Personal data residing or in transit, across and between administration networks
are the focus of extensive security efforts. Encryption should be deployed judiciously.
In this presentation, check how we safeguard information, processes and procedures
in three practical cases:
• Data-processing tools to fight social fraud (OASIS datawarehouse)
• Sign and deposit of notary acts (e-Depot platform)
• Identity Management at European-level (Services directive)
The document summarizes a .NET developer's portfolio consisting of several library management system projects. The projects were developed across multiple phases, starting with a Windows desktop application and expanding to a web application, web service, and additional features. The final portfolio spanned 6 projects with over 10,000 lines of C# code to support a full-featured library system.
Leisa Fox gave a presentation about the resources and advantages of doing business in Iowa. She discussed Iowa's natural resources including agriculture, energy sources, and transportation infrastructure. She also highlighted Iowa's educated workforce, quality of life factors such as affordable cost of living and short commute times, and business-friendly climate and incentives. Throughout her presentation she provided examples of Iowa companies and business leaders that have found success in the state. Her overall message was that with Iowa's preparation and opportunities, business owners are lucky and well-positioned to succeed there.
This document provides an overview of cross media marketing strategies. It discusses how combining multiple marketing channels like direct mail, email, web pages, and advertising can deliver a unified message and drive respondents to a single data collection point. The document outlines four steps for effective cross media campaigns: 1) developing customer personas, 2) determining available assets, 3) leveraging existing marketing efforts, and 4) selecting targeted touches and executing the campaign. Specific techniques are also described, including real-time personalization, variable data printing, personalized URLs, email, social media, QR codes, and direct mail best practices. The goal is to capture visitors across channels, group respondents, and deliver personalized messages to improve response rates and ROI.
This document discusses how emojis, emoticons, and text speak can be used to teach students. It provides background on the origins of emoticons in 1982 as ways to convey tone and feelings in text communications. It then suggests that with text speak and emojis, students can translate, decode, summarize, play with language, and add emotion to language. A number of websites and apps that can be used for emoji-related activities, lessons, and discussions are also listed.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationCDB Consultancy LLC
The document discusses the opportunity for the mortgage industry to transition from paper-based to electronic processes ("E"). It outlines how the Uniform Electronic Transactions Act and other laws have established a legal framework for electronic records and signatures. The document then provides examples of how electronic mortgages, e-recordings, and e-servicing could streamline processes, reduce costs, and improve efficiency compared to traditional paper-based methods. It emphasizes the importance of change management strategies like executive sponsorship, cross-functional teams, and developing a roadmap when implementing new electronic systems and processes.
Dutch Cadastre, UNECE/WPLA Conference, Frank Tierolff LLMLandRegistry
Dutch Cadastre, UNECE/WPLA Conference, Frank Tierolff LLM
Director of Land Registration and Land Consolidation
Cadastre, National Land Registry and Mapping Agency
The document summarizes a .NET developer's portfolio consisting of several library management system projects. The projects were developed across multiple phases, starting with a Windows desktop application and expanding to a web application, web service, and additional features. The final portfolio spanned 6 projects with over 10,000 lines of C# code to support a full-featured library system.
Leisa Fox gave a presentation about the resources and advantages of doing business in Iowa. She discussed Iowa's natural resources including agriculture, energy sources, and transportation infrastructure. She also highlighted Iowa's educated workforce, quality of life factors such as affordable cost of living and short commute times, and business-friendly climate and incentives. Throughout her presentation she provided examples of Iowa companies and business leaders that have found success in the state. Her overall message was that with Iowa's preparation and opportunities, business owners are lucky and well-positioned to succeed there.
This document provides an overview of cross media marketing strategies. It discusses how combining multiple marketing channels like direct mail, email, web pages, and advertising can deliver a unified message and drive respondents to a single data collection point. The document outlines four steps for effective cross media campaigns: 1) developing customer personas, 2) determining available assets, 3) leveraging existing marketing efforts, and 4) selecting targeted touches and executing the campaign. Specific techniques are also described, including real-time personalization, variable data printing, personalized URLs, email, social media, QR codes, and direct mail best practices. The goal is to capture visitors across channels, group respondents, and deliver personalized messages to improve response rates and ROI.
