Lays out the effects of a national identity for a citizen’s lifecycle events including:
* Birth
* Vaccinations
* First day of school
* Health treatment
* Getting driver’s license and passports
* Changing name and gender
* Paying for government services taxes, fines
* i-Voting
* Moving within the country
* Claiming for social services
* Death
This presentation covers the challenges of:
* Most African governments struggle with people Illegally immigrating in and then masquerading as a citizen
* Voting irregularities
* Pretending to be students when they’re not
* Using dead citizen’s identities to then use them to access social programs
* Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
Presents an integrated framework that not only addresses this BUT ALSO can be used for education, health and citizen payments
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
Developing Countries National ICT Identity Governance StrategyGuy Huntington
Reviews the governance components required to successfully implement and maintain an e-government strategy:
* Identity data governance
* Identity infrastructure governance
* Laws and regulations governance
National identity strategy presentation may 10, 2016Guy Huntington
Based on my recent activities in Africa, I have updated my proposed national citizen digital identity strategy to include:
* Benchmark it against Estonia
* Include overview of the number of different RFP's required and show how they can be combined with local and off-shore suppliers
* Compare against what the World Bank's ID4D study recommends
Reviews current government challenges in receiving and making citizen payments
Presents a way for governments to make more money every day by leveraging citizen identity and the phone
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
National Identity ICT Defence and Intelligence StrategyGuy Huntington
Examines:
* Significant risk of governments being held for ransom from malware attacks on their national ICT infrastructure
* Lays out high level requirements for:
- Privacy
- Malware and denial of service attack defence
- High availability
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
This presentation covers the challenges of:
* Most African governments struggle with people Illegally immigrating in and then masquerading as a citizen
* Voting irregularities
* Pretending to be students when they’re not
* Using dead citizen’s identities to then use them to access social programs
* Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
Presents an integrated framework that not only addresses this BUT ALSO can be used for education, health and citizen payments
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
Developing Countries National ICT Identity Governance StrategyGuy Huntington
Reviews the governance components required to successfully implement and maintain an e-government strategy:
* Identity data governance
* Identity infrastructure governance
* Laws and regulations governance
National identity strategy presentation may 10, 2016Guy Huntington
Based on my recent activities in Africa, I have updated my proposed national citizen digital identity strategy to include:
* Benchmark it against Estonia
* Include overview of the number of different RFP's required and show how they can be combined with local and off-shore suppliers
* Compare against what the World Bank's ID4D study recommends
Reviews current government challenges in receiving and making citizen payments
Presents a way for governments to make more money every day by leveraging citizen identity and the phone
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
National Identity ICT Defence and Intelligence StrategyGuy Huntington
Examines:
* Significant risk of governments being held for ransom from malware attacks on their national ICT infrastructure
* Lays out high level requirements for:
- Privacy
- Malware and denial of service attack defence
- High availability
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
submission to: https://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Financial_Technology_and_Regulatory_Technology/FinancialRegulatoryTech/Submissions
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
"Navigating Disability Law: The 30,000-Foot View" was presented at the Center for Health Literacy Conference 2011: Plain Talk in Complex Times by Cary LaCheen, JD, Senior Attorney, National Center for Law and Economic Justice.
Description: This session will provide a forum for an audience-driven discussion about the legal obligations to communicate and provide information in a way that is accessible to individuals with disabilities. The presenter will answer your questions about disability law, what "reasonable" accommodation means, and where to go for additional resources.
The true concept of democracy includes the participation of individuals in the governing process. But due
to gargantuan population the active participation of citizen in governing process is not possible. But egovernance makes it possible through online feedback system from the public. This paper entirely deals
with the concept of e-governance and the application of e-governance in various domains. The role of
information and communication technology [ICT] in e-governance, the scope & objective of e-governance.
The scope includes four main aspect namely G2C; C2G; G2B; G2G.Finally this paper includes the
overview of Digital India project, e-governance plan formulated by the government and our views.
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services.
Proposed country identity strategy july 24, 2015Guy Huntington
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services. As well the slides also show how governments can use this to make and save money.
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
submission to: https://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Financial_Technology_and_Regulatory_Technology/FinancialRegulatoryTech/Submissions
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
"Navigating Disability Law: The 30,000-Foot View" was presented at the Center for Health Literacy Conference 2011: Plain Talk in Complex Times by Cary LaCheen, JD, Senior Attorney, National Center for Law and Economic Justice.
