The Belgian government launched an electronic national ID card program in 2001 to serve as the foundation for improved e-government services. Over 9 million ID cards had been issued by 2009, allowing citizens access to over 600 online public services. The ID card system provides identification, authentication with a PIN, and a digital signature. A notable aspect is the "My File" application, which gives citizens transparency by allowing them to view any government agency's access to their personal data. Marketing techniques were also used to promote adoption of the new ID cards and their associated e-government services. Another program, Kids-ID, issues secure electronic ID cards to children under 12 that can also be used to safely access the internet.
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...Feroot
At the Smart Technology Privacy Summit 2018, hosted by Feroot Privacy and the Privacy & Access Council of Canada, John Beardwood provided the current Canadian legal framework for GDPR and personal information in the context of IoT, Smart Technology & Smart Cars.
This presentation provides key legal information for any CEO or company leader seeking to fulfill GDPR Access Requests, also known as GDPR DSAR, GDPR DSR, and GDPR SAR.
About Feroot:
Feroot GDPR DSAR Framework helps any organizations understand, prepare for handling access requests, and manage fulfillment of access requests using the self-serve approach from within their mobile, web apps, and portals.
The Development of E-Commerce in Nigeria - Olushola AbiloyeAcas Media
THE IMPACT OF SUPREME COURT DECISION IN KUBOR v. DICKSON (2014) 4 NWLR (Part 1345) 534-594 ON THE DEVELOPMENT OF E-COMMERCE IN NIGERIA: ISSUES AND PROSPECTS
Countries that have made electronic signatures legalDaria Kizilova
There are many countries, 60 to be precise, which have passed laws to make electronic signatures fully legal and admissible by law. These legislations provide e-signatures a solid foundation to stand on.
Feroot Smart Technology Privacy Summit: The Connected Car — Understanding the...Feroot
At the Smart Technology Privacy Summit 2018, hosted by Feroot Privacy and the Privacy & Access Council of Canada, John Beardwood provided the current Canadian legal framework for GDPR and personal information in the context of IoT, Smart Technology & Smart Cars.
This presentation provides key legal information for any CEO or company leader seeking to fulfill GDPR Access Requests, also known as GDPR DSAR, GDPR DSR, and GDPR SAR.
About Feroot:
Feroot GDPR DSAR Framework helps any organizations understand, prepare for handling access requests, and manage fulfillment of access requests using the self-serve approach from within their mobile, web apps, and portals.
The Development of E-Commerce in Nigeria - Olushola AbiloyeAcas Media
THE IMPACT OF SUPREME COURT DECISION IN KUBOR v. DICKSON (2014) 4 NWLR (Part 1345) 534-594 ON THE DEVELOPMENT OF E-COMMERCE IN NIGERIA: ISSUES AND PROSPECTS
Countries that have made electronic signatures legalDaria Kizilova
There are many countries, 60 to be precise, which have passed laws to make electronic signatures fully legal and admissible by law. These legislations provide e-signatures a solid foundation to stand on.
Non-Financial Use Cases of Mobile Expressmobmewireless
Mobile Express is a plug & play Eco-System that combines the security & non-repudiation properties of Digital Signature Certificates with the convenience & simplicity of Mobile phones
Who needs a EU representative according to GDPR article 27?idc-representative
One of the requirements under the GDPR ( Article 27 ) is the appointment of a representative in the EU for international companies that are not on the ground within the Union. According to the recitals , the EU representative must be designated in writing, and the obligation applies to both the “controller” (the company collecting the data and in some kind of customer relationship with the data subject) and any (sub-contracted) “processor” of the data. We give examples for which companies this obligation applies.
A Secure E-Medical Exemption System (E-MES): Jordan CaseIJNSA Journal
In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key
Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the
proposed system is summarized into three phases: first, the hospital process for applying the patient's
application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which
receives the hospital report, will then send a request to the ministry of health, the income and sales tax
department, and the ministry of social development in order to check the patient's condition for a medical
exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment.
Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system
is more efficient than the traditional medical protocols since the patient can apply for a medical exemption
directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key
encryption and digital signature system ensures and guarantees the security of the proposed protocol.
Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
With the changing times, the mode of producing evidence before Court has also changed. Most of the evidence presented before Courts is going to be Digital Evidence, so it is necessary to understand nature and methods to capture such evidence and present the same before Court.
The revolutionary progresses in information technology have a deep rooted impact in
global communication and that’s also having a great impact in the national as well as
the global business environment.
.Along with its growing importance it also has challenges due to technological issues
and their legal consequences.
In this study the key elements of e-contract (in light of the Indian Contract Act, 1872)
has been discussed. Its various issues related to Evidence Act, IT Act, Stamping laws,
consumer disputes has been covered.
E-contract is new phenomenon in modern business, so there are some ambiguities in
technical and legal issues but will be solved
Digitized services have been with us for many years already, and looking at the lessons we’ve all learned in times of COVID-19 and working-at-home, the benefits and possibilities are universally clear. But is the picture really complete? If you’ve ever looked at available tools, services, laws, or even functional requirements, you’ve probably asked yourself: does this meet my needs? Does this comply with legal requirements? Is it safe? What will happen when I need this information many years from now? Will I be able to find it, and will it be accepted as evidence?
After this session, you’ll not only understand what’s legally and technically possible but you’ll also be introduced to some of the solutions that are leading the digital shift today. And more importantly, you’ll see that you don’t have to wait for a bright future – it’s here today!
Watch the webinar here: https://xenit.eu/webinars/digital-signature-archiving/
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
http://www.gemalto.com/govt/documents/national-identity-schemes
Firstly, the national identity scheme indicates the roles of the sovereign state with regard to digital identity:
Is the state a regulator?
An issuer of sovereign identities or the digital derivatives of these identities?
What are its responsibilities within the chosen ecosystem in terms of organization, data and applications, and infrastructure?
Next, the national identity scheme establishes the underlying principles and operating methods of the digital identity ecosystem. It describes the main systems and flows linked to the use of digital identities to access services, authenticate users, and exchange and verify data linked to the service requested.
Where necessary, it provides useful details on the approved identity types and trust levels supported by the ID ecosystem. For example, commercial or transactional uses for identity may have functionalities distinct from those associated with authentication in the public domain.
It is clear that the deployment of digital identities under different national frameworks represents a dual challenge for nations, which must manage their sovereignty in the digital space while improving services to companies and citizens, in other words the framework for market interactions, and ultimately the healthy operation of the economy.
Yet reconciling market demands and sovereignty is no simple task. It requires constructive negotiation between their respective objectives.
A good example is provided by the European Union. Here, national identity schemes must be viewed in terms of both the actions of individual states, and the implementation of the eIDAS regulation (which may indicate future convergence), as well as the objectives of the European Digital Single Market and European Digital Agenda 2020 strategies.
In the end, these actions surrounding digital identity demonstrate a desire to rekindle economic growth through the more effective use of digital services, and build a single digital space of trust, offering a high level of security, interoperability and data protection.
Digital Innovation Digest by Initio. Special focus on Belgium and Digital Pan European ID.
Swoon is coming in Belgium
ITSME has won 40% of Belgian
Private Bank DELEN take over fintech Swanest
Non-Financial Use Cases of Mobile Expressmobmewireless
Mobile Express is a plug & play Eco-System that combines the security & non-repudiation properties of Digital Signature Certificates with the convenience & simplicity of Mobile phones
Who needs a EU representative according to GDPR article 27?idc-representative
One of the requirements under the GDPR ( Article 27 ) is the appointment of a representative in the EU for international companies that are not on the ground within the Union. According to the recitals , the EU representative must be designated in writing, and the obligation applies to both the “controller” (the company collecting the data and in some kind of customer relationship with the data subject) and any (sub-contracted) “processor” of the data. We give examples for which companies this obligation applies.
A Secure E-Medical Exemption System (E-MES): Jordan CaseIJNSA Journal
In this paper, a new secure E- Medical Exemption System Based on Elliptic Curve Public Key
Cryptography is proposed. This study specifies the medical exemption system in Jordan. However, the
proposed system is summarized into three phases: first, the hospital process for applying the patient's
application and producing the medical report. Second, the Royal Hashemite Court (RHC) process, which
receives the hospital report, will then send a request to the ministry of health, the income and sales tax
department, and the ministry of social development in order to check the patient's condition for a medical
exemption. In fact, this aim of this step is to ensure that the patient is not able to bear the cost of treatment.
Third, the RHC will send the decision to the patient via a short message. In practice, this E-medical system
is more efficient than the traditional medical protocols since the patient can apply for a medical exemption
directly from the hospital without suffering of any extra cost. Therefore, the elliptic curve public-key
encryption and digital signature system ensures and guarantees the security of the proposed protocol.
Nonetheless, to prevent a brute force attack, the choice of the key size becomes crucial.
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
With the changing times, the mode of producing evidence before Court has also changed. Most of the evidence presented before Courts is going to be Digital Evidence, so it is necessary to understand nature and methods to capture such evidence and present the same before Court.
The revolutionary progresses in information technology have a deep rooted impact in
global communication and that’s also having a great impact in the national as well as
the global business environment.
.Along with its growing importance it also has challenges due to technological issues
and their legal consequences.
In this study the key elements of e-contract (in light of the Indian Contract Act, 1872)
has been discussed. Its various issues related to Evidence Act, IT Act, Stamping laws,
consumer disputes has been covered.
E-contract is new phenomenon in modern business, so there are some ambiguities in
technical and legal issues but will be solved
Digitized services have been with us for many years already, and looking at the lessons we’ve all learned in times of COVID-19 and working-at-home, the benefits and possibilities are universally clear. But is the picture really complete? If you’ve ever looked at available tools, services, laws, or even functional requirements, you’ve probably asked yourself: does this meet my needs? Does this comply with legal requirements? Is it safe? What will happen when I need this information many years from now? Will I be able to find it, and will it be accepted as evidence?
After this session, you’ll not only understand what’s legally and technically possible but you’ll also be introduced to some of the solutions that are leading the digital shift today. And more importantly, you’ll see that you don’t have to wait for a bright future – it’s here today!
Watch the webinar here: https://xenit.eu/webinars/digital-signature-archiving/
National identity schemes - digital identity - national ID - eGovernmentEric BILLIAERT
http://www.gemalto.com/govt/documents/national-identity-schemes
Firstly, the national identity scheme indicates the roles of the sovereign state with regard to digital identity:
Is the state a regulator?
An issuer of sovereign identities or the digital derivatives of these identities?
What are its responsibilities within the chosen ecosystem in terms of organization, data and applications, and infrastructure?
Next, the national identity scheme establishes the underlying principles and operating methods of the digital identity ecosystem. It describes the main systems and flows linked to the use of digital identities to access services, authenticate users, and exchange and verify data linked to the service requested.
Where necessary, it provides useful details on the approved identity types and trust levels supported by the ID ecosystem. For example, commercial or transactional uses for identity may have functionalities distinct from those associated with authentication in the public domain.
It is clear that the deployment of digital identities under different national frameworks represents a dual challenge for nations, which must manage their sovereignty in the digital space while improving services to companies and citizens, in other words the framework for market interactions, and ultimately the healthy operation of the economy.
Yet reconciling market demands and sovereignty is no simple task. It requires constructive negotiation between their respective objectives.
A good example is provided by the European Union. Here, national identity schemes must be viewed in terms of both the actions of individual states, and the implementation of the eIDAS regulation (which may indicate future convergence), as well as the objectives of the European Digital Single Market and European Digital Agenda 2020 strategies.