This document discusses how emojis, emoticons, and text speak can be used to teach students. It provides background on the origins of emoticons in 1982 as ways to convey tone and feelings in text communications. It then suggests that with text speak and emojis, students can translate, decode, summarize, play with language, and add emotion to language. A number of websites and apps that can be used for emoji-related activities, lessons, and discussions are also listed.
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems?
Here’s what AI learnings your business should keep in mind for 2017.
E To The Rescue: Opportunity in Mortgage Servicing and Loss MitigationCDB Consultancy LLC
The document discusses the opportunity for the mortgage industry to transition from paper-based to electronic processes ("E"). It outlines how the Uniform Electronic Transactions Act and other laws have established a legal framework for electronic records and signatures. The document then provides examples of how electronic mortgages, e-recordings, and e-servicing could streamline processes, reduce costs, and improve efficiency compared to traditional paper-based methods. It emphasizes the importance of change management strategies like executive sponsorship, cross-functional teams, and developing a roadmap when implementing new electronic systems and processes.
Dutch Cadastre, UNECE/WPLA Conference, Frank Tierolff LLMLandRegistry
Dutch Cadastre, UNECE/WPLA Conference, Frank Tierolff LLM
Director of Land Registration and Land Consolidation
Cadastre, National Land Registry and Mapping Agency
In this session we will go through the basics of claims based authentication. What is it and what does it bring to the table? We will provide an overview of some basic and more advanced scenarios in which you would want to use claims based authentication. We will also touch upon related concepts like federated identity and single sign-on.
Furthermore, we will cover some real world implementation tips that might come in handy when considering claims based authentication before taking this route. There are some very common issues that you better be aware of.
This session is primarily targeted at SharePoint administrators, e.g. we won't go into details on development topics such as custom claims providers although we will touch upon the subject.
Electronic document interchange (EDI) allows businesses to exchange documents like orders and invoices electronically instead of using paper. EDI standards were developed to facilitate this exchange between trading partners in a consistent format. Using EDI provides benefits like reduced errors, faster processing, lower costs, and access to electronic data. While early systems required custom formats for each partner, evolving standards now allow any partners using the same standard to exchange documents electronically. SAP systems support EDI using IDocs to represent documents that are exchanged securely and asynchronously between different systems.
CreditUnionVMS is a centralized system for managing vendor contracts and assessing risks. It allows credit unions to [1] easily access and organize all vendor contracts and terms, [2] set automatic alerts for expiring contracts to avoid renewals, and [3] assess vendor risks through a standardized questionnaire and rating system. The system also provides reporting on vendor costs and oversight to help credit unions manage expenses and meet compliance requirements.
This document summarizes how digital signatures are implemented in PDF documents. It discusses the need for integrity, authenticity and non-repudiation that digital signatures provide. It covers basic concepts like hashing, encryption and digital signatures. It then explains how these concepts are applied specifically to PDF, following standards like ISO 32000 and PAdES. It discusses server-side signing, client-side signing and deferred signing architectures. It also covers how digital signatures can be used in document workflows and long-term validation strategies like revocation, timestamps and document security stores.
The document discusses collaborative security for protecting financial critical infrastructures. It describes how financial institutions are increasingly exposed to coordinated cyber attacks. It then introduces the CoMiFin platform, which uses semantic rooms to allow financial organizations to collaboratively monitor for threats, detect fraud, and share threat information in real time. Key features of the CoMiFin platform include its use of private and public cloud deployments, its complex event processing capabilities through tools like AGILIS and Esper, and its semantic rooms for detecting specific attacks like stealthy port scanning and correlating fraud events across organizations. The platform has received several awards and has been evaluated positively by major financial organizations for its potential business value.
comprehensive lane histories and
carrier databases that allow you to
quickly find carriers that have hauled
specific lanes in the past. This
information is invaluable when you
need to find a carrier for a new or
unusual lane.
