Preview

Effect of Nimc on the Society

Better Essays
Open Document
Open Document
2143 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Effect of Nimc on the Society
| | Home | |
Share on linkedin Share on facebook Share on twitter Share on email 156 INTRODUCTION The National Identity Management Commission (NIMC) was established by Act No. 23 of 2007 primarily to foster the orderly development of an identity sector in Nigeria through the development of a modern and universally acceptable identity management infrastructure in Nigeria. The Act empowers NIMC to establish, manage, regulate and enforce an effective and secure Identity Assurance System that would facilitate the harmonization and integration of identity databases in government agencies, ensure sustainability, reliability and acceptance across diverse points and contexts and application of the verification and authentication services within and outside the country. | |
The Commission’s mandate can be categorized into four (4) major action tracks, namely: 1. Establish the National Identity Management Commission as the primary legal, regulatory and institutional mechanism for implementing Government’s reform initiative (in the identity sector) as contained in the National Policy and NIMC Act, Sections 1, 2, 5 and 6. 2. Wind up and take over the assets and liabilities of the former DNCR which no longer exist, including the personnel in both the State and Local Government Offices nationwide; 3. Establish, operate and manage the National Identity Management System (NIMS): a. Carry out the enrolment of citizens and legal residents as provided for in the Act; b. Create and operate a National Identity Database; c. Issue Unique National Identification Numbers to qualified citizens and legal residents; d. Issue a National Identity Smart Card to every registered person 16 years and above; e. Provide a secure means to access the National Identity Database so that an individual can irrefutably assert his/her identity [Person Identification Verification Services (PIVS) Infrastructure]; f. Harmonize and integrate Identity

You May Also Find These Documents Helpful

  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    1. In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    2. Which among the following is the process of proving that provided identity credentials are valid and…

    • 1651 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Relationship To NIMS

    • 113 Words
    • 1 Page

    To better respond to disaster incident, FEMA decided to involve the whole community to help during a disastrous incident. “Along with the National Planning Frameworks for other mission areas, this document now describes the all-important integration and inter-relationships among the mission areas of Prevention, Protection, Mitigation, Response, and Recovery. Relationship to NIMS the response protocols and structures described in the NRF align with NIMS. NIMS provides the incident management basis for the NRF and defines standard command and management structures” (n.d., 2010.) NIMS came up with a plan to have communities work together to prevent, protect, mitigate, respond to, and recover from the effects of a disastrous incident regardless…

    • 113 Words
    • 1 Page
    Good Essays
  • Good Essays

    First of all we need to define what authentication accurately is. Authentication is the ability to verify the identity of a user or a computer system on a computer network. (Barker, 2013) There are many forms or variations that authentication can manifest itself depending on the requirements as outlined in the Security Policy published by the business. Most commonly these would include one, two, or three factor configurations to verify the identity of the person requesting access to a resource. If everything associated with the authentication factors are valid and correct for the claimed identity, it is then assumed that the accessing person is who they claim to be. (Stewart, 2011) Some of the most common authentication factors would be something you know such as a password, something you have such as a smart card, and something you are such as a fingerprint.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Emerson In Self-Reliance

    • 688 Words
    • 3 Pages

    Respecting each citizen and allowing them to live their life without interference is one of NISI's top priorities. With a limited government, our community allows democracy to take over as it enhances the dignity of…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For various reasons, a national identity has become a problematic subject for most western countries. One reason is that…

    • 919 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Many questions have risen out of the book of Daniel and the Bible as a whole. Due to numerous issues, many historians consider Daniel a narrative rather than a historical document. This is despite its placement in the canon by the founding fathers. Among the many problems are dating, names, and the usage of Greek and Persian in a book that is otherwise Hebrew and Aramaic. Despite the fact that Daniel is considered a book written after the occurrence, even a forgery, critical thinking and research are necessary for proper understanding, as well as its proper placement in history. Rather than do extended research on the subject, it has been easier to give up and not search further for truth.…

    • 4014 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Advantages Of NIMS

    • 919 Words
    • 4 Pages

    The National Incident Management System (NIMS) was developed in the wake of nine eleven to resolve all issues within the response community about how any disaster should be handled. Do to the National Incident Management being created in the wake of nine eleven, citizens as a whole did not know what the National Incident Management was. Individuals thought NIMS was only used as a terrorism preparedness advantage (Bourne & Moffat, 2005). The National Incident Management System can be used in all major disasters going forward especially in the wake of the 2004 hurricane season along the golf cost (Bourne & Moffat, 2005). In addition, many citizens did not know what the NIMS was and took no interest in NIMS. However, NIMS is more than just a terrorism response, NIMS is a comprehensive, national approach to incident management that is applicable at all jurisdictional levels and across functional disciplines and can be used with any disaster (What is NIMS, Homeland Security). In addition, the National Incident Management System provides a consistent national framework and approach to enable all government levels, state, local, tribal, the private sector and all non-governmental organizations to work together to prepare, mitigate, prevent, and respond to any incident regardless of its size and impact (What is NIMS, Homeland Security).…

    • 919 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mathias (2013) stated that identity management (ID management) is defined as a wide-ranging area that manages the personal identification during a system, (such as a country or a social networking) and have access to gain resources from it through associating user rights and restriction with established identity.…

    • 1633 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Identity Theft

    • 2587 Words
    • 11 Pages

    Bibliography: "Identity Theft: What to Do If It Happens to You | Privacy Rights Clearinghouse." Privacy Rights Clearinghouse | Empowering Consumers. Protecting Privacy. Web. 25 May 2011. .…

    • 2587 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Davies, P. G., Spencer, S. J., & Steele, C. M. (2005). Clearing the air: Identity safety moderates…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Identity Formation

    • 919 Words
    • 4 Pages

    The definition of identity has been contested by many social scientists, as it has many influences, which has to be considered, such as, gender, social class, nationality, physical appearances, religious and ethnicity. Initially, we acquire some aspects of identity through official documents, such as birth certificate, where in order to exit, a birth must…

    • 919 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Passport automation system

    • 2267 Words
    • 10 Pages

    All the details entered by the applicants are validated upon submission and recorded in the database. The applicants have to scan and upload their original documents for proofs of citizenship, address, educational background, occupation, etc.The final step would be payment of the passport application fee that would be computed automatically based on the modes and category of applicant. After the payment is successfully carried out, an appointment date would be generated for in-person verification of the applicant by the passport authorities. A receipt slip would be generated as an acknowledgement for the completion of passport application process.…

    • 2267 Words
    • 10 Pages
    Powerful Essays