I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
I527-290 ESRIF Final Report (WEB).indd - European Commission
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
276<br />
Weight / Cost<br />
Estimate (small2-<br />
5€; med 10-25€;<br />
large 30-40€)<br />
Cluster Timeline<br />
(short-midlong-term)<br />
From WG What? Why? How? Key link<br />
elements<br />
running<br />
No.<br />
small<br />
short to mid<br />
term<br />
4<br />
§ 3.1, 3.10, 4.1.1,<br />
4.2.4 & reco. 5<br />
part 1 ; § 3.3.3 &<br />
4.2.1.part 2<br />
(WG8) final<br />
report<br />
• Need of a single system governing all the international<br />
movements of assets.<br />
• Development of Privacy Enhancing Technologies (PET)<br />
solutions.<br />
• Biometric solutions to effectively improve the privacy of<br />
individuals.<br />
• Mechanisms allowing revocation of biometric<br />
information.<br />
Security solutions that are put in place must<br />
provide an efficient protection of the privacy of<br />
the individuals. The Data Protection Directive<br />
provides a common framework for the EU-27.<br />
MS have to take proper actions<br />
correspondingly. Specific technological<br />
75 8 Harmonised privacy<br />
protection for identity<br />
management<br />
solutions, such as PET, have to be developed.<br />
med to large<br />
short to mid<br />
term<br />
4<br />
§ 2.3, 2.4, 3.9,<br />
4.1.3 & 4.2.3 part<br />
1 ; § 4.2.5. part2<br />
(WG8) final<br />
report<br />
• Automated border control to leverage the increasing<br />
number of electronic travel documents and to manage<br />
the associated technical and legal complexity.<br />
Harmonised global border<br />
control<br />
76 8<br />
<strong>ESRIF</strong> FINAL REPORT - ANNEX II<br />
• Move the border controls from reactive to proactive<br />
through a connection to a secure information system<br />
(through companies operating flights or through a<br />
special secure connection); passengers checked by<br />
authorities during the flight; only those who need a more<br />
detailed control at the border will be actually and<br />
physically checked<br />
• Need to manage the threat posed by the regulated<br />
workers and populations such as the police, the x-ray<br />
screeners in airports.<br />
• Develop standards required to ensure true<br />
interoperability of secure documents and systems.<br />
Lack of Change Management and planning.<br />
Failure to plan and build efficiency into<br />
systems such that individuals can be fast<br />
tracked will result in major user satisfaction<br />
and management issues.<br />
Lack of business models to manage costs of<br />
new security systems.<br />
Lack of system interoperability. Hence new<br />
systems are limited and will ultimately not be<br />
fit for the sophisticated purposes for which<br />
they are required.<br />
Standards – failure to agree and put in place all<br />
required standards continues to hold up our<br />
ability to exploit and maximise our use of<br />
available and new technologies. Also it hinders<br />
innovation and R&D as developers still do not<br />
have roadmaps for all requirements as yet.<br />
• Architecture - Require architectural support and clear<br />
interface specification including data formatting and<br />
security for the new systems and use central<br />
infrastructures for multiple applications –removing<br />
redundant and/or isolated “stovepipe” systems<br />
• Support best of breed technologies,<br />
• Efficiency versus accuracy trade-off