Preview

Effect of Nimc on the Society

Better Essays
Open Document
Open Document
2143 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Effect of Nimc on the Society
| | Home | |
Share on linkedin Share on facebook Share on twitter Share on email 156 INTRODUCTION The National Identity Management Commission (NIMC) was established by Act No. 23 of 2007 primarily to foster the orderly development of an identity sector in Nigeria through the development of a modern and universally acceptable identity management infrastructure in Nigeria. The Act empowers NIMC to establish, manage, regulate and enforce an effective and secure Identity Assurance System that would facilitate the harmonization and integration of identity databases in government agencies, ensure sustainability, reliability and acceptance across diverse points and contexts and application of the verification and authentication services within and outside the country. | |
The Commission’s mandate can be categorized into four (4) major action tracks, namely: 1. Establish the National Identity Management Commission as the primary legal, regulatory and institutional mechanism for implementing Government’s reform initiative (in the identity sector) as contained in the National Policy and NIMC Act, Sections 1, 2, 5 and 6. 2. Wind up and take over the assets and liabilities of the former DNCR which no longer exist, including the personnel in both the State and Local Government Offices nationwide; 3. Establish, operate and manage the National Identity Management System (NIMS): a. Carry out the enrolment of citizens and legal residents as provided for in the Act; b. Create and operate a National Identity Database; c. Issue Unique National Identification Numbers to qualified citizens and legal residents; d. Issue a National Identity Smart Card to every registered person 16 years and above; e. Provide a secure means to access the National Identity Database so that an individual can irrefutably assert his/her identity [Person Identification Verification Services (PIVS) Infrastructure]; f. Harmonize and integrate Identity

You May Also Find These Documents Helpful

  • Powerful Essays

    Lab 7 & 8

    • 1094 Words
    • 5 Pages

    1. In an Internet Banking Financial Institution is Single Factor Authentication acceptable? Why or why not?…

    • 1094 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Nt2580 Final Project

    • 1848 Words
    • 6 Pages

    It is my view the Administrator’s responsibility is to provide secure communications by adding layers of security at all levels to assure the amount of protection for company’s valuable assets. Richman will provide its employees a new method of authentication I call Trinity. It is a three-factor authentication method requiring updated laptops and new Apple IPhone. Since Microsoft has stopped support for Microsoft Windows Operating System XP, and 87 % of our current systems require upgrade to Windows 7. We should take advantage of the newest technologies available to our Corporation. Trinity is a three-factor authentication combines” “something that you know” (password – PIN), with “something that you have” (hardware- token, mobile phone) and/or “something that you are” (biometric technologies), to make sure that the person is who he/she claims to be.”(1)…

    • 1848 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    IS 3340 FINAL EXAM QUESTIONS

    • 1651 Words
    • 13 Pages

    2. Which among the following is the process of proving that provided identity credentials are valid and…

    • 1651 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    The specific purpose of this paper is to describe the authentication process and to describe how this and other information security considerations will affect the design and development process for new information systems.…

    • 1478 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    The nation and identity: how are national identities created and what ensures their success or failure?…

    • 758 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    First of all we need to define what authentication accurately is. Authentication is the ability to verify the identity of a user or a computer system on a computer network. (Barker, 2013) There are many forms or variations that authentication can manifest itself depending on the requirements as outlined in the Security Policy published by the business. Most commonly these would include one, two, or three factor configurations to verify the identity of the person requesting access to a resource. If everything associated with the authentication factors are valid and correct for the claimed identity, it is then assumed that the accessing person is who they claim to be. (Stewart, 2011) Some of the most common authentication factors would be something you know such as a password, something you have such as a smart card, and something you are such as a fingerprint.…

    • 630 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Emerson In Self-Reliance

    • 688 Words
    • 3 Pages

    Respecting each citizen and allowing them to live their life without interference is one of NISI's top priorities. With a limited government, our community allows democracy to take over as it enhances the dignity of…

    • 688 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IOM Impact Of Nursing

    • 303 Words
    • 2 Pages

    With the United States (US) and the world facing a multitude of issues, the nations healthcare concerns continue to take high priority. Finding timely solutions to health care reforms became the inspiration of the Institute of Medicine (IOM). Along with the Robert Wood Johnson Foundation (RWJF), the IOM created the RWJF Initiative on the Future of Nursing, which according the IOM (2010, p.ix) looks at the possibility of strengthening the largest component of the health care workforce – nurses – to become partners and leaders in improving the delivery of the care and the health…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Many questions have risen out of the book of Daniel and the Bible as a whole. Due to numerous issues, many historians consider Daniel a narrative rather than a historical document. This is despite its placement in the canon by the founding fathers. Among the many problems are dating, names, and the usage of Greek and Persian in a book that is otherwise Hebrew and Aramaic. Despite the fact that Daniel is considered a book written after the occurrence, even a forgery, critical thinking and research are necessary for proper understanding, as well as its proper placement in history. Rather than do extended research on the subject, it has been easier to give up and not search further for truth.…

    • 4014 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Good Essays

    For various reasons, a national identity has become a problematic subject for most western countries. One reason is that…

    • 919 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Mathias (2013) stated that identity management (ID management) is defined as a wide-ranging area that manages the personal identification during a system, (such as a country or a social networking) and have access to gain resources from it through associating user rights and restriction with established identity.…

    • 1633 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Advantages Of NIMS

    • 919 Words
    • 4 Pages

    The National Incident Management System (NIMS) was developed in the wake of nine eleven to resolve all issues within the response community about how any disaster should be handled. Do to the National Incident Management being created in the wake of nine eleven, citizens as a whole did not know what the National Incident Management was. Individuals thought NIMS was only used as a terrorism preparedness advantage (Bourne & Moffat, 2005). The National Incident Management System can be used in all major disasters going forward especially in the wake of the 2004 hurricane season along the golf cost (Bourne & Moffat, 2005). In addition, many citizens did not know what the NIMS was and took no interest in NIMS. However, NIMS is more than just a terrorism response, NIMS is a comprehensive, national approach to incident management that is applicable at all jurisdictional levels and across functional disciplines and can be used with any disaster (What is NIMS, Homeland Security). In addition, the National Incident Management System provides a consistent national framework and approach to enable all government levels, state, local, tribal, the private sector and all non-governmental organizations to work together to prepare, mitigate, prevent, and respond to any incident regardless of its size and impact (What is NIMS, Homeland Security).…

    • 919 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Davies, P. G., Spencer, S. J., & Steele, C. M. (2005). Clearing the air: Identity safety moderates…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Identity Formation

    • 919 Words
    • 4 Pages

    The definition of identity has been contested by many social scientists, as it has many influences, which has to be considered, such as, gender, social class, nationality, physical appearances, religious and ethnicity. Initially, we acquire some aspects of identity through official documents, such as birth certificate, where in order to exit, a birth must…

    • 919 Words
    • 4 Pages
    Good Essays