Network FOB is one of the fastest growing third party logistics firms with over 100 agents across the US. They offer competitive commissions of up to 80%, paperless archiving, and ultra-fast agent support. The software and tools provided give agents access to rate data, carrier performance monitoring, and tools to find carriers for new lanes based on historical shipping data. Agents are also set up for success through training and credit/account setup assistance during the transition to Network FOB.
This deck was our presentation during the GSMA Joyn Innovation Challenge presentation in Berlin Nov, 8th, 2012 to the developers audience. It is explained briefly our architecture to exoser RCS as REST API and use cases as example.
According to the document, reported database thefts increased 37% from 2011 to the previous year. The document discusses how personal identity data has become a commodity that is bought and sold online. As the value of this data has decreased over time, the number of databases and amount of personal data collected has dramatically increased, fueling more database thefts. The document provides examples of how easily databases can be accessed without authorization, examines the profile of most database thieves, and provides best practices for database security to help prevent further theft.
The document discusses Brian Culver's contact information and thanks attendees for participating in the first ever SharePoint Saturday event in the greater Houston area. It then provides an overview of claim-based authentication in SharePoint and how it allows for mixed authentication models across web applications and zones with different authentication types like Windows, Forms Based Authentication, and SAML. The document concludes by reminding attendees to complete a session evaluation form.
Zero Visibility: Critcality of Centralized Log Management - v1asherad
This document discusses the criticality of centralized logging for IT security. It outlines how attacks have evolved from nuisances targeting technical issues to targeting businesses and individuals for money. Compliance regulations now require extensive logging and retention of logs for proof of security and auditing. However, most current IT infrastructures lack centralized logging, making it difficult to meet compliance requirements or perform forensic investigations of security incidents. Potential solutions involve implementing centralized log management to address business objectives around compliance, security operations, and IT operations.
E-commerce transaction validation using IMS Claude Florin
The document proposes leveraging the IMS architecture to provide a validation service for e-commerce transactions, which would serve as a trusted third party to validate transactions between buyers and merchants, enhancing security by adding stronger authentication and supporting anonymous transactions while protecting buyers' privacy. The validation service would complement existing payment clearinghouse services and enable additional capabilities for micro-payments and mobile billing splits.
Transaction-based Capacity Planning for greater IT Reliability™ webinar Metron
Do you need to predict the true impact of business growth for a specific department or product line?
Are you unsure which infrastructure items (servers and their logical software components) are serving which business applications and on which tiers response time for your transactions are taking place?
Now you can get a valuable insight into the performance across all tiers of your enterprise data center environments.
We’ll show you how you can combine business forecast information with infrastructure performance metrics and predict whether you have sufficient capacity to meet the needs of your business at both the component and service levels.
Join us and find out how the combination of Correlsense SharePath and Metron athene® will provide you with a complete Capacity Management solution
The document discusses the Real Estate Transaction Standard (RETS) which is a data transport standard that allows real estate listing data to be shared across different systems. RETS facilitates the sharing of listing data from MLS systems to client applications, brokers' websites, and syndication portals. It outlines how RETS works and the various stakeholders involved, from MLSs that provide listing data to vendors that develop client applications, syndication portals, and brokers' websites that consume and display listing data. The document also discusses the need for data standards to ensure consistency in naming and formatting of real estate listing data fields across different geographies and systems.
This document summarizes a presentation on the UNICORE Server Components. It discusses how UNICORE provides a web services framework for job submission and management across different computing resources. Key points include:
- UNICORE uses a gateway, service containers, and atomic services to expose target systems through standardized web service interfaces.
- Atomic services include job management, storage management, and file transfer services that abstract access to underlying systems.
- Security is provided through authentication with XUUDB and authorization controlled by XACML policies.
- Ongoing development focuses on areas like license management, meta-scheduling, monitoring, and improved data and MPI support.
This document summarizes a presentation on the UNICORE Server Components. It discusses how UNICORE provides a web services framework for job submission and management across different computing resources. Key points include:
- UNICORE uses a gateway, service containers, and atomic services to expose target systems through standardized web service interfaces.
