Identity Document from Wikipedia, the Free Encyclopedia

Total Page:16

File Type:pdf, Size:1020Kb

Identity Document from Wikipedia, the Free Encyclopedia Identity document From Wikipedia, the free encyclopedia (Redirected from ID card) "National identity card" redirects here. For cards referred to in the English language as "national identity card", see: National identity card (disambiguation). This article needs additional citations for verification. Please help improve this article by adding reliable references. Unsourced material may be challenged and removed.(January 2008) An identity document (also called a piece of identification or ID) is any document which may be used to verify aspects of a person's Personalidentity. If issued in the form of a small, mostly standard-sized card, it is usually called an identity card (IC). In some countries the possession of a government-produced identity card is compulsory while in others it may be voluntary. In countries which do not have formal identity documents, informal ones may in some circumstances be required. In the absence of a formal identity document, some countries accept driving licences as the most effective method of proof of identity. Most countries accept passports as a form of identification. Contents [hide] 1 Information included in ID documents 2 Adoption of identity cards o 2.1 Arguments for o 2.2 Arguments against 3 National policies o 3.1 European Union . 3.1.1 Belgium . 3.1.2 Bulgaria . 3.1.3 Cyprus . 3.1.4 Czech Republic . 3.1.5 Denmark . 3.1.6 Estonia . 3.1.7 Finland . 3.1.8 France . 3.1.9 Germany . 3.1.10 Greece . 3.1.11 Hungary . 3.1.12 Italy . 3.1.13 Poland . 3.1.14 Portugal . 3.1.15 Romania . 3.1.16 Slovakia . 3.1.17 Spain . 3.1.18 Sweden . 3.1.19 United Kingdom o 3.2 Albania o 3.3 Argentina o 3.4 Australia o 3.5 Bangladesh o 3.6 Bosnia and Herzegovina o 3.7 Brazil o 3.8 People's Republic of China . 3.8.1 Hong Kong Special Administrative Region . 3.8.2 Macao Special Administrative Region o 3.9 Colombia o 3.10 Costa Rica o 3.11 Chile o 3.12 Croatia o 3.13 Dominican Republic o 3.14 El Salvador o 3.15 Guatemala o 3.16 India o 3.17 Indonesia o 3.18 Iran o 3.19 Iraq o 3.20 Israel o 3.21 Japan o 3.22 Macedonia o 3.23 Malaysia o 3.24 Mauritius o 3.25 Mexico o 3.26 Montenegro o 3.27 Pakistan o 3.28 Peru o 3.29 Philippines o 3.30 Serbia o 3.31 Singapore o 3.32 South Africa o 3.33 Sri Lanka o 3.34 Republic of China ("Taiwan") o 3.35 United Arab Emirates o 3.36 United States o 3.37 Uruguay 4 See also 5 References 6 External links [edit]Information included in ID documents Information present on the document — or in a supporting database — might include the bearer's full name, a portrait photo, age, birth date, address, an identification number, profession or rank, religion, ethnic or racial classification, restrictions, and citizenship status. New technologiescould allow identity cards to contain biometric information, such as photographs, face, hand or iris measurements, or fingerprints. Electronic identity cards or e-IDs are already available in some territories such as Hong Kong, Malaysia, Estonia, Finland, Belgium, Portugal and Spain.Morocco is also planning to launch a new identity card of biometric type by January 2007[citation needed]. [edit]Adoption of identity cards The universal adoption of identity cards is supported by law enforcement officials who claim that it will make surveillance and identification of criminals easier. However, concern is also expressed about the extensive cost and potential abuse of hi-tech smartcards. In the United Kingdom and the United States especially, government-issued compulsory identity cards or, more precisely, their centralised database are a source of debate as they are regarded as an infringement of privacy and civil liberties. Most criticism is directed towards the enhanced possibilities of extensive abuse of centralised and comprehensive databases storing sensitive data. A 2006 survey of UK Open University students concluded that the planned compulsory identity card coupled with a central government database generated the most negative attitudinal response among several alternative configurations.