Too much business influence on ID verification plan?
- 10 December, 2012 13:34
A proposed National Trusted Identities Framework (NTIF) appears to provide few benefits and “a number of risks” for consumers, according to the Australian Communications Consumer Action Network (ACCAN).
Under the proposed NTIF, the government and private sector could share consumer identity information with the goal of faster identity verification.
However, in a submission today to the Department of Prime Minister and Cabinet, ACCAN said “no clear case” has been “made from a consumer perspective that the NTIF is needed.”
ACCAN complained that consumer interest have not been well represented in consultations to develop the NTIF. Businesses have had large influence on consultations and ACCAN fears that NTIF “is simply a tool for business and governments to better identify individuals,” the consumer group wrote in its submission.
“Much more detail about the NTIF is needed for consumers and civil society representatives to be able to engage with the development process, and this detail should be made public and provided in a timely and transparent manner if there is to be any confidence in the process from civil society and consumers,” ACCAN said.
ACCAN said the influence of businesses has led to too much focus on extending the document verification service to private sector companies. The DVS is an online service used by the government for identity verification.
“The claimed benefits of the NTIF extend beyond private sector interests, yet the DVS extension would primarily benefit businesses,” ACCAN said. “If the DVS extension is to serve as the next stage in the development of the NTIF it will likely undermine consumer confidence in later stages of the NTIF.”
ACCAN outlined several priority areas for the final NTIF.
The NTIF “must recognise that online identity is multi-faceted, and continue to allow individuals to maintain multiple identities," ACCAN said. Someone might need to maintain multiple online identities if, for example, a person is dealing with one organisation in two ways, as an individual and as a company representative.
The framework should recognise that disclosure of identity is not always needed, ACCAN said. “If, for example, it is sufficient for some purpose to verify that an individual is over 18, there should be no disclosure of the individual’s date of birth, but rather a simple acknowledgement that the individual is over 18.”
Individuals should be able to contest incorrect data about themselves through a simple mechanism, ACCAN added.
Separately, ACCAN has proposed stronger privacy protections for consumers in the case of data breaches. In a submission earlier this month, the consumer group urged a law requiring companies to notify customers about breaches soon after they occur.
Parliament passed several amendments to privacy law last month, including greater enforcement powers for the Australian privacy commissioner.
Follow Adam Bender on Twitter: @WatchAdam
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Australian National University streamlines IT
Leveraging DCIM Software
Business executives are challenging their IT staffs to convert costly data centres into producers of business value. Only with higher visibility, more control and improved automation of reporting systems can help deliver on this commitment. Holistic management capabilities available today can enable data centre professionals to maximize their capacity to control their energy costs and to advise the business on how to utilize IT assets more effectively. This paper demonstrates how data centre infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Efficient Data Management in Three Simple Steps
Gartner reports that Business Intelligence, Mobile Technologies and Cloud Computing rank 1-2-3 as the 2013 Global CIO Technology Priorities. These three trends, labelled the “Perfect Storm” of new technologies, are transforming every link in the IT value chain, promising to deliver more efficient, responsive and dynamic IT operations. But this also means massive shifts in the way IT applications and services are created, deployed and maintained. This whitepaper aims to help you begin the journey to efficient modern data management
Complexity Ate My Budget
It’s high time we tamed the monster we created! Against a backdrop of sustained and uncontrollable data growth, most of today’s operational problems revolve around backup and recovery. Understanding the hidden costs and implications for data protection strategies is critical, but the complexity of the nebulous and amorphous cloud can make everything hazy. This white paper breaks it down to different dimensions of virtualisation and how to deliver the productivity and flexibility it promises.