The Secure ID Coalition is an affiliation of companies providing digital security solutions for identification documents, including contactless smart cards. Our mission is to promote the understanding and appropriate use of smart card technology to achieve enhanced security for enhanced ID management systems, while maintaining user privacy.
Such ID management systems include physical and/or logical access to facilities and networks.
Working with the following groups to help lead the charge for secure identification systems
Citizen Privacy Rights
Coalition members support specific citizen privacy rights as follows:
Privacy of personal information as defined by all relevant regulations and laws, principally the body of laws known as the Fair Information Practices.
Confidence that ID documents have been appropriately secured against threats of fraudulent access to personal information.
Secure ID News to Know
According to Secure ID News, the National Institute of Science and Technology (NIST) may be seeking to revise the four-level authentication framework that currently serves as an important piece of secure identity assurance. The framework is embodied in NIST Special Publication 800-63, a technical document that maps out each of the four levels, and serves as a crucial guide to stakeholders concerned with secure authentication practices.Read more...
Check out this in-depth exposé by The Washington Post on the enormous Medicare power wheelchair scam. The piece blames Medicare's "weak defenses against fraud" as the primary reason for the scandal.Read more...
Unless you've been living under a rock, you've likely heard about the celebrity photo hacking incident that targeted high profile Apple users. The breach comes at a time when Apple has begun doubling down on its cloud services. According to the Wall Street Journal, the attack was successful due to a rather straightforward assault on two of Apple's authentication systems -- password-based authentication and knowledge-based authentication -- both of which pale in comparison to token-based authentication when it comes to security.Read more...