[1] [edit]Arguments for This section may contain original research or unverified claims. Please improve the article by adding references. See the talk page for details. (July 2009) . Identity verification in banks or at national borders with a standard national identification card would be simpler than with a physically bulkypassport, especially if banks don't accept residents having foreign passports. Eligibility or ownership verification would be facilitated (for example, when paying with a credit card or cheque, or attempting to buy age-restricted products). False identification may be reduced where identity cards are required to access a bank account. Of course, phishing and many other forms ofidentity theft will be unaffected. Identity cards can be a useful administrative tool that can increase efficiency in dealings with both the government and private companies. In US states that don't issue identity cards, private companies like banks require equivalent documents, such as a driver's license (for fraud protection). Persons who don't have a driver's license are usually required in practice to get a document that is something very much like an identity card, if possible. Cards may help reduce immigration service bureaucracy. In certain countries, the procedures for deporting illegal immigrants whose ages, identities or nationalities cannot be formally established are more complex than those for whom they can be readily asserted. This gives illegal immigrants more time to prepare their legal defence. In some countries (Spain, for instance) it may prevent the immigrant's deportation altogether. However, in this situation most illegal immigrants will destroy their identity papers, nullifying the reduction in bureaucracy. Every human being already carries one's own personal identification in the form of one's DNA, which can not be falsified or discarded. Even for non-state commercial and private interactions, this may shortly become the preferred identifier, rendering a state-issued identity card a lesser evil than the potentially extensive privacy risks associated with everyday use of a person's genetic profile for identification purposes.[2][3][4][5][6] . In many countries ID Cards are given only to citizens (for instance, Pakistan), these can be a source of pride since they are often the most tangible proof of citizenship. A national identity card available for all residents in a country would reduce a problem that otherwise would occur: Banks and some other companies do de facto require identity cards, and if they also did handle the issuing of cards, they could refuse it for security reasons. A national authority has better opportunities to check identities, and to take the responsibility for the issuing, while banks don't want to guarrantee uncertain identities. [edit]Arguments against Further information: freedom of movement and propiska This section may contain original research or unverified claims. Please improve the article by adding references. See the talk page for details. (July 2009) . Commercial organisations such as banks typically do not try to authenticate the identity of a person, but rather the validity of a transactions (e.g. by signature or PIN) due to the acknowledged difficulty in reliably identifying an individual in a fraud proof and convenient manner. It has been argued that identity cards impose a disproportionate burden upon both government and citizens while empowering the executive, which is contrary to the maxim: "the government that governs best, governs least". Some have pointed out that extensive lobbying for identity cards has been undertaken, in countries without compulsory identity cards, by IT companies who will be likely to reap rich benefits in the event of an identity card scheme being implemented. Cards with centralised database could be used to track anyone's movements and private life, thus endangering privacy. The proposed British ID card (see next section) will involve a series of linked databases, to be managed by the private sector. Managing disparate linked systems using a range of institutions and any number of personnel is alleged to be a security disaster in the making.[7] . A requirement to carry an identity card at all times can lead to the inconvenience of arbitrary requests from card controllers (such as thepolice). This can lead to functionality creep whereby carrying a card becomes de facto if not de jure compulsory, as in the case of Social Security numbers in the USA, which are now widely used as ID. Government claims that identity cards will prevent crimes may not be based in fact. The former UK Home Secretary Charles Clarke conceded that identity cards may be useful only in the identification of bodies in the aftermath of a crime. As a strong presumption of identity is given in favour of a card holder, the identity card scheme might be an asset to potential terrorists. In many cases, other forms of documentation such as a driver's license, passport, or Medicare card serve a similar function on a more limited scale, and thus an ID card is not needed. The cost of introducing and administering an identity card system can be very high. Figures from £30 (US$60) to £90 or even higher have been suggested for the proposed UK ID card.[8] . In some countries where ID cards were required to show religious affiliation (as used to be the case in Greece) or ethnic background, this led to cases of discrimination. Under some interpretations of Sharia law, apostate Muslims may be sentenced to death. Malaysia's identity cards state the religion only if a person's religion is Islam.
