Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Too much business influence on ID verification plan?

ACCAN sees “no clear case” for National Trusted Identities Framework.

A proposed National Trusted Identities Framework (NTIF) appears to provide few benefits and “a number of risks” for consumers, according to the Australian Communications Consumer Action Network (ACCAN).

Under the proposed NTIF, the government and private sector could share consumer identity information with the goal of faster identity verification.

However, in a submission today to the Department of Prime Minister and Cabinet, ACCAN said “no clear case” has been “made from a consumer perspective that the NTIF is needed.”

ACCAN complained that consumer interest have not been well represented in consultations to develop the NTIF. Businesses have had large influence on consultations and ACCAN fears that NTIF “is simply a tool for business and governments to better identify individuals,” the consumer group wrote in its submission.

“Much more detail about the NTIF is needed for consumers and civil society representatives to be able to engage with the development process, and this detail should be made public and provided in a timely and transparent manner if there is to be any confidence in the process from civil society and consumers,” ACCAN said.

ACCAN said the influence of businesses has led to too much focus on extending the document verification service to private sector companies. The DVS is an online service used by the government for identity verification.

“The claimed benefits of the NTIF extend beyond private sector interests, yet the DVS extension would primarily benefit businesses,” ACCAN said. “If the DVS extension is to serve as the next stage in the development of the NTIF it will likely undermine consumer confidence in later stages of the NTIF.”

ACCAN outlined several priority areas for the final NTIF.

The NTIF “must recognise that online identity is multi-faceted, and continue to allow individuals to maintain multiple identities," ACCAN said. Someone might need to maintain multiple online identities if, for example, a person is dealing with one organisation in two ways, as an individual and as a company representative.

The framework should recognise that disclosure of identity is not always needed, ACCAN said. “If, for example, it is sufficient for some purpose to verify that an individual is over 18, there should be no disclosure of the individual’s date of birth, but rather a simple acknowledgement that the individual is over 18.”

Individuals should be able to contest incorrect data about themselves through a simple mechanism, ACCAN added.

Separately, ACCAN has proposed stronger privacy protections for consumers in the case of data breaches. In a submission earlier this month, the consumer group urged a law requiring companies to notify customers about breaches soon after they occur.

Parliament passed several amendments to privacy law last month, including greater enforcement powers for the Australian privacy commissioner.

Follow Adam Bender on Twitter: @WatchAdam

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Document Verification Service (DVS), Identity, Australian Communications Consumer Action Network (ACCAN), National Trusted Identities Framework (NTIF), privacy
Latest Blog Posts
Whitepapers
  • Avoiding Common Pitfalls of Evaluating and Implementing DCIM Solutions
    While many who invest in Data Centre Infrastructure Management (DCIM) software benefit greatly, some do not. Research has revealed a number of pitfalls that end users should avoid when evaluating and implementing DCIM solutions. Choosing an inappropriate solution, relying on inadequate processes, and a lack of commitment / ownership / knowledge can each undermine a chosen toolset’s ability to deliver the value it was designed to provide. This paper describes these common pitfalls and provides practical guidance on how to avoid them.
    Learn more »
  • Transform IT, Transform the Enterprise
    Existing IT operational models and an ageing infrastructure are CIOs back from their full potential. This paper reveals the three IT imperatives for a CIO-led transformation, and details how CIOs are adopting strategies to change IT and assert their organisations as business leaders and innovators.
    Learn more »
  • CISO 2013 Security Insights: A new standard for security leaders
    Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO