Government

Many Small Steps to Enhanced Passport Security

The real value of security components

A huge number of people cross borders every hour, many of them by air. If you consult flight radar apps, where one can follow every airplane currently in the air, air traffic is sometimes so heavy that you are not even able to spot a patch of sky amongst flight paths. It is estimated by the International Aviation Trade Association (IATA) that the number of travelers will double in the next twenty years. The world is becoming a smaller place.

Why Governments Should Consider Private Sector Verification Needs When Introducing Digital ID

Digital identity is more than a buzzword in the government business. It is almost reality. More than 10 pilot projects and a small number of live projects are currently running worldwide, mainly around digital driving licenses. But what do we mean when we talk about digital identity? Is it just a digitalized identity document that is accessible on a smart phone? This would not make it any different from a conventional physical document, so why bother at all investing in such a project?

When It Comes to a Digital ID, Where Is the Safest Place for a Citizen's Data?

Today, a small number of citizens around the world are lucky enough to use digital IDs thanks to a handful of governments that have put these programs in place. For many others, digital ID is just around the corner. Nevertheless, the decision to go for a digital ID program implicates many decisions that a government must make during the process. An example of one such vital decision is where the data of the citizens will be stored.

Integrated Security Features Reduce the Risks of Paper Documents

As he waits to travel outside the EU, a man stands in the border control line to get his passport checked. He is a bit nervous, but his passport does not take any longer to get checked than the passport of the traveller before him. The border control officer takes a quick look at the security features on the polycarbonate data page and the security thread, the data is read from the MRZ and we’re done. Next one, please!

Subscribe