Recommended publications
  • Pre-Arriv Al Guide
    PRE-ARRIVAL GUIDE 2013–14 II SCAD HONG KONG PRE-ARRIVAL GUIDE CONTENTS HONG KONG AND SHAM SHUI PO LIVING IN HONG KONG Hong Kong 1 Hong Kong identity card 6 Sham Shui Po district 1 Residence halls 6 Electricity 6 ARRIVAL AND DEPARTURE Water 7 Passports/visas 2 Renters insurance 7 Immigration requirements 2 Currency 7 Arrival 3 Currency exchange 7 Check-in at student residence 3 Banking 7 Departure 3 Weather 8 Clothing 8 ORIENTATION AND ENGLISH Books and art supplies 8 LANGUAGE ASSESSMENT Travel 8 Orientation 3 POLICIES ESL assessment 3 Making payments to SCAD Hong Kong 8 HEALTH AND SAFETY SCAD Card 9 Insurance 4 CONDUCT AND BEHAVIOR Health 4 Student handbook 9 Safety 4 Conduct 9 Emergencies 5 Alcohol 9 Lost passport 5 Drugs 9 LOCAL TRANSPORTATION Smoking 9 MTR 5 CONTACT INFORMATION 9 Buses, trams, taxis and ferries 5 Air 5 FACILITIES MAP 10 Octopus Card 5 COMMUNICATION Time 6 Telephones 6 Mobile phones 6 Computers/Internet 6 VoIP 6 SCAD HONG KONG PRE-ARRIVAL GUIDE III CONGRATULATIONS ON YOUR ACCEPTANCE TO SCAD! HONG KONG AND SHAM SHUI PO Hong Kong: An international gateway to Asia, Hong Kong is a bustling global metropolis accessible by several major airlines A short plane ride from metropolitan centers of Taiwan, Thailand, Malaysia, Singapore and Indonesia, Hong Kong is also in close proximity to Japan, Korea and Australia Mainland China and the city of Guangzhou, the country’s third largest city, are a short train ride away Hong Kong is a one-hour trip by boat from the island of Macau, a former Portuguese colony with a unique blend of
    [Show full text]
  • Customer Name
    商業客戶資料 / Corporate Client (CIF) Information □ 開立 / Creation □ 更改 / Change 注意: - 請用正楷填寫並在適當的方格內劃上“”號。 PARA USO DO BANCO FOR BANK USE 如所提供作答的空間不足,請使用附有貴公司機構名稱之信函提供有關資料。 C.I.F.: Note : - Please fill in BLOCK LETTERS and tick where applicable In case the space provided for any answer is not enough, please use paper with your company letterhead to provide the data 日期 Date:___ (日 day) ____ (月 month) ______ (年 year) 1. – 公司名稱: Company Full Name: 2. 註冊號碼: 註冊日期: 註冊地: 國家代碼 Business Registration Nr. : Date of Incorporation: Country of Incorporation: Country Code: _______________________ ____ /____ / ________ ___ ___ ___ 資本: Share capital ____________________________ 3. 營業地址: 郵政編號: Business Address: Postal Code: 省/州: 國家 國家代碼 Province / State: Country: Country Code: ___ ___ ___ 電話: 傳真 電郵 Telephone Fax: E-mail: 4. 通訊地址: (若有異於營業地址) 郵政編號: Correspondence Address: (if different from “Business Address”) Postal Code: 省/州: 國家 國家代碼 Province / State: Country: Country Code: ___ ___ ___ 電話: 傳真 電郵 Telephone Fax: E-mail: 5. 行業: Code: Line of Business: Código ___________ 6. 股東 Shareholders 姓名: 持股權 國籍 常居地址: CIF Name: Share Nationality: Habitual Residential Address: Page 頁 1 of 4 7. 董事會成員及有效簽署人: Directors & Authorized Signatories: 姓名: 職位 國籍 常居地: CIF Name: /Title Nationality: Habitual Residential Address: 8. 持有其他公司股權 (如有) Shareholdings in other companies – if applicable 公司名稱: Company Full Name: 註冊地址 Registered Address: 註冊日期 持股金額 持股量 Date of incorporation Share Capital Capital _________________________________________________ ____ / ____ / _________ ___________________ _______ _________________________________________________ 公司名稱: Company Full Name: 註冊地址 Registered Address: 註冊日期 持股金額 所佔率% Date of incorporation Share Capital Capital _________________________________________________ ____ / ____ / _________ ___________________ _______ _________________________________________________ 9. 擁有之不動產(如有): Real Estate owned by the Company – if applicable 註冊地址: 地點: 市值: 負擔(抵押 / 按揭) Description/Registration details: Location: Value: Pledge / Mortgage: Page 頁 2 of 4 10.
