Reviews the governance components required to successfully implement and maintain an e-government strategy:
* Identity data governance
* Identity infrastructure governance
* Laws and regulations governance
Reviews current government challenges in receiving and making citizen payments
Presents a way for governments to make more money every day by leveraging citizen identity and the phone
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
National Identity ICT Defence and Intelligence StrategyGuy Huntington
Examines:
* Significant risk of governments being held for ransom from malware attacks on their national ICT infrastructure
* Lays out high level requirements for:
- Privacy
- Malware and denial of service attack defence
- High availability
National identity strategy presentation may 10, 2016Guy Huntington
Based on my recent activities in Africa, I have updated my proposed national citizen digital identity strategy to include:
* Benchmark it against Estonia
* Include overview of the number of different RFP's required and show how they can be combined with local and off-shore suppliers
* Compare against what the World Bank's ID4D study recommends
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
Lays out the effects of a national identity for a citizen’s lifecycle events including:
* Birth
* Vaccinations
* First day of school
* Health treatment
* Getting driver’s license and passports
* Changing name and gender
* Paying for government services taxes, fines
* i-Voting
* Moving within the country
* Claiming for social services
* Death
This presentation covers the challenges of:
* Most African governments struggle with people Illegally immigrating in and then masquerading as a citizen
* Voting irregularities
* Pretending to be students when they’re not
* Using dead citizen’s identities to then use them to access social programs
* Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
Presents an integrated framework that not only addresses this BUT ALSO can be used for education, health and citizen payments
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
Reviews current government challenges in receiving and making citizen payments
Presents a way for governments to make more money every day by leveraging citizen identity and the phone
Global & National Identity Projects Failures and SuccessesGuy Huntington
* Reviews common causes for why so many large identity projects fail, go over budget and timelines and under-deliver
* Describes, based on my experience, ways to structure a large identity program with several related identity projects such that they will be successful
National Identity ICT Defence and Intelligence StrategyGuy Huntington
Examines:
* Significant risk of governments being held for ransom from malware attacks on their national ICT infrastructure
* Lays out high level requirements for:
- Privacy
- Malware and denial of service attack defence
- High availability
National identity strategy presentation may 10, 2016Guy Huntington
Based on my recent activities in Africa, I have updated my proposed national citizen digital identity strategy to include:
* Benchmark it against Estonia
* Include overview of the number of different RFP's required and show how they can be combined with local and off-shore suppliers
* Compare against what the World Bank's ID4D study recommends
National ICT & Education Strategy July 2016Guy Huntington
Presents the author’s own experience and efforts to change the Canadian education system
Warns countries of simply adding cost to their existing education and ICT budgets by adding technology if they don’t learn from past mistakes other countries have made
Presents a high level framework for an education strategy leveraging identity and ICT
Lays out the effects of a national identity for a citizen’s lifecycle events including:
* Birth
* Vaccinations
* First day of school
* Health treatment
* Getting driver’s license and passports
* Changing name and gender
* Paying for government services taxes, fines
* i-Voting
* Moving within the country
* Claiming for social services
* Death
This presentation covers the challenges of:
* Most African governments struggle with people Illegally immigrating in and then masquerading as a citizen
* Voting irregularities
* Pretending to be students when they’re not
* Using dead citizen’s identities to then use them to access social programs
* Governments find the identity is effectively siloed in many different ministry databases and have problems with fake identity cards being used
Presents an integrated framework that not only addresses this BUT ALSO can be used for education, health and citizen payments
* Lays out existing healthcare delivery problems many developing countries have
* Presents a high level framework for an ICT health care strategy leveraging identity
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
submission to: https://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Financial_Technology_and_Regulatory_Technology/FinancialRegulatoryTech/Submissions
Presentation on eGovernance and Open Governance products launched/under development in Moldova, in the context of building e-Democracy. 6th Internet Governance Forum, Kyiv, Ukraine, September 30, 2015
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Presentation held by Mr. Toon Timbermont, within the Regional Workshop on Georgia's anti-corruption and public service delivery reforms (22-24 September 2011).
