Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Too much business influence on ID verification plan?

ACCAN sees “no clear case” for National Trusted Identities Framework.

A proposed National Trusted Identities Framework (NTIF) appears to provide few benefits and “a number of risks” for consumers, according to the Australian Communications Consumer Action Network (ACCAN).

Under the proposed NTIF, the government and private sector could share consumer identity information with the goal of faster identity verification.

However, in a submission today to the Department of Prime Minister and Cabinet, ACCAN said “no clear case” has been “made from a consumer perspective that the NTIF is needed.”

ACCAN complained that consumer interest have not been well represented in consultations to develop the NTIF. Businesses have had large influence on consultations and ACCAN fears that NTIF “is simply a tool for business and governments to better identify individuals,” the consumer group wrote in its submission.

“Much more detail about the NTIF is needed for consumers and civil society representatives to be able to engage with the development process, and this detail should be made public and provided in a timely and transparent manner if there is to be any confidence in the process from civil society and consumers,” ACCAN said.

ACCAN said the influence of businesses has led to too much focus on extending the document verification service to private sector companies. The DVS is an online service used by the government for identity verification.

“The claimed benefits of the NTIF extend beyond private sector interests, yet the DVS extension would primarily benefit businesses,” ACCAN said. “If the DVS extension is to serve as the next stage in the development of the NTIF it will likely undermine consumer confidence in later stages of the NTIF.”

ACCAN outlined several priority areas for the final NTIF.

The NTIF “must recognise that online identity is multi-faceted, and continue to allow individuals to maintain multiple identities," ACCAN said. Someone might need to maintain multiple online identities if, for example, a person is dealing with one organisation in two ways, as an individual and as a company representative.

The framework should recognise that disclosure of identity is not always needed, ACCAN said. “If, for example, it is sufficient for some purpose to verify that an individual is over 18, there should be no disclosure of the individual’s date of birth, but rather a simple acknowledgement that the individual is over 18.”

Individuals should be able to contest incorrect data about themselves through a simple mechanism, ACCAN added.

Separately, ACCAN has proposed stronger privacy protections for consumers in the case of data breaches. In a submission earlier this month, the consumer group urged a law requiring companies to notify customers about breaches soon after they occur.

Parliament passed several amendments to privacy law last month, including greater enforcement powers for the Australian privacy commissioner.

Follow Adam Bender on Twitter: @WatchAdam

Follow Computerworld Australia on Twitter: @ComputerworldAU, or take part in the Computerworld conversation on LinkedIn: Computerworld Australia

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Document Verification Service (DVS), Identity, Australian Communications Consumer Action Network (ACCAN), National Trusted Identities Framework (NTIF), privacy
Latest Blog Posts
Whitepapers
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • CISO 2013 Security Insights: A new standard for security leaders
    Insights from the 2013 IBM Chief Information Security Officer Assessment which uncovered a set of leading business, technology and measurement practices that help to address the questions CISO's and security leaders have in managing diverse business concerns, creating mobile security policies and in fully integrating business, risk and security metrics.
    Learn more »
  • IDC MarketScape Excerpt: Worldwide Client Virtualization Software Assessment
    The rise of BYOD is creating governance and regulatory nightmares while providing end users with unprecedented flexibility and agility. While IT is still intrigued by the possibility of a better desktop management model and the operational savings client virtualization software could deliver, it is the increased governance and the ability to deliver desktops, applications, and data to any device that are driving today's purchases.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO