384 research outputs found

    Doświadczenia międzynarodowe w zakresie systemu elektronicznej identyfikacji

    Get PDF
    Autorzy mówili modele systemów identyfikacji elektronicznej stosowane w krajach europejskich i USA. W wielu krajach państwo w ramach zapewnienia bezpieczeństwa i interoperacyjności określiło jedynie podstawowe standardy funkcjonowania dla zaangażowanych instytucji. Scharakteryzowano rynek usług zaufania w Europie, podkreślając jego duże zróżnicowanie. Najczęstszą usługą zaufania oferowaną przed przedsiębiorców, instytucji prywatnych i publicznych jest wyda-wanie kwalifikowanych certyfikatów. Natomiast najrzadziej, prawdopodobnie ze względu na poziom skomplikowania przedsięwzięcia dostawcy usług zaufania podejmują się stworzenia kwalifikowanych usług, rejestrowanych elektronicznych doręczeń. Omówiono także kwestie bezpieczeństwa w elektronicznej identyfikacji podejmowane w państwa EU.The authors have discussed the models of electronic identification systems used in the European countries and the USA. In many countries, the state has defined only the basic standards of functioning for the engaged institutions as part of safety and interoperability guarantee. The trust services market in Europe has been defined, while putting an emphasis on its diversity. The most common trust service offered by entrepreneurs or private and public institutions is the issuance of qualified certificates. On the other hand, the trust services providers very rarely undertake to create qualified electronically registered services, probably due to the complexity of the enterprise. Also the issues of electronic identification security undertaken by the EU states

    Algorithmic Jim Crow

    Get PDF
    This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on the back end in the form of designing, interpreting, and acting upon vetting and screening systems in ways that result in a disparate impact

    Certificateless Digital Signature Technology for e-Governance Solutions

    Get PDF
    . In spite of the fact that digital signing is an essential requirement for implementation of e-governance solutions in any organization, its use in large scale Government ICT implementation is negligible in India. In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India. The outcome of the study revealed that the reasons are related to the challenges concerning the use of cryptographic devices carrying private key and the complicated process of generation, maintenance and disposal of Digital Signature Certificates (DSC).The solution, for the challenges understood from the case study, required implementation of a certificateless technology where private keys should be generated as and when required rather than storing them on cryptographic devices. Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. This paper presents the first realistic architecture to implement Identity Based Cryptography with biometrics using RSA algorithm. The solution presented in the paper is capable of providing a certificateless digital signature technology to the users, where public and private keys are generated on-the-fly

    Electronic Signatures in E-Healthcare: The Need for a Federal Standard

    Get PDF
    Healthcare, like many industries, is fast embracing the benefits of modern information technology ( IT ). The wide range of available publications on the use of IT in healthcare indicates that IT provides the promise of faster and more comprehensive information about all aspects of the healthcare delivery process, to all classes of its consumers - patients, doctors, nurses, insurance adjudicators, health inspectors, epidemiologists, and biostatisticians. But the drive towards electronic information in health care is not rooted merely in efficiency; more recently, significant emphasis has been placed on patient safety issues raised by the Institute of Medicine\u27s ( IOM ) year 2001 quality report on the subject. It is believed that the deficiencies indicated in that report can be substantially overcome by the use of IT in health care. However, to make this transition successful and complete, all aspects of health care delivery, information management, and business transactions, have to be logically migrated into the electronic world. This includes the function and use of the signature. The use of signatures in business contexts has traditionally provided two functions of legal significance: 1) evidence that can attribute documents to a particular party, and 2) indication of assent and intent that the documents have legal effect. In the recent decades, state and federal statutes have substantiated these functional attributes to digital or electronic signatures. Many of these statutes derive from model codes, such as the Uniform Electronic Transactions Act ( UETA ), that attempt to standardize use and technology surrounding electronic signatures. Subsequent sections will attempt to identify gaps in the standards which prevent true transaction portability. Lack of portability defeats one of the fundamental goals of health care IT solutions - improved efficiency. The discussion will end with a proposal for a uniform federal statutory scheme for standardized electronic signatures for health care

    Biometrics Institute 20th Anniversary Report

    Get PDF
    The purpose of this report is to mark the 20-year anniversary of the Biometrics Institute on the 11 October 2021. More importantly, however, this report celebrates the work of the Biometrics Institute over the past twenty years, which together with the support of its members, has provided a platform for a balanced discussion promoting the responsible and ethical use of biometrics and a deeper understanding of the biometrics industry