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
Feb 2020 - Senate Submission Financial Technology and Regulatory TechnologyTimothy Holborn
submission to: https://www.aph.gov.au/Parliamentary_Business/Committees/Senate/Financial_Technology_and_Regulatory_Technology/FinancialRegulatoryTech/Submissions
Presentation on eGovernance and Open Governance products launched/under development in Moldova, in the context of building e-Democracy. 6th Internet Governance Forum, Kyiv, Ukraine, September 30, 2015
Some simplified slides I developed to use in briefings and discussions about “data sharing” and the “data sharing” provisions in the Digital Economy Bill (now Digital Economy Act)
Presentation held by Mr. Toon Timbermont, within the Regional Workshop on Georgia's anti-corruption and public service delivery reforms (22-24 September 2011).
Who Will Run My Fantasy Football Team When I’m Gone: The Latest and Greatest ...gallowayandcollens
National Academy of Elder Law Attorneys Webinar 2015 presented by Attorney Howard Collens on the recent updates regarding Fiduciary Access to Digital Assets.
E Commerce Platform Data Ownership and Legal Protectionijtsrd
In order to better distinguish the issues of data ownership in e commerce platforms, this article starts with the basic theory of data rights on e commerce platforms, studies the current status of e commerce legal regulations, and explains relevant data rights regulations from the aspects of legislation, law enforcement, and justice Practice and analyze how to scientifically allocate rights, obligations and responsibilities in practice based on classic cases of data rights protection on e commerce platforms. Through the research on the existing data of e commerce platform data rights, the comparative analysis method is used to analyze the main problems in the development. The e commerce platform data rights protection legal system, law enforcement protection methods, and judicial relief systems still need to be improved. Finally, corresponding perfect countermeasures are proposed for the above problems. China should further improve the e commerce platform data rights legal system, law enforcement mechanism, and judicial relief channels, improve the self discipline mechanism of industry associations, improve the internal data governance capabilities and levels of e commerce platform enterprises, and provide a comprehensive and systematic legal protection for the protection of e commerce platform data rights. Changjun Wu | Xinhui Zhang "E-Commerce Platform Data Ownership and Legal Protection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd32983.pdf Paper Url :https://www.ijtsrd.com/management/law-and-management/32983/ecommerce-platform-data-ownership-and-legal-protection/changjun-wu
Challenges for an implementation of an electronic single window - Guichet Un...AAEC_AFRICAN
Presentation made during the "Sharing Experience session" on 15 march 2017 - 8th General Assembly of the African Alliance for Electronic Commerce, held in Nairobi.
Public sector e-signature policy webinar 170711K6 Partners
State and local entities are looking for new ways to engage citizens and provide value through digital channels. Yet they face challenges that are different from those faced by private industry. What are the best practices for rolling out electronic signatures? Can a policy help? Our panel will help you avoid common mistakes and provide guidance for a smoother transition to digital government.
Education law conferences, March 2018, Keynote 2 - 10 steps in 10 weeks to GD...Browne Jacobson LLP
This sessions provides 10 steps schools can take in the 10 weeks leading up to the enforcement of the General Data Protection Regulation on 25 May 2018.
All of government information technology strategy: What does this mean for re...polly martin
Archives New Zealand Director, Client Capability, John Roberts (aka antiquarian and subject matter expertise in men's fashion), presents on the implications of the Strategy and Action plan for those who work with records and information in an ever changing environment.
Those implementing social media in local government agencies face a different set of challenges than private sector implementers. From agency culture to policy to terms of use agreements, the issues need to be identified and managed for successfully implementing these networks.
One pager - "Trust in an Interdependent World" - October 2017Guy Huntington
“The information age has ushered in a networked and interdependent world, one in which challenges and opportunities appear and disappear faster than traditional organizational models can manage.” - Chris Fussell
We are living in an economic revolution, which is quietly disrupting almost all of our ways of doing things. Driven by electronic interdependencies between multiple parties, it requires trust.
Central to creating the trust is verifying who the identity is, accepting an authentication, and obtaining the identity’s authorization consent. Technology for interdependency, i.e. federation, is outpacing our ability to create this trust. New guidelines, laws, and regulations are required to leverage biometrics for identity verification.
Couple this with the advent of a miniature “Internet of Things.” Each of us will likely have hundreds of them. We will be required to provide our authorization consent allowing each device to work with other devices, identities, and/or enterprises.
