Exploring The Global Digital ID Landscape
Exploring The Global Digital ID Landscape
digital ID landscape
Clear leaders, varied paths, and steps
to realize their potential
Program director
Raul Brens Jr.
Introduction.....................................................................................................................................................3
Analog identity................................................................................................................................................3
Case studies.................................................................................................................................................. 12
Estonia............................................................................................................................................................... 12
India.................................................................................................................................................................... 12
African Union.....................................................................................................................................................13
EU eIDAS ...........................................................................................................................................................13
United States.....................................................................................................................................................13
Endnotes........................................................................................................................................................ 16
Exploring the global digital ID landscape
Executive summary
In an increasingly digital world, digital identity systems re- transform the delivery of government services and industry
present a fundamental transformation in how personal infor- interactions, though there are potential risks and limitations
mation is authenticated and managed, shifting from traditio- to be considered.
nal physical identification methods to electronic credentials Despite promising advantages, limitations across technical,
that enable access to digital services across government political, and social spheres present an array of challenges.
and private-sector platforms. These systems utilize authenti- Technical limitations include interoperability between diffe-
cated credentials that verify individual qualifications and per- rent systems, cybersecurity vulnerabilities, and accessibility
sonal information to establish trusted digital documentation, barriers in regions with limited digital infrastructure. Political
spanning use cases from health certificates to mobile identi- obstacles include insufficient regulatory frameworks, lack
fication for travel security and banking verification. of adherence to international standards, and coordination
The worldwide adoption of digital identity systems varies si- issues between jurisdictions. Social limitations center on
gnificantly across regions and implementation approaches. concerns over public trust, particularly regarding surveil-
Estonia’s comprehensive e-ID system, mandatory for all lance and privacy, along with unequal access that can fur-
residents, demonstrates transformative societal impact by ther marginalize vulnerable populations including refugees,
connecting organizations through distributed databases elderly citizens, and those with limited digital literacy.
and blockchain technology. India’s Aadhaar program serves Successful implementation of digital identity systems re-
a massive population, proving that large-scale digital identity quires coordinated efforts across sectors. Governments
systems can operate in developing countries while bringing must adopt user-first design principles, ensure interope-
previously undocumented populations into formal economic rability through technical standards, tailor systems to local
systems, albeit not without criticism. The European Union’s contexts, and establish effective public-private partnerships.
eIDAS framework mandates that all member states offer di- Private-sector actors should prioritize transparency, data se-
gital identity wallets to citizens and businesses, creating in- curity, and accessibility while implementing privacy-enhan-
teroperability across member states. The African Union has cing technologies. Civil society organizations play crucial
faced infrastructure and data-protection challenges, while roles in public education and representing user interests.
the United States remains fragmented with individual states
implementing mobile driver’s licenses without federal coor- As digital identity systems become the cornerstone of per-
dination. sonal identification, effective implementation depends on
building systems that genuinely serve user needs while
Digital identity systems offer a breadth of benefits including maintaining robust protections against misuse and public
enhanced convenience, improved access for underserved trust through transparency and accountability measures,
populations, stronger privacy protections through data mi- particularly ensuring the protection and well-being of margi-
nimization principles, and significant cost savings for or- nalized and disadvantaged populations.
ganizations. These systems hold tremendous potential to
ATLANTIC COUNCIL 2
Exploring the global digital ID landscape
Introduction
Digital transformation has fundamentally altered how indivi- associated limitations of these systems. Through compre-
duals interact with governments and businesses worldwide. hensive analysis, the report provides practical recommenda-
At the heart of this transformation is the concept of digital tions to facilitate the widespread adoption of digital ID sys-
identity: the electronic representation of an individual’s cre- tems while safeguarding fundamental rights and ensuring
dentials and authentication information that gives access to inclusive access for all.
digital services. This report explores the global digital iden-
tity (ID) landscape, examining the wide-ranging benefits and
Analog identity
Tracing its origin to the Latin idem, or “the same,” an identity with other institutions. Again, considering the passport, a tra-
comprises the traits, qualities, behaviors, and choices that veler must carry their documents with them to cross borders,
define unique individuals, organizations, and entities. These and a passport booklet may not be accepted as a verifica-
largely static details amassed over time include basic tion method for other services, such as entering a school
identifiers, demographic information, employment details, facility or a place of employment.
and biometrics. Taken together, these data can establish Analog IDs also offer relatively easy vectors for identity theft.
authenticity and verify that a claimed entity is “the same” Simply by stealing a wallet or a paper file, a thief can im-
as a genuine entity, shaping how it interacts with others mediately access a trove of information. Printed documents
in the public sphere. Public and private institutions have lack password protection, biometric verification methods,
traditionally represented these consolidated verification and multifactor authentication requirements that limit visibi-
details with analog, or nondigital, identities (IDs). These lity to sensitive details about an entity. A criminal can use
material forms of authenticity include passports, business all printed information to perpetrate a host of identity theft
licenses, and insurance cards that prevent fraudulent activity crimes, seriously disrupting the personal and professional
and enable access to services otherwise unavailable to lives of victims.
anonymous entities.
