top of page
Search

In the Wake of the Qantas Breach: Rethinking Identity Verification

ree

The recent cyber-attack on Qantas – which saw personal information for roughly six million passengers, including names, email addresses, phone numbers and dates of birth, exfiltrated via a compromised third-party call-centre platform – underscores the escalating risks companies face when handling sensitive PII themselves. While no financial or passport data was accessed, the incident highlights just how damaging even basic identity details can be when weaponised by threat actors.



The Hidden Costs of In-House PII Handling

Managing identity checks in-house often means collecting and storing sensitive documents – driver licences, passports, Medicare cards – within your own systems. This approach multiplies attack surfaces and intensifies regulatory burdens under frameworks such as Australia’s Privacy Act and EU’s GDPR. Data custodianship carries ongoing obligations: secure storage, breach notification, potential fines, not to mention reputational fallout if PII is lost or stolen  .



Why Outsourcing Identity Checks Makes Sense

Engaging specialist third-party identity verification providers shifts the liability for PII storage and matching away from your business. These platforms perform live checks against issuer databases – such as government registries or official document issuer systems – and then promptly purge or tokenise the data, only returning a simple “match” or “no-match” verdict. This model dramatically reduces the volume of PII your organisation ever retains, slashing legal exposure and simplifying compliance  .



Core Capabilities of Modern Verification Services

Most leading identity verification services offer:


  • Document Authentication: Verifying that the document is genuine and unaltered (e.g., driver licence or passport) by checking security features against issuing-authority records  .

  • Biographic Matching: Comparing name, date of birth and document number against official databases in real-time.

  • Liveness and Selfie Biometrics: Ensuring the person presenting the document is alive and the legitimate holder, using facial recognition and anti-spoofing techniques.

  • Continuous Monitoring: Optional dark-web or watchlist screening to flag potential compromised credentials before they’re used.




Leading Providers to Consider

  • Telstra Identity Verification Services

    Uses secure API calls to compare document data (e.g., passport, driver licence) against issuer systems, returning a match/no-match result without storing PII long-term  .

  • IDMatch (via Attorney-General’s Department)

    Government-backed service that checks biographic details on identity documents against Commonwealth records, available 24/7 for businesses and agencies  .

  • Global Data (GSP/IDSP)

    An approved Gateway Service Provider offering instant DVS checks for passports, driver licences and birth certificates, minimising manual review  .

  • ID Analyzer

    A private API platform capable of validating over 190 document types worldwide, with built-in data extraction, authenticity checks and biometric liveness detection  .




Best Practices for Integration

  1. User Consent & Disclosure

    Clearly inform users that their document will be checked via a third-party service, and only the verification outcome is retained.

  2. API-First Deployment

    Embed verification at critical junctures (e.g., account creation, high-value transactions) using lightweight API calls that never store raw images or PII in your systems.

  3. Audit & Monitoring

    Regularly review verification logs and integrate breach detection tools to ensure continuous protection.

  4. Legal Safeguards

    Ensure your contracts with providers include strict data-handling clauses, indemnities, and compliance attestations.




By offloading identity confirmation to expert services, your organisation can eliminate the need to store sensitive documents, reduce regulatory burdens, and fortify your defences against the next inevitable breach – all while maintaining a seamless user experience.

 
 
 

Comments


bottom of page