Accessibility
On this website, it is possible to change the contrast of the content to make reading easier.
To enlarge the content, we recommend using the built-in functionality of the web browser: hold down the Ctrl key (Cmd key in OS X) and press the + or – key at the same time.
Another convenient option is to use the mouse: hold down the Ctrl key while moving the mouse scroll wheel. You can return to normal size by pressing the Ctrl and 0 keys at the same time.
All major operating systems include settings to increase the content displayed on the screen.
In Windows 7, you can find a program called Magnifier if you click on the “Start” menu button at the bottom left, type Magnifier (the first few letters are enough) and press Enter. A small window will open in which everything is magnified. By default, the program tracks the position of the mouse cursor. In Windows XP, you can find Magnifier by going to Start > All Programs > Accessories > Accessibility > Magnifier.
On Apple computers, to use zoom, navigate to: Apple menu > System Preferences > Accessibility (or Universal Access) > Zoom.
Jamaica Identity Management Framework
eGA experts provided consultancy and guidance to IDB, NIDS Project Team and critical stakeholders for developing the National Identification System for Jamaica. The secure system for issuing ID cards is the main precondition of the development of a strong identity, incl. a digital identity that enables secure access to public services and helps to build trust towards the system.
The consultancy concerned policies, standards and processes by reviewing NIDS (National Identification System) Security Framework, identifying gaps and developing eight information security policies.
The work included the following tasks:
1. A general overview of the NIDS Framework policies and legal analysis of existing policies and best practices to identify gaps and make high-level recommendations,
2. A review of enrolment and renewal, vetting and identity verification services as the key processes in the identity card lifecycle to identify possible risks and gaps and to make high-level recommendations.
3. A general review of the NIDS Solution architecture and design to identify gaps and to give high-level recommendations.
4. State of Affairs Report drafting.
5. A review or drafting of the most critical policies related to information security management in compliance with ISO/IEC 27001, and a review of the Incident Response Strategy.