You are here: Resources > FIDIS Deliverables > Interoperability > D4.7: Review and classification for a FIDIS identity management model > 
Auditing  Title:
FURTHER DESCRIPTION OF THE TABLES
 Incorporating FIDIS research into the proposed identity classification system

 

Further description of the tables

 

  1. Identity 

The identity being specified in the classification system 

  1. Identifier / Credential 

The identifier/credential being specified which relates to the identity 

  1. Importance 

Level of importance of the identifier/credential, which may be high, medium or low; or primary or secondary, which will depend upon its application

  1. Information held by person and other stakeholders 

The identifier/credential, which is held by the person, and by other stakeholders such as an employer or government agency  

Notes:  

  1. Where there may be more than one identifier/credential representing a particular attribute, such as Name or Address, they are stated as Name (n) or Address (n).

  2. Most of the identifiers/credentials are documents that only relate to the person, which can be copied. They do not directly identify the person, as in the case of biological identifiers/credentials. 

  3. The identifiers/credentials, stakeholders, etc, stated in the tables are not exhaustive and will be extended as the work progresses. 

  4. It is envisaged that each country will have its own “names” for government departments, national ID numbers, etc.

  5. The tables provide an overview of the five principles, applicable to most identifiers/ credentials, rather than detailed descriptions for each one.  

 

  1. Roles and responsibilities 

The roles and responsibilities of all stakeholders such as: 

    1. Ensuring information is secure at all times 

    2. Ensuring that the practitioners managing the information are bona fide 

    3. Ensuring staff are aware of pertinent legislation and regulations 

  1. Processes and procedures 

The processes and procedures of all stakeholders for managing the information, such as: 

  1. Ensuring that the identity lifecycle is managed correctly and effectively 

  2. Ensuring that the information is complete, accurate and authorised 

  3. Ensuring interoperability between stakeholders is secure, efficient and effective  

  1. Enabling technologies 

Ensuring that the appropriate technologies, to support and manage, the identity information are in place, such as: 

  1. Card readers 

  2. Biometric scanners 

  3. RFID 

  1. Audit and control 

To audit and control operations relating to identity management including: 

  1. The vetting of personnel 

  2. Compliance with statutes and regulations 

  3. Variances between actual and monitored information 

 

 

 

 

 

 

 

Classification System 

 

Stakeholder: Person        Class 1:  Factual / Physical / Material Attributes (Simple / Singular)

 

Identity 

Secure and protect: 

   Information

   Computer systems

 

Destroy out of date information 

 

Ensure stakeholders  

& representatives are bona fide 

 

Protect:  

   Credit card usage

   Passwords

   PIN numbers

 

Delete unsolicited emails 

 

Monitor regularly: 

   Information

   Computer systems

   Vetting of personnel

 

Comply with statutes & regulations 

 

 

Purpose for use 

 

Application 

 

Lifecycle: 

   Input

   Storage

   Access

   Maintenance

   Deletion

 

Accuracy 

 

Authentication 

 

Authorisation 

 

Confidentiality 

 

Security 

 

Interoperability 

 

Identification 

 

Matching checks 

Paper 

 

Electronic 

  Web

  E-mail

 

Cards: 

  Credit (n)

  Store (n)

  Licence (n)

  Membership (n)

  Etc

 

Voice 

 

Face to face 

 

Camera (n) 

 

Scanner (n) 

 

RFID 

 

PET 

 

TET 

 

Databases 

Ensure all items are bona fide: 

 

Person (n)  

 

Stakeholders & their representatives 

 

Documents and copies 

 

Scans match with originals 

 

Computer systems 

 

Compliance with statutes & regulations 

 

 

 

Classification System 

 

Stakeholder: Person        Class 1:  (Continued)

 

Identity 

Secure and protect: 

   Information

   Computer systems

 

Destroy out of date information 

 

Ensure stakeholders  

& representatives are bona fide 

 

Protect:  

