Browse Definitions :
Definition

Real ID

Real ID is a specification for driver's licenses mandated by the United States Real ID Act of 2005. The deadline for implementation is 2011. After the Act is in effect, any driver's license that does not conform to the federal mandate will not be accepted for authentication. Under the law, individuals without a Real ID would be unable to enter federal buildings, board airplanes or open bank accounts.

The Real ID Act orders that state agencies issue driver's licenses with:

  • The full legal name, signature, date of birth, gender and address of the principal residence of the holder.
  • A driver's license or identification card number.
  • A photograph of the license holder's face.
  • Physical security features designed to prevent counterfeiting or duplication of the ID, including a hologram.
  • Machine-readable bar codes that can include additional data.

The Real ID Act also mandated that each state must share its driver's license records with all other states, creating a nationally interlinked database. Industry experts have raised concerns about the practicality and dangers of such a database with respect to identity theft.

The original deadline for implementation of May 2008 was extended when the proposal encountered considerable opposition from state governments. Many state governments oppose the program because of the considerable costs of implementation, most of which would be shouldered by individuals and state agencies.

This was last updated in March 2009

Continue Reading About Real ID

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close