Browse Definitions :
Definition

Real ID

Real ID is a specification for driver's licenses mandated by the United States Real ID Act of 2005. The deadline for implementation is 2011. After the Act is in effect, any driver's license that does not conform to the federal mandate will not be accepted for authentication. Under the law, individuals without a Real ID would be unable to enter federal buildings, board airplanes or open bank accounts.

The Real ID Act orders that state agencies issue driver's licenses with:

  • The full legal name, signature, date of birth, gender and address of the principal residence of the holder.
  • A driver's license or identification card number.
  • A photograph of the license holder's face.
  • Physical security features designed to prevent counterfeiting or duplication of the ID, including a hologram.
  • Machine-readable bar codes that can include additional data.

The Real ID Act also mandated that each state must share its driver's license records with all other states, creating a nationally interlinked database. Industry experts have raised concerns about the practicality and dangers of such a database with respect to identity theft.

The original deadline for implementation of May 2008 was extended when the proposal encountered considerable opposition from state governments. Many state governments oppose the program because of the considerable costs of implementation, most of which would be shouldered by individuals and state agencies.

This was last updated in March 2009

Continue Reading About Real ID

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close