Description: This session will provide a forum for an audience-driven discussion about the legal obligations to communicate and provide information in a way that is accessible to individuals with disabilities. The presenter will answer your questions about disability law, what "reasonable" accommodation means, and where to go for additional resources.
The true concept of democracy includes the participation of individuals in the governing process. But due
to gargantuan population the active participation of citizen in governing process is not possible. But egovernance makes it possible through online feedback system from the public. This paper entirely deals
with the concept of e-governance and the application of e-governance in various domains. The role of
information and communication technology [ICT] in e-governance, the scope & objective of e-governance.
The scope includes four main aspect namely G2C; C2G; G2B; G2G.Finally this paper includes the
overview of Digital India project, e-governance plan formulated by the government and our views.
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services.
Proposed country identity strategy july 24, 2015Guy Huntington
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services. As well the slides also show how governments can use this to make and save money.
Identity Federation: Governments and Economic GrowthGuy Huntington
This paper illustrates how identity federation rethinks citizen interaction with government and third parties. It provides examples for finance, health, social services, drivers’ licenses, passports, different levels of governments, citizens’ changing addresses, and schools.
The net effects of identity federation are:
• A rapid increase in the speed of servicing a citizen via their cell phone
• Seamless interaction from the national identity verification service with governments and third parties
• Lower cost of service
• A citizen’s privacy is protected with their consent
• Economic growth
A N A UTOMATION S YSTEM F OR T RACKING C OMMUNITY C ERTIFICATEijcsa
The e-governance project is an online web portal wh
ich aims to serve the public by providing their
community certificate. The objective of achieving e
-governance goes far beyond mere computerization of
standalone back office operations. This portal is d
eveloped to validate the information provided by th
e
public by governing authorities such as Tahsildar a
nd Revenue Inspector etc., It includes a provision
for
the public to track the status of the requested cer
tificate with certificate number whether it is appr
oved or
rejected or in progress via online. The goal for es
tablishing e-governance is to improve the user
friendliness of the administrative system and to si
mplify and improve the efficiency, reliability and
transparency of the administrative sector.
India is the largest democracy in the world and being an Indian citizen, students will –
1. Acquire knowledge about the mandatory documents as citizens, they or their family members must have
2. Be aware of the necessity, utility, and importance of these documents
3. Be informed about the requirement and process of applying, and the eligibility criteria
For More information: https://www.deshapnayen.org/downloads
Desh Apnayen - Growing up in a democracyDesh Apnayen
Democracy was the most successful political idea turns out to be much easier than setting up a viable democratic government in India.
Desh Apnayen encourages democracy to the youth of nation.
https://www.deshapnayen.org/
Ta2.09 1 mills.un data forum innovations crvs idms sam mills jan 14 2017Statistics South Africa
Overview of importance of CRVS in monitoring SDGs, Principles on Identification for Sustainable Development, CRVS eLearning course by the Global CRVS group - presented at the UN World Data Forum
Desh Apnayen - Growing up in a democracyDesh Apnayen
Democracy was the most successful political idea turns out to be much easier than setting up a viable democratic government in India.
Desh Apnayen encourages democracy to the youth of nation.
https://www.deshapnayen.org/
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Monitoring Health for the SDGs - Global Health Statistics 2024 - WHOChristina Parmionova
The 2024 World Health Statistics edition reviews more than 50 health-related indicators from the Sustainable Development Goals and WHO’s Thirteenth General Programme of Work. It also highlights the findings from the Global health estimates 2021, notably the impact of the COVID-19 pandemic on life expectancy and healthy life expectancy.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Preliminary findings _OECD field visits to ten regions in the TSI EU mining r...OECDregions
Preliminary findings from OECD field visits for the project: Enhancing EU Mining Regional Ecosystems to Support the Green Transition and Secure Mineral Raw Materials Supply.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
2. This Deck…
• Lays out the effects of a national identity for a citizen’s
lifecycle events including:
– Birth
– Vaccinations
– First day of school
– Health treatment
– Getting driver’s license and passports
– Changing name and gender
– Paying for government services taxes, fines
– i-Voting
– Moving within the country
– Claiming for social services
– Death
• So who am I?
3. Guy Huntington
Guy Huntington is a very
experienced identity
architect, program and
project manager who has led,
as well as rescued, many
large Fortune 500 identity
projects including Boeing and
Capital One. He recently
completed being the identity
architect for the Government
of Alberta’s Digital Citizen
Identity and Authentication
program.
