1 / 29

Report of the Identity Theft Prevention and Identity Management Standards Panel

Report of the Identity Theft Prevention and Identity Management Standards Panel. Webinar on the Release of the IDSP Report January 31, 2008. Webinar Agenda Speaker Introductions – IDSP Chair Overview of IDSP Process and Deliverables – IDSP Chair

calder
Download Presentation

Report of the Identity Theft Prevention and Identity Management Standards Panel

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Report of the Identity Theft Prevention and Identity Management Standards Panel Webinar on the Release of the IDSP Report January 31, 2008

  2. Webinar Agenda • Speaker Introductions – IDSP Chair • Overview of IDSP Process and Deliverables – IDSP Chair • Findings and Recommendations – IDSP Working Group Co-Chairs • Industry Analyst Perspectives • Question & Answer Period .

  3. Today’s Speakers IDSP Chairman (Master of Ceremonies) Joseph V. Gurreri, III President, CorporatePlanningGroup.NET Former VP, General Manager, Global Solutions Development TransUnion .

  4. Today’s Speakers (contd.) Co-Chairs Working Group 1 - Issuance James E. Lee President, C2M2 Associates, LLC Former SVP and Chief Public & Consumer Affairs Officer ChoicePoint James X. Dempsey Policy Director Center for Democracy and Technology .

  5. Today’s Speakers (contd.) Co-Chairs Working Group 2 - Exchange Julie Fergerson VP of Emerging Technologies Debix, The Identity Protection Network Working Group 3 - Maintenance George K. “Chip” Tsantes EVP and Chief Technology Officer Intersections Inc. .

  6. Today’s Speakers (contd.) Industry Analysts James Van Dyke President and Founder Javelin Strategy & Research Larry Ponemon Founder and Chairman Ponemon Institute .

  7. What is the IDSP? • Cross-sector coordinating body focused on preventing ID Theft • Identify existing standards, guidelines and best practices • Analyze gaps, need for new standards, leading to improvements • Make catalogue available to businesses, government, consumers • Jointly administered by the American National Standards Institute (ANSI) and the Better Business Bureau (BBB) • ANSI – coordinator of the U.S. standardization system • BBB – advancing trust in the marketplace • Launched September 13, 2006 – a 16 month effort • 165 representatives from 78 organizations

  8. Charter

  9. Founding PartnersA diverse group of organizations

  10. AARP Accredited Standards Committee X9 Affinion Group Alliance for Telecommunications Industry Solutions American Financial Services Assn. AOL LLC ARMA International Center for Democracy and Technology Debix Fellowes, Inc. General Services Administration KPMG National Institute of Standards and Technology North American Security Products Organization Pay By Touch Telecommunications Industry Assn. Underwriters Laboratories Inc. Steering CommitteeComposition • Chairman – Joseph V. Gurreri, III • Founding Partners • At Large Members

  11. Working GroupsDefinitions WG 1 Issuance • Standards relating to issuance of identity documents by government and commercial entities WG 2 Exchange • Standards relating to acceptance and exchange of identity information WG 3 Maintenance • Standards relating to ongoing maintenance and management of identity information

  12. First DeliverableStandards Inventory – Volume II, Final Report • Working Groups Catalogued into a SINGLE Resource . . . • Existing Standards, Guidelines and Best Practices • PRIVATE AND PUBLIC SECTOR • Laws / Regulations • Proposed Legislation • White Papers • Conformity Assessment Programs • Glossaries of Identity Terms • Research Studies / Reports • Market Survey and ANSI Database Search filled out Inventory

  13. Sample EntryStandards Inventory – Volume II, Final Report SAMPLE

  14. Second DeliverableFindings and Recommendations – Volume I, Final Report • WGs Described / Prioritized Identity Fraud-Related Problems • Considered Range of Possible Solutions to Identify Gaps • New Account Processing Identified as a Risk Scenario • Two Process Flows Created to Facilitate Gap Analysis • Birth of a Citizen and Acquisition of ID Credentials • Typical New Account Establishment Procedure • WGs Performed Gap Analysis Against these Flows / Identified Problem Areas • Considered Items Referenced in Standards Inventory • Plenary Meeting / Full Panel Discussion • Drafting / Review of Report and Recommendations

  15. Issuance of Identity CredentialsEnhance Security of Issuance Process Recommendation #1 • Issue standards for birth certificates and Social Security cards • National Ctr. for Health Statistics and Social Security Admin. should do so under Intelligence Reform and Terrorism Prevention Act of 2004 • Improve communication / cooperation between government agencies and private sector • National Assn. for Public Health Statistics & Information Systems should expand to government agencies use of Electronic Verification of Vital Events system