    [Show full text]
  • Registration → Guidelines on Completing the CC Code and Name Field) for Reference
    236/421 THE UNIVERSITY OF HONG KONG Guide to Online Master Registration 1. After you obtained your HKU Portal account details, you should immediately login to http://hkuportal.hku.hk, click “Self-Service” under “MyPage”, then click “Master Registration” to complete your online Master Registration. If you do not complete online Master Registration, your Student Registration Card cannot be issued and you cannot enroll on any course. 2. There are 6 pages in the Master Registration form. Pages 1 to 5 are for data input. Page 6 is the confirmation page. After completing each page, press “Save & Next” to go to the next page. When you have reviewed the information on Page 6, press “Submit” to confirm the data you have entered. After pressing the “Submit” button, you will see an acknowledgement page. Logout from the system and close all the browser windows. How to complete the online Master Registration Please take note of the following when you fill in the registration form: (a) University Number and Degree Curriculum These fields will be pre-entered for you on the basis of information extracted from your admission records. No changes will be allowed. (b) Name You should enter your name as it appears in your HKID Card, Passport or Exit-Entry Permit for Travelling to and from Hong Kong and Macau (往来港澳通行证). Do not enter a comma to separate your Christian name. Also, do not enter a name different from your HKID Card or Passport, your Student Registration Card, degree diploma and other documents from the University will be issued with an unofficial name.
    [Show full text]
  • Guide to Shipping Register and Shipping Tax Regime in Hong Kong Contents
    Guide to Shipping Register and Shipping Tax Regime in Hong Kong Contents The Hong Kong Shipping Register 1 Taxation of Shipping Profits in Hong Kong 8 Schedule 12 The Hong Kong Shipping Register Until 3 December 1990, the United Kingdom Merchant Shipping Acts (the “Acts”) (except for the Merchant Shipping Act 1988) applied to registration of ships and to mortgages of ships in Hong Kong. A ship registered at the Port of Hong Kong was, therefore, a British ship. Hong Kong reverted to Chinese sovereignty on 1 July 1997 and became a Special Administrative Region of the People’s Republic of China. Section VIII of Annex I to the Sino- British Joint Declaration which relates to the transfer of sovereignty states that: “The Hong Kong Special Administrative Region shall maintain Hong Kong’s previous systems of shipping management and shipping regulation, including the system for regulating conditions of seamen. The specific functions and responsibilities of the Hong Kong Special Administrative Region Government in the field of shipping shall be defined by the Hong Kong Special Administrative Region Government on its own. Private shipping businesses and shipping-related businesses and private container terminals in Hong Kong may continue to operate freely. The Hong Kong Special Administrative Region shall be authorised by the Central People’s Government to continue to maintain a shipping register and issue related certificates under its own legislation in the name of ‘Hong Kong, China’.” The Hong Kong Government appointed a Steering Committee in 1987 to advise the Government on the establishment of an independent shipping registry. The result was enacted as the Merchant Shipping (Registration) Ordinance (Cap 415) (the “Ordinance”), which came into effect on 3 December 1990.
