Digital Identity Toolkit: a GUIDE for STAKEHOLDERS in AFRICA Indicates That a Separate, Detailed Study on Cost-Benefit Deal with Technology
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Digital Identity Roadmap Guide
Digital Identity Roadmap Guide International Telecommunication Union Place des Nations CH-1211 Geneva 20 Switzerland ISBN: 978-92-61-27821-2 9 7 8 9 2 6 1 2 7 8 2 1 2 Published in Switzerland Geneva, 2018 Digital Identity Roadmap Guide Some Rights Reserved This work is a publication of the International Telecommunication Union (ITU). The findings, interpre- tations and conclusions expressed in this work do not necessarily reflect the views of the International Telecommunication Union or its governing bodies. The International Telecommunication Union does not guarantee the accuracy of the data included in this work. The boundaries, colours, denominations, and other information shown on any map in this work do not imply any judgment on the part of the International Telecommunication Union concerning the legal status of any territory or the endorse- ment or acceptance of such boundaries. Nothing herein shall constitute or be considered to be a limitation upon or waiver of the privileges and immunities of the International Telecommunication Union, all of which are specifically reserved. Rights & Permission This work is available under the Creative Commons Attribution 3.0 IGO license (CC BY 3.0 IGO) http:/ / creativecommons .org/ licenses/by/ 3 .0/ igo. Under the Creative Commons Attribution license, you are free to copy, distribute, transmit, and adapt this work, including for commercial purposes, under the following conditions: Attribution — Please cite the work as follows: International Telecommunication Union, Digital Identity Roadmap Guide. Creative Commons Attribution 3.0 IGO (CC BY 3.0 IGO). Translations — If you create a translation of this work, please add the following disclaimer along with the attribution: This translation was not created by the International Telecommunication Union (ITU) and should not be considered an official translation. -
Digital Identity in Banking What Ceos Need to Know About Best Practices and Future Directions
Digital Identity In Banking What CEOs Need to Know About Best Practices and Future Directions RON SHEVLIN Director of Research Cornerstone Advisors TABLE OF CONTENTS 1 Digital Identity: A Challenge As Old As The Internet 3 Technology Developments In Digital Identity Management 7 Five Forces Shaping Digital Identity Management 15 Best Practices In Digital Identity Management For Today 17 Conclusion 19 About Cornerstone Advisors 19 Avoka (now Temenos) 20 Endnotes © 2018 Cornerstone Advisors. All rights reserved. Reproduction of this report by any means is strictly prohibited without written permission. DIGITAL IDENTITY: A CHALLENGE AS OLD AS THE INTERNET Although the topic of digital identity gets daily attention today in 2018, it’s hardly a new topic. In 1993, The New Yorker published what has become one of the most—if not the most—iconic cartoons about the Internet (Figure 1). In it, one dog says to another, “On the Internet, nobody knows you’re a dog.” Twenty-five years ago, many people saw the ability FIGURE 1: New Yorker Cartoon on Digital Identity to remain anonymous as a feature of the Internet, not a liability. Despite a quarter century of techno- logical advances that include e-commerce, social media, and the smartphone: “There is still no easy way to prove online that you are not a dog, are over 18, live at a certain address, graduated from a certain school, work at a specific company, or own a specific asset. These kinds of assertions about ourselves are difficult to trust because they are nearly impossible to verify.” 1 Source: The New Yorker WHY IS DIGITAL IDENTITY STILL A PROBLEM? If we’ve seen 25 years of technological advances, then why is digital identity still a problem? Three reasons: 1) There are no standardized formats for digital credentials; 2) There are no standardized methods to verify the source and integrity of digital credentials; and 3) The technological advances that have occurred over the past 25 years have exasperated the problem—not alleviated it. -
Digital Identity