Furthermore, analog IDs grow increasingly irrelevant as mo-
This verification method offers clear advantages of ease of dern societies digitize. Today’s public commons have trans-
control and challenge of replication. For example, as govern- formed from a physical place of interaction to a network of
ments issue just one tourist passport per citizen, travelers online connections and engagements. Community gathe-
can verify that no one else has access while concealing their rings, professional workflows, and financial transactions no
documents in their possession. Furthermore, while forging a longer require participants to occupy the same space, ins-
passport may be possible, duplication requires access to an tead connecting individuals, businesses, and devices across
original copy, and the authentic document can be verified the world in real time. Analog IDs cannot establish sufficient
with details generally stored in an external database. authenticity in this domain, and the sensitivity of certain in-
However, a physical form of identification also inherently im- teractions requires a threshold of verification that a physical
poses constraints on its effectiveness. It must be physically form of identity cannot provide. To meet this demand, new
present to provide its benefits, and one form of identity spe- forms of digital IDs offer promising alternatives.
cific to a single institution may have limited interoperability
ATLANTIC COUNCIL 3
Exploring the global digital ID landscape
Source: Jean-Marc Seigneur and Tewfiq El Maliki, “Chapter 17 – Identity Management,” in Computer and Information Security Handbook,
ed. John Vacca (Morgan Kaufman, 2009), 269–292, https://doi.org/10.1016/B978-0-12-374354-1.00017-0.
ATLANTIC COUNCIL 4
Exploring the global digital ID landscape
Still, the potential benefits of digitized public services pro- The scope of these digital IDs varies widely across a broad
mise to revolutionize the way governments interact with their range of services. Some systems, such as California’s pro-
citizens, paying dividends through enhanced transparency gram and several other mobile vehicle license programs in
and public trust, and lowering service delivery costs by up to US states, remain limited to few functions, verifying age and
95 percent.7 By leveraging the power of digital connectivity address at select businesses and government agencies. 8
and the quality of available data, public officials can trans- Others, such as Estonia’s e-ID system, enable access to a
form their services into faster, safer, and cheaper alternatives comprehensive list of public services, from voting to mana-
for a more inclusive form of governance. To do so, they face ging medical prescriptions.9
the challenge of developing an integrated, streamlined digi- New digital IDs may also pair with analog IDs for a more ro-
tal infrastructure while sufficiently protecting user data and bust process. Estonia’s e-ID system combines a physical ID
respecting the rights of individuals. Card with an embedded SIM chip, a Mobile ID with encryp-
Common digital ID tion keys stored on a smartphone, and an online Smart ID
system. This diversification allows users to access services
Enter the modern digital ID. These systems offer a verifiable virtually or in person, and it also backs up digital systems for
one-to-one representation of a physical identity across a cases of reduced or disrupted connectivity.10
range of digital applications. When sufficiently scaled, this
enables a user to seamlessly access and engage with an
interconnected network of institutions. In return, those ins-
titutions can better trust the authenticity of a user to ensure
their services are achieving their desired effect.
ATLANTIC COUNCIL 5
Table 2. A comparison of digital IDs across selected countries and US states
Services
System Overview Design and Access
Government Commercial
System
Birth/ Edu-
ATLANTIC COUNCIL
Ownership: ISO Health Vehicle Digital Docu-
Digital ID Digital/ Death Tax cation
Region Government Access Standard Ser- Voting Passports Licen- Bill Pay Signa- ment Banking
Concept Physical Twin Certifi- Filing Ser-
and/or (18013-5) vices sing ture Storage
cates vices
Commerical
Government
Australia Digital iD Yes and/or Com- Citizens No X X X X X X X X
mercial
Exploring the global digital ID landscape
eIDAs/eIDAs2/
EU Yes Both Everyone Yes X X X X X X X X X X
EUDI Wallet
6
Finland e-ID No Commercial Everyone No X X X X X X X X X X
mDL (pilot) /
California California Identity Yes Government Citizens Yes X X X X
Gateway
ATLANTIC COUNCIL 7
Exploring the global digital ID landscape
Digital authentication systems also improve the security of flows and builds trust with users who increasingly see go-
identity management, which better protects the information vernment institutions as working for them.
