Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- D5.1: A survey on legislation on ID theft in the EU and….
- D5.2: ID Fraud Workshop.
- D5.2b: ID-related Crime: Towards a Common Ground for Interdisciplinary Research.
- D5.2c: Identity related crime in the world of films.
- D5.3: A Multidisciplinary Article on Identity-related Crime.
- D5.4: Anonymity in electronic government: a case-study analysis of governments? identity knowledge.
- D6.1: Forensic Implications of Identity Management Systems.
- D6.5/D6.6: Second thematic Workshop forensic implications.
- D6.7b: Workshop on Forensic Profiling.
- D6.7c: Forensic Profiling.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
Appendix
Table 1: Identification processes, Applying for a tree felling permit
Traditional Electronic
Front office
Asked for Name Social security number
Address
Private phone number
Mobile/business phone number
Place of signature
Date of signature
Signature
Matched with Personal Social security number
Records Database
Gathered Name
Address
Asked for Private phone number
Mobile/business phone number
Email address
Back office
Stored Name Name
Address Address
Private phone number Private phone number
Mobile/business phone number Mobile/business phone number
Place of signature Email address
Date of signature
Signature
MatchedName
Land registry officeAddress
Used
Communication Name Name
Address Address
Legally justifiedName
Address Address
ContactPrivate phone number
Mobile/business phone number Mobile/business phone number
Email address
Personal information in italics is occasionally matched or used.
Table 2: Identification processes, Border passage at Schiphol Airport (part 1)
Traditional Electronic
KMAR KMAR Privium
Before border passage
Asked for Name
Date of birth
Place of birth
Nationality
Type of travel document
Travel document number
Expiry date travel document
Address
Email address
Iris scan
Matched with Passport photo
Individual Year of birth
Height
Used
Card Name
Date of birth
Place of birth
Template of the iris
Contact Name
Address
Table 3: Identification processes, Border passage at Schiphol Airport (part 2)
Traditional Electronic
KMAR KMAR Privium
Border passage to Schengen country
Stored Name
Date of birth
Place of birth
Time and date of passage
Shared with Name
KMAR Date of birth
Place of birth
Time and date of passage
Border passage to non-Schengen country
Asked for Travel document which includes: Privium card which includes:
Name Name
Nationality Date of birth
Date of birth Place of birth
Place of birth Template of the iris
Gender
Height
Personal number
Passport photo
Matched Passport photo Template of the iris
with Height
individual Year of birth
with Name Name
SIS and RBS Date of birth Date of birth
Place of birth Place of birth
Stored (Name) Name
(Date of birth) Date of birth
(Place of birth) Place of birth
(Date of passage) Time of passage
Date of passage
Used
for Passport photo Template of the iris
identification Height
Year of birth
for Name Name
tracing Date of birth Date of birth
Place of birth Place of birth
Shared
with AIVD (Name) (Name)
and MIVD (Date of birth) (Date of birth)
(Place of birth) (Place of birth)
with Name
KMAR Date of birth
Place of birth
Date of passage
Time of passage
For the personal information between brackets, it is unclear whether this information is stored.
17 / 45 |