23.10.2013 Views

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

I527-290 ESRIF Final Report (WEB).indd - European Commission

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

276<br />

Weight / Cost<br />

Estimate (small2-<br />

5€; med 10-25€;<br />

large 30-40€)<br />

Cluster Timeline<br />

(short-midlong-term)<br />

From WG What? Why? How? Key link<br />

elements<br />

running<br />

No.<br />

small<br />

short to mid<br />

term<br />

4<br />

§ 3.1, 3.10, 4.1.1,<br />

4.2.4 & reco. 5<br />

part 1 ; § 3.3.3 &<br />

4.2.1.part 2<br />

(WG8) final<br />

report<br />

• Need of a single system governing all the international<br />

movements of assets.<br />

• Development of Privacy Enhancing Technologies (PET)<br />

solutions.<br />

• Biometric solutions to effectively improve the privacy of<br />

individuals.<br />

• Mechanisms allowing revocation of biometric<br />

information.<br />

Security solutions that are put in place must<br />

provide an efficient protection of the privacy of<br />

the individuals. The Data Protection Directive<br />

provides a common framework for the EU-27.<br />

MS have to take proper actions<br />

correspondingly. Specific technological<br />

75 8 Harmonised privacy<br />

protection for identity<br />

management<br />

solutions, such as PET, have to be developed.<br />

med to large<br />

short to mid<br />

term<br />

4<br />

§ 2.3, 2.4, 3.9,<br />

4.1.3 & 4.2.3 part<br />

1 ; § 4.2.5. part2<br />

(WG8) final<br />

report<br />

• Automated border control to leverage the increasing<br />

number of electronic travel documents and to manage<br />

the associated technical and legal complexity.<br />

Harmonised global border<br />

control<br />

76 8<br />

<strong>ESRIF</strong> FINAL REPORT - ANNEX II<br />

• Move the border controls from reactive to proactive<br />

through a connection to a secure information system<br />

(through companies operating flights or through a<br />

special secure connection); passengers checked by<br />

authorities during the flight; only those who need a more<br />

detailed control at the border will be actually and<br />

physically checked<br />

• Need to manage the threat posed by the regulated<br />

workers and populations such as the police, the x-ray<br />

screeners in airports.<br />

• Develop standards required to ensure true<br />

interoperability of secure documents and systems.<br />

Lack of Change Management and planning.<br />

Failure to plan and build efficiency into<br />

systems such that individuals can be fast<br />

tracked will result in major user satisfaction<br />

and management issues.<br />

Lack of business models to manage costs of<br />

new security systems.<br />

Lack of system interoperability. Hence new<br />

systems are limited and will ultimately not be<br />

fit for the sophisticated purposes for which<br />

they are required.<br />

Standards – failure to agree and put in place all<br />

required standards continues to hold up our<br />

ability to exploit and maximise our use of<br />

available and new technologies. Also it hinders<br />

innovation and R&D as developers still do not<br />

have roadmaps for all requirements as yet.<br />

• Architecture - Require architectural support and clear<br />

interface specification including data formatting and<br />

security for the new systems and use central<br />

infrastructures for multiple applications –removing<br />

redundant and/or isolated “stovepipe” systems<br />

• Support best of breed technologies,<br />

• Efficiency versus accuracy trade-off

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!