stored in consolidated databases. Paper registries remain Finally, if regionally standardized, digital IDs can serve
vulnerable to duplication, forgery, loss, and theft. If digitized as catalysts for economic growth. Commonly accepted
in a properly designed database, personal information may frameworks allow users to seamlessly access foreign goods
be better sustained and protected through encryption, the and services while offering businesses international mar-
integration of decentralized blockchain systems, and other ket access beyond borders. The EU’s Digital Identity Wallet
privacy-enhancing technologies (PETs).16 Not only do ad- should offer both demand- and supply-side benefits for tran-
vanced databases improve security, but the user’s ownership sactions between individuals and institutions.18 For example,
of their personal data reduces the need for companies to the system will allow EU citizens to seamlessly access me-
store as much personal information as had been the case. dical prescriptions abroad and open bank accounts in non-
These digital ID systems can greatly improve organizational native countries. Simultaneously, it will enable businesses
efficiency, saving time and money for public and private ins- to easily seek foreign funding and sell products safely and
titutions. Estonia estimates that its e-governance processes securely to customers across borders. This ease of transac-
save more than 1,400 years of working time annually, as 99 tions promises to boost regional commerce and improve in-
percent of government services are available online twenty- ternational competitiveness for countries with such systems.
four hours a day.17 This access streamlines organizational
ATLANTIC COUNCIL 8
Exploring the global digital ID landscape
ATLANTIC COUNCIL 9
Exploring the global digital ID landscape
for government and civil-society actors aimed at developing Potential users may lack a clear understanding of the be-
rights-based, inclusive digital ID systems. In addition to UN- nefits of enrolling in and utilizing government-owned digi-
DP’s framework, the Organization for Economic Co-operation tal ID systems, and this lack of understanding further limits
and Development (OECD) released its Recommendation of public-private trust. Historically, individuals have exhibited a
the Council on the Governance of Digital Identity in August greater willingness to entrust “big tech” firms with their data,
2023.20 Similarly, the recommendation aims to ensure that in large part due to the tangible benefits offered by those
digital identity is reliable, secure, and accessible, and that it companies. Users may feel inclined to skim or blindly agree
respects human rights and democratic values. While these to lengthy privacy policies required for online media or com-
initiatives are valuable, they have limitations as insufficient merce services due to their expectation for rapid gratifica-
governance frameworks, including the lack of enforcement tion from their products. The benefits of sharing personal
mechanisms, concrete guidance on balancing privacy pro- data with the government, however, may not necessarily ap-
tections, guidelines for cross-border interoperability, and re- pear as clear, so citizens may be less likely to volunteer their
gulation on public-private partnerships. data to state-run databases.
Moreover, the global implementation of digital ID systems Moreover, the collection of biometric data presents risks to
can create geopolitical tensions as countries with various security, equality, and public trust. Biometric measurement
privacy standards might be encouraged to adopt regulations systems, while advanced, can be compromised by malicious
that fundamentally challenge their sovereign approaches actors, and the features they use to verify identities cannot
to personal data and human rights. Thus, the enforcement be changed like usernames or passwords. Once exposed,
of robust international guidelines that consider sovereign these fundamentally personal details can be repeatedly
norms but also ensure safe and responsible use of digital ID exploited. Furthermore, facial recognition technologies de-
systems is crucial to widespread adoption. monstrate significant error rates, particularly for margina-
lized populations, leading to potential misidentification and
Social limitations systemic discrimination. Algorithmic biases in biometric col-
In addition to necessity and usability, the adoption of digital lection run the risk of widening privilege gaps, enabling easy
ID systems is fundamentally limited by public trust. The user access for some while creating artificial barriers for others.
must believe that they will gain the benefits offered by the Digital ID systems built on biometric recognition can enable
system while remaining protected by specific design and re- unprecedented government and institutional surveillance,
gulatory measures. transforming identity verification mechanisms into tools for
social control, used by authoritarian regimes to track, moni-
Most immediately, community-level concerns over surveil-
tor, and suppress their citizens.
lance and privacy violations prevent users from opting into
the systems. Personal data will not be voluntarily given up if Finally, digitizing personal identities can create many
there is no trust in the system, and if governments are not risks for marginalized communities. Systematic exclusion
transparent about the mechanisms used for the collection, exists for refugees and migrants who have limited or no
storing, and handling of personal data, misinformation can documentation. There are technological access disparities
further generate public trust concerns. Digital education is in the form of limited infrastructure in underserved
a critical component of building this trust, giving individuals communities, inadequate digital literacy education, and
the ability to understand how their data is used and equip- economic barriers to technology access. In addition to
ping them with skills to mitigate misinformation and disinfor- identification and technological challenges, communities
mation. Regional and generational disparities in digital skill may face discrimination in the form of biometric verification
levels can complicate public outreach efforts, so countries failures, such as algorithmic biases and systematic profiling.
with large digital divides and older populations may struggle These risks could increase social marginalization and
to build trust with their users. inequities across many communities.