- Atomic services include job management, storage management, and file transfer services that provide abstract access to computing jobs and files on remote systems.
- Security is handled through XUUDB authentication, XACML authorization policies, and message signing. Configurable security handlers provide flexibility.
The document discusses four projects from 2003-2006 that explored using information and communication technologies (ICT) to improve judicial services. It summarizes each project: [1] Austria focused on automating exchanges between lawyers and courts; [2] Finland emphasized accessibility, user-friendliness, and empowering citizens; [3] Italy focused on security, privacy and automating transactions for professionals; [4] the UK and Wales aimed to reduce costs by bypassing legal representation. The research examined how ICT interacts with institutions and can trigger healthy or unhealthy institutional dynamics during development of e-services.
This document describes an intelligent society management software called iSoty. It provides the following key functions:
1. Allows housing societies and other organizations to manage their operations online through centralized communication and participation from members.
2. Offers features like user management, bylaws, announcements, asset management, trouble tickets, discussions, surveys, documents, rental forms, news, meetings, library management, facilities booking and events management.
3. The software can be used as a hosted solution with monthly subscription or an installed version for on-premise hosting and management. It aims to bring efficiency through automation and enhance participation for members.
BankerVMS is a vendor management system that helps banks organize vendor contract information, assess vendor risks, monitor costs, and generate reports to assist with compliance, management, and expense control. It provides a central repository for electronic contracts, alerts for expiring contracts, risk assessments of vendors, and customizable dashboards and reports. Customers praise how it helps gain efficiencies in vendor negotiations and oversight in order to reduce costs and risks.
The Belgian interoperability implementation and the European Interoperability framework are explained. Presentation held by Mr. Frank Leyman, within the first session of the FORUM „INFORMATION TECHNOLOGY IN GOVERNMENT”, dedicated to interoperability, held at Chisinau, January 16th 2012.
More Related Content
Similar to Information Society with Absolute Trust in the Services
In this session we will go through the basics of claims based authentication. What is it and what does it bring to the table? We will provide an overview of some basic and more advanced scenarios in which you would want to use claims based authentication. We will also touch upon related concepts like federated identity and single sign-on.
Furthermore, we will cover some real world implementation tips that might come in handy when considering claims based authentication before taking this route. There are some very common issues that you better be aware of.
This session is primarily targeted at SharePoint administrators, e.g. we won't go into details on development topics such as custom claims providers although we will touch upon the subject.
Electronic document interchange (EDI) allows businesses to exchange documents like orders and invoices electronically instead of using paper. EDI standards were developed to facilitate this exchange between trading partners in a consistent format. Using EDI provides benefits like reduced errors, faster processing, lower costs, and access to electronic data. While early systems required custom formats for each partner, evolving standards now allow any partners using the same standard to exchange documents electronically. SAP systems support EDI using IDocs to represent documents that are exchanged securely and asynchronously between different systems.
CreditUnionVMS is a centralized system for managing vendor contracts and assessing risks. It allows credit unions to [1] easily access and organize all vendor contracts and terms, [2] set automatic alerts for expiring contracts to avoid renewals, and [3] assess vendor risks through a standardized questionnaire and rating system. The system also provides reporting on vendor costs and oversight to help credit unions manage expenses and meet compliance requirements.
This document summarizes how digital signatures are implemented in PDF documents. It discusses the need for integrity, authenticity and non-repudiation that digital signatures provide. It covers basic concepts like hashing, encryption and digital signatures. It then explains how these concepts are applied specifically to PDF, following standards like ISO 32000 and PAdES. It discusses server-side signing, client-side signing and deferred signing architectures. It also covers how digital signatures can be used in document workflows and long-term validation strategies like revocation, timestamps and document security stores.
The document discusses collaborative security for protecting financial critical infrastructures. It describes how financial institutions are increasingly exposed to coordinated cyber attacks. It then introduces the CoMiFin platform, which uses semantic rooms to allow financial organizations to collaboratively monitor for threats, detect fraud, and share threat information in real time. Key features of the CoMiFin platform include its use of private and public cloud deployments, its complex event processing capabilities through tools like AGILIS and Esper, and its semantic rooms for detecting specific attacks like stealthy port scanning and correlating fraud events across organizations. The platform has received several awards and has been evaluated positively by major financial organizations for its potential business value.
comprehensive lane histories and
carrier databases that allow you to
quickly find carriers that have hauled
specific lanes in the past. This
information is invaluable when you
need to find a carrier for a new or
unusual lane.
Network FOB is one of the fastest growing third party logistics firms with over 100 agents across the US. They offer competitive commissions of up to 80%, paperless archiving, and ultra-fast agent support. The software and tools provided give agents access to rate data, carrier performance monitoring, and tools to find carriers for new lanes based on historical shipping data. Agents are also set up for success through training and credit/account setup assistance during the transition to Network FOB.
This deck was our presentation during the GSMA Joyn Innovation Challenge presentation in Berlin Nov, 8th, 2012 to the developers audience. It is explained briefly our architecture to exoser RCS as REST API and use cases as example.
According to the document, reported database thefts increased 37% from 2011 to the previous year. The document discusses how personal identity data has become a commodity that is bought and sold online. As the value of this data has decreased over time, the number of databases and amount of personal data collected has dramatically increased, fueling more database thefts. The document provides examples of how easily databases can be accessed without authorization, examines the profile of most database thieves, and provides best practices for database security to help prevent further theft.
The document discusses Brian Culver's contact information and thanks attendees for participating in the first ever SharePoint Saturday event in the greater Houston area. It then provides an overview of claim-based authentication in SharePoint and how it allows for mixed authentication models across web applications and zones with different authentication types like Windows, Forms Based Authentication, and SAML. The document concludes by reminding attendees to complete a session evaluation form.
Zero Visibility: Critcality of Centralized Log Management - v1asherad
This document discusses the criticality of centralized logging for IT security. It outlines how attacks have evolved from nuisances targeting technical issues to targeting businesses and individuals for money. Compliance regulations now require extensive logging and retention of logs for proof of security and auditing. However, most current IT infrastructures lack centralized logging, making it difficult to meet compliance requirements or perform forensic investigations of security incidents. Potential solutions involve implementing centralized log management to address business objectives around compliance, security operations, and IT operations.
E-commerce transaction validation using IMS Claude Florin
The document proposes leveraging the IMS architecture to provide a validation service for e-commerce transactions, which would serve as a trusted third party to validate transactions between buyers and merchants, enhancing security by adding stronger authentication and supporting anonymous transactions while protecting buyers' privacy. The validation service would complement existing payment clearinghouse services and enable additional capabilities for micro-payments and mobile billing splits.
Transaction-based Capacity Planning for greater IT Reliability™ webinar Metron
Do you need to predict the true impact of business growth for a specific department or product line?
Are you unsure which infrastructure items (servers and their logical software components) are serving which business applications and on which tiers response time for your transactions are taking place?
Now you can get a valuable insight into the performance across all tiers of your enterprise data center environments.
We’ll show you how you can combine business forecast information with infrastructure performance metrics and predict whether you have sufficient capacity to meet the needs of your business at both the component and service levels.
Join us and find out how the combination of Correlsense SharePath and Metron athene® will provide you with a complete Capacity Management solution
The document discusses the Real Estate Transaction Standard (RETS) which is a data transport standard that allows real estate listing data to be shared across different systems. RETS facilitates the sharing of listing data from MLS systems to client applications, brokers' websites, and syndication portals. It outlines how RETS works and the various stakeholders involved, from MLSs that provide listing data to vendors that develop client applications, syndication portals, and brokers' websites that consume and display listing data. The document also discusses the need for data standards to ensure consistency in naming and formatting of real estate listing data fields across different geographies and systems.
