3 min read

eIDAS – Breaking the SME Barrier

eIDAS – Breaking the SME Barrier

In a recent article, we looked at how eIDAS can help SMEs grow and prosper. SMEs are undoubtedly the lifeblood of any economy which means that EU initiatives must cater to their specific needs. The previous article looked at how eIDAS can address the security needs of SMEs while reducing their regulatory burden and allowing them to focus on their core competencies.

However, SMEs have a unique set of challenges as well. Today, we look at some of the challenges unique to SMEs and how those challenges may be overcome to ensure that SMEs can benefit from eIDAS enabled tools to the maximum extent possible.

Challenge 1: Awareness and technical capabilities.

The majority of businesses in the EU are small operations with less than 10 people and they don’t often have an IT department. Implementing technically complicated solutions might become difficult or cost ineffective in such setups.

Solution

New call-to-actionThe first part of the solution is to spread awareness about what eIDAS enabled tools can do for SMEs in the first place. Unless the business owners know specifically how eSignature or eTimeStamp, for example, can help their business in a tangible way, they might not be interested in implementing the solution. Various EU organisations are already working to spread awareness through infographics, explanatory videos and other such tools. But a bigger impact is likely to come from other commercial partners of these SMEs.

For example, their bank might introduce them to a particular eIDAS enabled solution for their business. Or maybe one of their larger merchandise suppliers might want to on-board them on a supply chain tool that uses something like eSignature or Electronic Registered Delivery Service.

The second part of the solution is providing technical training. Once the positive impact of a particular solution has been made clear, it would become easier to motivate SMEs to invest the necessary resources to implement it and undergo training. In the medium to long term, the investment would likely pay for itself several times over.

Challenge 2: Businesses are diverse.

Organisations differ significantly in terms of size, structure and technical capabilities and, in the case of the EU, additional cultural or language barriers exist as well.

Solution:

In order to reach SMEs anywhere, it is essential to adopt a more local approach. While cross border improvements might be good for certain businesses, many operate locally only. So, it becomes important to address each business based on its specific circumstance. A good way to do this is through a network of networks approach. Rather than information being disseminated form one central location, local hubs need to be created which can help SMEs locally with the necessary information. 

This network of hubs essentially creates a local network further downstream. And each of these hubs would be more aware about the local requirements. Hubs don’t have to be EU bodies - they can be private companies which themselves can benefit operationally by ensuring their local counterparts are using the best tools. For example, an automobile manufacturer which sources components from dozens of local small vendors can provide them with the relevant training.

What lies ahead…

There are many more challenges that lie ahead for successful adoption of various eIDAS enabled tools by SMEs. But such challenges always exist whenever a paradigm shift is being brought about. We will keep highlighting more challenges in future articles and how SMEs can power through them. Ultimately though, it is the business owners who have to decide how to make the best use of all the tools that are not only available to them, but have been designed keeping them in mind.

 

Download white paper

References and Further Reading


  • Selected articles on Electronic Signing and Digital Signatures (2014-today), by Ashiq JA, Gaurav Sharma, Guillaume Forget, Jan Kjaersgaard , Peter Landrock, Torben Pedersen, Dawn M. Turner, and more
  • Selected articles on Authentication (2014-today), by Heather Walker, Luis Balbas, Guillaume Forget, Jan Kjaersgaard, Dawn M. Turner and more