   Credit card usage

   Passwords

   PIN numbers

 

Delete unsolicited emails 

 

Monitor regularly: 

   Information

   Computer systems

   Vetting of personnel

 

Comply with statutes & regulations 

 

 

Purpose for use 

 

Application 

 

Lifecycle: 

   Input

   Storage

   Access

   Maintenance

   Deletion

 

Accuracy 

 

Authentication 

 

Authorisation 

 

Confidentiality 

 

Security 

 

Interoperability 

 

Identification 

 

Matching checks 

Paper 

 

Electronic 

  Web

  E-mail

 

Cards: 

  Credit (n)

  Store (n)

  Licence (n)

  Membership (n)

  Etc

 

Voice 

 

Face to face 

 

Camera (n) 

 

Scanner (n) 

 

RFID 

 

PET 

 

TET 

 

Databases 

Ensure all items are bona fide: 

 

Person (n)  

 

Stakeholders & their representatives 

 

Documents and copies 

 

Scans match with originals 

 

Computer systems 

 

Compliance with statutes & regulations 

 

 

Classification System 

 

Stakeholder: Person        Class 1:  (Continued)

 

Identity 

Secure and protect: 

   Information

   Computer systems

 

Destroy out of date information 

 

Ensure stakeholders  

& representatives are bona fide 

 

Protect:  

   Credit card usage

   Passwords

   PIN numbers

 

Delete unsolicited emails 

 

Monitor regularly: 

   Information

   Computer systems

   Vetting of personnel

 

Comply with statutes & regulations 

 

 

Purpose for use 

 

Application 

 

Lifecycle: 

   Input

   Storage

   Access

   Maintenance

   Deletion

 

Accuracy 

 

Authentication 

 

Authorisation 

 

Confidentiality 

 

Security 

 

Interoperability 

 

Identification 

 

Matching checks 

Paper 

 

Electronic 

  Web

  E-mail

 

Cards: 

  Credit (n)

  Store (n)

  Licence (n)

  Membership (n)

  Etc

 

Voice 

 

Face to face 

 

Camera (n) 

 

Scanner (n) 

 

RFID 

 

PET 

 

TET 

 

Databases 

Ensure all items are bona fide: 

 

Person (n)  

 

Stakeholders & their representatives 

 

Documents and copies 

 

Scans match with originals 

 

Computer systems 

 

Compliance with statutes & regulations 

 

 

 

Classification system 

 

Stakeholder: Person        Class 2:  Abstract / Interpretational Attributes (Complex)

 

Identity 

Secure and protect: 

   Information

   Computer systems

 

Destroy out of date information 

 

Ensure stakeholders  

& representatives are bona fide 

 

Protect:  

   Credit card usage

   Passwords

   PIN numbers

 

Delete unsolicited emails 

 

Monitor regularly: 

   Information

   Computer systems

   Vetting of personnel

 

Comply with statutes & regulations 

 

 

Purpose for use 

 

Application 

 

Lifecycle: 

   Input

   Storage

   Access

   Maintenance

   Deletion

 

Accuracy 

 

Authentication 

 

Authorisation 

 

Confidentiality 

 

Security 

 

Interoperability 

 

Identification 

 

Matching checks 

Paper 

 

Electronic 

  Web

  E-mail

 

Cards: 

  Credit (n)

  Store (n)

  Licence (n)

  Membership (n)

  Etc

 

Voice 

 

Face to face 

 

Camera (n) 

 

Scanner (n) 

 

RFID 

 

PET 

 

TET 

 

Databases 

Ensure all items are bona fide: 

 

Person (n)  

 

Stakeholders & their representatives 

 

Documents and copies 

 

Scans match with originals 

 

Computer systems 

 

Compliance with statutes & regulations 

 

 

 

Auditing  fidis-wp4-del4.7.review_and_classification_01.sxw  Incorporating FIDIS research into the proposed identity classification system
15 / 28