4. Single Citizen Identity
• One identity per citizen
• Any changes to the identity are then shared with
other apps/services consuming them
– One place for a citizen to change things like addresses
and phone numbers
– Citizens don’t have to fill in the same information
over and over in forms for different apps/services
• Same identity used for access management
5. Single
Citizen
Identity
Citizen
Accesses via their phone or the internet
Government Portal
Ministry
Apps/Services
Ministry
Apps/Services
Ministry
Apps/Services
Municipalities
Apps/Services
3rd Party
Apps/Services
Crown Corp.
Apps/Services
Citizen Identity Access Management System
Identity - Foundation of e-Governance
6. It Starts When A Citizen Is Born…
• When they are born, in addition to the traditional
information being captured, the health worker will
also take a biometric from the infant, e.g. a finger
scan and/or a retina scan
• As well, the health worker will also obtain the
parents national identities from their national ID
card
• There is one important addition to the national
ID….it now captures the citizen’s cell number in the
national ID directory
• So, in the national directory, the infant’s electronic
identity begins at birth. There is also a relationship
between them, their parents or legal guardians
7. Parents Are Given A
Infant National ID Card For The Infant
• Each child will be issued a “infant national ID
card”
• This card also has the ability to store some of
their medical information if the child is living in
an area where healthcare facilities are not readily
available
• When the parents or legal guardians make it to a
local first aid post, they present the infant’s card
and the medical information can be updated
8. Automatically Create A
Healthcare Account For The Infant
• The central government identity management
server can be used to send the infant’s new birth
entry, along with their parents/legal guardian
information to a open source health care
software (which also exists today)
• Included in this is their parents/legal guardians
cell phone information
9. Vaccinations…
• When the infant is due for a vaccination the e-health
software sends the parent’s/legal guardians an SMS
message letting them know this
• Since an infant’s finger biometric changes, the
vaccination point in their lifecycle is an excellent
opportunity for the local health care worker to
update it
• They use a smartphone and/or rugged attachments
to do this
• They also update the infant’s health information in
the e-health software and the national infant ID card
10. What Happens When
There’s No Connectivity?
• In certain parts of the country there may be no or poor
connectivity
• The infant has a national identity card
– Malaysia creates youth identity cards MyKid
• http://www.malaysiacentral.com/information-directory/mykid-
identity-card-of-malaysia-for-children-below-12-years-
old/#sthash.ZXp3bJOb.dpbs
• On the card will securely be stored some of their medical
information
• If their parents are in a remote area, the health care
worker will scan the card using a portable unit, treat or
vaccinate them and then update the card
• When the healthcare worker reaches connectivity, they
will upload the information to the healthcare system
11. It’s Their First Day At School…
• Each school will be connected to the internet
• Remote schools will also be given smartphones
• When they show up, the parents/legal guardians
will provide one or two biometrics
• This will be checked against the national directory
and the infant will be found to be their offspring or
under their guardianship
• More biometrics will now be taken from the child
including finger scans, face, retina and voice
• The child will now be issued a national ID youth card
12. Each Subsequent School Year…
• The student will have their face, voice and finger
scans all updated because they change with
aging
13. A Student Record Will Be
Automatically Created For Them…
• The identity management server will send the
child’s citizen identity information along with
their parents to an open source education
management software (which also exists today)
