Who cares about unique identifiers?

Almost everyone has been on the receiving end of a request to provide photo identification (most commonly a drivers’ licence or a passport) when applying for a bank account, or purchasing a new mobile phone, or some similar account-based transaction. The person making the request typically either writes down the details of the document or photocopies it. But there is one piece of information that should not be captured unless there is a legitimate reason to – the unique identifier.
Read More

Risky Business

There is a significant focus within government agencies on the management of risks associated with the adoption of cloud services. This is to be expected as the general perception is that the “cloud” is risky and that adopting cloud services could result in bad outcomes.

Read More



Information Security & Privacy as part of Project Management

A typical Project Management methodology doesn’t include details about ensuring confidentiality, integrity and availability of information or the privacy of personal information. Experience has shown that too often the information security or privacy subject matter experts are not consulted about the project until the test phase, or even worse when the project needs to be signed off or is about to go live.

Read More