In the end, these actions surrounding digital identity demonstrate a desire to rekindle economic growth through the more effective use of digital services, and build a single digital space of trust, offering a high level of security, interoperability and data protection.
Digital Innovation Digest by Initio. Special focus on Belgium and Digital Pan European ID.
Swoon is coming in Belgium
ITSME has won 40% of Belgian
Private Bank DELEN take over fintech Swanest
e-Residency offers to every world citizen a government-issued digital identity and the opportunity to run a trusted company online, unleashing the world’s entrepreneurial potential.
A complete study about how Estonia did its digital revolution of government and public services ... till new concepts such as e-residents ... and full traceability by each citizen of which civil agent consulted what data and if legitimate (possibility to claim if not) ... total reciprocity and transparency building a trust relationship between state & citizens ...
Initial Country Offering: How To Build Government-In-The-Cloud or Country-As-...Vladislav Solodkiy
Overview of blockchain-based GovTech startups and trends by Life.SREDA VC, The BB Fund and Arival bank. Article on CoinTelehraph: https://goo.gl/ea6reR
E-Government progress Croatia by Danijela Babic, ZaMirNETMetamorphosis
Presentation by Danijela Babic, ZaMirNET at the third International Conference e-Society.Mk: E-Government progress Croatia, December 1, 2007, Skopje Macedonia
Reviews current government challenges in receiving and making citizen payments
Presents a way for governments to make more money every day by leveraging citizen identity and the phone
Presentation given at the Service Design and Delivery in a Digital Age - Academies for EaP countries organised by the SIGMA Programme and the GiZ Eastern Partnership Regional Fund. Topic 2: Digital transformation.
Presentation of reseach of GDPR enforcement practice, based on information of 86 cases, vailaible publicly. The event, where the research was presented, has taken place in Kyiv, Ukraine on October, 10, 2019.
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
My presentation from IDnext 2015, the European Digital Identity Event. "UK government identity initiatives past, present, future: policy and technology perspectives"
Australia professional-membership-application frm-eng_0720fadliwiryawirawan
download here ISACA ,
isikan form karena dapat foundation free , ini masih sisa waktu kok sampai 2021 , hanya memiliki vissa platinum ,
dan sebagainya ,
kontak fadliwirya@webnull.com & friendly melindagates@foundations.org/
Enhanced Enterprise Intelligence with your personal AI Data Copilot.pdfGetInData
Recently we have observed the rise of open-source Large Language Models (LLMs) that are community-driven or developed by the AI market leaders, such as Meta (Llama3), Databricks (DBRX) and Snowflake (Arctic). On the other hand, there is a growth in interest in specialized, carefully fine-tuned yet relatively small models that can efficiently assist programmers in day-to-day tasks. Finally, Retrieval-Augmented Generation (RAG) architectures have gained a lot of traction as the preferred approach for LLMs context and prompt augmentation for building conversational SQL data copilots, code copilots and chatbots.
In this presentation, we will show how we built upon these three concepts a robust Data Copilot that can help to democratize access to company data assets and boost performance of everyone working with data platforms.
Why do we need yet another (open-source ) Copilot?
How can we build one?
Architecture and evaluation
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
Unleashing the Power of Data_ Choosing a Trusted Analytics Platform.pdfEnterprise Wired
In this guide, we'll explore the key considerations and features to look for when choosing a Trusted analytics platform that meets your organization's needs and delivers actionable intelligence you can trust.
Adjusting OpenMP PageRank : SHORT REPORT / NOTESSubhajit Sahu
For massive graphs that fit in RAM, but not in GPU memory, it is possible to take
advantage of a shared memory system with multiple CPUs, each with multiple cores, to
accelerate pagerank computation. If the NUMA architecture of the system is properly taken
into account with good vertex partitioning, the speedup can be significant. To take steps in
this direction, experiments are conducted to implement pagerank in OpenMP using two
different approaches, uniform and hybrid. The uniform approach runs all primitives required
for pagerank in OpenMP mode (with multiple threads). On the other hand, the hybrid
approach runs certain primitives in sequential mode (i.e., sumAt, multiply).
