spacer

Have your say

Provide your comments here

Have your say >>

Keep Informed

Subscribe to our RSS feed to receive the latest updates from Human Services.

What is RSS? RSS

Page updated on September 17, 2007

Information Security

See also the information on Protection of Privacy.

The Access Card System comprises three modules:

  • The Customer System;
  • The Operations System; and
  • The Card Management System.

This modular architectural approach is a deliberate design feature which enhances overall security, protects privacy, streamlines development and improves the robustness and integrity of the Access Card System.

The system is designed in accordance with industry standards and best practices from security and privacy mechanisms to the evaluation and certification of the entire environment by the Defence Signals Directorate.

Security framework

The security architecture of the system ensures compliance with key legislative and regulatory requirements including the:

  • Commonwealth Protective Security Manual;
  • Australian Government Information and Communications Technology Security Manual;
  • Financial Management Accountability Regulations;
  • Privacy Act 1988;
  • Public Service Act 1999; and
  • Archives Act 1983.

Defence Signals Directorate

Australia’s national authority for information security and signals intelligence – the Defence Signals Directorate will evaluate, test and certify the entire system, throughout its development and prior to implementation.

Personnel security

Extensive training will be provided to access card agency staff to ensure they are aware of their responsibilities when accessing a card holder’s personal and private information. Personnel with access to the system will require a security clearance and will only be able to view information relevant to their job function. All access or attempts to access the system will be logged and these logs will be subject to regular independent audits. (See also the information on Protection of Privacy.)

Physical card security

Physical card security will use a variety of mechanisms to ensure the physical security and integrity of the card, protect the card against tampering and prevent counterfeiting. These include secure markings on the surface of the card and the protection of the photograph on the card by a high quality optical variable device. A range of covert and overt physical security features on the card may include:

  • guilloche printing;
  • micro-printing;
  • UV sensitive printing;
  • rainbow printing; and
  • relief printing.

These techniques, which are commonly used to protect banknotes, make it very difficult to copy the card and provide visible features for service providers to ensure a card is genuine.

Chip security

Information held on the chip inside the card will be protected using advanced technology such as encryption and secure zones. The chip architecture provides discrete areas separated by firewalls. Security controls include:

  • the digital signing of all data on the card using Public Key Encryption technology;
  • encryption of data, certificates and keys on the chip ensuring they cannot be tampered with or extracted;
  • the use of access control lists identifying which agencies or service providers can access specific data fi elds; and
  • the use of a PIN if the card holder chooses to protect certain information.

Only Defence Signals Directorate-certified chips and card operating systems will be used.

Anti-hacking design

The security design relies on a multi-layered defence model. This model operates on varying levels of the system including the card, chip, terminals and communication system. Each layer includes security and privacy enhancing features which add together to provide a comprehensive end-to-end security framework.

To protect customer information, data in the system is not held centrally in one place. No individual will be able to access all components of the system. The system comprises separate databases (i.e. secure customer database, photo database, card management system) and they are protected by many different levels of security and encryption.

Notes

Top of page