• This will be used for the citizen’s entire life as
they move between schools, regions, and take
courses throughout their life
• There’s also something else that can be done…
14. Students Can Logon To
School Networks Using Their Voice…
• Schools will leverage the national identity and
authentication service using their voice to
authenticate
• The voice is authenticated by the national
authentication service and then a persistent
anonymous identifier (“PAI”) will be sent to the
open source education management system
• This will then take the PAI and map it to the
student’s identity granting the student access to
apps and services they are entitled to
15. Why Use A PAI?
• The architecture values a citizen’s privacy
• Therefore, it mitigates against the risk that a malicious
person, who has access to a ministry server can then
obtain their unique ID and then masquerade as them on
another ministry’s server
• So, let’s use an example…
• The citizen is interacting with two different ministry
services “A” and “B”
• When they successfully authenticate, Ministry A gets a PAI
of ABCDE for them, which they then map to their identity
within the database
• Ministry B gets a PAI of MNOPQ
• So a person who maliciously obtains ABCDE can’t use this
on other different ministries databases
16. iSchool…
• At a recent conference, I was with a lady from the
Estonian government who has worked on their
identity system since 2000
• As we were sitting together in Kigali, she was looking
at her children’s homework assignments and if they
were in classes using her smartphone
• In Estonia, this is called “iSchool”
• This will be modified to leverage SMS for people
who only have a cell phone
• So now parents/legal guardians have a way to see
what’s happening at school each and every day
17. Child’s Parents/Legal Guardians
Change…
• When the child’s parents or legal guardian
changes, the court system will then automatically
send this change to the central national identity
system
• Any systems dependent upon this information
will then be automatically notified
18. They’ve Grown Up…
• Now the adult needs to get things like a adult
national ID card
• When they are approaching age of majority, the
national identity service will automatically send the
person an SMS message directing them to go to a
government off ice to get their updated adult
national identity card
• So the person goes to their office and provides some
biometrics which are verified against the national
identity and access management system
• The adult card is then printed and given to the
person
19. Driver’s Licenses and Passports…
• The adult wants to get a driver’s license and
passport
• So the person goes to their office and provides some
biometrics which are verified against the national
identity and access management system
• Their tombstone level information is then
automatically sent from the identity management
server to the driver’s license or passport system
• The adult doesn’t have to fill in any forms with their
tombstone level identity information
20. And Then There Are Payments…
• The citizen now has to pay for things like
car/motorcycle registration, license renewals,
taxes, paying fines, paying for water and power
bills, etc.
21. Let’s Say They Got A Speeding Ticket…
• They would see that they can pay via their cell or
online
• If they do this, the cost is lower than if they pay
last minute as is traditionally the case
• Additionally, if they pay even earlier, there will be
a further discount!
• So they call up a toll free number to access the
government payment portal (or enter a URL on
their smartphone, tablet or computer)
22. Here’s What Happens…
• They authenticate using their voice
• The same identity and access management infrastructure
authenticates them sending a PAI to the payment portal
• In the blink of an eye, the payment portal then queries all
the ministry services dealing with citizen payments and
finds they have a speeding ticket (using a Enterprise
Service Bus or “ESB”)
• ESB’s have been around for the last 15 or so years
• The IVR then tells the citizen the amount owing and asks
how they want to pay
• They can select e-wallet, bank SMS, credit or debit and
make the payment
• They didn’t have to go into a government office!
23. When Their Phone Number Changes…
• Citizens only have to go to one place online
where they authenticate and provide their phone
number change
• This information is then automatically sent to
relevant government ministries, municipalities,
crown corporations and third parties like banks
and insurance companies
24. When They Get Married, Change Their
Name Or Their Gender…
• When the citizen marries, or changes their name
or, changes their gender, they provide their
biometrics to the local government office which
then verifies their identity
• The change to their identity is then automatically
sent to relevant government ministries,
municipalities, crown corporations and third
parties
25. When Opening A Bank, Insurance or Telco
Account…
• When the citizen is opening a bank, insurance or
telco account, they give their consent to provide
some biometrics which are then verified against
the national identity service
• If successful, their tombstone level identity
information is then sent to the third party
• The citizen doesn’t have to fill in any of their
tombstone information
26. When They Move…
• The citizen enters their new address in only one
place online by first authenticating against the
national identity service
• The service then automatically notifies relevant
ministries, third parties, crown corporations and
municipalities
• The citizen then doesn’t have to notify each
party about their move
27. If They Need Government Social Services…
• The citizen provides their biometrics in a
government office which then are validated
• The government worker can now see all their
legal dependents and their accompanying
tombstone level information is automatically
entered into the social services application
28. iVoting…
• When the citizen is going to vote, they supply
their biometrics which are validated against the
national identity service
• Assuming the validation is successful, they then
vote online
29. What Happens When A Citizen Dies?
• The citizen is confirmed to be who others claim them to
be via biometrics
– E.g. fingerprints
• The business process then leads to an entry into the
death registry
• The registry automatically notifies the national identity
directory
• The national identity directory then automatically
notifies all the government ministries/services
• This mitigates the risk of people using dead people’s
identities to masquerade as others
30. Leverage ICT Identity Investments
• The same infrastructure enables the government
to effectively manage a person THROUGH THEIR
WHOLE LIFE
• Leverages the national identity and
authentication infrastructure
• It makes the life of the citizen much easier since
many of the services can be offered via their
phone or smartphone wherever the citizen is
31. In Estonia…
• They went from a GDP per capita of $2000 in the
late 1990’s to today approximately $26,000!
• They did this by adopting the internet
• They offer more than a 1,000 e-services to
citizens
32. Summary
• Your country could
become the Estonia of
Africa – a innovative
nation that leveraged
the digital world to
rethink itself
• Please contact me:
– 1-604-861-6804
– guy@hvl.net
– www.hvl.net