ATLANTIC COUNCIL 10
Exploring the global digital ID landscape
ATLANTIC COUNCIL 11
Exploring the global digital ID landscape
Case studies
Estonia tem will protect their data and successfully deliver on its pro-
mises. Estonia’s e-ID currently serves as the gold standard
Estonia presents itself as a unique but crucial use case for
for safe, secure, and effective digital ID systems.
understanding the development and adoption of digital ID
systems. Now considered one of the most digitized, trans- India
parent, and least corrupt countries in the world ,23 Estonia
Launched in 2009 by India’s Unique Identification Authority
took a new path to digitizing its society. With a population of
(UIDAI),33 Aadhaar is the world’s largest digital ID program
only 1.3 million,24 the goal for Estonia’s centralized digital ID
with over 1.3 billion enrollees as of September 2023. The
system was to provide services to all citizens, not only those
system assigns a unique twelve-digit number linked to bio-
fully integrated into digital society. Introduced in 2002, e-ID
metric and demographic data. UIDAI partnered with private
has now operated successfully for more than twenty years.25
companies to establish enrollment centers nationwide, re-
The e-ID data kept by the Estonian government is distributed
gistering 600 million Indians in the first five years,34 while
across interoperable databases and connects almost 700
also preventing duplicates through biometric verification.
organizations and public-sector entities26 to avoid a single
contact point. The data is also decentralized and backed up Aadhaar has been transformational for marginalized Indians
through a data embassy,27 a data center located in Luxem- who previously lacked formal documentation. Before the
bourg under the “Tier 4” level of security—the highest level program, many rural Indians couldn’t leave their villages,
for data centers. Established in 2017, this Estonian-owned rent housing, or open bank accounts due to missing iden-
data center located outside its territorial borders has the tity papers—over a third lacked birth certificates before
same rights as a physical embassy, such as immunity. This 2010.35 Aadhaar, which translates to “base” or “foundation”
innovative concept of duplicative and distributed data limits in English, at its core was developed as a foundation for the
the impact of a potential data breach and is secured against improvement of economic and social lives of Indians.36 As
spoofing attacks with blockchain technology. of 2023, more than 93 percent of the population is registe-
red,37 with Aadhaar serving as the foundation for economic
Estonia’s Identity Documents Act requires all residents to
and social participation.
have a digital ID (e-ID), mandatory at age fifteen. The e-ID
uses two personal identification numbers—one for identity The Aadhaar system provides a model for other developing
verification and one for legally binding e-signatures—and countries seeking to adopt a similar digital identity system.
integrates with banking (nearly 99 percent28 of Estonian Contrasting with other systems, which primarily focus on digi-
banking is online), loyalty programs, and health insurance. tal authentication, the Aadhaar system is primarily designed
This comprehensive system earned Estonia a 74.2 percent as a tool for social inclusion. Millions of underprivileged In-
score29 on the OECD’s 2023 Digital Government Index, well dians now receive benefits and subsidies directly because
above the 60.5 percent average. of welfare programs linked to Aadhaar.38 However, Aadhar
has also faced criticism for further marginalizing populations
However, Estonia’s e-ID has attracted criticism. A 2017 se-
in rural and remote areas due to unreliable internet connec-
curity lapse signaled the risk of reliance on the technology,
tivity, electricity blackouts, and faulty biometric scanners at
resulting in the Estonian government removing security ac-
service delivery points.
cess for almost 800,000 affected identity cards. Users were
forced to update their digital security certificates and while Nevertheless, Aadhaar has integrated the unbanked into the
there was no known data theft, the security flaw had the po- formal financial system, allowing more than 523 million bank
tential to expose a citizen’s full identity, allowing bad actors accounts to be opened.39 The program does face significant
to access hundreds of public- and private-sector services. security challenges: In November 2017, more than 200 offi-
This incident raised concerns around Estonia’s reliance on cial government websites40 accidentally exposed 130 million
e-ID and the severe consequences of a data breach. Aadhaar numbers and personal data.41 This security flaw is
not unique—app-based errors, third-party leaks, and dupli-
Estonia also launched e-Residency in 2014,30 offering trans-
cate Aadhaar cards are just some of the criticisms of India’s
national digital identity verification to access EU business
Aadhaar program.