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
ViewShift: Hassle-free Dynamic Policy Enforcement for Every Data LakeWalaa Eldin Moustafa
Dynamic policy enforcement is becoming an increasingly important topic in today’s world where data privacy and compliance is a top priority for companies, individuals, and regulators alike. In these slides, we discuss how LinkedIn implements a powerful dynamic policy enforcement engine, called ViewShift, and integrates it within its data lake. We show the query engine architecture and how catalog implementations can automatically route table resolutions to compliance-enforcing SQL views. Such views have a set of very interesting properties: (1) They are auto-generated from declarative data annotations. (2) They respect user-level consent and preferences (3) They are context-aware, encoding a different set of transformations for different use cases (4) They are portable; while the SQL logic is only implemented in one SQL dialect, it is accessible in all engines.
#SQL #Views #Privacy #Compliance #DataLake
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
2. 2
The identity card program in Belgium
The keystone of e-Government
Identity & Biometric Solutions
The context
In July 2001, the Belgian Council of Ministers decided to launch an
electronic ID card for all its citizens. This card was to be the cornerstone
of a wider e-Government project, aiming to simplify administrative
procedures, and modernize public services.
Approved by the Belgian Commission for the Protection of Personal
Information, and passed by the Parliament and Senate, the project was
officially launched in March 2003. The national deployment of the card
began in 2004.
The Challenge
As one of the first countries in the
world to implement this measure
on a national scale, Belgium has
had to set up an organization,
infrastructure, and brand-new
technical framework, known
as BelPIC (Belgian Personal
Identity Card). The aim was to
provide Belgian citizens with a
secure identity document, but also with a brand-new digital signature
and identification tool to access public and private services online. This
platform had to meet legitimate security, flexibility, and adaptability
requirements. It also had to comply with European Directive 1999/93/
EC on digital signatures.
Furthermore, a significant communication campaign had to be launched,
in order to raise awareness, and begin to prepare the 9 million citizens
it was hoped to target by 2009.
The solution
To this end, the Belgian government created a new organization,
the Fedict, a new PKI infrastructure, the FedPKI, and a new inter-
governmental technical framework.
The new secure identity card is now an official proof of identity for
Belgian citizens. There are many advantages to this system, such
as faster and more secure access to government services online,
including tax services, online police reports, changes of address,
request for birth certificates and other certificates, declaring
domestic staff, etc. Each card holder has an individual PIN for
authentication, and the card generates a legally recognized
signature.
The results
With more than 9 million cards in use by the end of 2009, the Belgian
eID project was the first to meet its targets in Europe, along with Estonia’s.
The Belgian card is the digital key for more than 600 e-applications
on the internet (source: Fedict, October 2009). Many public services
are now available online, and procedures which used to take hours
now only take a few seconds. Through agreements with other public
institutions and many private service providers, such as Certipost
(a joint venture between the Belgian Post Office and Belgacom), as well
as software providers such as Microsoft and Adobe, citizens can send
letters, PDF documents, and signed contracts over the internet, or pay
their bills online.
The Belgian eID cards
This is a “credit card” type version of the old identity card. It is classed as
electronic, since it has an electronic chip.
The e-ID lists the same information as the previous card. Some information
is listed both on the card and on the chip, while other information is only
on the chip (such as the address). It is be carried from the age of 15. 12
Euros before the age of 18, and 17 Euros after the age of 18.
The residency card is a card without a chip for the part needed for
travelling abroad, and with a chip (on the back) to offer residents the
same access rights to online services as Belgian citizens.
For all foreigners (non-EU or Swiss) residing in Belgium. 16 Euros.
