FB pixel

Many factors make good digital ID planning and procurement

Practical advice in heavy demand at ID4Africa 2024
Many factors make good digital ID planning and procurement
 

The journey to a secure identity usually begins with understanding an organization’s unique needs. With cyber threats evolving rapidly and data breaches becoming more sophisticated, reports of organizations implementing robust digital identity tools to protect sensitive information and ensure secure access, is also on the rise.

A session at the ID4Africa 2024 conference co-chaired by Dr. Sarah Lister, head of governance at UNDP, and Victor Margall von Hegyeshalmy, electoral/ID procurement lead at UNDP Procurement Services Unit focused on the practical aspects of eID and eGovernance digital tools. Lister tells Biometric Update that it is evident that many countries are currently planning or already designing and implementing digital ID and eGovernance systems.

“There is also a huge interest and dynamism in the industry around these technologies. And there is a significant thirst for support on issues of procurement,” she adds.

This “creates many opportunities but also risks and challenges. It is fundamental to have a well-balanced, well-informed and objective assessment on each case, starting with the needs and how to optimally address them. Factors that become critical may include medium and long term sustainability of the offerings, overall and hidden costs – search for the true ‘best value for money’, ensuring ownership by the beneficiary, and progressive capacity building and progressive introduction of technology.”

It was highlighted in the session that decisions to make or buy digital identity and governance systems must also consider all the above and further technological aspects, as each involve significantly different pros and cons, she continues.

Associated risks

According to the session, analyzing past security incidents and potential threat vectors can help in selecting an identity tool that addresses specific vulnerabilities. This proactive approach minimizes the risk of future breaches. Once the needs are identified, the next step is procuring technology that aligns with those needs. This phase involves meticulous research and evaluation of available options.

Margall von Hegyeshalmy notes that risks can materialize at any stage of the overall process and may come from very different angles and/or actors involved.

“In procurement, we use models and procedures geared towards risk identification and mitigation, including of course all  parts of contract implementation,” Margall von Hegyeshalmy adds.

“But risks go beyond that, and we must also look into aspects and potential risks relating to the further future and the resilience of the technologies and solutions chosen. The more advanced a country is in implementing a system, the more costly it may be to address design defects or even change to another system to address challenges in the future, so we need to take great care in every step towards designing and deploying a national identity solution.”

The session also delved into the risks associated with deploying national identity systems and how to mitigate them. Margall von Hegyeshalmy highlighted the importance of a holistic approach to risk management, which encompasses the entire lifecycle of the solution from procurement to long-term resilience.

The presentation at ID4Africa identified a number of risks and potential mitigation measures. This includes ensuring early and consistent involvement of relevant objective experts, for comprehensive and in depth analysis and advice from start to end. Additionally, it also includes seeking and conducting relevant business processes analysis, as technology alone will likely not be the answer to procedural issues, according to Lister.

Assessing technical capacities at the government and seeking to build those in line with the technical complexity of the system (hence, progressive approaches are practical), and ensuring steps taken are consistent and avoid back and forth, are both additional mitigation measures.

“Focus on needs and results; ensure ownership and tools are handed over to; consider total cost of ownership including maintenance; consider present and future use including scalability, interoperability, ensure open standards; and consider special contractual modalities and clauses for software/systems development,” Lister concludes.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Get in on California’s Identity Gateway, says chief information official

California’s Chief Information Officer and California Department of Technology (CDT) Director Liana Bailey-Crimmins wants more departments to plug into the…

 

Digital identity takes center stage at G20 TechSprint as OIDF, ID4Africa joins judging panel

Digital identity featured prominently for the first time at the G20 TechSprint, with global open identity standards body OpenID Foundation…

 

World Bank experts urge more investment in DPI security, resilience

Three World Bank experts have cautioned that the rapid deployment of digital public infrastructure (DPI) must be matched with security preparedness…

 

Ethio Telecom to boost Cameroon’s digital connectivity, inclusion drive

Cameroon, through its government-owned telecommunications company (CAMTEL), is leaning on the experience of Ethiopia’s Ethio Telecom to strengthen its efforts toward…

 

Vietnam integrating biometrics into daily life in digital transformation drive

Vietnam is rapidly integrating biometrics and digital identity into everyday life, rolling out identity‑based systems across public transport, air travel…

 

Cambodia’s Verify digital ID tech adopted by the Philippines national identity system

The Philippines government is plugging in Cambodia’s digital verification platform to its national digital identity system. From St. Kitts and…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events