other territories. The Office of International Affairs can take your passport photos and process your passport application. The Department continues to work on developing and planning for the implementation of the new online renewal service.
    [Show full text]
  • A Part of the Ottoman Centralization Policy: Travel Permits and Their Samples Until the 20 Th Century
    A Part of the Ottoman Centralization Policy: Travel Permits and Their Samples Until the 20 th Century CENGIZ ERGÜN UNIVERSITY OF SZEGED After the development of central governments, from the 16 th century onwards, states wanted to control the movements of their citizens by several documents. These identity documents were a kind of passports, and their arrangements varied from country to country. With the undisputed triumph of capitalism and nation-states in 19 th century of Europe, the state’s control over the people was predominantly considered as an internal matter. Compe- tition between states in the economic and military fields revealed the importance of cen- tralization. Politicians who wanted to take advantage of this competition went on to in- crease control over the activities of their populations. In the Ottoman Empire, the state-control over the movements of its citizens dates back well before the 19 th century. Due to the manorial system in the Ottomans, the peasantry re- mained attached to their lands, and the State imposed criminal sanctions on those left their lands. There were severe migration waves to Western Anatolia and especially to Istanbul until the 20 th century, and therefore it was necessary to prevent the entry of beggars and un- employed people without guarantees to the city. The obligation to have “yol hükmü” (road provision), whose name changed to “mürur tezkeresi” (passing compass), was also one of these considerations. In this study, it is aimed to shed light on the state-control over the people by making use of the Ottoman archives, the narratives of the travellers with secondary sources, and aimed to give information about the travel permits and travel documents which were subject to an arrangement since the 19 th century.
    [Show full text]
  • Faces, Fingerprints & Feet: Guidance On
    Faces, Fingerprints & Feet Guidance on assessing the value of including biometric technologies in UNICEF-supported programs July 2019 ACKNOWLEDGEMENTS CONTENTS This guidance was developed by Nicola Richards (Independent consultant) and a UNICEF project team including: GLOSSARY 2 Karen Carter – Data and Analytics Section; Division of Data, Research and Policy (Project manager) INTRODUCTION 3 Kristen Wenz – Child Protection, Programme Division Tanya Accone – Office of Innovation SECTION I Shane Khan – Data and Analytics Section; Division of Data, Research and Policy Background 4 Toby Wicks – Data and Analytics Section; Division of Data, Research and Policy Steven Vosloo – Policy Lab; Division of Data, Research and Policy What are biometrics? 5 Sophie Clavet – Child Safeguarding Unit, Office of the Executive Director. How biometric technology works 8 System performance 9 Valuable input and feedback was also provided by a broad range of UNICEF staff, to whom we extend our appreciation, including the Admin Data Task team, country and regional offices who participated in the interviews and shared their SECTION II concerns and experiences, and those who provided feedback and comments on earlier drafts. We would also like to Benefits, risks, and concerns 12 acknowledge the valuable insights shared by our colleagues at UNHCR and WFP as this document was formulated. Potential benefits 13 Risks of using biometric technologies 16 Specific risks for children 19 SECTION III Practical approaches in assessing the use of biometric technologies 20 How to
    [Show full text]