Building Trusted & Resilient DIGITAL IDENTITY JULY 2019 Business Roundtable CEO members lead companies with more than 15 million employees and $7.5 trillion in revenues. The combined market capitalization of Business Roundtable member companies is the equivalent of over 27 percent of total U.S. stock market capitalization, and Business Roundtable members invest nearly $147 billion in research and development — equal to over 40 percent of total U.S. private R&D spending. Our companies pay $296 billion in dividends to shareholders and generate $488 billion in revenues for small and medium-sized businesses. Business Roundtable companies also make more than $8 billion in charitable contributions. Learn more at BusinessRoundtable.org. Copyright © 2019 by Business Roundtable Building Trusted & Resilient DIGITAL IDENTITY JULY 2019 CONTENTS Introduction 2 Digital Identity Today: Promise & Challenges 3 A Vision for the Future: Objectives for Improving Digital Identity 6 An Action Plan to Establish Trust & Resiliency in Digital Identity 8 Conclusion 13 Appendix: Primer on Digital Identity 14 Endnotes 18 Building Trusted and Resilient Digital Identity 1 Introduction The ability of individuals to recognize and use creative and sophisticated tools to stay a step ahead. As a result, illegitimate identity may trust each other plays a fundamental role in well be the likeliest path for fraud and other cybersecurity intrusions. economic and social interactions. Yet having a digital identity is more than a data Before the digital age, identification systems protection and security mechanism — it enables relied upon physical documents and face-to-face individual users and institutions to establish an interactions. The internet and the proliferation appropriate level of trust to transact and interact of internet-enabled devices have dramatically in the digital world, including activities ranging changed the interplay between individuals and from banking to health care to social media. -
Passport Application Identification Requirements
Passport Application Identification Requirements Immediate Silvio bloodied intransigently while Jessey always whines his dispersers rouged tendentiously, he syphilized so deucedly. Norris usually recants doggone or sny unisexually when trilateral Rocky syllabizes sententially and atop. How coadunate is Ariel when elmiest and single-hearted Kevin gips some abstractedness? Do not eligible for an observation on your passport application in person signing the back into your geographical area ID or you hold an Out of State or Foreign License? Search Bar for CT. States are now working to produce IDs that comply with this Act. The applicant must be prepared to be able to prove the need for the provisional passport. Secondary evidence of identification and birth in the United States for the minor. It must be notarized or have the seal and signature of the acceptance agent. All who apply for passports and national ID cards must personally come to the police passport office, including children and adolescents. Enforcement will now begin on Oct. The agency uses it to identify and track its cases. We will use this information to improve the site. For faster processing, you may request expedited service. If you do not have primary identification, you must bring a witness who has known you for two or more years. COM IS NOT OPERATED, MAINTAINED BY, OR AFFILIATED WITH ANY GOVERNMENT AGENCIES OR PASSPORT OFFICES. You will need to show proof of travel. Do not sign the application unless instructed to do so. We may ask you to provide additional evidence toestablish your identity. This implies that the parents or legal guardian must bring the baby when submitting the application in person. -
A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access
A Guide to Optimizing Digital Identity Risk and Experience with Adaptive Access Phone Numbers Email Addresses The Power of Identity Name Our digital identities are fundamental to how we interact with each other and the online world. [ 1 ] The ability to prove who we are provides us with control and allows access to people, information and economies. Digital trust in those identities is Device Usage power. Geo Data But creating a trusted digital identity can be difficult. It’s a complex network of traditional instruments of ID such as name, address, birthday and social security Search Habits number and data points like email address, username and password, search habits, purchasing behavior and so on. This personally identifiable information (PII) is made up of the unique attributes Biometric Da associated with an individual and is the gateway to every online exchange. These actions rely on context to understand identity. Mouse speed [2] As the exchanges increase, however, so do vulnerabilities. Bad actors are Purchase Behavior constantly finding new ways to exploit PII for identity theft or to hack businesses for valuable data. In 2018, the number of consumer records exposed containing sensitive PII shot up to 126%. [ 3 ] In 2019, the cost of a data breach increased to nearly $4 million.