SlideShare a Scribd company logo
Access Cards and Identity Management  Is It Worthwhile? Presenter Robert Bromwich   BBA  CQU 2008 RMAA Conference Sydney NSW Australia
Presentation  Objectives ,[object Object],[object Object],[object Object],[object Object],[object Object]
Presentation Objectives ,[object Object]
Presentation Objectives ,[object Object],[object Object]
Presentation and Paper Scope  ,[object Object],[object Object],[object Object]
Australian System  Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Legislative Basis ,[object Object],[object Object],[object Object]
Aims of Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of Scheme (#1) ,[object Object],[object Object]
Interaction with AGAF ,[object Object],[object Object]
United States of America System Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
REAL-ID Legislative Basis ,[object Object],[object Object]
REAL-ID Program Aims  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Program Consequences  ,[object Object],[object Object],[object Object],[object Object]
REAL-ID Program Data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
REAL-ID Implementation ,[object Object],[object Object],[object Object]
REAL-ID Key Dates ,[object Object],[object Object],[object Object],[object Object]
United Kingdom System Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
Basis of Scheme ,[object Object],[object Object],[object Object]
Purpose of Scheme ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Information held by system ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Program Implementation ,[object Object],[object Object],[object Object]
Interplay of Identity Theft and Identity Schemes or … . How to confuse the government without really trying
Identity Theft Defined ,[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft Defined ,[object Object],[object Object],[object Object],[object Object],[object Object]
Systems Commonality  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Data Breaches ,[object Object],[object Object]
Examples of Data Breaches ,[object Object]
Identity Theft Costs - Targets ,[object Object],[object Object],[object Object]
Identity Theft Costs - Financial ,[object Object],[object Object],[object Object]
Individual Program Cost Comparison US$11 billion (NCSL/NGA/AAMVA 2007) state incurred REAL ID External Costs Official Cost and Savings Program
Individual Program Cost Comparison A$15 billion (ACCI 2005) A$1 billion cost A$3 billion saving (over 10 years) HWAC External Costs Official Costs Program
Individual Program Cost Comparison £12 billion to £18 billion (LSE 2006) £5.612 billion cost (over 10 years, Nov 2007) UK ID Card External Costs Official Cost and Savings Program
Identity Theft Costs - Awareness ,[object Object],[object Object],[object Object]
The Big Question Is it Worthwhile?
Laws of Data Smog as they apply to identity cards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Laws of Data Smog as they apply to identity cards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Laws of Data Smog as they apply to identity cards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Program Effectiveness ,[object Object],[object Object]
Program Effectiveness ,[object Object]
Identity Theft Counter Prevention Strategies ,[object Object],[object Object],[object Object]
Presentation Conclusion

More Related Content

What's hot

Right to Information Act, 2005
Right to Information Act, 2005Right to Information Act, 2005
Right to Information Act, 2005
student
 
Right To Information (RTI)
Right To Information (RTI)Right To Information (RTI)
Right To Information (RTI)
Pank Jes
 
Fasten Your Belts for #GDPR
Fasten Your Belts for #GDPRFasten Your Belts for #GDPR
Fasten Your Belts for #GDPR
"John "Jeb"" Beckwith
 
Fasten Your Belts for GDPR
Fasten Your Belts for GDPRFasten Your Belts for GDPR
Fasten Your Belts for GDPR
"John "Jeb"" Beckwith
 
The Conversation Continues: Where International Data Transfers Stand
The Conversation Continues: Where International Data Transfers Stand The Conversation Continues: Where International Data Transfers Stand
The Conversation Continues: Where International Data Transfers Stand
TrustArc
 
Right to Information Act(RTI)
Right to Information Act(RTI)Right to Information Act(RTI)
Right to Information Act(RTI)
MeenuSajeev
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
Patton Boggs LLP
 
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
David Erdos
 
Right To Information Act 2005
Right To Information Act 2005Right To Information Act 2005
Right To Information Act 2005
Aiswarya P Suresh
 
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentUSA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
Alex Baulf
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.feature
Divya Gigy
 
Role of PIOs and APIOs
Role of PIOs and APIOsRole of PIOs and APIOs
Role of PIOs and APIOs
Kapoor Rakesh
 
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Jamil Salem
 
Right_to_Information_overview
Right_to_Information_overviewRight_to_Information_overview
Right_to_Information_overview
rtizindabad
 
The collection of statistics act, 2008
The collection of statistics act, 2008The collection of statistics act, 2008
The collection of statistics act, 2008
Diganth Raj Sehgal
 
Presentation 01
Presentation 01Presentation 01
Presentation 01
vindya
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes Off
Patton Boggs LLP
 
