FB pixel

Many factors make good digital ID planning and procurement

Practical advice in heavy demand at ID4Africa 2024
Many factors make good digital ID planning and procurement
 

The journey to a secure identity usually begins with understanding an organization’s unique needs. With cyber threats evolving rapidly and data breaches becoming more sophisticated, reports of organizations implementing robust digital identity tools to protect sensitive information and ensure secure access, is also on the rise.

A session at the ID4Africa 2024 conference co-chaired by Dr. Sarah Lister, head of governance at UNDP, and Victor Margall von Hegyeshalmy, electoral/ID procurement lead at UNDP Procurement Services Unit focused on the practical aspects of eID and eGovernance digital tools. Lister tells Biometric Update that it is evident that many countries are currently planning or already designing and implementing digital ID and eGovernance systems.

“There is also a huge interest and dynamism in the industry around these technologies. And there is a significant thirst for support on issues of procurement,” she adds.

This “creates many opportunities but also risks and challenges. It is fundamental to have a well-balanced, well-informed and objective assessment on each case, starting with the needs and how to optimally address them. Factors that become critical may include medium and long term sustainability of the offerings, overall and hidden costs – search for the true ‘best value for money’, ensuring ownership by the beneficiary, and progressive capacity building and progressive introduction of technology.”

It was highlighted in the session that decisions to make or buy digital identity and governance systems must also consider all the above and further technological aspects, as each involve significantly different pros and cons, she continues.

Associated risks

According to the session, analyzing past security incidents and potential threat vectors can help in selecting an identity tool that addresses specific vulnerabilities. This proactive approach minimizes the risk of future breaches. Once the needs are identified, the next step is procuring technology that aligns with those needs. This phase involves meticulous research and evaluation of available options.

Margall von Hegyeshalmy notes that risks can materialize at any stage of the overall process and may come from very different angles and/or actors involved.

“In procurement, we use models and procedures geared towards risk identification and mitigation, including of course all  parts of contract implementation,” Margall von Hegyeshalmy adds.

“But risks go beyond that, and we must also look into aspects and potential risks relating to the further future and the resilience of the technologies and solutions chosen. The more advanced a country is in implementing a system, the more costly it may be to address design defects or even change to another system to address challenges in the future, so we need to take great care in every step towards designing and deploying a national identity solution.”

The session also delved into the risks associated with deploying national identity systems and how to mitigate them. Margall von Hegyeshalmy highlighted the importance of a holistic approach to risk management, which encompasses the entire lifecycle of the solution from procurement to long-term resilience.

The presentation at ID4Africa identified a number of risks and potential mitigation measures. This includes ensuring early and consistent involvement of relevant objective experts, for comprehensive and in depth analysis and advice from start to end. Additionally, it also includes seeking and conducting relevant business processes analysis, as technology alone will likely not be the answer to procedural issues, according to Lister.

Assessing technical capacities at the government and seeking to build those in line with the technical complexity of the system (hence, progressive approaches are practical), and ensuring steps taken are consistent and avoid back and forth, are both additional mitigation measures.

“Focus on needs and results; ensure ownership and tools are handed over to; consider total cost of ownership including maintenance; consider present and future use including scalability, interoperability, ensure open standards; and consider special contractual modalities and clauses for software/systems development,” Lister concludes.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Swedish police seek mobile fingerprint readers in $7.6M tender

The Swedish police have issued a tender seeking mobile biometric fingerprint readers with integrated passport readers. The estimated value of…

 

Banks struggle to fight fraud with AI, reusable ID could help

The vast majority of financial institutions – around 90 percent – are leaning on some form of AI to combat…

 

Regulator presses TFH for details on World biometric data collection in Indonesia

Indonesia government officials are exploring the potential misuse of biometric data and may require the deletion of 500,000 iris data…

 

Ghana’s new identification authority board to focus on public trust, inclusive service delivery

The National Identification Authority of Ghana (NIA) has new appointees on its governing board with a call on them to…

 

Biometrics has been drafted into the battle between AI fraud and AI defenses

Biometrics implementations for public services are expanding in countries around the world, even as AI-enabled fraud and deepfakes threaten online…

 

Oversight report fuels urgency of Congressional push for TSA biometrics reform

At a time of intensified scrutiny of the Transportation Security Administration’s (TSA) expanding use of facial recognition technology (FRT) at…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events