TheKids-eIDallowschildrenunder12torapidlybeidentified,eitherwithin
or outside Belgian borders. It is therefore a secure identity and travel
document. This card also allows the child (from the age of 6), to use the
internet in a safer way. Other uses can be developed, for example to
register or for identification at school, swimming pools, libraries, etc. An
emergency service is also linked to the card. An alert can be sent out if
the child has a problem or is in danger. If they so wish, parents can link
this central number to a list of telephone numbers which can be reached
in case of emergency. Around 3 Euros depending on the area.
This secure document is not compulsory.
3. 3
The chip on the e-ID card is now used for the card’s second function:
cardholder authentication. This is a new function that did not exist with
the former physical identity card. The electronic chip contains a digital
authentication certificate that ‘electronically’ proves the identity of the
cardholder. To identify himself, the citizen places the card in a reader and
keys in a 4-digit PIN – just like one does for a banking card. Authentication
offers an even higher level of security than identification because it requires
the cardholder to be in possession of both card and PIN.
Authentication is an optional function that has the advantage of
protecting the identity document against fraudulent use. In Belgium, when
citizens are issued with their e-ID card, they must declare to the issuing
authority there and then, whether they wish to activate the authentication
option or not.
The third function is also new to this new generation of identity document.
A second certificate, located on the chip in the e-ID card can add an
authentic electronic signature to electronic documents.
The electronic signature has the same legal value as its paper equivalent.
After having introduced the e-ID card into the reader, the citizen keys in
the PIN which then generates a signature that is unique to the document.
The electronic signature is an optional function. In Belgium, when
citizens are issued with their e-ID card, they must declare to the issuing
authority there and then, whether they wish to activate the signature
option or not. In our example, where the card is issued to a minor, the
signature option is automatically deactivated.
How does it work?
Thanks to the chip, e-ID currently fulfils three functions:
identification, authentication, and signature.
The first function of any ID card is to identify the holder.
The e-ID card contains exactly the same information as the
traditional identity card but now the information is contained on
the chip. e-ID thus enables two different levels of identification:
• Visualface-to-faceidentification:thankstotheinformation
visible on the card,
• Automatic identification: using data capture of the
information stored on the chip. This identification can be done
remotely over the Internet.
This identification (either visual or automatic) does not, however,
guarantee that the holder is the person they claim to be. To verify
this, authentication is required.
Key events and dates
• September 2004 - Decree to expand the use of the e-ID
electronic identity card – BELPIC project after the launch of
the pilot project in March 2003.
• December 2004 - Green light from the government to
launch the Be-Health platform offering on-line healthcare
services, using e-ID and the SIS card.
• May 2005 - launch of the Federal Interoperability Framework
for e-Government (BELGIF).
• January 2006 - Social Security enables salaries to be
recorded on-line. Launch of the firste-Democracy projects
is done.
• November 2006 - second state/region cooperation
agreementforanintegratede-Government.Launchofthe‘Safer
Internet’ website, whose secure use with e-ID prevents child
abuse, enables anonymity to be managed in a secure
way and prevents spam containing illicit material.
• July 2007 - more than 5 million e-ID cards deployed.
Strategic plan 2007 for the knowledge society and
e-Government is presented by the Minister for Employment
and Information Mr. Vanvelthoven.
• December 2009 - 100% of the target population has the
eID. Over 9 million cards in circulation.
• February 2011 - 42% of Belgian children have a Kids-
ID, more than 100.000 adults use the Fedict services to
authenticate when accessing internet gambling & betting
(source Fedict 2011)
“Police on web” is one of 600 applications which use online
identification in Belgium. Bike theft? Graffiti? Going on holiday?
Report it all directly on the internet! Since 100% of the Belgian
population have eID cards, all citizens can report thefts over the
internet. This application is part of the measures to streamline
administrative procedures.
