NIN Tokenization Overview
12 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the purpose of NIN tokenization?

  • To advise the individual of any subsequent access to their personal information
  • To store personal information in a centralized database
  • To provide a virtual version of the person's NIN that expires after 72 hours (correct)
  • To retain and use the individual's NIN record

What are the concerns regarding the storage of Personal Information in Nigeria?

  • The entity storing the PII strictly follows NIMC's data storage and encryption regimes
  • Personal Information is stored in disparate databases around the country with little control (correct)
  • The NIN holder is always advised of any subsequent access to their personal information
  • Personal Information is stored in a centralized and secure database

What is the role of the NIMC in the verification process?

  • The NIMC has total visibility on the parties carrying out verifications
  • The NIMC strictly enforces its data storage and encryption regimes
  • The NIMC is always advised by the entity storing the PII
  • The NIMC does not have total visibility on the actual parties carrying out verifications (correct)

What happens to the virtual NIN after it is generated?

<p>It expires 72 hours after being generated (A)</p> Signup and view all the answers

What are the consequences of an entity storing personal data without approval from the NIMC?

<p>The entity may not have complied with NIMC's strict data storage and encryption regimes (B)</p> Signup and view all the answers

What is the purpose of advising the NIMC of any subsequent access to personal information?

<p>To comply with NIMC's strict data storage and encryption regimes for data transmission (D)</p> Signup and view all the answers

What is the primary purpose of tokenization in the context of personal information?

<p>To protect sensitive information from being cloned or duplicated (A)</p> Signup and view all the answers

What is the main difference between the Virtual NIN (vNIN) and the raw 11-digit NIN?

<p>The vNIN uses 16 alpha-numeric characters, while the raw NIN uses 11 digits (A)</p> Signup and view all the answers

Which of the following is NOT a characteristic of the Virtual NIN?

<p>It can be issued for any purpose (D)</p> Signup and view all the answers

What is the role of the NIMC in the issuance of the Virtual NIN?

<p>The NIMC approves the issuance of the Virtual NIN (D)</p> Signup and view all the answers

What algorithm is employed as a check digit algorithm for the Virtual NIN?

<p>ISO/IEC 7064, MOD 1271_36 (A)</p> Signup and view all the answers

Which of the following is a potential future application of tokenization, as mentioned in the text?

<p>Creating a token for a driver's license (D)</p> Signup and view all the answers
Use Quizgecko on...
Browser
Browser