![]() The IT architecture defined for this purpose features a clear separation between security services, provided at an infrastructure level, and application services, exposed on the Internet as Web Services. ![]() Technical complexity stems from the need of efficiently supporting this distribution of responsibilities while ensuring, at the same time, interoperability of IT-based systems independent of technical choices of the organizations involved, and fulfilment of privacy constraints. Organizational complexity lies in the distribution of responsibilities for the management of Personal Data Registries (on which identity of people is based) which is an institutional duty of the more than 8000 Italian municipalities, and the need of keeping a centralized control on all processes dealing with identity of people as prescribed by laws and for national security and police purposes. In this paper we describe the overall process of deployment of the Italian Electronic Identity Card: the way it is issued, services it is used for, organizations involved in the process, and the Information Technology (IT) infrastructure enabling the effective management of the whole process while ensuring the mandatory security functions. Individuals can negotiate legally-binding "privacy policies" with their service providers which govern how disclosed per- sonal data can be used and which precautions must be taken to safeguard it, and Individuals can limit the information collected about them by using pseudo-identities, certifications and cryptography when performing online transactions. PRIME's vision is to give individuals sovereignty over their personal data so that. To complement the legal framework, the PRIME (Privacy and Identity Management for Europe) project (13) has implemented a technical framework for processing personal data. In the past decade, the European Union and its member states have implemented a legal framework to provide guidance on pro- cessing of personal data with the specific aim to restore the citizens' control over their data. ![]() In many cases, profiling of personal data is done without the consent of the target individual. ![]() While such profiles can be helpful and improve efficiency, they can also govern opaque decisions about an individual's access to services such as credit or an employment position. As a result, it is becoming more common for businesses to "profile" individuals in order to present more personalized offers as part of their business strategy. The shift from a paper-based to an electronic-based society has dra- matically reduced the cost of collecting, storing and processing in- dividuals' personal information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |