ICAC issues guidelines on ID protection

By

Database tracking systems and computer audits could soon be regular practice in NSW public sector offices, after the Independent Commission and Corruption (ICAC) agency yesterday released a report detailing strategies to help prevent the misuse of people’s identity information and documents.

ICAC issues guidelines on ID protection
Database tracking systems and computer audits could soon be regular practice in NSW public sector offices, after the Independent Commission and Corruption (ICAC) agency yesterday released a report detailing strategies to help prevent the misuse of people’s identity information and documents.

The report, 'Protecting Identity Information and Documents', lists a set of trusted guidelines that help protect corporate and individual identities against common known identity threats such as identity theft, creation and use of false identification, and dishonest representation of nationality.

Additionally, the report aims to raise awareness of both physical and online identity and information security while suggesting potential treatment options.

According to Jerrold Cripps, the Commissioner of the Independent Commission (ICAC), NSW agencies have a legal obligation to protect the private and confidential information they receive as identity related fraud has serious consequences for the public and the agency.

“All NSW public sector agencies are exposed to some degree of corruption risk in relation to the identity documents and information they manage. Many agencies face internal risks such as staff who misuse their authority or computer access to assume the identity of another,” said Cripps in the report.

Information security and technological advancements are among the breakdown of risks noted by ICAC, along with physical security, authentication, staff, outsourcing and management and systems.

Furthermore, techniques such as data mining and computer forensics are listed as part of the ‘risk treatment options’. Along with helpful checklists like, biometrics, database tracking system, recorded password access attempts, locking of unattended terminals and regular audits,

The Police, Roads and Traffic Authority (RTA) and Attorney Generals Departments collaborated with the ICAC to help create the document, which is available for download on the ICAC website.
Got a news tip for our journalists? Share it with us anonymously here.
Tags:

Most Read Articles

India's alarm over Chinese spying rocks CCTV makers

India's alarm over Chinese spying rocks CCTV makers

Hackers abuse modified Salesforce app to steal data, extort companies

Hackers abuse modified Salesforce app to steal data, extort companies

Cyber companies hope to untangle weird hacker codenames

Cyber companies hope to untangle weird hacker codenames

Woolworths' CSO is Optus-bound

Woolworths' CSO is Optus-bound

Log In

  |  Forgot your password?