NIN Tokenization Overview
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of NIN tokenization?

  • To advise the individual of any subsequent access to their personal information
  • To store personal information in a centralized database
  • To provide a virtual version of the person's NIN that expires after 72 hours (correct)
  • To retain and use the individual's NIN record
  • What are the concerns regarding the storage of Personal Information in Nigeria?

  • The entity storing the PII strictly follows NIMC's data storage and encryption regimes
  • Personal Information is stored in disparate databases around the country with little control (correct)
  • The NIN holder is always advised of any subsequent access to their personal information
  • Personal Information is stored in a centralized and secure database
  • What is the role of the NIMC in the verification process?

  • The NIMC has total visibility on the parties carrying out verifications
  • The NIMC strictly enforces its data storage and encryption regimes
  • The NIMC is always advised by the entity storing the PII
  • The NIMC does not have total visibility on the actual parties carrying out verifications (correct)
  • What happens to the virtual NIN after it is generated?

    <p>It expires 72 hours after being generated</p> Signup and view all the answers

    What are the consequences of an entity storing personal data without approval from the NIMC?

    <p>The entity may not have complied with NIMC's strict data storage and encryption regimes</p> Signup and view all the answers

    What is the purpose of advising the NIMC of any subsequent access to personal information?

    <p>To comply with NIMC's strict data storage and encryption regimes for data transmission</p> Signup and view all the answers

    What is the primary purpose of tokenization in the context of personal information?

    <p>To protect sensitive information from being cloned or duplicated</p> Signup and view all the answers

    What is the main difference between the Virtual NIN (vNIN) and the raw 11-digit NIN?

    <p>The vNIN uses 16 alpha-numeric characters, while the raw NIN uses 11 digits</p> Signup and view all the answers

    Which of the following is NOT a characteristic of the Virtual NIN?

    <p>It can be issued for any purpose</p> Signup and view all the answers

    What is the role of the NIMC in the issuance of the Virtual NIN?

    <p>The NIMC approves the issuance of the Virtual NIN</p> Signup and view all the answers

    What algorithm is employed as a check digit algorithm for the Virtual NIN?

    <p>ISO/IEC 7064, MOD 1271_36</p> Signup and view all the answers

    Which of the following is a potential future application of tokenization, as mentioned in the text?

    <p>Creating a token for a driver's license</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser