* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
National Identity ICT Defence and Intelligence StrategyGuy Huntington
Examines:
* Significant risk of governments being held for ransom from malware attacks on their national ICT infrastructure
* Lays out high level requirements for:
- Privacy
- Malware and denial of service attack defence
- High availability
Reviews current government challenges in receiving and making citizen payments
Presents a way for governments to make more money every day by leveraging citizen identity and the phone
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
Developing Countries National ICT Identity Governance StrategyGuy Huntington
Reviews the governance components required to successfully implement and maintain an e-government strategy:
* Identity data governance
* Identity infrastructure governance
* Laws and regulations governance
National identity strategy presentation may 10, 2016Guy Huntington
Based on my recent activities in Africa, I have updated my proposed national citizen digital identity strategy to include:
* Benchmark it against Estonia
* Include overview of the number of different RFP's required and show how they can be combined with local and off-shore suppliers
* Compare against what the World Bank's ID4D study recommends
Lays out the effects of a national identity for a citizen’s lifecycle events including:
* Birth
* Vaccinations
* First day of school
* Health treatment
* Getting driver’s license and passports
* Changing name and gender
* Paying for government services taxes, fines
* i-Voting
* Moving within the country
* Claiming for social services
* Death
This presentation covers the challenges of:
* Most African governments struggle with people Illegally immigrating in and then masquerading as a citizen
* Voting irregularities
* Pretending to be students when they’re not
* Using dead citizen’s identities to then use them to access social programs
* Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
Presents an integrated framework that not only addresses this BUT ALSO can be used for education, health and citizen payments
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
National Identity ICT Defence and Intelligence StrategyGuy Huntington
Examines:
* Significant risk of governments being held for ransom from malware attacks on their national ICT infrastructure
* Lays out high level requirements for:
- Privacy
- Malware and denial of service attack defence
- High availability
Reviews current government challenges in receiving and making citizen payments
Presents a way for governments to make more money every day by leveraging citizen identity and the phone
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
Developing Countries National ICT Identity Governance StrategyGuy Huntington
Reviews the governance components required to successfully implement and maintain an e-government strategy:
* Identity data governance
* Identity infrastructure governance
* Laws and regulations governance
National identity strategy presentation may 10, 2016Guy Huntington
Based on my recent activities in Africa, I have updated my proposed national citizen digital identity strategy to include:
* Benchmark it against Estonia
* Include overview of the number of different RFP's required and show how they can be combined with local and off-shore suppliers
* Compare against what the World Bank's ID4D study recommends
Lays out the effects of a national identity for a citizen’s lifecycle events including:
* Birth
* Vaccinations
* First day of school
* Health treatment
* Getting driver’s license and passports
* Changing name and gender
* Paying for government services taxes, fines
* i-Voting
* Moving within the country
* Claiming for social services
* Death
This presentation covers the challenges of:
* Most African governments struggle with people Illegally immigrating in and then masquerading as a citizen
* Voting irregularities
* Pretending to be students when they’re not
* Using dead citizen’s identities to then use them to access social programs
* Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
Presents an integrated framework that not only addresses this BUT ALSO can be used for education, health and citizen payments
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services.
Proposed country identity strategy july 24, 2015Guy Huntington
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services. As well the slides also show how governments can use this to make and save money.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
The Fiduciary Access to Digital Assets Act in Michigan: Now That We Have it, ...gallowayandcollens
Attorney Howard H. Collens presents the most recent updates on the new Fiduciary Access to Digital Assets Act. Learn the many states that have recently enacted the new Act and updates on what the future holds for estate planning and digital assets.
The Fiduciary Access to Digital Assets Act in Michigan:Now That We Have it, W...gallowayandcollens
Attorney Howard Collens presented the most recent updates on Michigan’s new Fiduciary Access to Digital Assets Act. Now is the perfect time to update your will, trust and power of attorney to incorporate the latest options for dealing with your digital assets.
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services.
Proposed country identity strategy july 24, 2015Guy Huntington
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services. As well the slides also show how governments can use this to make and save money.
Estonia has evolved a remarkable digital society. Here we'll explore key aspects of the technical infrastructure behind Estonian digital governance and provide some theories as to why they have emerged.
apidays LIVE JAKARTA - How National ID accelerates the digital economy by Rah...apidays
apidays LIVE JAKARTA - Connecting the Digital Stack
How National ID accelerates the digital economy
Rahul Parthe, CTO of International Biometrics Indonesia
The Generations of Digital governance : From Paper to RobotsYannis Charalabidis
Digital or Electronic Governance relates to the utilisation of Information and Communication Technologies for achieving better digital services to citizens, enhance transparency and collaboration, and promote evidence-based decision making in the public sector. Along these directions, the talk presents the methods, the tools and the solutions that structure the main generations of Digital Governance. Starting from the introduction of computers in the public sector and reaching the emerging applications of artificial intelligence and other exponential technologies, the talk covers the benefits and the challenges for decision makers, from a technical and administrative viewpoint.
The presentation introduces the concept of eGovernance, the challenges,the levels and stages, where India stands, the way forward in terms of Open Data and Open Governance
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
Introduction to Empowerment Technology.pptxJerome Bigael
Introduction to Empowerment Technology.
What is ICT?
What is information and Communication Technology?
Status if ICT in the Philippines
Importance of ICT in the Philippine society
Similar to National ICT & Healthcare Strategy (20)
One pager - "Trust in an Interdependent World" - October 2017Guy Huntington
“The information age has ushered in a networked and interdependent world, one in which challenges and opportunities appear and disappear faster than traditional organizational models can manage.” - Chris Fussell
We are living in an economic revolution, which is quietly disrupting almost all of our ways of doing things. Driven by electronic interdependencies between multiple parties, it requires trust.
Central to creating the trust is verifying who the identity is, accepting an authentication, and obtaining the identity’s authorization consent. Technology for interdependency, i.e. federation, is outpacing our ability to create this trust. New guidelines, laws, and regulations are required to leverage biometrics for identity verification.
Couple this with the advent of a miniature “Internet of Things.” Each of us will likely have hundreds of them. We will be required to provide our authorization consent allowing each device to work with other devices, identities, and/or enterprises.
The result? A revolution is upon us. It’s unlike anything we have ever seen.
Requirements for Successful Enterprises in a Federated Economy - October 2017Guy Huntington
An economic revolution is quietly occurring. It is built upon creating new, rapid interdependencies between enterprises, devices, and people. This allows us to analyze, optimize, prophesize, customize, digitize, and automate services. What most people and enterprises don’t understand are the requirements to be successful in this new world. That is what this paper addresses.
It is built upon trust. This paper identifies the foundational pieces required to create trust for an interdependent world:
• Identity verification
• Identity authentication
• Authorization consent
• Security
• Operational availability
Requirements for each piece are stated from the following perspectives:
• Users
• Third party (e.g. banks, telco’s, insurance companies, small businesses, et al.)
• Government (municipal, regional, state, and national)
• Identity verification and authentication service
The underlying infrastructure required for this interdependent world is complex. The paper illustrates this by examining the three main protocols required: OpenID Connect, OAuth, and User Managed Access.
It also discusses a potential downside of creating an interdependent world – creating a single point of enterprise and/or economic failure. A disturbing trend is the increasing size of botnet distributed denial of service attacks. The paper uses Estonia’s 2007 attack to illustrate this problem on a national scale.
Identity Federation: Citizen Consent and the Internet of Things - October 2017Guy Huntington
With nanotechnology, devices are shrinking down to an almost molecular level and have the ability to communicate wirelessly via the Internet. These devices are beginning to proliferate in almost all aspects of our lives be it medical, transportation, government, clothing, appliances, and so on.
Since device owners have to access many different systems to manage their authorization consents, it becomes unwieldly. This paper addresses the simple question of “How do I manage all my consents across a wide variety of different devices, suppliers, and their systems in one place?”
Identity Federation: Governments and Economic GrowthGuy Huntington
This paper illustrates how identity federation rethinks citizen interaction with government and third parties. It provides examples for finance, health, social services, drivers’ licenses, passports, different levels of governments, citizens’ changing addresses, and schools.
The net effects of identity federation are:
• A rapid increase in the speed of servicing a citizen via their cell phone
• Seamless interaction from the national identity verification service with governments and third parties
• Lower cost of service
• A citizen’s privacy is protected with their consent
• Economic growth
Identity federation = Biometrics and Governments Sept 2017Guy Huntington
We live in an increasingly small world with rapid technological changes. Our existing identity verification systems were designed for the early 1900s. This was long before the rise of the internet with the fast, easy movement of people between government borders, electronic identity federation between enterprises and genetic cloning.
The use of high identity assurance, i.e. strong identity verification, is required to accomplish things like citizens easily being able to use digital signatures, vote online, conduct large financial transactions, etc. It requires a trusted government issued identity, from the date of birth onwards through an identity’s life. We must re-design our systems to answer the question “How do I know if you are really you?” while protecting the citizen’s privacy and their biometrics. That's what this paper discusses.
Identity federation – Mitigating Risks and Liabilities Guy Huntington
When I go into enterprises deploying identity federation, I frequently tell my teams that I have four letters stenciled across my forehead: R I S K. To mitigate risk from federation requires an enterprise view of the risk from Legal, Governance, Business, and IT.
It has been my experience that Business and Legal don’t fully understand the risks involved, and instead trust their IT department to “handle it.” This is why I have written this paper. It is aimed at Business, Legal, and IT leaders within an enterprise that is either embarking on identity federation and/or expanding their use of it. By reading this paper, you will learn the types of things your enterprise should be doing to mitigate federation risks and potential liabilities.
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
MHM Roundtable Slide Deck WHA Side-event May 28 2024.pptx
National ICT & Healthcare Strategy
1. National ICT & Healthcare
Strategy
Huntington Ventures Ltd.
The Business of Identity Management
July 2016
2. This Deck…
– Lays out existing healthcare delivery problems countries currently
have
– Presents a high level framework for an ICT health care strategy
leveraging the national identity and authentication infrastructure
which:
• Unifies the citizen’s identities between the numerous existing ministry
health applications
• Provides an national eHealth software
• Combines the national ID card with citizen health care cards for remote
locations
– Presents new, low cost ways of reminding citizens about
vaccinations for their children as well as innovative ways of
tracking moms to be
– So who am I?
3. Guy Huntington
Guy Huntington is a very
experienced identity
architect, program and
project manager who has led,
as well as rescued, many
large Fortune 500 identity
projects including Boeing and
Capital One. He recently
completed being the identity
architect for the Government
of Alberta’s Digital Citizen
Identity and Authentication
program.
4. Country HealthCare Delivery Challenges
• Too many health care systems/applications
currently delivering health care
• Lack of a unified health identity per citizen that
commences when they are born and stays with
them until they die
• Some remote places lacking connectivity are
difficult to deliver health services cost effectively
5. Technology Citizens Have
• Most citizens in Africa DON’T have internet
access
• What they do have is:
– Cell phone
– e-wallets
• Some have debit and credit cards
6. Solution: Leverage Identity & Cell
• Create a national identity strategy leveraging citizens use
of cell phones using their voice to authenticate
• The architecture behind this has been used by large global
enterprises and a few countries like Estonia since the late
1990’s….so it’s nothing new
• It also leverages interactive voice response, which has
been used in industry for the last 20 years as well
• It provides a seamless user experience when the citizen
acquires a smart phone, tablet or laptop
• It leverages the same infrastructure that ALL government
ministries will use
• Additionally, the same infrastructure can be used by crown
corporations, municipalities and third parties like banks,
telcos and insurance companies
7. Before We Get To Health…
• I will show you how other countries are using a
similar infrastructure to create more than 1,000
online services for their citizens (Estonia)
• To begin, let me first talk about the lifecycle of a
citizen’s identity
8. It Starts When A Citizen Is Born…
• When you are born, in addition to the traditional
information being captured, the health worker will also
take a biometric from you, e.g. a finger scan and/or a
retina scan
• As well, the health worker will also obtain your parents
national identities from their national ID card
• There is one important addition to the national ID….it now
captures the citizen’s cell number in the national ID
directory
• So, in the national directory, your electronic identity
begins at birth. There is also a relationship between you
and your parents or legal guardians
• Let’s look “behind the scenes” at how this will work by
first understanding a bit about the architecture...