[4] Typing speed Address SSN# Kicking the Can The problem is people don’t exactly understand cybersecurity, [ 5 ] and many KEY POINT organizations are still protecting critical applications through username and password alone when there’s a better way. Multi-factor authentication (MFA) can add another layer of security and makes it much more difficult for unauthorized persons Despite a predicted increase and greater to gain access. -
Contribution by Ghana to the Intergovernmental Group of Experts
Intergovernmental Group of Experts on E-Commerce and the Digital Economy First session 4-6 October 2017 Geneva Contribution by GHANA The views expressed are those of the author and do not necessarily reflect the views of UNCTAD. WHAT DO DEVELOPING COUNTRIES NEED IN ORDER TO BUILD COMPETITIVE ADVANTAGES THROUGH E-COMMERCE AND THE DIGITAL ECONOMY? a. Street Addressing Systems Street naming and addressing system are still at nascent stages in Ghana. Most streets in the country do not have names and those with names are rarely utilised as addressing or directional tools. The Government of Ghana in 2010 developed the operational guidelines to assist Metropolitan, Municipal and District Assemblies (MMDAs) to manage the processes for establishing a coherent Street Addressing System. The Government was of the view that the successful implementation of this system will provide location addresses to promote operations of businesses and an addressing platform to facilitate other government initiatives such as the National Identification Exercise and National Population and Housing Census. Notwithstanding the difficulties in the implementation of the project, citizens are now deriving benefits from this initiative. It has led to the introduction of new online services particularly within the transport sector. Examples include the introduction of Uber and the Black Ride services in the country which run on the GIS database. Currently, citizen are able to request for service with an estimated fare to their specific destinations. The Government of Ghana have also launched the National Digital Property Addressing System (Asaase GPS App), which will provide every Ghanaian with a unique permanent digital address linked to postcodes. -
Digital Identification: a Key Identification: Todigital Inclusive Growth
Digital identification: A key to inclusive growth inclusive Digital to identification: key A Digital identification A key to inclusive growth April 2019 McKinsey Global Institute Since its founding in 1990, the McKinsey Global Institute (MGI) has sought to develop a deeper understanding of the evolving global economy. As the business and economics research arm of McKinsey & Company, MGI aims to provide leaders in the commercial, public, and social sectors with the facts and insights on which to base management and policy decisions. MGI research combines the disciplines of economics and management, employing the analytical tools of economics with the insights of business leaders. Our “micro-to-macro” methodology examines microeconomic industry trends to better understand the broad macroeconomic forces affecting business strategy and public policy. MGI’s in-depth reports have covered more than 20 countries and 30 industries. Current research focuses on six themes: productivity and growth, natural resources, labor markets, the evolution of global financial markets, the economic impact of technology and innovation, and urbanization. Recent reports have assessed the digital economy, the impact of AI and automation on employment, income inequality, the productivity puzzle, the economic benefits of tackling gender inequality, a new era of global competition, Chinese innovation, and digital and financial globalization. MGI is led by three McKinsey & Company senior partners: Jacques Bughin, Jonathan Woetzel, and James Manyika, who also serves as the chairman of MGI. Michael Chui, Susan Lund, Anu Madgavkar, Jan Mischke, Sree Ramaswamy, and Jaana Remes are MGI partners, and Mekala Krishnan and Jeongmin Seong are MGI senior fellows. Project teams are led by the MGI partners and a group of senior fellows and include consultants from McKinsey offices around the world. -
Enabling Digital Identity
