How to Add Text to a PDF (A Complete 2026 Guide)
You've probably done this before. Someone sends a PDF, you open it, spot one line that needs changing, and assume it'll take ten seconds.
May 20, 2026 | 20 Min Read
A staff identity card project often lands on someone's desk with very little warning. One week you're handling onboarding documents, access requests, and payroll queries. The next, you're being asked to choose card stock, decide what employee data belongs on a badge, and make sure no one creates a GDPR problem in the process.
That mix of HR, operations, security, and compliance is exactly why these projects go wrong. Teams treat the card as a design job when it's an identity system. If you start with logos and colours, you usually end up rebuilding policy later.
A good staff identity card should do three jobs at once. It should identify the person quickly, support the level of security your workplace needs, and fit into a controlled process that HR and operations can maintain.

In the UK, employee cards aren't just about workplace branding. They're closely tied to formal identity assurance, and the UK government's Identity and Attributes Trust Framework, launched in 2022, created a national standard for digital identity services. That matters because the same assurance principles feed into onboarding, access control, and evidence of role or clearance, as noted in this UK employee ID card guidance.
Before choosing software or printers, settle these points:
If your site also needs door hardware and reader planning, Your 2026 access control system guide is useful because it frames card decisions in the wider access-control setup rather than treating the badge as a standalone item.
Practical rule: If you can't describe how a card is issued, activated, suspended, and collected, you're not ready to print it.
The strongest rollouts come from mapping the workflow before buying anything. A simple process map helps expose where approvals stall, where photos are stored, and who is responsible when someone leaves. If you need a starting point, this process map template is a practical way to sketch the journey from pre-employment checks through issue and recovery.
Don't ignore the employee experience either. A card issue process is formal, but first impressions still matter. Some teams pair onboarding admin with a small welcome gesture, such as a group greeting card, so the process doesn't feel purely transactional.
A staff ID card project often looks harmless until someone asks for the photo archive after an employee leaves, or a lost badge turns up with more personal data on it than it ever needed. That is the point where a design job becomes a data protection issue.

In the UK, the primary risk sits behind the card. Employee photos, cardholder records, encoded numbers, print files, and access logs are all personal data if they can identify someone. Under the Data Protection Act 2018 and UK GDPR, teams need a clear purpose for collecting that data, limits on what they keep, and controls over who can access it. The ICO's employee monitoring guidance also points back to the same tests. Necessity, proportionality, and purpose limitation.
A useful starting question is simple. What problem does the card solve? Visual identification, access control, contractor validation, or role verification each justify different data fields. If the purpose is vague, the card usually ends up carrying too much information, and the back-end system keeps even more.
A practical staff card usually needs less than stakeholders first request. Name, photo, a unique employee number, and sometimes an expiry date are often enough. Department and job title can help on large sites or in client-facing settings, but they also expose more internal information than many organisations intend.
Use this test for each field: would security, reception, or a line manager struggle to do their job without seeing it on the card itself?
| Data field | Usually justified when | Common risk |
|---|---|---|
| Name | Visual identification | Full name may be unnecessary for some roles |
| Photo | Quick human verification | Weak controls over stored image files |
| Employee number | Internal matching and issuance control | Reused as a visible identifier in other systems |
| Department | Large or complex sites | Reveals internal structure without a clear need |
| Job title | Public-facing or regulated roles | Discloses more role detail than necessary |
| Expiry date | Temporary staff, visitors, contractors | Low risk, but only useful if someone checks it |
Avoid putting special category data, home addresses, personal phone numbers, dates of birth, National Insurance numbers, payroll references, or emergency contact details on a physical badge. I would also treat licence numbers, DBS-related markers, and union-related identifiers with care. If a regulated role creates a genuine need, record the rationale and check whether that detail belongs in the system rather than on the visible card.
One mistake I see regularly is using the card front to compensate for weak systems. If managers need more role detail than the card can safely show, fix the directory or roster view instead of crowding the badge.
Suppliers will talk about stock, ribbon quality, encoding options, and print speed. Useful, but secondary. First decide how your organisation will lawfully process employee data through the card lifecycle.
A workable policy should cover:
The hidden liability is usually the shared drive full of old headshots and card templates, not the plastic card in someone's pocket.
If your organisation works across regions, UK GDPR is a strong benchmark because it forces clear decisions on necessity and proportionality. Similar questions appear in other workforce data projects too. The same discipline that applies to badges often applies to telematics, mobile device data, and location tools. This guide to employee GPS tracking rules New Zealand is a useful example of how quickly an operational tool becomes a privacy and governance issue.
A compliant programme depends on the operating model around the card. Ask where photos are uploaded, whether the supplier stores cardholder records, how proofs are shared, and who can export data. If a third party hosts the platform or prints cards off site, procurement should check the contract terms, security measures, and data processing clauses before any employee records move across.
This matters even more if teams are modernising HR systems at the same time. Card projects often expose old folders, duplicate identifiers, and weak joiner-mover-leaver controls. If that sounds familiar, digital transformation work in HR operations usually brings the same governance gaps to the surface.