9. Nearly 20 Years Ago…
• Many Fortune 500 companies and only a few governments realized that
single identity was a critical cornerstone piece of their digital strategies
• Without this, no SOA and portal strategy would work, since having
multiple identities for the same person would not allow for seamless
digital and in-person services
• Further, they also realized that having a common access service is
dependent upon having a unified identity
• In my own case, at Boeing, in the early 2000’s, we implemented a
unified identity and access management infrastructure and then
integrated into this several large portals with more than one million
users as well as 1,500 applications. In parallel, they then developed a
SOA architecture based on the identity infrastructure
• To illustrate this, the next slide is an old Burton Group target identity
architecture, now nearly 20 years old, showing the basic components of
an identity and access management system
10. • An old Burton group target architecture from
nearly 20 years ago illustrates this showing
identity, provisioning and access management
all running as web services
11. The Point I Am Making…
• For the last 20 years, all identity and access
management systems have the following
components:
– Identity Management Server
• In today’s world this is a combination of the Provisioning and
Identity & Policy Admin from the previous slide
– Directory
• This is the large box at the bottom entitled “Identity Data
Services
– Access Manager
• This is the box titled Access Policy Enforcement Infrastructure
– API/Internet Gateway server
• This didn’t exist 20 years ago
• You will see this in some slides in this deck
12. Estonia…
• In Estonia, in the late 1990’s they too realized
that identity is the key component
• They realized that a common identity for each
citizen was required
• They also realized that citizen event life triggers
were also important to streamline government
services
• Finally, they too also adopted a SOA web services
architecture
13. Single Citizen Identity
• One identity per citizen
• Any changes to the identity are then shared with
other apps/services consuming them
– One place for a citizen to change things like addresses
and phone numbers
– Citizens don’t have to fill in the same information
over and over in forms for different apps/services
• Same identity used for access management
14. Single
Citizen
Identity
Citizen
Accesses via their phone or the internet
Government Portal
Ministry
Apps/Services
Ministry
Apps/Services
Ministry
Apps/Services
Municipalities
Apps/Services
3rd Party
Apps/Services
Crown Corp.
Apps/Services
Citizen Identity Access Management System
Identity - Foundation of e-Governance
15. So Why The Green Triangle?
• A “Directory” is a special type of database
• More than 20 years ago, large enterprises realized
that if they were going to use the database for
authentications, it could take hundreds of thousands
or millions of concurrent hits per second
• Since the old databases couldn’t perform, they
created a tree type database which could easily
perform and scale
• This is called a LDAP directory (Lightweight Directory
Access Protocol) and is depicted using a triangle
16. Now Let’s Look At Authoritative Sources
• In the lifecycle of an identity, there are several main
identity “trigger” points
– These are depicted in the yellow boxes in the next slide
• For each one of these, there are associated business
processes, usually determined by laws
– These are depicted by the red boxes in the next slide
• Once the data is entered into the authoritative source for
the identity lifecycle, it then flows to the national identity
management server
– The black box in the next slide
– This is the smart brains of the identity management system
• It then creates or modifies an identity in the citizen
tombstone identity directory
18. Why Is It Called “Tombstone”?
• The national identity and access management
infrastructure only stores high level “tombstone”
identity information
– Similar to what is often entered on a person’s tombstone
• This includes things like legal name, place of birth,
gender, address AND CELL NUMBER
• The directory is not the “mother of all identity
databases”
– So sensitive information such as tax numbers, etc. stays in
the respective ministries databases
• This is good privacy design
19. Leverage Open Source Software
• The strategy leverages open source software identity
and access management from a company called
“ForgeRock”
• Governments using this around the world include
Canada, Norway, New Zealand, Australia and the
Province of Alberta
• Large companies like Toyota also use it
• So this is proven and you won’t be the first to use it
• Let me show you what really happens “underneath
the hood”…
20. The Actual Architecture…
• The following slide shows the actual architecture used
• To simplify this let’s pretend that you’ve just been born
• The birth registration, including your biometric, plus you
parents identity information is sent from one of the red boxes
on the left titled “Birth Authoritative Source”
• It flows out via an API (Application Programming Interface),
securely through the internet (3 types of encryption used) and
into one of your national data centres
• It then flows to a box called “Open IG”. This is the internet
gateway server mentioned previously
• Open IG then passes the information to the Open IDM server
(this is the identity management server mentioned previously)
• Open IDM then realizes you are a new entry and then creates a
new identity in the directory with links to your parent’s/legal
guardian (this is the LDAP directory mentioned previously)
21.
22. So Why Am I Showing You This?
• You are about to see how the same underlying
national identity management and
authentication infrastructure can be used to
create new accounts in open source healthcare
and education management software
• It will also be used to authenticate against
23. Automatically Create A
Healthcare Account For The Infant
• The identity management server can be used to
send your new birth entry, along with your
parents/legal guardian information to a open
source health care software (which also exists
today)
• Included in this is your parents/legal guardians
cell phone information
• Here’s how this happens “underneath the
hood”…
24. Changes To The Citizen’s Identity
• The value of using this architecture is that all government
ministries, crown corporations, municipalities and 3rd
parties consume the same identity
• So now let’s see how an identity change then flows from
the identity management server (OpenIDM) to these
entities…one of which is to the Open Source Health Care
application to create a new identity for you
• In the next slide you’ll see the identity management
server, sending your identity information, via Open IG out
to numerous ministries, crown corps, municipalities and
third parties
• In this case, one of the “National Ministry Services” would
be the Ministry’s of Health Open Source Healthcare
Management Software
25.
26. Let’s Say You Don’t Immediately
Implement Open Source eHealth…
• If it takes time to implement the open source
eHealth software, then an interim step is to first set
up each of the existing healthcare applications with
the same identity and any changes to the identity,
from the national citizen identity and authentication
infrastructure
• This will eliminate any possible confusion or costs
arising from identities that are out of sync between
the different systems as well as assumptions the
identity man be more than one person
– E.g. In British Columbia, several years ago, they
discovered they had 9 million health care cards for 4
million citizens. This lead to the creation of a unified
citizen identity system
27. When You’re Vaccinated
Your Biometrics Are Updated…
• Since your finger biometric changes, the
vaccination point in your lifecycle is an excellent
opportunity for the local health care worker to
update it
28. Use Voice To Service
Citizens Via Telemedicine
• In remote areas where there are no or poor access to
health care professionals here’s what not could happen…
• A citizen could call a toll freee healthcare number
• They are authenticated using their voice
• The authtentication services then sends a PAI “Persistent
Anonymous Identifier” to the helth portal
• The Health portal then maps the PAI to your identity
• With your consent, the citizen grants acces to their
ehealth record to the health professiona; on the phone
• The medical profession treats them and then updates their
health record
29. Why Use A PAI?
• The architecture values a citizen’s privacy
• Therefore, it mitigates against the risk that a malicious
person, who has access to a ministry server can then
obtain your unique ID and then masquerade as you on
another ministry’s server
• So, let’s use an example…
• You the citizen are interacting with two different ministry
services “A” and “B”
• When you successfully authenticate, Ministry A gets a PAI
of ABCDE for you, which they then map to your identity
within the database
• Ministry B gets a PAI of MNOPQ
• So a person who maliciously obtains ABCDE can’t use this
on other different ministries databases
30. Single
Citizen
Identity
Citizen
Accesses via their phone or the internet
Government Portal
Ministry
Apps/Services
Ministry
Apps/Services
Ministry
Apps/Services
Municipalities
Apps/Services
3rd Party
Apps/Services
Crown Corp.
Apps/Services
Citizen Identity Access Management System
All Apps/Services Leverage the Same
Access Management System
31. Let’s Follow The Electrons…
• The sick citizens uses their voice to authenticate by calling
a toll free health number and then saying their name
• The IVR takes the voice and then passes it, via the internet
to the same infrastructure you saw before in previous
slides
• It goes through the Internet Gateway server and on to the
Open AM (access manager server)
• This then verifies the voice against the directory or a
related biometric server
• If successful, the Open AM server then generates the PAI
which is then sent, via Open IG to the Health portal
• The portal then maps the PAI to your identity and the
open source health care software then takes over
32.
33. What Happens When
There’s No Connectivity?
• In certain parts of your country there may be no or poor
connectivity
• You, the infant, will also have a national identity card
– Malaysia creates youth identity cards MyKid
• http://www.malaysiacentral.com/information-directory/mykid-
identity-card-of-malaysia-for-children-below-12-years-
old/#sthash.ZXp3bJOb.dpbs
• On the card will securely be stored some of your medical
information
• If your parents are in a remote area, the health care
worker will scan the card using a portable unit, treat or
vaccinate you and then update the card
• When the healthcare worker reaches connectivity, they
will upload the information to the healthcare system
34. So The Next Time
You Show Up For Treatment…
• You would present your or your child’s national
ID card.