Enabling Digital Identity David Recordon Innovator for Advanced Products & Research DC PHP Conference 2006 Overview + Web 2.0 + Identity…so what? + Identity 2.0 + “Competitive” Overview + Digging into OpenID + Example Relying Party What is Web 2.0? Web 2.0 + Users in Control + Data Sharing + Social Networking + Collaboration Tools + Lightweight Business Models + Perpetual Beta + The Long Tail + Application Platform What is Identity? “The collective aspect of the set of characteristics by which a thing is definitively recognizable or known.” -Dictionary.com Offline Identity + David Recordon + 09/04/1986 + Oregon + Black Hair and Brown Eyes + Central Pocket Loop + Size 12 Shoes + Drive a Subaru + Work for VeriSign + Star Alliance Gold + AOW Scuba Diver + CPR / AED / First Aid Trained + etc Online Identity + David Recordon + Daveman692 + recordond + http://daveman692.livejournal.com + [email protected] + [email protected] + [email protected] + [email protected] Identity…why do we need technology? + Accuracy ▪ Biometrics + Convenience ▪ Verification + Security ▪ Authorization + Privacy ▪ Limited Disclosure + Portability ▪ HSPD-12 Identity 1.0 on the Web + Proprietary ▪ AOL ▪ Yahoo! ▪ Microsoft ▪ Google + Segregated + Federation + Little User Choice + Many Usernames + Few Passwords Identity 2.0 + Internet Scale ▪ Decentralized + Privacy Protecting ▪ Disclose only as much as is needed + Easy to Adopt ▪ Add to your application in a weekend + Community Driven ▪ Open Source development and that means… + User Choice ▪ Who hosts -
Foundational Digital Infrastructures for Inclusive Digital Economies.Pdf
FOUNDATIONAL DIGITAL INFRASTRUCTURES FOR INCLUSIVE DIGITAL ECONOMIES 1 2 CONTENTS Foreword 1 01 Background 2 02 Methodology for the white paper 5 2.1 Content in the context of Singapore and other countries that have 5 already developed some of the necessary digital infrastructure 2.2 Data collection and case studies for other countries that are 5 beginning their digitisation journey 03 The importance of a digital infrastructure 6 3.1 Why countries need a digital infrastructure 6 3.2 A strategy for a digital infrastructure 6 3.3 Pre-conditions for creating a digital infrastructure 7 3.4 Governance of a digital infrastructure 7 04 Four pillars of a digital infrastructure 9 4.1 Digital Identity 9 4.2 Authorisation and Consent 10 4.3 Payments Interoperability 11 4.4 Data Exchange 13 05 One pillar in depth – Digital identity: a foundational component of a digital infrastructure 15 5.1 Opportunities and value drivers enabled by digital identity 15 5.2 Key questions to shape the design of digital identity 19 5.3 Key enablers including trust and addressing local market pre-conditions 21 5.4 How to launch – Key factors to improve adoption 25 06 Better understanding digital identity in Africa & Asia: 4 case studies 27 6.1 Key insights from the case studies 27 6.2 Case study - digital identity in Brunei 30 6.3 Case study - digital identity in Cambodia 34 6.4 Case study - digital identity in Ghana 37 6.5 Case study - digital identity in Kenya 40 07 Public-Private Partnerships in driving adoption 44 7.1 Singapore case study: Digitally verifiable health credentials 44 7.2 Cambodia case study: Next generation payment system 47 08 Journey to adoption 48 8.1 Next steps for further research 49 09 Glossary 50 10 References 53 3 FOREWORD The digital revolution is radically transforming The report starts with a survey of the available the way we live and work. -
Epasslet Suite Java Card Framework for Eid Documents
Product Brief ePasslet Suite Java Card Framework for eID documents ePasslet Suite is a Java Card framework that contains a complete set of applications for imple- menting electronic ID cards, travel documents, driver‘s licenses and other similar electronic documents. It supports many international standards. MANAGEMENT SUMMARY The ePasslet Suite is delivered either as a solution embedded in the ROM or pre-installed in the flash memory of a Java Card ena- ID cards, passports, driving licences and other identification do- bled smart card. The ePasslet Suite provides applets for various cuments can be equipped with a small computer chip. The result eID document applications, including electronic passports, eIDAS is called an electronic identity card (eID). The embedded chip compliant signature cards, ISO 18013 electronic driver‘s licenses, increases security and can be used for many interesting appli- electronic health cards, custom national eID cards, and more. The cations, e.g. for computer login, automated