  16. Issuance of Identity CredentialsEnhance Security of Issuance Process (contd.) Recommendation #1 • Government / industry should dialogue about cross-application of existing security standards for identity issuance processes, and new standards development as appropriate • Government / commercial ID issuers should give further attention to secure delivery of credentials to end user

  17. Issuance of Identity CredentialsAugment Private Sector Commercial Issuance Processes Recommendation #2 • Government / industry need to dialogue about greater interoperability between public / private sector ID theft prevention mechanisms • Private sector could benefit from appropriate and secure access to government vital records systems

  18. Issuance of Identity CredentialsImprove the Integrity of Identity Credentials Recommendation #3 • Document Security Alliance and North American Security Products Organization (NASPO) should proceed with project to measure effectiveness of document security technologies • Department of Homeland Security should work with issue stakeholders to develop adversarial testing standards • NASPO, SIA and SEMI in North America – and CEN in Europe – should proceed with standards for secure serialization anti-counterfeiting technology

  19. Exchange of Identity DataStrengthen Best Practices for Authentication Recommendation #4 • Financial Institutions and credit grantors should take into account level of risk, cost and convenience when determining an appropriate authentication procedure • Should not use easily-obtainable personal information such as Social Security numbers as sole authenticators • Financial regulatory agencies and FFIEC are encouraged to review the sufficiency of authentication practices for online banking

  20. Exchange of Identity DataStrengthen Best Practices for Authentication (contd.) Recommendation #4 • Industry and standards developers are encouraged to continue to develop trusted networks for multi-factor mutual authentication • Public and private sectors should implement systems to allow physical ID documents to be validated in real time • FTC and financial regulatory agencies should provide guidance on best practices for credit grantors responding to fraud alerts

  21. Exchange of Identity DataStrengthen Best Practices for Authentication (contd.) Recommendation #4 • Social Security Admin. should work with private sector on a mechanism that enables companies to verify if a Social Security number belongs to a minor • Stakeholders should consider best practices / consumer education to help protect the elderly and terminally ill from fiduciary abuse • Social Security Admin. should work with states and private sector to improve notification when someone is classified as deceased • FTC should consider enhanced ID theft protection for active duty military

  22. Exchange of Identity DataIncrease Understanding / Usability of Security Freezes Recommendation #5 • Lenders, government agencies, consumer advocacy groups, credit reporting agencies and others should continue to support consumer education on benefits and limitations of security freezes

  23. Maintenance of Identity InformationEnhance Data Security Management Best Practices Recommendation #6 • ISO/IEC, PCI Security Standards Council, NASPO and other standards developers should review / augment existing data security management standards (or develop new ones) to: • Define the frequency of periodic employee security training and content of an employee awareness program • Clarify requirements for data access credentialing and background checks • Provide guidance on continuous review of access credentials and privileges

  24. Maintenance of Identity InformationEnhance Data Security Management Best Practices (contd.) Recommendation #6 • Develop targeted guidance for industry sectors that are not regulated or that do not have standards • Provide guidance to ensure downstream vendors are secure • Implement an ongoing program of security re-evaluation • Develop a security breach risk assessment for insurance purposes

  25. Maintenance of Identity InformationAugment Best Practices for Sensitive Data Collection, Retention and Access Recommendation #7 • Industry, Small Business Admin., Chambers of Commerce and similar organizations need to develop and distribute practical guidance for small businesses on data collection, retention and access • Industry and key government stakeholders (FTC, OMB, SSA) need to develop uniform guidance on the collection, use and retention of Social Security numbers

  26. Maintenance of Identity InformationCreate Uniform Guidance on Data Breach Notification and Remediation Recommendation #8 • Issue stakeholders need to dialogue on the desirability / feasibility of developing a private sector standard for data breach notification, recognizing there are tradeoffs • Industry should assemble a cross-sector forum to develop uniform guidance on consumer remediation in the event of a data compromise • Issue stakeholders should educate / reinforce ID theft prevention strategies to consumers

  27. Industry Analyst Perspectives James Van Dyke President and Founder Javelin Strategy & Research Larry Ponemon Founder and Chairman Ponemon Institute .

  28. Question & Answer Period .

  29. For more information,or to download the Report,please visitwww.ansi.org/idspThank You! .

More Related