The result? A revolution is upon us. It’s unlike anything we have ever seen.
Requirements for Successful Enterprises in a Federated Economy - October 2017Guy Huntington
An economic revolution is quietly occurring. It is built upon creating new, rapid interdependencies between enterprises, devices, and people. This allows us to analyze, optimize, prophesize, customize, digitize, and automate services. What most people and enterprises don’t understand are the requirements to be successful in this new world. That is what this paper addresses.
It is built upon trust. This paper identifies the foundational pieces required to create trust for an interdependent world:
• Identity verification
• Identity authentication
• Authorization consent
• Security
• Operational availability
Requirements for each piece are stated from the following perspectives:
• Users
• Third party (e.g. banks, telco’s, insurance companies, small businesses, et al.)
• Government (municipal, regional, state, and national)
• Identity verification and authentication service
The underlying infrastructure required for this interdependent world is complex. The paper illustrates this by examining the three main protocols required: OpenID Connect, OAuth, and User Managed Access.
It also discusses a potential downside of creating an interdependent world – creating a single point of enterprise and/or economic failure. A disturbing trend is the increasing size of botnet distributed denial of service attacks. The paper uses Estonia’s 2007 attack to illustrate this problem on a national scale.
Identity Federation: Citizen Consent and the Internet of Things - October 2017Guy Huntington
With nanotechnology, devices are shrinking down to an almost molecular level and have the ability to communicate wirelessly via the Internet. These devices are beginning to proliferate in almost all aspects of our lives be it medical, transportation, government, clothing, appliances, and so on.
Since device owners have to access many different systems to manage their authorization consents, it becomes unwieldly. This paper addresses the simple question of “How do I manage all my consents across a wide variety of different devices, suppliers, and their systems in one place?”
Identity Federation: Governments and Economic GrowthGuy Huntington
This paper illustrates how identity federation rethinks citizen interaction with government and third parties. It provides examples for finance, health, social services, drivers’ licenses, passports, different levels of governments, citizens’ changing addresses, and schools.
The net effects of identity federation are:
• A rapid increase in the speed of servicing a citizen via their cell phone
• Seamless interaction from the national identity verification service with governments and third parties
• Lower cost of service
• A citizen’s privacy is protected with their consent
• Economic growth
Identity federation = Biometrics and Governments Sept 2017Guy Huntington
We live in an increasingly small world with rapid technological changes. Our existing identity verification systems were designed for the early 1900s. This was long before the rise of the internet with the fast, easy movement of people between government borders, electronic identity federation between enterprises and genetic cloning.
The use of high identity assurance, i.e. strong identity verification, is required to accomplish things like citizens easily being able to use digital signatures, vote online, conduct large financial transactions, etc. It requires a trusted government issued identity, from the date of birth onwards through an identity’s life. We must re-design our systems to answer the question “How do I know if you are really you?” while protecting the citizen’s privacy and their biometrics. That's what this paper discusses.
Identity federation – Mitigating Risks and Liabilities Guy Huntington
When I go into enterprises deploying identity federation, I frequently tell my teams that I have four letters stenciled across my forehead: R I S K. To mitigate risk from federation requires an enterprise view of the risk from Legal, Governance, Business, and IT.
It has been my experience that Business and Legal don’t fully understand the risks involved, and instead trust their IT department to “handle it.” This is why I have written this paper. It is aimed at Business, Legal, and IT leaders within an enterprise that is either embarking on identity federation and/or expanding their use of it. By reading this paper, you will learn the types of things your enterprise should be doing to mitigate federation risks and potential liabilities.
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services.
Proposed country identity strategy july 24, 2015Guy Huntington
Based on all my experience, i want to assist governments in creating a national citizen identity that will enable citizens to use the technology they have, the cell phone, to improve their lives. This high level overview outlines how by using their voice to authenticate, citizens can receive young children vaccination management, health and education management and pay for government services using their SMS Banking and telco e-wallet services. As well the slides also show how governments can use this to make and save money.
ZGB - The Role of Generative AI in Government transformation.pdfSaeed Al Dhaheri
This keynote was presented during the the 7th edition of the UAE Hackathon 2024. It highlights the role of AI and Generative AI in addressing government transformation to achieve zero government bureaucracy
Donate to charity during this holiday seasonSERUDS INDIA
For people who have money and are philanthropic, there are infinite opportunities to gift a needy person or child a Merry Christmas. Even if you are living on a shoestring budget, you will be surprised at how much you can do.
Donate Us
https://serudsindia.org/how-to-donate-to-charity-during-this-holiday-season/
#charityforchildren, #donateforchildren, #donateclothesforchildren, #donatebooksforchildren, #donatetoysforchildren, #sponsorforchildren, #sponsorclothesforchildren, #sponsorbooksforchildren, #sponsortoysforchildren, #seruds, #kurnool
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
A process server is a authorized person for delivering legal documents, such as summons, complaints, subpoenas, and other court papers, to peoples involved in legal proceedings.
2. This Deck…
• Reviews the governance components required to
successfully implement and maintain an e-
government strategy:
– Identity data governance
– Identity infrastructure governance
– Laws and regulations governance
• So who am I?
3. Guy Huntington
Guy Huntington is a very
experienced identity
architect, program and
project manager who has led,
as well as rescued, many
large Fortune 500 identity
projects including Boeing and
Capital One. He recently
completed being the identity
architect for the Government
of Alberta’s Digital Citizen
Identity and Authentication
program.
4. Identity Governance
• Many people don’t understand the governance
requirements to successfully implement and
maintain an e-government strategy
• There are several components:
– Identity data governance
– Identity infrastructure governance
– Laws and regulations governance
• Let’s start with identity data…
5. Birth
Name Change
Gender Change
Death
Address Change
Tel. Number Change
Parent/Guardian Change
Marriage
Divorce
Authoritative Source
Authoritative Source
Authoritative Source
Authoritative Source
Authoritative Source
Authoritative Source
Authoritative Source
Authoritative Source
Authoritative Source
Business
Processes
Business
Processes
Business
Processes
Business
Processes
Business
Processes
Business
Processes
Business
Processes
Business
Processes
Business
Processes
Citizen
Tombstone
Identity
Directory
National Citizen Identity Lifecycle
6. Who Has Legal Responsibility?
• For each of the identity data on the left hand side of
the previous screen, what government ministry is
legally responsible for the data?
• There are some new identity challenges that need to
be addressed:
– When a biometric is obtained from a person (e.g. infant,
child or adult) which ministry is ultimately responsible for
the biometric?
– For Parents/legal guardians, which ministry is legally
responsible for establishing this relationship
– For citizen addresses and phone numbers, is there one
ministry who will be legally responsible for the collection
and management of this?
7. Legal Vs. Operational Responsibility
• Once the legal governance for each piece of identity data
is determined, then there needs to be a determination of
who is operationally responsible for the collection of it
• This is the second column in the previous diagram, i.e.
business processes
• Here’s a hypothetical example:
– When a student goes to school for their first day, they will
provide a face and voice print biometric
• The school district or, a specialized identity team, might be the people
who actually collect the biometrics
• HOWEVER, the ministry legally responsible for the biometric will likely
not be the Education Ministry
• So regulations and standards need to be created and then
audited for the operational governance of each piece of
identity data
8. Shared Services
• About 20 years ago, when large global
enterprises began to digitize themselves and
centralize operations, it became apparent there
was a need for a shared services group to
collectively manage IT infrastructure
• Governments began to adopt this too
• There needs to be a legal act and regulations
regarding the formation of such an entity
9. Identity Infrastructure et al
• Shared Services are usually the group who is
responsible for the operational management of the
identity infrastructure
– This includes data centres, clouds, operational data, high
availability, etc.
– It may or many not include the security management
• Note that the Shared Services group only has
operational responsibility and not legal ownership
for each of the underlying identity data components
– The legal ownership remains with the ministry
responsible for each identity data
10. BUT Sometimes Shared Services
Is Legally Responsible…
• Sometimes, the shared services group also looks
after things like identity phone numbers and
addresses, since there usually isn’t one ministry
assigned to this
• At the last government client I worked with, their
shared services ministry not only managed the
identity infrastructure but also was responsible
for the centralized citizen telephone numbers
and address collection and management
– Citizens would go to one place online to change their
addresses and phone numbers
11. Government Identity Steering Committee
• Many enterprises deploying global identity
strategies quickly come to the realization that
identity crosses all the enterprise administration
silos
– It’s thus not only operationally very important, BUT
also politically important
• It is not uncommon in large enterprises for them
to form a identity steering committee to oversee
identity infrastructure, identity investments, etc.