    [Show full text]
  • Cloud App Security Administration Guide For
    Cloud App Security Administration Guide for Office 365 and Microsoft 365 Contents Understanding Cloud App Security 6 Understanding Email Security 6 Using Data Leak Protection 7 Understanding Anomalies 8 Understanding Click-Time Protection 8 Configuring Cloud App Security 10 Subscribing to Cloud App Security 10 Activating Cloud Applications for Cloud App Security 11 Activating Office 365 and Microsoft 365 Cloud Applications 13 Manually Configuring Office 365 and Microsoft 365 Cloud Applications During Activation 17 Managing Quarantine for Office 365 and Microsoft 365 29 Setting Up a Quarantine Mailbox for Office 365 and Microsoft 365 Email (Exchange Online) 29 Setting Up a Quarantine Folder for Office 365 and Microsoft 365 OneDrive 30 Setting Up a Quarantine Folder for Office 365 and Microsoft 365 SharePoint 30 Using the Quarantine View for Office 365 and Microsoft 365 Email (Exchange Online) 31 Using the Quarantine Page 32 Using the Quarantined File Creator Dashboard 33 Using the User Dashboard for Office 365 and Microsoft 365 34 Managing Restore Requests 35 Using the SonicWall Cloud App Security Dashboard 36 Using the Security Events Widgets 37 Changing a Security Event Widget to an Alert or Custom Query 38 Resetting a Security Event Widget 38 Hiding a Security Event Widget 39 Configuring Security Event Widget Custom Queries 39 Adjusting the Time Scale 40 Viewing the Summary of Security Events 40 Viewing Login Events 42 Viewing Secured Applications 44 Viewing the Scanned Files Summary 45 Managing Security Events 46 Using the Security
    [Show full text]
  • Immigration Manual
    Immigration Manual November 2006 Baker & McKenzie International is a Swiss Verein with member law firms around the world. In accordance with the common terminology used in professional service organizations, reference to a “partner” means a person who is a partner, or equivalent, in such a law firm. Similarly, reference to an “office” means an office of any such law firm. © 2006 Baker & McKenzie All rights reserved. This publication is copyright. Apart from any fair dealing for the purposes of private study or research permitted under applicable copyright legislation, no part may be reproduced or transmitted by any process or means without prior written permission. IMPORTANT DISCLAIMER. The material in this booklet is of the nature of general comment only. It is not offered as advice on any particular matter and should not be taken as such. The firm and the contributing authors expressly disclaim all liability to any person in respect of anything and in respect of the consequences of anything done or omitted to be done wholly or partly in reliance upon the whole or any part of the contents of this booklet. No client or other reader should act or refrain from acting on the basis of any matter contained in it without taking specific professional advice on the particular facts and circumstances in issue. Immigration Manual Immigration Manual INTRODUCTION This manual is designed to provide a general overview of the immigration laws and procedures of various countries. Please note that the immigration laws and procedures are constantly changing and are subject to new policies and developments. Therefore, this manual is not intended to be exhaustive and specific questions should be directed to the Executive Transfer and Immigration Department of Baker & McKenzie, Hong Kong.
    [Show full text]
  • China: Procedure and Requirements to Obtain a Biometric Passport
    Responses to Information Requests - Immigration and Refugee Board of Canada Page 1 of 3 Immigration and Refugee Board of Canada Home > Research Program > Responses to Information Requests Responses to Information Requests Responses to Information Requests (RIR) respond to focused Requests for Information that are submitted to the Research Directorate in the course of the refugee protection determination process. The database contains a seven-year archive of English and French RIRs. Earlier RIRs may be found on the UNHCR's Refworld website. 6 May 2013 CHN104415.E China: Procedure and requirements to obtain a biometric passport, including date they started to be issued; indicators that the passport is biometric, including symbols Research Directorate, Immigration and Refugee Board of Canada, Ottawa 1. Date of First Issue for Biometric Passports Sources indicate that China began to issue biometric passports on 15 May 2012 (China 16 May 2012; Dalian Municipal Government 17 May 2012). The identity-document checking service operated by Keesing Reference Systems writes that a passport that "contains a contactless chip in the back cover" was first issued in February 2012 (n.d.a). According to the official web portal of the Chinese government, traditional passports may continue to be used for as long as they are valid (China 16 May 2012). People's Daily Online, a Chinese news website founded in 1997 (People's Daily Online n.d.), reports that electronic passports for public affairs were first issued by the Ministry of Foreign Affairs on 1 July 2011 (5 July 2011). These passports contain a "'component layer,' consisting of microchips, electronic circuits, and other parts" inside the back cover, which includes "the passport owner's name, sex and personal photo as well as the passport's term of validity and [the] digital certificate of the chip" (ibid.).