4. 4
As part of the Belgian e-Government program, any Belgian citizen can
access the “My File” application after receiving their e-ID card. With this
application, Belgian citizens can consult all transactions performed over
the last 6 months by government officials who have accessed files using
their civil register data, from the National Population Register, with the
exception of exchanges relating to State security (Justice and Homeland
Security). The application comprises an online form enabling citizens to
request an official explanation from the government body that accessed
their private data. The following information appears on the screen: the
date and time of access, the name of the person who consulted this data,
if the consultation was performed via identification with an electronic
card, the code of the institution which consulted the date, and finally the
name of this institution.
It says a lot that for months on end this application was consulted more
than any other when the Belgian e-Government program was started up.
It has quickly come to be considered to be a new right associated with
the Belgian e-ID electronic Identity Card. It has proven to be effective
in ensuring uptake of the program, and Belgian citizens subsequently
eagerly awaited the roll-out of public services, and then semi-public
commercial services that the card could give them access to (Post
offices, Transport, local services, online police complaints, etc.).
A remarkably transparent system
The “My File” application
A new right for Belgian citizens
The law which accompanied the distribution of the e-ID in Belgium
led the government to offer Belgian citizens the “My File” application,
which can be accessed online, and which allows people to know
who has accessed their personal data. Therefore, a fundamental
democratic principle was complied with: when faced with a new
constraint (digital footprints), provide a new right (transparency).
A record is kept each time National Register data is accessed by
a government official, noting the identity and place of work of the
official who accessed the personal data of a citizen and the date
of access.
The citizen can then consult their personal databases, in the six months
following access. A query or complaints form is made available to
citizens, who can request that the government provide a justification
for the recorded access. Police forces, by the very nature of their
duties, are of course exempt from this requirement.
5. 5
TheBelgianfederalgovernmenthasadoptedaresolutelyentrepreneurial
approach to e-Government. It has always considered e-Government
as an e-Service responsible for the public domain. The public has
been familiar with e-Services for nearly 7 years, or even more. It does
not distinguish between services. It acclaims innovative services that
promote the user’s needs and show an excellent understanding of the
‘web attitude’, and criticizes those that are still dependent on the service-
provider culture and constraints. The public wants its interests to be put
forward. Consumerism is a fundamental aspect of 21st century culture
and the public sector is no exception: the right service must be provided
to the right person, at the right time, and if possible with the most pro-
active approach.
The service must come to the user and not the opposite. This is a
personalized service; when people log in they are recognized, and their
personal history of dealings with the government are instantly recalled.
Knowing the customer and improving the service requires the right tool.
That tool is marketing. Belgian public authorities considered this was
necessary for the success of the project. Indeed, what is expected in
the private sector should also be expected in the public sector. “There
are no excuses in today’s society for a low quality service in the name
of user equality».
Product
The Belgian public authorities established several user workgroups -
one per “customer” segment (essentially citizens and businesses) - and
creativity workshops. It was important for the priorities and attractiveness
of the services to be in phase to create a strong uptake. “We have of
course focused work on services that use the e-ID card, as it was this
card that we wanted to promote to maximize political success and
recognition.» This is how some services were created that no one thought
possible, such as:
• electronic access via e-ID to local waste collection sites reserved
for residents;
• the ‘Kids ID’ card for the protection of children;
• “Safer Chat”, where credentials must be shown in order to remain
anonymous;
• training and online monitoring of police complaints.
Price
Price elasticity has an effect on public services, particularly if online
access is not mandatory and substitutions are possible (price of the card,
subscription, after-sales, developer kits). “We defined them in a public-
private partnership with our suppliers.”
The price of the card itself was set by taking into account the experiences
of other countries (Finland, Sweden). It was not acceptable for a Belgian
family to pay 35 to 45 Euros per card and per person. The price of the
Belgian Identity Card varies, within a price bracket of 3 to 17 Euros, as
described below.