services online. This has created an attractive ecosystem to
start and run location-independent EU companies entirely In response to these criticisms, the UIDAI released a two-tier
online, expanding market access for companies. The pro- security system42 in 2018 to increase the privacy and security
gram generated €31 million31 for Estonia’s economy in the of Aadhaar numbers. The measure introduced a temporary
first half of 2024 alone, with over 120,000 e-residents and sixteen-digit number, the virtual ID, for every Aadhaar user
33,000 companies by the end of 2024. that allows authentication without using their actual twelve-
digit number. In addition to the virtual ID, the creation of
Estonia’s success is largely due to the country’s high level
a “limited know-your-customer (KYC) service” prevents
of digital literacy, as the government has mandated techno-
agencies from collecting Aadhaar numbers. More recently, to
logy and computer skills be taught in schools from an early
better secure biometric authentication processes, the UIDAI
age.32 This ensures that citizens understand how to access
launched an AI-enabled mechanism in 2023,43 enabling
e-services—including filing taxes, voting in federal elections,
more comprehensive fingerprint verification. The security
viewing healthcare records—and that they trust that the sys-
ATLANTIC COUNCIL 12
Exploring the global digital ID landscape
method confirms the liveness of the collected fingerprint, not be collected without means of privacy protection.
reducing the potential for spoofing attempts. Following Through partnerships like those with Estonia, African
years of negotiations, India passed its first cross-sectoral countries can simultaneously develop robust infrastructure
law on personal data protection,44 the Digital Personal Data and regulations to increase both adoption rates and
Protection Act, in 2023. The act requires individual consent continental interoperability.
prior to the processing of personal data and provides the
user with “the right to access, correct, update, and erase EU eIDAS
their data.” However, the law lacks a strong regulator Implemented in 2014, the European Union’s Electronic
and exempts the government from privacy regulations, Identification, Authentication and Trust Services (eIDAS)
undermining its effectiveness. regulation52 creates a standardized, secure, and interoperable
Despite criticisms, Aadhaar demonstrates successful large- framework for digital identification and transactions across
scale digital ID implementation in communities with limited EU member states. eIDAS aims to eliminate digital barriers
digital integration, revolutionizing e-government access for between countries and facilitate seamless cross-border
marginalized populations while highlighting the need for ro- digital interactions for citizens, businesses, and government
bust security frameworks and comprehensive regulations. entities.
The latest update, eIDAS 2.0,53 addresses accelerated tech-
African Union nological innovation and the shift toward digital-service de-
African Union member countries agree45 that an interope- livery by introducing the European Digital Identity Wallet.54
rable digital ID is essential for the smooth movement of With the aim of simplifying verification processes, eIDAS 2.0
people, goods, and services across the continent. However, also highlights interoperability among member states for a
effective data-privacy frameworks must be established first consistent digital market. The EU Digital Wallet Consortium
to protect user data and build public trust. is a public-private joint venture55 focused on leveraging the
The rollout of Kenya’s digital ID, the Maisha Namba, has benefits of this wallet. Member states must fully implement
been halted numerous times46 due to its noncompliance digital identity wallets by 2026, adhering to the existing eI-
with the country’ Data Protection Act of 2019. Critics argued DAS guidelines.
the Maisha Namba was unconstitutional and posed potential Unlike India’s centralized Aadhaar system, eIDAS establi-
human rights violations.47 Though the ban was lifted in Au- shes a collaborative framework where each member state
gust 2024, the legal battle created a backlog affecting more develops its own electronic identification systems while
than a million applicants and demonstrates the crucial role ensuring mutual recognition and compatibility. Citizens can
data-protection frameworks play in digital ID adoption. use their national digital identities to access public services
South Africa exemplifies a better approach by revising iden- in other EU countries such as remotely submitting tax de-
tification laws while developing its digital ID. The draft Natio- clarations, enrolling in universities, opening bank accounts,
nal Identification and Registration Bill of 2022 aims “to esta- and completing administrative procedures. For businesses,
blish a single, inclusive and integrated national identification the regulation simplifies cross-border digital transactions
system for South Africa applicable to citizens, residents and through consistent legal frameworks for electronic identifi-
foreigners,”48 while ensuring third-party data sharing com- cation and trust services. Furthermore, the European Digital
plies with the Protection of Personal Information Act of 2013. Identity Wallet will harmonize standards and processes, re-
However, frameworks must be developed with interopera- duce costs, and enhance security and privacy protections
bility in mind, as different national approaches create both across the EU, promoting digital innovation and economic
technical and governance challenges across the continent. integration.