This document summarizes a presentation on the UNICORE Server Components. It discusses how UNICORE provides a web services framework for job submission and management across different computing resources. Key points include:
- UNICORE uses a gateway, service containers, and atomic services to expose target systems through standardized web service interfaces.
- Atomic services include job management, storage management, and file transfer services that abstract access to underlying systems.
- Security is provided through authentication with XUUDB and authorization controlled by XACML policies.
- Ongoing development focuses on areas like license management, meta-scheduling, monitoring, and improved data and MPI support.
This document summarizes a presentation on the UNICORE Server Components. It discusses how UNICORE provides a web services framework for job submission and management across different computing resources. Key points include:
- UNICORE uses a gateway, service containers, and atomic services to expose target systems through standardized web service interfaces.
- Atomic services include job management, storage management, and file transfer services that provide abstract access to computing jobs and files on remote systems.
- Security is handled through XUUDB authentication, XACML authorization policies, and message signing. Configurable security handlers provide flexibility.
The document discusses four projects from 2003-2006 that explored using information and communication technologies (ICT) to improve judicial services. It summarizes each project: [1] Austria focused on automating exchanges between lawyers and courts; [2] Finland emphasized accessibility, user-friendliness, and empowering citizens; [3] Italy focused on security, privacy and automating transactions for professionals; [4] the UK and Wales aimed to reduce costs by bypassing legal representation. The research examined how ICT interacts with institutions and can trigger healthy or unhealthy institutional dynamics during development of e-services.
This document describes an intelligent society management software called iSoty. It provides the following key functions:
1. Allows housing societies and other organizations to manage their operations online through centralized communication and participation from members.
2. Offers features like user management, bylaws, announcements, asset management, trouble tickets, discussions, surveys, documents, rental forms, news, meetings, library management, facilities booking and events management.
3. The software can be used as a hosted solution with monthly subscription or an installed version for on-premise hosting and management. It aims to bring efficiency through automation and enhance participation for members.
BankerVMS is a vendor management system that helps banks organize vendor contract information, assess vendor risks, monitor costs, and generate reports to assist with compliance, management, and expense control. It provides a central repository for electronic contracts, alerts for expiring contracts, risk assessments of vendors, and customizable dashboards and reports. Customers praise how it helps gain efficiencies in vendor negotiations and oversight in order to reduce costs and risks.
The Belgian interoperability implementation and the European Interoperability framework are explained. Presentation held by Mr. Frank Leyman, within the first session of the FORUM „INFORMATION TECHNOLOGY IN GOVERNMENT”, dedicated to interoperability, held at Chisinau, January 16th 2012.
Similar to Information Society with Absolute Trust in the Services (20)
Information Society with Absolute Trust in the Services
1. Gov IT Summit 2009 – Antwerpen, 21 Septembre 2009
Information Society
with Absolute Trust in the Services
Luc Gathy
page 1
2. What citizens expect ?
Factors encouraging the use of e-ID
The assurance that the law on data protection is complied with
The guarantee that the data is not sold on or re-used
A label or logo proving that the service is secure
An individual file of my data and transactions so that I know
what information about me is held
Obtaining a receipt after providing information
Information on the information system
Information on how the data I have provided is used
Testimonies of people who have used the system.