Basic marketing principles and studies
have therefore been applied
according to the 4 Ps: « Product –
Price – Place – Promotion »
A remarkable implementation approach
The Belgian e-Government is a service for everyone: so it
had to be marketed to the public
6. 6
Furthermore, the child protection service linked to the Kids-ID card, which
was originally going to be a paying service, was finally provided free
of charge.
The equipment distribution network and the ease of access to the service
is a determining factor. “However, we have tried to add a ‘trendy/
fashionable’ side, as we considered that the product was still perceived
as technological by our customers and that was an aspect to be
enhanced.”
So they then created ‘e-ID shops’ where trendy gadgets may be found
and a high uptake by ‘early users’ can be achieved, as this target
population has the potential to recommend and influence segments of
the market where people are less easily convinced.
Promotion
Communication is usually neglected by most e-Government policies.
Unfortunately, communication should be considered as an important
aspect, as a major transformation of the relationship between individuals
and institutions is taking place through the administrative system that
manages public services. Of course, the government is also being
modernized for its own sake as well as for the efficiency of the service
it provides, but the effort to convince citizens and develop loyalty will
continue for at least another 5 to 10 years.
The Federal Government plans to provide a considerable number of
new services allowing the e-ID card to be used to carry out transactions,
and communications were improved in 2009 with a website, and a
large number of local advertising campaigns. The aim is to reach out to
citizens (with the “My eID” bus, for example), and teach them to use the
services, rather than waiting for them to discover them by accident. The
launch of a private-sector service provider without appropriate
media communications would be unthinkable.
There is no reason for the Belgian public service sector to act differently.
The e-ID online shop: a good example of product packaginghere for developers
7. 7
Since the launch of the pilot scheme in 2007, the «Kids-ID», the new
Belgian electronic identity document for children under 12 has been a
success from the start, especially as Belgium has seen some tragedies in
terms of paedophilia and child abductions.
Fedict, the Belgian Federal Public Service in charge of e-Government
projects,launchedthenationwideimplementationofKids-IdinMarch2009.
The Kids-ID project is based upon the combination of an interactive
protection service, an internet service, and a specific version of the
Belgian national ID card. Kids-ID is the same size as a credit card and
holds secure information. It offers three functions:
• It is first and foremost an official electronic identity and travel document
that is compliant with the ICAO standard valid in most European
countries, and contains the identity data and the child’s photo stored
on the electronic chip. The parents’ name is also featured on the card.
• Secondly, it protects the child in emergency situations. If the child
is lost or has an accident, the card features a telephone number
that can be used to contact the child’s relatives. The caller dials the
special number, entering the eleven digits which identify the child on
the national register. The call is immediately transferred to the first
number in a list that may feature up to seven contacts, selected by the
parents when the card was issued. If this person cannot be reached,
the call is redirected to the second number in the list, and so on,
until somebody answers. If none of the contacts can be reached, the
request is redirected to Child Focus, a Belgian foundation for child
assistance, accessible 24/7, which can be assisted by the national
police force if required.
• Lastly, the Kids-ID card may be used on the internet for safer access
to online chat rooms and for services requiring ID. An integrated PIN
code automatically identifies children and only allows them access
to those internet services that they are allowed to use
Highly secure, these cards offer endless possibilities. In the near future, it
is envisaged that they may be used as library cards, sports membership
cards or perhaps even school attendance cards. It is also expected to
replace the Social Security (SIS) card for children.
A remarkable service-oriented application
Kids-ID: Belgian child protection services, both within
Belgium and abroad
Kids-ID is not compulsory for children remaining in Belgium. Parents
may, if they wish, activate the cascading call service, by telephone or
via this website, available in three languages. A 3 Euro contribution
to the cost of the card is invoiced to local authorities. Kids-ID is a
fine example of cooperation with Child Focus, the Foundation for
Missing and Sexually-Abused Children, a member of Missing
Children Europe. Communications are focused on parents, and
promoted by local authorities.
At the start of 2011, 42% of Belgian children had one of these