ATLANTIC COUNCIL 13
Exploring the global digital ID landscape
services. However, NIST’s guidelines serve as standards, not These recent efforts to establish federal regulation around
law. Bills aiming to establish a government-wide approach the adoption and use of digital IDs in the United States de-
to digital identity improvement (by creating an Improving Di- monstrate the importance of standards to ensure interope-
gital Identity Task Force within the Executive Office of the rability across the country. Because these mobile driver’s
President) were introduced in the 118th Congress in the US license systems are developed and operated by the private
Senate59 and the House of Representatives.60 The Senate sector, it is critical that the federal government implements
Homeland Security and Governmental Affairs Committee regulation to foster safety and compatibility.
referred an amended bill to the full Senate in 2023; in the
House, the bill was referred to the Committee on Oversight
and Accountability in 2024. Neither version of the Improving
Digital Identity Act received a floor vote. To date, the legisla-
tion has not been reintroduced in the 119th Congress.
ATLANTIC COUNCIL 14
Exploring the global digital ID landscape
Will LaRivee is a resident fellow at the Atlantic Council’s GeoTech Center, where he researches
the interplay between international security issues, global political currents, and the technology
frontier.
Prior to joining the GeoTech Center, LaRivee served as a strategic planner at Headquarters Air
Force, where he managed portfolios for manned and unmanned combat aircraft. He is a graduate
of the Air Force Fighter Weapons School. He has served operational tours flying F-22s in Alaska
and Hawaii, where he integrated joint US capabilities with Indo-Pacific allies and partners.
LaRivee holds a master of arts in security studies from Georgetown University’s School of Foreign
Service and a bachelor of science in economics from the US Air Force Academy.
ATLANTIC COUNCIL 15
Exploring the global digital ID landscape
Endnotes
1 Juanita Blue, Joan Condell, and Tom Lunney, “A Review of Identity, Identification and Authentication,” International Jour-
nal for Information Security Research 8, no. 2 (2018): 795, https://infonomics-society.org/wp-content/uploads/ijisr/publi-
shed-papers/volume-8-2018/A-Review-of-Identity-Identification-and-Authentication.pdf.
2 Jean-Marc Seigneur and Tewfiq El Maliki, “Chapter 17 – Identity Management,” in Computer and Information Security
Handbook, ed. John Vacca (Morgan Kaufman, 2009), 269–292, https://doi.org/10.1016/B978-0-12-374354-1.00017-0.
3 Blue, Condell, and Lunney, “A Review of Identity,” 799.
4 “E-file Options to File Your Return,” US Internal Revenue Service, last modified October 28, 2024, https://www.irs.gov/filing/
e-file-options; and “America’s Seed Fund,” US Small Business Administration, https://www.sbir.gov/.
5 “The Failed Launch of www.HealthCare.gov,” Harvard Business School, November 18, 2016, https://d3.harvard.edu/plat-
form-rctom/submission/the-failed-launch-of-www-healthcare-gov/.
6 “Marketplace 2024 Open Enrollment Period Report: Final National Snapshot,” Centers for Medicare & Medicaid Services,
January 24, 2024, https://www.cms.gov/newsroom/fact-sheets/marketplace-2024-open-enrollment-period-report-final-natio-
nal-snapshot.
7 Paula Algarra et al., “How Digital Technology Can Delivery Government Services More Cost Effectively,” Inter-American
Development Bank, March 30, 2023, https://blogs.iadb.org/ideas-matter/en/how-digital-technology-can-deliver-govern-
ment-services-more-cost-effectively/.
8 “Mobile Driver License,” American Association of Motor Vehicle Administrators, https://www.aamva.org/topics/mobile-dri-
ver-license#?wst=d5a5f5751f7474b62a5bb2b374692b61.
9 “e-Identity,” e-Estonia, Accessed November 2024, https://e-estonia.com/solutions/estonian-e-identity/id-card/.
10 “e-Identity,” e-Estonia.
11 “About Us,” Id.me, Accessed November 2024, https://id.me/.
12 “Identification for Development Global Dataset,” World Bank, Accessed November 2024, https://id4d.worldbank.org/glo-
bal-dataset.
13 “Digital ID to Unlock Africa’s Economic Value if Fully Implemented, Say Experts,” United Nations Economic Commission for
Africa, February 20, 2024, https://www.uneca.org/stories/digital-id-to-unlock-africa%E2%80%99s-economic-value-if-fully-im-
plemented%2C-say-experts.
14 “I Am a Resident Foreign National, Can I Enroll for Aadhaar?,” Unique Identification Authority of India, Accessed November
2024, https://uidai.gov.in/en/circulars-memorandums-notification/296-english-uk/faqs/enrolment-update/aadhaar-enrol-
ment-process/16483-i-am-resident-foreign-national-can-i-enrol-for-aadhaar.html.