page 2
3. What citizens expect ?
Factors encouraging the use of e-Services
If my privacy is completely respected
If I can choose which personal data I want to provide
If the service is free
If the service saves me time
If it is very easy to register
If my friends have strongly recommended it to me
Who should offer these services
A government organization (federal, local),
A company, a specialist service provider
A non-profit organization
page 3
4. To summarize ...
Active and responsible relation is expected with Public Services
Simplification and rapidity as issuing conditions to the usage of e-
Services to organize “my” everiday life
Transparency
Methods of conserving and consulting data
Conditions for storing this data
Controls in place, also for subcontractors involved in processing
the personal data
Consistency intra- and between platforms (codes, signs and products)
No extra cost
page 4
5. e-Depot :Overview
Notary
1 2 3 4 5
e-Notariat
interface
Consult Monitor the
Write deed Deposit digital Update e-Gov
authentic status of
and extracts deed sources
sources deposits
e-Gov
interface
Moni-
National Bis Company Justice teur
register register register files Belge (*)
Dep. Social
Inneres security Dep. Economy Department Justice
(*) Belgian Official Gazette
Clerk Citizen
page 5
6. e-Depot: Partnership & SOA infrastructure
Tracebility through “Certificates chain”
and “Timestamping” (XAdES standards) Social Server
KSZ security NationalServer
RRN register
Server Server
L
AM
n
rtio
üS
(3)
se
as
Logs
Notaris 4
Notary 4
eID
Real Server Server r
Card certificaat certificaat Nat N 4
1 Nat Nr eID 2 Nat Nr eID
Notaris
Notary KFBN Server
FRNB Server Federal Server
FSB
service
bus (FSB) Server
6 5/7
Notaris
Notary
FOD/Justitie
Dep. Justice FOD/Economie
Dep. Economy
Server Server
Server Server
page 6
7. e-Depot: New workflow
Find physical(s) person(s)
FPHP by National number Dep.
RRN
Inneres
Notary
Notariaat Find foreign natural
person(s) Social
KSZ
security
Creation / Update of data
FMOP
Find a moral person (company’s /
enterprise’s) FOD
Dep.
FRNB Portal economy
Economie Deed preparation
PRSU Deed processing
Federal service bus (FSB)
Creation of a new enterprise Dep.
FOD
( New Enterprise number created )
economy
Economie
KFBN FSB -NOT
-
Deposition of deeds Dep.
FOD
e-Depot Justice
( Submission of files, Justitie
(web)
number & date of deposit returned )
services
Activation of the enterprise FOD
Dep.
Economie
economy
Publication in the “Moniteur”
Dep. FOD
Dep.
Justice Justitie BS
Justice
( Date of publication)
FPHP = Manage phy sical person details
FMOP = Manage mo ral person details Forward of the final status to Moniteur
the network Dep.
FOD Belge
PRSU = Process sub mittal of an electronic
notary deed
Justice
Justitie
page 7
8. e-Depot: A best practice
We meet the “Trust” requirements:
« Authentic digital
Act
Signed
Electronically »
Recognition:
&
http://www.epractice.eu/cases/edepot
page 8
9. OASIS: Overview
Registre national
DMFA
Dimona
Chômage Chantiers
(ONEM) (Construction)
Travail- Employ-
leurs eurs Comptes &
recouvrements
Actions sur les
«Sources authentiques»
Vue «Employeur »
Déclarations
Vue «Travailleur » Fichier Dettes TVA
TVA
Clients-fournisseurs page 9
13. OASIS: Recognition
“Crime such as fraud cause loss of revenue and require human resources
to trace and handle them. Electronic systems for fraud detection can
increase the detection rate by automatically carrying out checks and
controls.
The Belgian Anti-Fraud Datawarehouse project has developed a model
whereby the need for precious resources in terms of both time and
personnel has been cut and which has enabled more focused
investigations leading to an increased apprehension rate.
This example also illustrates as possible solution to tackle issues related
to security and trust, a major concern for both front and back office users
and for clients.”
Ecrit par Christine Leitner (Head of eEurope Awards Project Management
Secretariat and Senior Lecturer, EIPA Maastricht) dans la revue “Eipascope”
numéro 2004/1 page 40.
More details: http://www.epractice.eu/cases/OASIS2
page 13
14. OASIS: What about « Big Brother » syndrome ?
« Commission for the protection of privacy » special autorisation:
Délibération n° 01/06 du 6 mars 2001 relative à une demande du Ministère
des Affaires sociales, de la Santé publique et de l'Environnement pour la création et la
gestion d'une banque de données OASIS, en vue de la lutte contre la fraude sociale dans les
secteurs de la construction, de la construction métallique, de l'électricité et des parcs et
jardins.
Délibération n° 05/001 du 18 janvier 2005 relative à la création et gestion
de la banque de données OASIS en vue de la lutte contre la fraude sociale - Extension de
l'autorisation comprise dans la délibération n° 01/06 du 6 mars 2001.