The Right To Information Act (RTI), 2005
 The Right To Information Act (RTI), 2005 The Right To Information Act (RTI), 2005
The Right To Information Act (RTI), 2005
lokeshgoyal37
 
RTI - Rakesh Dubbudu
RTI - Rakesh DubbuduRTI - Rakesh Dubbudu
RTI - Rakesh Dubbudu
rakesh.dubbudu
 
Regulatory Compliance in Colombia
Regulatory Compliance in ColombiaRegulatory Compliance in Colombia
Regulatory Compliance in Colombia
ProColombia
 

What's hot (20)

Right to Information Act, 2005
Right to Information Act, 2005Right to Information Act, 2005
Right to Information Act, 2005
 
Right To Information (RTI)
Right To Information (RTI)Right To Information (RTI)
Right To Information (RTI)
 
Fasten Your Belts for #GDPR
Fasten Your Belts for #GDPRFasten Your Belts for #GDPR
Fasten Your Belts for #GDPR
 
Fasten Your Belts for GDPR
Fasten Your Belts for GDPRFasten Your Belts for GDPR
Fasten Your Belts for GDPR
 
The Conversation Continues: Where International Data Transfers Stand
The Conversation Continues: Where International Data Transfers Stand The Conversation Continues: Where International Data Transfers Stand
The Conversation Continues: Where International Data Transfers Stand
 
Right to Information Act(RTI)
Right to Information Act(RTI)Right to Information Act(RTI)
Right to Information Act(RTI)
 
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the HorizonALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
ALERT: Health Care Cybersecurity Reform and Regulations on the Horizon
 
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?The UK and EU Personal Data Regime After Brexit: Another Switzerland?
The UK and EU Personal Data Regime After Brexit: Another Switzerland?
 
Right To Information Act 2005
Right To Information Act 2005Right To Information Act 2005
Right To Information Act 2005
 
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act PermanentUSA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
USA: President Obama Signs Legislation Making Internet Tax Freedom Act Permanent
 
41 rti-sali.feature
41 rti-sali.feature41 rti-sali.feature
41 rti-sali.feature
 
Role of PIOs and APIOs
Role of PIOs and APIOsRole of PIOs and APIOs
Role of PIOs and APIOs
 
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
Palestinian Legal Environment: Challenges & Opportunities for eGovernment Ini...
 
Right_to_Information_overview
Right_to_Information_overviewRight_to_Information_overview
Right_to_Information_overview
 
The collection of statistics act, 2008
The collection of statistics act, 2008The collection of statistics act, 2008
The collection of statistics act, 2008
 
Presentation 01
Presentation 01Presentation 01
Presentation 01
 
Comprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes OffComprehensive Immigration Reform Takes Off
Comprehensive Immigration Reform Takes Off
 
The Right To Information Act (RTI), 2005
 The Right To Information Act (RTI), 2005 The Right To Information Act (RTI), 2005
The Right To Information Act (RTI), 2005
 
RTI - Rakesh Dubbudu
RTI - Rakesh DubbuduRTI - Rakesh Dubbudu
RTI - Rakesh Dubbudu
 
Regulatory Compliance in Colombia
Regulatory Compliance in ColombiaRegulatory Compliance in Colombia
Regulatory Compliance in Colombia
 

Similar to Access Cards and Identity Management - is it worthwhile?

CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
nationalconsumersleague
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
YashiVaidya
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
nationalconsumersleague
 
Global Evolution of Data Sharing
Global Evolution of Data SharingGlobal Evolution of Data Sharing
Global Evolution of Data Sharing
PERC
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
Jan Carroza
 
Fbi sec inform
Fbi sec informFbi sec inform
Fbi sec inform
Fernando Murillo
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
NationalUnderwriter
 
02_Exthand.pptx
02_Exthand.pptx02_Exthand.pptx
02_Exthand.pptx
FinTech Belgium
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for Government
FairTechInstitute
 
Digital blue skies or a perfect storm for the taxman - our take on the impa...
Digital   blue skies or a perfect storm for the taxman - our take on the impa...Digital   blue skies or a perfect storm for the taxman - our take on the impa...
Digital blue skies or a perfect storm for the taxman - our take on the impa...
Rick Bouter
 
Digital – blue skies or a perfect storm for the taxman capgemini consulting...
Digital – blue skies or a perfect storm for the taxman   capgemini consulting...Digital – blue skies or a perfect storm for the taxman   capgemini consulting...
Digital – blue skies or a perfect storm for the taxman capgemini consulting...
Rick Bouter
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
Shirley Ingles-Cruz
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
MYO AUNG Myanmar
 