15 “What is Data Minimization and Why is it Important?,” Kiteworks, Accessed June 23, 2025, https://www.kiteworks.com/
risk-compliance-glossary/data-minimization/
16 “Emerging Privacy-enhancing Technologies,” Organisation for Economic Co-operation and Development (OECD), March 8,
2023, https://www.oecd.org/en/publications/emerging-privacy-enhancing-technologies_bf121be4-en.html.
17 “e-Governance,” e-Estonia, Accessed November 2024, https://e-estonia.com/solutions/e-governance/government-cloud/.
18 “European Digital Identity,” European Commission, Accessed November 2024, https://commission.europa.eu/strate-
gy-and-policy/priorities-2019-2024/europe-fit-digital-age/european-digital-identity_en.
19 “UNDP Model Governance Framework for Digital Legal Identity System,” United Nations Development Programme Digital
Legal ID Governance4ID, in collaboration with Norwegian Ministry of Foreign Affairs, (Accessed November 2024), https://
www.governance4id.org/.
20 OECD, Recommendation of the Council on the Governance of Digital Identity, OECD/LEGAL/0491, Accessed November
2024, https://legalinstruments.oecd.org/en/instruments/OECD-LEGAL-0491.
21 Sreevas Sahasranamam and Jaideep Prabhu, “Digital Public Infrastructure in the Developing World,” Stanford Social Innova-
tion Review, March 25, 2024, https://ssir.org/articles/entry/digital-public-infrastructure-developing-world.
22 “Estonia among the Least Corrupt Countries, Rising to 12th Position Globally: Report,” Invest in Estonia, e-Estonia, March
2024, https://investinestonia.com/estonia-among-the-least-corrupt-countries-rising-to-12th-position-globally-report/.
23 “Estonia among the Least Corrupt,” Invest in Estonia.
24 “Estonia: Population, Demographic Situation, Languages, and Religions in Estonia,” Eurydice (network), European Commis-
sion, July 15, 2024, https://eurydice.eacea.ec.europa.eu/national-education-systems/estonia/population-demographic-situa-
tion-languages-and-religions.
25 “e-Identity: Estonia’s e-ID: The Cornerstone of a Seamless Digital Society,” e-Estonia, (Accessed October 2024., https://e-es-
tonia.com/solutions/estonian-e-identity/id-card/.
26 Jake Maxwell Watts, “One Country’s Uber-Convenient, Incredibly Invasive Digital ID System,” Wall Street Journal, May 9,
2019, https://www.wsj.com/articles/the-digitization-of-your-identity-11557403060.
27 “e-Governance: Data Embassy,” e-Estonia, Accessed November 2024, https://e-estonia.com/solutions/e-governance/da-
ta-embassy/.
ATLANTIC COUNCIL 16
Exploring the global digital ID landscape
28 “Estonia Country Commercial Guide,” US Department of Commerce, March 15, 2024, https://www.trade.gov/country-com-
mercial-guides/estonia-market-overview.
29 “Estonia among the Best Countries to Provide Digital Public Services according to the OECD,” e-Estonia, January 31, 2024,
https://e-estonia.com/estonia-among-the-best-countries-to-provide-digital-public-services-according-to-the-oecd/.
30 “e:Identity: e-Residency,” e-Estonia, Accessed October 2024, https://e-estonia.com/solutions/estonian-e-identity/e-residen-
cy/.
31 Sten Hankewitz, “Estonian e-residents Contribute Millions to the Economy,” Estonian World, June 3, 2024, https://esto-
nianworld.com/business/estonian-e-residents-contribute-millions-to-the-economy/.
32 “Estonia: The Most Advanced Digital Society in the World,” Global Ties KC, April 25, 2024, https://globaltieskc.org/estonia-
the-most-advanced-digital-society-in-the-world/.
33 Billy Perrigo, “India’s Supreme Court Rules Aadhaar Is Constitutional,” Time, September 28, 2018, https://time.com/5409604/
india-aadhaar-supreme-court/.
34 Michael Totty, “Addressing Its Lack of an ID System, India Registers 1.2 Billion in a Decade,” Research Brief, UCLA Anderson
School of Management, April 13, 2022, https://anderson-review.ucla.edu/addressing-its-lack-of-an-id-system-india-registers-
1-2-billion-in-a-decade/.
35 Michael Totty.
36 Ted O’Callahan, “What Happens When a Billion Identities Are Digitized?,” Faculty Viewpoints: K. Sudhir and Shyam Sunder,
Yale Insights, March 27, 2020, https://insights.som.yale.edu/insights/what-happens-when-billion-identities-are-digitized.
37 Manya Rathore, “Share of Population Covered under Aadhaar in India as of Financial Year 2018 to 2023,” Statista, July 24,
2024, https://www.statista.com/statistics/1170678/india-share-of-population-covered-under-aadhaar/#:~:text=As%20of%20
financial%20year%202023,to%20all%20across%20the%20country.