    Big Data Blacklisting

    Get PDF
    “Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation of rights and privileges through government-led big data programs as a constitutional harm under substantive due process, and identifies the obstruction of core liberties with big data tools as rapidly evolving and systemic. To illustrate the mass scale and unprecedented nature of the big data blacklisting phenomenon, this Article undertakes a significant descriptive burden to introduce and contextualize big data blacklisting programs. Through this descriptive effort, this Article explores how a commonality of big data harms may be associated with nonclassified big data programs, such as the No Work List and No Vote List-programs that the government uses to establish or deny an individual\u27s eligibility for certain benefits or rights through database screening. The big data blacklisting harms of big data tools to make eligibility decisions are not, of course, limited to nonclassified programs. This Article also suggests how the same consequences may be at play with classified and semi-classified big data programs such as the Terrorist Watchlist and No Fly List. This Article concludes that big data blacklisting harms interfere with and obstruct fundamental liberty interests in a way that now necessitates an evolution of the existing due process jurisprudence

    With renewables for energy security

    Get PDF
    Taking into account the possible future exhaustion of fossil energy sources, the actual and near danger of climate change, the drastic increase of the greenhouse gases in the last 200 years, as well as the growing need for sustainable development, consumption and liveable environment, the increasing necessity of renewable energy sources becomes clear. Utilization of these energy sources have to acquire a bigger role in the field of energy supply, in order to enhance the energy security of Hungary, to decline the energy import dependence, to reduce the negative environmental impacts, and to recover the economy. The world’s hunger for energy is growing exponentially; this is why it is crucial to establish feasibility scenarios in the next decades, which are able to meet these expectations, and to increase the safety of the energy supply

    Digital Recording of Real Estate Conveyances

    Get PDF
    The purpose of this article is to describe how such a revolutionary change in the recording system can take place, and to identify and discuss the major policy issues that must be resolved in order to accomplish it. This change ought to happen. Failure to update the system will result in the continued imposition of unnecessary costs and delays on those who buy, sell, or mortgage real estate in America

    With renewables for energy security

    Get PDF
    Taking into account the possible future exhaustion of fossil energy sources, the actual and near danger of climate change, the drastic increase of the greenhouse gases in the last 200 years, as well as the growing need for sustainable development, consumption and liveable environment, the increasing necessity of renewable energy sources becomes clear. Utilization of these energy sources have to acquire a bigger role in the field of energy supply, in order to enhance the energy security of Hungary, to decline the energy import dependence, to reduce the negative environmental impacts, and to recover the economy. The world’s hunger for energy is growing exponentially; this is why it is crucial to establish feasibility scenarios in the next decades, which are able to meet these expectations, and to increase the safety of the energy supply

    Privacy Concerns Regarding the Use of Biometrics in Trusted Traveler Programs

    Get PDF
    One of the objectives of the U.S. government is to balance the individual’s right to privacy and national security interests. Trusted Traveler programs create a risk-based security model where the traveling public is categorized into low or high risk. There are, however, some privacy concerns related to the acceptance of the use of biometric technology in the adoption of expedited security screening procedures in commercial airports. The theoretical construct of this case study of the TSA Pre-Check Program is based on Ajzen and Fischbein’s theory of reasoned action, specifically through Davis’ technology acceptance model. The purpose of this case study was to explore the perceptions of the traveling public regarding the protection of privacy and the use of biometric technologies. Data for this study included 325 social media postings, 50 privacy complaints reported to the Department of Homeland Security between 2009 and 2014, and publicly available data from the Government Accountability Office about expedited screening for the years 2011 – 2014. Data were coded into a priori themes and then subjected to a content analysis procedure. Findings indicate that the traveling public generally support expedited security screening and consent to waiving certain privacy rights in order to facilitate expedited screening. Complaints from travelers were also primarily related to wait times and secondary screening, and not privacy concerns. The positive social change implications stemming from this study include recommendations to the TSA to expand the Trusted Traveler programs such that the primary concern of the traveling public, reduction of wait time is balanced against privacy concerns about the collection of biometric data as part of a measured response to aviation security
    corecore