Cyber Insurance as Digital Strategy
Cyber Insurance as Digital StrategyCyber Insurance as Digital Strategy
Cyber Insurance as Digital Strategy
Randeep Sudan
 
Digital – Blue Skies or a Perfect Storm for the Taxman?
Digital – Blue Skies or a Perfect Storm for the Taxman?Digital – Blue Skies or a Perfect Storm for the Taxman?
Digital – Blue Skies or a Perfect Storm for the Taxman?
Capgemini
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
Robert Bromwich
 
The Panama Papers: What now for Jersey?
The Panama Papers: What now for Jersey? The Panama Papers: What now for Jersey?
The Panama Papers: What now for Jersey?
bakerpartners
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Loeb Smith Attorneys
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 

Similar to Access Cards and Identity Management - is it worthwhile? (20)

CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
National Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft ReportNational Consumers League 2013 State of ID Theft Report
National Consumers League 2013 State of ID Theft Report
 
DATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPERDATA SAFEGUARD INC.- WHITE PAPER
DATA SAFEGUARD INC.- WHITE PAPER
 
The State of Identity Theft in 2013
The State of Identity Theft in 2013The State of Identity Theft in 2013
The State of Identity Theft in 2013
 
Global Evolution of Data Sharing
Global Evolution of Data SharingGlobal Evolution of Data Sharing
Global Evolution of Data Sharing
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
Fbi sec inform
Fbi sec informFbi sec inform
Fbi sec inform
 
All's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber WarfareAll's Fair in Love and Cyber Warfare
All's Fair in Love and Cyber Warfare
 
02_Exthand.pptx
02_Exthand.pptx02_Exthand.pptx
02_Exthand.pptx
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for Government
 
Digital blue skies or a perfect storm for the taxman - our take on the impa...
Digital   blue skies or a perfect storm for the taxman - our take on the impa...Digital   blue skies or a perfect storm for the taxman - our take on the impa...
Digital blue skies or a perfect storm for the taxman - our take on the impa...
 
Digital – blue skies or a perfect storm for the taxman capgemini consulting...
Digital – blue skies or a perfect storm for the taxman   capgemini consulting...Digital – blue skies or a perfect storm for the taxman   capgemini consulting...
Digital – blue skies or a perfect storm for the taxman capgemini consulting...
 
Data Privacy Act in the Philippines
Data Privacy Act in the PhilippinesData Privacy Act in the Philippines
Data Privacy Act in the Philippines
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
 
Cyber Insurance as Digital Strategy
Cyber Insurance as Digital StrategyCyber Insurance as Digital Strategy
Cyber Insurance as Digital Strategy
 
Digital – Blue Skies or a Perfect Storm for the Taxman?
Digital – Blue Skies or a Perfect Storm for the Taxman?Digital – Blue Skies or a Perfect Storm for the Taxman?
Digital – Blue Skies or a Perfect Storm for the Taxman?
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
The Panama Papers: What now for Jersey?
The Panama Papers: What now for Jersey? The Panama Papers: What now for Jersey?
The Panama Papers: What now for Jersey?
 
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of JusticeCryptocurrency enforcement framework - Report by the U.S. Department of Justice
Cryptocurrency enforcement framework - Report by the U.S. Department of Justice
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 

Recently uploaded

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 

Recently uploaded (20)

WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 

Access Cards and Identity Management - is it worthwhile?

  • 1. Access Cards and Identity Management Is It Worthwhile? Presenter Robert Bromwich BBA CQU 2008 RMAA Conference Sydney NSW Australia
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. Interplay of Identity Theft and Identity Schemes or … . How to confuse the government without really trying
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Individual Program Cost Comparison US$11 billion (NCSL/NGA/AAMVA 2007) state incurred REAL ID External Costs Official Cost and Savings Program
  • 32. Individual Program Cost Comparison A$15 billion (ACCI 2005) A$1 billion cost A$3 billion saving (over 10 years) HWAC External Costs Official Costs Program
  • 33. Individual Program Cost Comparison £12 billion to £18 billion (LSE 2006) £5.612 billion cost (over 10 years, Nov 2007) UK ID Card External Costs Official Cost and Savings Program
  • 34.
  • 35. The Big Question Is it Worthwhile?
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.

Editor's Notes

  1. Introduction slide
  2. Presentation overview
  3. Presentation overview
  4. Presentation overview
  5. Presentation scope
  6. Australian Welfare Access Card introduction
  7. HWAC Introduction
  8. HWAC overview
  9. HWAC Program elements
  10. HWAC interaction with AGAF