12. Laws and Regulations
• If one examines governments who have already
successfully deployed national e-identity programs,
like Estonia, one finds that a major component to do
this is to create and/or change laws and regulations
• The use of things like digital signatures, digital data
retention, biometrics et al require well thought out
acts and regulations
• So your government will have to do this too
• Let’s take a quick look at some of the laws that
Estonia brought into being…
13. Legal Framework
• Digital Signatures Act -
https://www.riigiteataja.ee/en/eli/508072014007/consolide
• Public Information Act -
https://www.riigiteataja.ee/en/eli/522122014002/consolide
• Personal Data Protection Act -
https://www.riigiteataja.ee/en/eli/529012015008/consolide
• Act on Intellectual Property
• Uniform Bases for Document Management Procedures -
https://www.riigiteataja.ee/akt/119062012007
• Archives Act - https://www.riigiteataja.ee/akt/112072014028
• Principles of Estonian Information Policy (1998, 2004)
• Action Plan of Estonian Information Policy – (eEstonia) (1998,
1999, 2000, 2001,2002, 2003, 2004, 2005, 2006...)
• http://egov2.eu/knowledge-base/an-overview-of-estonian-
e%E2%80%91government-development-and-projects/
14. Identity and Credential Assurance
• Your government will have to create two standards; identity
and credential assurance
• Identity assurance covers what documents and biometrics are
allowable under what type of conditions to establish an
identity
• Credential assurance covers what type of credential is
allowable for certain types of risk
• There will have to be memorandums of understanding
between the national government and local state and
municipalities as well as crown corporations
• These documents will also likely be legally referred to in
federation agreements with third parties
• As your country begins to work with other countries on
recognizing national identities and verification, these
documents must then become part of such agreements
15. Federation Agreements
• Your government’s e-identity strategy will also
require the national identity and authentication
service to work with third parties like banks,
telcos, insurance companies, etc.
• Each of these parties will have to sign a
federation agreement with the government
• This covers many things like identity and
credential assurance, liability, responsibility for
when a session is dropped part way through, etc.
16. Governance Challenges
• Creating, implementing and sustaining an e-
identity strategy IS VERY CHALLENGING because:
– Crosses over all ministry silo’s
– Extremely public facing
– Literally many thousands of decisions to be made as
the systems are all interconnected
– The system is prone to attack from organized crime
and foreign intelligence agencies
– Large budgets and time cycles involved
17. Strong, Sustained Leadership
• Therefore, from the top of your government on
down, all must be not only aware but take a
strong, sustained leadership role
• It’s when times get tough, like a denial of service
attack, etc. that the top leaders have to be there
to calm the public and ensure the system will be
properly maintained
18. There’s A Lot To Governance
• It has been my own past experience that most
enterprises commencing large, global, identity
programs don’t understand the implications of
governance
• It’s usually tacked on towards the end of the
project
• THIS IS A BIG MISTAKE since many projects go
over time and budgets as they finally realize
governance is complex and must be addressed
19. Governance Should Be Addressed First
• At the very least, governance should be one of
the main project tracks
• Many different government governance
initiatives must be launched in parallel to the
business process and technical activities of the
teams
• Governance work takes time – so plan for it
• If you do this, then there is an excellent chance
your identity program will roll out the door on
time and on budget
20. Changing the World a Bit
• Guy wants to change the world a bit by assisting
developing countries to leapfrog ahead of most
western societies by:
– Leveraging citizen’s use of the cell phone and their
voice to then access online government services
– Creating a new model for educating students
– Leverage existing technology to deliver healthcare
more effectively
21. If You Thought This Is Thought Provoking
• Then please pass along a link to the presentation
to people in your country who might be
interested
• You can contact me at:
– guy@hvl.net
– 1-604-861-6804
– Via LinkedIn (https://ca.linkedin.com/in/ghuntington)
• Thanks for your time!