Encryption of the personal data
For the detection process
... With limited opportunities to retrieve the original version
In the investigation process
page 14
15. Positioning of Belgium
Reliability of our Civil Register (Parent database)
Contains the “founding documents” upon which identification
security is to be based
A unique identification system
Not multiple unified or partitioned
Traceability of all transactions performed, e.g. by Civil servants
Example: “Mondossier” or “MyFile”
e-ID as an electronic identification system guaranteed by the State
A “Service-oriented” State in construction
For the Individual/Citizen: State’s back office own structure hidden
(“Citizen Centric”), facilitation for learning, promoting the service,
accessibility and responsiveness (face-to-face and electronic)
For government bodies: Migrate from paper-based to electronic
culture, prioritization of the need for transparency, maintain “Social
cohesion”, cross-functional shared framework (for the fluidity of the
processing), Circle of Trust, legal validity of paperless procedures.
page 15
16. Positioning of Belgium
Protection of individual’s privacy and personal data
Principle of “end goals” (bind to mandates) and
“proportionality” (Example: Driving licence = 18 or over No need to
know the age or date of birth)
Five Trusted party commissions for privacy protection,
compartmentalized by domain;
Public-sector administration/Interior ministry
Finance
Health
Social matters
Justice
Introduction or mixed access to commercial and non-commercial
services carried out with great precision.
... And ensuring the public’s interests !
page 16
17. Services Directive: Overview
Abolish restrictive legislation and practices hindering service
providers
Set up Point of Single Contact
Applicants must be able to:
– Find rules and formalities they need to comply with
– Complete applications electronically (submit application forms,
supporting documents, fee payment)
Autorités Compétentes
« Interlocuteur
Prestataire Prestataire unique »
établi de services
Guichet
Unique
Prestataire
non établi
Administration co-operation improved with counterparts in other
EU countries
page 17
18. Services Directive: Issues
Recognition of electronic documents across Member States (MS)
borders, requires:
Common set - or at least understanding – of signature and
document formats (structured and unstructured)
Necessary information for validation of e-Docs
Signature format for (qualified) electronic signature should be
defined
Date of public registers has to be accessible (read only) to
authorities of MS, involves questions:
How to identify a requesting authority? eID LSP STORK
How to search for and find a certain record in accordance with
national data protection rules?
How to retrieve and validate it?
page 18
19. Services Directive: Issues (continue)
Point of Single Contact
Authentication Service Federal Authentication Service
+
Federated Identity and CA
Access Management (FIAM) CA
FAS CA
+
Trust relationship IdP
CA
PsC IdP
SSO
IdP
SP IdP
SP
SP
SP
SP SP IdP: Identity provider
SSO: Single-sign-on
SP: Service provider
CA: Certification authority
page 19
20. Services Directive: Issues (continue)
e-Delivery
service
MS A
Additional
issues
e-Procedure e-Doc safe
MS B
page 20
21. Services Directive: Issues (continue)
National e-delivery systems have to become interoperable:
How can a sending authority find the appropriate messaging
service?
How to interface with it?
How to identify individual recipients and their addresses?
How to get confirmation of delivery and receipt?
Data safes can make online transactions during an official
procedure more efficient, comfortable and user friendly, but:
How to access an e-Document safe of MS A across borders
during an electronic transaction in MS B?
How to retrieve a particular document?
How to authorise public authorities for asynchronous access to
data safes?
Is there a need for a standard document inventory to find
equivalent in other MS?
page 21
22. Services Directive: Issues (continue)
Cross border payment of administrative fees:
Service providers should be able to use their local payment
system (e.g. credit card and online banking) with foreign public
administrations
Common service directory needed:
Description of service interface as well as of process models
Service orientation independently of a particular national portal
Allowing integration (partial or complete) in others MS !
page 22
23. Conclusion
Authority
Trust
Traceability
Transparency
= Four “untouchable” fundamental components !
Included in our future work to avoid…
page 23