A Tale of Three Databases

Frontside of ID card issued in Taiwan

Image via Wikipedia

This is about a national identification card and system that would secure the privacy of holders. There is much to be gained and, by what follows, little likelihood of a breach in their trust of personal information.

  • Those in the United-States, whether citizens or not and of an age responsible for such possession would each have a card with an alphanumeric id, photo and electronic legibility. When serving as a driver’s license, the state granting the license would also be identified. In fact any information whose value is in its quick disclosure could appear on the card subject to available space, and with the confirmed request of the cardholder.
  • Based on personal accessibility, there would be four classifications of information: I) card, II) [(I) plus an access code], III [(II)  plus the card holder’s presence], and IV [a writ of disclosure] & [all remaining data whose access is unencumbered by its being circumspect]. Being able to access information is different from being able to remove it. A nucleus of information central to the card’s being of national identity would appear on it (I); further, any assignments of classification by the cardholder to the first three classifications would require the card holder’s presence and necessarily be classified III. Beyond these exceptions and information classified IV, the cardholder would decide classification.
  • A core database would associate with internal (cardholder) ids all information from all classifications, including some (within IV) unknown to the cardholder. Its content would have a legal status similar to documents in the cardholder’s home: searched by the cardholder or by warrant and, in the latter case, excluded as evidence when gained without such. With no criminal investigation, there would be no government search.
  • A front-end database would associate, with each card id, information, downloaded (to I & II) from the core database upon modifications impacting upon it, and accessed when a card is made or a card id and a code are submitted. This would be dynamically linked to a most confidential pairing of card ids with corresponding internal ids: a pairing so important to this instrument of national security that any breach of it would be an act of sabotage. The pairing and its dynamic links would also direct personal information to and from the core database.
  • A back-end database would be formed by requested downloads of specific views from the core database. These would mirror their origins but without any internal ids. As anonymous data it may promote a valuable understanding of our collective circumstance: whether medical, criminal, fiscal or other.
  • Each site should be sealed from the others, and would require the highest level of security; no one would belong to the staff of more than one of them; but all three could be within a single structure (perhaps within Cheyenne Mountain, Colorado Springs). Also the need for redundancy and secure transmissions must be considered.

Some benefits:

  • Medical information: The front-end database would offer easy management of medical factors, the vital part of which would be kept on the card for emergencies.
  • Medical studies: The back-end database could grow into a source for ad hoc studies.
  • National Health Insurance: The back-end could aid in assessing the cost and reliability of treatments and diagnoses.
  • Interstate monitoring of those who have broken the law, whether traffic or criminal.

  • Immigration reform: Without a secure border and a national id, there can be no immigration reform. By registering currently undocumented immigrants, the qualifying for such a card (with its benefits) of those who have only recently entered could then be restricted. For this to work, nationality must be blocked from searches upon registration and from all cards until the last stages of the associated immigration reform.

3 responses to “A Tale of Three Databases

  1. Pingback: This Land Is Whose Land | Out on a Twig

  2. Pingback: Healthcare: Brief to a Measured Response | Out on a Twig

  3. Pingback: Immigration: Law and Border | Out on a Twig

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s