age verification and solution also allows for post-issuance activation of applets, and proof of identity on the internet. new applets can be developed using an internal core library API that provides a comprehensive set of functional blocks, reducing Electronic identity documents have become very popular in re- memory requirements and time to market. cent years. There are more than 100 states and non-state entities (i.e. United Nations) currently issuing ePassports, and over 490 The ePasslet Suite is the ideal solution for government agencies million ePassports in circulation. Many countries also issue elec- looking to add functionality to eID documents. tronic identity cards. -
National Identification Registration Regulations 2012
.. ..l . L.I. 2111 NATIONAL IDENTITY···REGISTER I REGULATIQNS, 20.12 I f. ARRANGEMENT OF REGULATIONS , •. ·. , .• , '. ' .... ··.: ' ,t • ... :· ,.,. Regulation . l .. · Application fornational identity card 2, Exemp; iripivid:u~ls . ·. · .. .. ·r ·3. · Procedure ·for·applitation r 4: . Processing of application . ~ ·. 5. Form of national. identity card 6. Collection of .nationa! id.entity card 7. Mandatory use ofnational identity card . 8 ..' Production of national identity card. - 9. Power to 'verify i~~ntity by.biometric match 10; Loss of or damage to national :identity. card 11. Obligation of finder ofnational idenrity card: 12. Invalidity, surrender and. cancellation. of national identity card lJ. Conditions under which data in the custody of theAuthoriry _may. ·: beacce.~ed _ ·- <<·, . - . 14. Access to information by· ~cliVidua~. · .. · . 15 ~ A: ,cess to inform~tioo by a ·µ$er ·a-~eti¢Y . ·. - " .1 · 16. -Disclosti~e· of pfrs6tiat infonnad~n with or Without consent I 7. Limits op use, disclosure or sharing of personal information by user ·.· - ,. ' . - - . ; 'agencies 18. Retention, disposal, storage and security .ofpersona! in.formation . by user agen¢ies . 19. Grievance procedure 20 .. · Fees payable 2 I: Ghanaians living outside ·Ghana and online application 22. Interpretation 23. Revocation SCHEDULE . 1_.1 j - l'J . L.I. 2111 2 - I'_,}· , __ NATIO~AL IDENTITY REGISTER REGULATIONS, 2012 I I [] I In exercise of the powers conferred on the Minister responsible for the: ~. ,. National Identification System by section 73 (l) of the National Identity .: LI' ) ,. Register Act, 2008 (Act 750), and on the advice of the Board of the National Identification Authority these Regulations are made this 20th day of February, 2012, i] Application for aationalIdentity card . -
Reimagining Identity Ecosystems in Sub-Saharan Africa with Mobile the Case of Benin, Ghana, Kenya and Uganda
Kenya Uganda Conclusion Reimagining identity ecosystems in Sub-Saharan Africa with mobile The case of Benin, Ghana, Kenya and Uganda December 2020 Copyright © 2020 GSM Association Introduction Benin Ghana Kenya Uganda Conclusion Digital Identity Contents The GSMA represents the interests of mobile The GSMA Digital Identity Programme is uniquely operators worldwide, uniting more than 750 operators positioned to play a key role in advocating and raising Introduction 2 and nearly 400 companies in the broader mobile awareness of the opportunity of mobile- enabled 1 Benin 4 ecosystem, including handset and device makers, digital identity and life-enhancing services. Our software companies, equipment providers and internet programme works with mobile operators, governments Country profile 5 companies, as well as organisations in adjacent and the development community to demonstrate the industry sectors. The GSMA also produces the industry- opportunities, address the barriers and highlight the The identity ecosystem 6 leading MWC events held annually in Barcelona, Los value of mobile as an enabler of digital identification. Angeles and Shanghai, as well as the Mobile 360 Series Policy frameworks 8 of regional conferences. For more information, please visit the GSMA Digital Identity website at www.gsma.com/digitalidentity Role of mobile 9 For more information, please visit the GSMA corporate 2 Ghana 12 website at www.gsma.com Follow GSMA Mobile for Development on Twitter: @GSMAm4d Country profile 13 Follow the GSMA on Twitter: @GSMA The identity ecosystem 14 Policy frameworks 17 Role of mobile 18 3 Kenya 20 Country profile 21 The identity ecosystem 22 Author: This initiative has been funded by UK aid from the Ken Okong’o, Senior Manager – Policy frameworks 25 UK government and is supported by the GSMA and Policy and Advocacy, Digital Identity, GSMA its members.