• The health care field worker would use a
portable unit to scan the card and upload
medical information contained on the card
• After treatment, the health care worker updates
the card and then, when they reach connectivity
updates the national system
35. When You Need A Vaccination…
• The open source eHealth software has your
parents/legal guardian’s cell numbers from the
national identity and authentication infrastructure
• So…it will be able to send them a SMS message
telling them you need a vaccination
• This leverages what the citizens have in their pockets
and the national identity and authentication
infrastructure
• You, the citizen, have to go to only one place to
change things like your address and your phone
number so the information is up to date in all the
different services you interact with
36. When The Citizen Changes
Their Address Or Phone Number…
• They only have one place to go to change this
information with the government, i.e. via their cell,
smartphone, tablet, computer or, an actual office
• After authenticating, the citizen may be required to
enter a 4 digit pin to provide stronger authentication
that they are whom they claim to be
• The change makes its way through the architecture
seen previously and then the identity management
server automatically sends it out to pre-approved
apps in ministries, crown corps and third parties
37. Change in Guardianship to Infants…
• Whenever there is a legal change in parent/guardian
status, it will be recorded via legal business
processes in a authoritative source
• The national identity management server would
then automatically update the record in the
directory as well as updating ministry apps, including
health, social services, education and municipalities
etc. for which a policy has been created.
• This will aid front line people who may be dealing
with different people claiming conflicting
parenthood/guardianship for a child
38. Innovative Treatment Programs
• At a recent African conference I attended, I came
across people who were using SMS to assist
mom’s to be with a treatment program in West
Africa
• They were very existed in the national identity
and authentication infrastructure this
presentation covers
• This architecture and strategy presented seeks to
leverage cost effective ways of treating and
following up with people using something they
have in their pockets…a cell phone.
39. Integrating Private & Public Healthcare…
• Private health care providers would be required to integrate the
national citizen identity and authentication service into their systems
• They would then be using the same underlying citizen identity as would
a public healthcare system
• Let’s uses ACME Medical as the third party. ACME medical would
create their apps to access the national authentication system using
patient’s voices as well as some other biometrics where the voice isn’t
available
– The fancy term for this is ACME’s authentication system would abstract out
its trust to the national identity and authentication system
• Acme would receive a PAI from the national identity and access
management system which it twould then map to the identity within
their own data systems
• As open source medical data systems, like HL7, etc. are adopted citizen
health data could then flow between the private and public systems
40. So What’s This About “Citizen Consent?”
• As the world and your country digitizes, citizen
consents will be required for numerous things
• In the past, you gave you consent in silo-ized
applications
• What if you could centrally manage all the
consents you have to governments, third parties.
Municipalities, etc.?
• Today you can using a emerging protocol “User
Managed Access”
41. Privacy & Consent
User Managed Access (UMA)
• Standards based
privacy and consent
• Giving people the
right to control
access to their data
across providers
• Interoperable
OAuth2-based
protocol
• Shipping as an
integrated feature of
OpenAM and OpenIG
42. Does This Solve All Health Problems…
• No. HOWEVER IT:
– Provides a e-health framework leveraging national citizen
identity and authentication infrastructure
– Leverages existing technology most citizens have access
today
– Provides a privacy and consent framework which is
required in health care
– Enables the Ministry to use the same identity with all the
applications currently running in the health ministry
– Rethinks the national ID card such that it becomes also a
national health card as well containing some medical
information, securely stored, and available to health care
workers out in the field
43. National ICT Identity …
• Is one of the critical building blocks to create an
e-health framework
• The same investment used by other government
services can be leveraged by the Health ministry
• The same privacy and consent services the
national identity service implements can be used
by the e-Health software
44. This Could Be Your Country…
• You can become a digital leader in Africa
• HOWEVER, to do this requires all Ministries to
work together leveraging the same underlying
national identity and authentication
infrastructure
• Finance, Education and Health should be
involved in the creation of this infrastructure in
addition to the traditional ministries who look
after identity lifecycle events
45. Summary
• Your country could
become the Estonia of
Africa – a innovative
nation that leveraged
the digital world to
rethink itself
• Please contact me:
– 1-604-861-6804
– guy@hvl.net
– www.hvl.net