    [Show full text]
  • St Sar Eid Whitepaper 101007Fi
    Edition1 /2007 The SECURE Application Review No portion of this publication may be is a Silicon Trust Program reproduced in part or in whole without publication, sponsored by the express permission, in writing, from Infineon Technologies AG. the publisher. All product copyrights Editorial Team and trademarks are the property of their Wendy Atkins, Rainer Bergmann, respective owners. All product names, Dr. Detlef Houdeau, Nicole Mountain specifications, prices and other infor- mation are correct at the time of going Project Development to press but are subject to change Krowne Communications GmbH, without notice. The publisher takes no Berlin, Germany responsibility for false or misleading This copy of SECURE Application information or omissions. Review is Copyright 2007 by Infineon Technologies AG. Further Information can be found at: Any comments may be addressed to www.silicon-trust.com [email protected] SECURE Application Review: CITIZEN CARDS C O NTENT S Definitions .................................................................................................................................4 Part 1 – Overview & market dynamics Change and citizen empowerment ......................................................................................7 Part 2 – Applications A smart way to deal with government applications ........................................................12 Partner Inputs: Precise Biometrics .....................................................................................21 Part 3 – Form factors Matching
    [Show full text]
  • Criminal Background Check Procedures
    Shaping the future of international education New Edition Criminal Background Check Procedures CIS in collaboration with other agencies has formed an International Task Force on Child Protection chaired by CIS Executive Director, Jane Larsson, in order to apply our collective resources, expertise, and partnerships to help international school communities address child protection challenges. Member Organisations of the Task Force: • Council of International Schools • Council of British International Schools • Academy of International School Heads • U.S. Department of State, Office of Overseas Schools • Association for the Advancement of International Education • International Schools Services • ECIS CIS is the leader in requiring police background check documentation for Educator and Leadership Candidates as part of the overall effort to ensure effective screening. Please obtain a current police background check from your current country of employment/residence as well as appropriate documentation from any previous country/countries in which you have worked. It is ultimately a school’s responsibility to ensure that they have appropriate police background documentation for their Educators and CIS is committed to supporting them in this endeavour. It is important to demonstrate a willingness and effort to meet the requirement and obtain all of the paperwork that is realistically possible. This document is the result of extensive research into governmental, law enforcement and embassy websites. We have tried to ensure where possible that the information has been obtained from official channels and to provide links to these sources. CIS requests your help in maintaining an accurate and useful resource; if you find any information to be incorrect or out of date, please contact us at: [email protected].
