4.1 security data & hijacking of companies (australia)

29
Security of Data Hijacking of Companies Corporate Registers Forum Mauritius April 2010 Rosanne Bell, Senior Executive Leader Registry Services and Licensing, Australian Securities and Investments Commission www.asic.gov.au [email protected] The Integrity of Corporate Registers

Upload: corporate-registers-forum

Post on 09-May-2015

555 views

Category:

Business


1 download

TRANSCRIPT

Page 1: 4.1 security data & hijacking of companies (australia)

Security of Data

Hijacking of Companies

Corporate Registers Forum Mauritius April 2010

Rosanne Bell, Senior Executive Leader

Registry Services and Licensing, Australian Securities and Investments Commission

www.asic.gov.au

[email protected]

The Integrity of Corporate Registers

Page 2: 4.1 security data & hijacking of companies (australia)

2

Australia

Page 3: 4.1 security data & hijacking of companies (australia)

Australia

• Australia's land area : 7.7 million square kilometres

• Australia's population : 22 million

3

Page 4: 4.1 security data & hijacking of companies (australia)

4

Australia - Uluru

Page 5: 4.1 security data & hijacking of companies (australia)

5

Australia – Great Barrier Reef

Page 6: 4.1 security data & hijacking of companies (australia)

6

Australia - Sports

Page 7: 4.1 security data & hijacking of companies (australia)

7

Page 8: 4.1 security data & hijacking of companies (australia)

CRF Melbourne 2005

8

Page 9: 4.1 security data & hijacking of companies (australia)

ASIC

ASIC is Australia’s corporate, markets, financial and credit services regulator.Our responsibilities are to:

• maintain, facilitate and improve the performance of the financial system and entities in it

• promote confident and informed participation by investors and consumers in the financial system

• administer the law effectively and with minimal procedural requirements

• enforce and give effect to the law

• receive, process and store, efficiently and quickly, information that is given to us

• make information about companies available to the public as soon as practicable

9See our website at www.asic.gov.au

Page 10: 4.1 security data & hijacking of companies (australia)

ASIC

10

• 1,800 total ASIC staff

• 400 Real Economy staff – the ‘front door’ to ASIC

• 200 registry and licensing staff

• Appropriation model

Page 11: 4.1 security data & hijacking of companies (australia)

16 Public Registers

11

• Companies (1.74 million)• Disqualified Company Directors and Other (2,515)• Company Charges (1.33m)• Registered Australian Bodies (1,023)• Foreign companies (3,195)• Reserved Names• Managed investment schemes (4,895)• Australian Financial Services Licensees (4,876)• Authorised Representatives of Australian Financial Services Licensees (62,866)• Auditors (5,295)• Liquidators (664)• Official Liquidators (498)• Banned or Disqualified Persons (3,044)• Trustee Debenture Holders• Licensees (search only)• Futures Licensees (search only)

Page 12: 4.1 security data & hijacking of companies (australia)

New Registers

12

• National Consumer Credit, July 2010, 10,000

• National Business Names, April 2011, 1.8 million

Register

24/7

Page 13: 4.1 security data & hijacking of companies (australia)

Registry Modernisation

Provide outstanding and cost effective services to all Real Economy Stakeholders through:

• Upgrading technology• New and improved online services• Customer centric approach• Connectivity

13

Page 14: 4.1 security data & hijacking of companies (australia)

ASIC’s Companies Register

• Over 1.7 million companiesPublic 21,439Proprietary 1,721,507

• 150,000 company registrations per annum

• 4.7 million officeholder roles Directors 3,054,615Secretaries 1,675,880

• 30,000 financial accounts pa

• 800,000 changes of details pa 14

Page 15: 4.1 security data & hijacking of companies (australia)

15

Annual Review

• Annual statement issued at review date

• Review company details and notify changes

• Pay annual review fee

• Pass a solvency resolution and notify as required

Page 16: 4.1 security data & hijacking of companies (australia)

Global Financial Crisis

2008/09:

• Company registrations down 8.7%

• Voluntary company deregistration up 10%

• Registrations of charges over company assets down 14.6%

• External Administrations up 26.5%

• Registry searches up 15%

16

Page 17: 4.1 security data & hijacking of companies (australia)

Registry Clients

17

Page 18: 4.1 security data & hijacking of companies (australia)

Channels

18

• over 70% of lodgements online

• 85% company registrations online & digital certificates

Page 19: 4.1 security data & hijacking of companies (australia)

Current Authentication Model

Features:

• Legislation

• Government direction

• Process and Technology

19

Page 20: 4.1 security data & hijacking of companies (australia)

Legislation

• No unique person identifier

• No validation of signatures on paper documents

• No person validation or proof of identify

20

Page 21: 4.1 security data & hijacking of companies (australia)

Authentication Process and Technology

• Corporate Key

• Authorising a Registered Agent

21

Page 22: 4.1 security data & hijacking of companies (australia)

Data Integrity Checks

• Data validation

Annual Review

Confirmations

Data exchanges

Government interoperability

• Technology

22

Page 23: 4.1 security data & hijacking of companies (australia)

Evidence Of Problems

Data integrity issues:

• Duplicates

• Addresses

• Out of date data

23

Page 24: 4.1 security data & hijacking of companies (australia)

Compliance Tools

• False lodgement

• Bannings

• Civil remedies

• Criminal remedies

24

Page 25: 4.1 security data & hijacking of companies (australia)

Evidence Of Problems

Fraud:

• Registry complaints of fraudulent activities

• Bud Gerigar and Humphrey B Bear

25

Page 26: 4.1 security data & hijacking of companies (australia)

Meeting The Challenge

• Government position

• Australian Crime Commission

• National Identity Security Strategy

26

Page 27: 4.1 security data & hijacking of companies (australia)

Meeting The Challenge

National ‘e’ Authentication framework:

• Balancing risk and user experience

• Agency specific model

• Reuse of credentials

• 5 levels of security

27

Page 28: 4.1 security data & hijacking of companies (australia)

Meeting The Challenge

• ASIC’s implementation of the National ‘e’ Authentication framework

• AUSKey

28

NeAF Level ASIC Solution

Level 0 Direct public access, no authentication necessary

Level 1 Basic authentication (username / password )

Level 2 Digital certificates (such as Auskey)

Level 3 No present solution. 'two factor‘ authentication

Level 4 No present solution & unlikely.

Page 29: 4.1 security data & hijacking of companies (australia)

Summary

• ASIC functions and registers

• Technology and registry modernisation program

• Data quality challenges

• Fraudulent activity

• Government priorities

• ASIC direction29