You can obtain more information by calling 6005 30003 (Call center), by visiting our website http://vg.emiratesid.ae and filling out the form under “contact us,” or you can send an email to vgadmin@emiratesid.ae stating your needs and intended usages and the Emirates Identity Authority will then contact you.
Operating Systems: Windows XP, Vista, Windows 2003 Server, Windows 2008 Server, and Windows 7 (Win32/Win64)
Browsers: ActiveX: IE 7 or higher, Java Applet: IE 7 or higher, Mozilla Firefox, and Google Chrome
The e-ID Service providers currently available in UAE can be found at www.emiratesid.ae.
The service provider’s application must include various documents and information, such as proof of the extent to which the service provider wishes to read out data for the purpose of his service. The letter of authorization issued is valid for a maximum period of three years.
Though specialist literature has various definitions for the term identity theft, it usually means, “Gaining unauthorized possession of an identity.” A perpetrator gains possession of another person’s identity (i.e. certain data through which the victim can be clearly linked to a certain context). For instance, an identity thief will combine the victim’s name and credit card data, their name and address, or even their name and date of birth. This theft is often followed by fraud in order to obtain a financial gain or to ruin the victim’s reputation.
Around one third of all identity theft still takes place today in the real, physical world where thieves use the data of a stolen ID card, for instance, to place orders for themselves. In two thirds of cases, however, the data used by identity thieves for criminal attacks is obtained on the Internet. This situation is often made easy when people freely disclose personal information and other data.
The police estimate that victims of online identity theft need to invest an average of around 400 working hours in order to eliminate the damage caused and to prevent further misuse.
The online ID function offers enormous benefits for both customers and service providers:
- The customer only has to remember one password; this makes the online service much more convenient
- Lower costs for resetting passwords and the related posting of password letters
- Phishing and Trojan attacks are more difficult; this means greater security for the customer portal operator
- The service provider’s customer data is also better protected
- The service provider automatically fulfills the Commission’s requirements regarding youth media protection by state institutes
- Compliance with the requirements of the Money Laundering Act
Yes, this is possible during various phases of the project. If a service provider is interested in connecting to an e-ID Service, Emirates ID recommends that the service first be used in a test environment.
In this case, the data exchange channel between the service provider and Emirates Identity Authority has already been mapped. Predefined messages and error codes are sent so that the service provider can fully prepare before going live. The following scenarios can be tested: The ID card holder enters the wrong PIN or fails to release the data. ID cards are not used in the test environment. This takes place during a test in the “reference environment.” A test run in the reference environment corresponds almost fully to real implementation and is recommended for demonstrating the e-ID service within the company. It is generally possible to go live with the e-ID service once the trial in the test environment has been completed.
The technical security level of the entire system that protects the data of the new Emirates ID card against unauthorized access is very high. The chip also meets with the highest security standards. Just like with other applications, such as e-Banking or Internet shopping, the precise level of security depends on the user’s computer environment. The Emirates ID card protects against identity theft and, with its security protocols and mechanism, it prevents unauthorized parties from reading, copying, or manipulating information.
Before data is transmitted, the ID card checks whether the requesting service or the requesting agency is authorized to request the information. Unnoticed data reading is not possible. Furthermore, all information and transmissions are protected by internationally recognized and established technical means (encryption and signature).
The user’s personal information is also safe on the Internet; only the person in possession of the ID card and the four-digit PIN can release the information for transmission. Data can only be exchanged between the cardholder and the service provider.
Post Your Comment