    [Show full text]
  • Report English 01.Pdf
    1 SUMMARY 1. EXECUTIVE SUMMARY 03 2. INTRODUCTION 08 3. SECTION ON CCTV 12 4. IDENTITY CARD SECTION 56 5. SECTION ON PERSONAL DATA ON THE INTERNET 97 6. CONCLUSIONS 182 7. BIBLIOGRAPHY 195 2 1. EXECUTIVE SUMMARY The initial objective of this Project was to carry out the first step in the promotion of a public debate and influence in public policies, relative to the protection of personal data in Latin America. In this first stage, the project has been centered in two countries: Brazil and Mexico, and has had as its objective the identification of the main institutional, legal, academic, social and technological actors in three spheres: a) National identification documents, b) video surveillance in public spaces, and c) surveillance of data in the Internet. In the framework of the new national identification document in Brazil, there exist laws, law projects and discussions in the Congress since 1991, but mainly, they refer to this document in an uncritical and non reflexive way, without participation and public debate with respect to the theme in the country. The research also brings up the point that scientific production borders the theme of biometrics and identification by the exact disciplines or those interested in suggesting more efficient technical systems. From the humanities there are fewer critical studies that reflect on the theme. In this way, the implementation is characterized by a technocratic aspect or a better technique that erases its political characteristics. The analysis of the law projects and of existing laws indicates that the application of the unique identification document in the country does not pass in Brazil due to legal mechanisms for the control and supervision of the document itself outside of groups who use it.
    [Show full text]
  • Digital Identification: a Key Identification: Todigital Inclusive Growth
    Digital identification: A key to inclusive growth inclusive Digital to identification: key A Digital identification A key to inclusive growth April 2019 McKinsey Global Institute Since its founding in 1990, the McKinsey Global Institute (MGI) has sought to develop a deeper understanding of the evolving global economy. As the business and economics research arm of McKinsey & Company, MGI aims to provide leaders in the commercial, public, and social sectors with the facts and insights on which to base management and policy decisions. MGI research combines the disciplines of economics and management, employing the analytical tools of economics with the insights of business leaders. Our “micro-to-macro” methodology examines microeconomic industry trends to better understand the broad macroeconomic forces affecting business strategy and public policy. MGI’s in-depth reports have covered more than 20 countries and 30 industries. Current research focuses on six themes: productivity and growth, natural resources, labor markets, the evolution of global financial markets, the economic impact of technology and innovation, and urbanization. Recent reports have assessed the digital economy, the impact of AI and automation on employment, income inequality, the productivity puzzle, the economic benefits of tackling gender inequality, a new era of global competition, Chinese innovation, and digital and financial globalization. MGI is led by three McKinsey & Company senior partners: Jacques Bughin, Jonathan Woetzel, and James Manyika, who also serves as the chairman of MGI. Michael Chui, Susan Lund, Anu Madgavkar, Jan Mischke, Sree Ramaswamy, and Jaana Remes are MGI partners, and Mekala Krishnan and Jeongmin Seong are MGI senior fellows. Project teams are led by the MGI partners and a group of senior fellows and include consultants from McKinsey offices around the world.
    [Show full text]
  • Enhanced Functionality Brings New Privacy
    2018] T. Szádeczky: Enhanced Functionality Brings New Privacy ... 3 DOI 10.5817/MUJLT2018-1-1 ENHANCED FUNCTIONALITY BRINGS NEW PRIVACY AND SECURITY ISSUES – AN ANALYSIS OF EID* by TAMÁS SZÁDECZKY** As compared with traditional paper-based versions and the standard username- -password login to e-Government services, the new electronic identity and travel documents have made on-site electronic and on-line authentication of citizen more comfortable and secure. The biometric passport was introduced in Hungary in 2006. A decade later the electronic identity card (eID) was implemented. The reason for the improvement of such documents is twofold: enhancing security features and performing new functions. The development is certainly welcome, but it also generates new types of risks, with which governments and citizens must take into account. In this paper, I will first analyze the most widespread technologies of data storage cards from the passive elements to the chipcards, including the biometric passport. The objective is to provide an overview of the technical development as a background to my paper. I will then proceed to an analysis of the relevant EU and national legal background, data elements, data protection and the functions (ePASS, eID, eSIGN) of the new Hungarian and German identity card, as well as the security risks and protection properties of the eID-type documents. The paper concludes with a summary of the lessons learned from and the risks involved in the current solutions in Hungary and Germany. * The work was created in commission of the National University of Public Service under the priority project KÖFOP-2.1.2-VEKOP-15-2016-00001 titled „Public Service Development Establishing Good Governance” in the Miklós Zrínyi Habilitation Program.
    [Show full text]