38 India’s Ministry of Electronics & IT underscored that “Aadhaar has been a powerful tool in bringing people into the formal
financial system.” See Press Release 2067940, Press Information Bureau, Government of India, October 24, 2024, https://
pib.gov.in/PressReleasePage.aspx?PRID=2067940#:~:text=Aadhaar%20has%20been%20a%20powerful,into%20the%20
formal%20financial%20system.
39 Press Release 2067940, Press Information Bureau, Government of India.
40 “Over 200 Govt Websites Made Aadhaar Details Public: UIDAI,” Times of India, November 19, 2017, https://timesofindia.india-
times.com/india/210-govt-websites-made-public-aadhaar-details-uidai/articleshow/61711303.cms.
41 Tech2 News Staff, “130 Mn Aadhaar Numbers Were Not Leaked, They Were Treated as Publicly Shareable Data: CIS,”
Firstpost, May 3, 2017, https://www.firstpost.com/tech/news-analysis/130-mn-aadhaar-numbers-were-not-leaked-they-were-
treated-as-publicly-shareable-data-cis-3702187.html.
42 Anuj Srivas, “Data Breaches, Leaks: UIDAI Rolls out New Security Measures,” Wire, January 10, 2018, https://thewire.in/tech/
data-breaches-leaks-uidai-rolls-new-security-measures.
43 Sneha Kulkarni, “Aadhaar Authentication to Become More Secure with New System; Know Details,” Economic Times, last
updated March 1, 2023, https://economictimes.indiatimes.com/wealth/save/aadhaar-authentication-to-become-more-secure-
with-new-system-know-details/articleshow/98324038.cms?from=mdr#google_vignette.
44 Anirudh Burman, “Understanding India’s New Data Protection Law,” Paper, Carnegie Endowment for International Peace,
October 3, 2023, https://carnegieendowment.org/research/2023/10/understanding-indias-new-data-protection-law?lang=en.
45 African Union, Interoperability Framework for Digital Identity in Africa, African Union, February 2022, https://au.int/sites/de-
fault/files/documents/43393-doc-AU_Interoperability_framework_for_D_ID_English.pdf.
46 Chris Burt, “Kenyan High Court Pauses National Digital ID for Third Time in 4 Years,” Biometric Update, July 25, 2024, https://
www.biometricupdate.com/202407/kenyan-high-court-pauses-national-digital-id-for-third-time-in-4-years.
47 Ayang Macdonald, “Kenya’s Digital ID Delivery Back On; Court Sets Aside Latest Injunction,” Biometric Update, August 13,
2024, https://www.biometricupdate.com/202408/kenyas-digital-id-delivery-back-on-court-sets-aside-latest-injunction.
48 Melody Musoni, Ennatu Domingo, and Elvis Ogah, Digital ID Systems in Africa, ECDPM Discussion Paper 360, European
Centre for Development Policy Management, December 2023, https://ecdpm.org/application/files/5517/0254/4789/Digi-
tal-ID-systems-in-Africa-ECDPM-Discussion-Paper-360-2023.pdf.
49 Kevin Rotich, “Estonia Opens Trade Office in Nairobi with 8 Firms,” Capital Business (Kenya), April 14, 2023, https://www.
capitalfm.co.ke/business/2023/04/estonia-opens-trade-office-in-nairobi-with-8-firms/.
50 “Estonia’s Thriving Digital Partnership with Africa,” e-Estonia, July 10, 2023, https://e-estonia.com/estonias-thriving-digi-
tal-partnership-with-africa/.
51 “Data Protection Laws in Namibia,” DLA Piper, 2025, https://www.dlapiperdataprotection.com/index.ht-
ml?t=law&c=NA#:~:text=freedoms%20of%20others.-,Save%20for%20the%20constitutional%20right%20to%20priva-
cy%2C%20Namibia%20has%20not,and%20for%20matters%20connected%20therewith.
52 “eIDAS Regulation,” European Commission, last updated May 5, 2025, https://digital-strategy.ec.europa.eu/en/policies/ei-
das-regulation.
53 “eIDAS 2.0: A Beginner’s Guide,” Dock.io, June 9, 2025, https://www.dock.io/post/eidas-2.
54 “EU Digital Identity Wallet Home,” European Commission, Accessed October 2024,, https://ec.europa.eu/digital-buil-
ding-blocks/sites/display/EUDIGITALIDENTITYWALLET/EU+Digital+Identity+Wallet+Home.
ATLANTIC COUNCIL 17
Exploring the global digital ID landscape
ATLANTIC COUNCIL 18
Atlantic Council Board of Directors