dentification documents. (d) Review best practices that have been established or that areunder consideration to prevent identity theft, privacy invasion, andcriminal use of personal and other data to determine theirapplicability to government-issued identification documents. (e) Consider requirements for a privacy impact assessment and asecurity risk assessment conducted by issuing entities that w