These are the questions that prevent trouble later:
Who signs off the data fields on the card?
Design approval is not enough. Someone should own the decision on every field shown or encoded.
Where are photos stored, and for how long?
Original image files, cropped versions, and print-ready artwork often end up in different places. Each one needs a retention rule.
Who can search past card records?
Security may need audit access. Line managers usually do not.
What data is printed, encoded, and stored separately?
Those are three different decisions, and each carries different risk.
What happens when someone leaves or changes role?
Deactivation, card recovery, template updates, and record retention should all be defined.
Have you completed a DPIA or at least documented the privacy assessment?
If the card links to access control, attendance, location, or monitoring tools, that review becomes much harder to skip.
A good staff ID programme is boring in the right way. The card shows only what is needed, the records are tightly controlled, and no one is guessing what to do when a badge is lost, replaced, or recovered after exit.
Once the data policy is set, design becomes much easier. The layout should support quick recognition first, and branding second.
The CR80 format is 85.60 × 53.98 mm, matching ISO/IEC 7810 ID-1, and it's the standard footprint expected by most badge holders, printers, and card readers, as set out in credentialing guidance on card compatibility. If a supplier suggests a custom size for visual impact, be wary. Non-standard cards create avoidable problems with holders, printer settings, reader alignment, and replacement stock.
A practical card front usually works best with:
The most common design error is clutter. Teams try to fit every brand element onto a very small surface, then discover the card is hard to read at arm's length.
A clean card usually has one visual anchor. That might be a logo strip, a coloured header, or a clear department marker. Don't use all three unless there's a strong operational reason. If you're preparing artwork internally, a short guide on uploading your company logo can help non-design teams avoid fuzzy files and inconsistent print output.
A staff identity card isn't a mini brochure. If someone can't recognise the holder and read the core details in a glance, the design has failed.
The card has to survive wallets, lanyards, desks, pockets, and readers. That's where practical material choices matter more than visual mock-ups.
Here's the practical trade-off:
The same applies to card orientation. Horizontal orientation often works better for visual identification from a distance. Portrait can make sense if your holder format or branding system is built that way. Pick one standard and stick to it.
A staff ID project often starts with a simple brief. Add a photo, print a badge, get people through the door. The trouble starts when that same card is later expected to control access, prove identity during an incident, and hold employee data that was never properly assessed under UK GDPR.
Security features need to match the actual risk, not the hopeful version of it. A visual-only badge can work in low-control environments where staff are recognised easily and access is still checked by people. Once the card is used to open internal doors, enter secure storage, access a data centre, or support lone working checks, print alone stops being enough.
The common mistake is choosing card technology on unit price and leaving the privacy impact for later. That creates two problems. Weak credentials are easier to copy, and poorly planned integrations often collect more personal data than the organisation needs.
A useful way to assess options is to look at two questions together: what happens if a card is copied, and what happens if the underlying card data is exposed?
| Technology | Security Level | Common Use Case | Data and compliance considerations | Relative Cost |
|---|---|---|---|---|
| Printed photo badge only | Low | Visual identification in staffed spaces | Usually limited personal data on the card face, but misuse risk is high if staff rely on appearance alone | Low |
| Static barcode | Low | Basic staff numbering or internal check-in | Easy to duplicate. If the code maps directly to HR records, access to the lookup system matters as much as the card | Low |
| Magnetic stripe | Low | Legacy systems with older readers | Data can be copied with basic tools. Poor fit for sites that need stronger access control or reliable audit trails | Low to moderate |
| QR code | Moderate in controlled workflows | Temporary passes or app-linked checks | Can work well for time-limited credentials, but avoid exposing personal identifiers in the code itself | Moderate |
| Contactless smart card | Higher | Building access, audit trails, integrated credentials | Better fit for controlled access if keys, readers, and revocation are managed properly | Higher |
For many UK employers, contactless smart cards are the sensible middle ground. Technologies such as MIFARE DESFire EV2 or EV3 are widely used because they support stronger authentication than magnetic stripe or static barcode systems. The card alone is only part of the control, though. Reader configuration, key management, and prompt revocation matter just as much.
Some features look impressive in a product sheet but add very little operational value. Others subtly prevent real incidents.
Use anti-tamper print features if staff or contractors may try to alter expiry dates, names, or site permissions by hand. Holographic overlays, UV print, microtext, or ghost images can help, particularly where guards make visual checks before someone reaches a secure area.
Use electronic credentials when you need accountability. A properly configured smart-card system can log who presented which card, where, and when. That supports investigations, helps identify shared-card behaviour, and gives Facilities or Security something more reliable than witness memory.
Be careful with biometrics. They may look attractive for high-security areas, but they raise a different level of privacy risk. In the UK, biometric data used for identification is special category data under UK GDPR. That means you need a clear lawful basis, a condition for processing, tighter retention rules, and a defensible reason why less intrusive controls are not enough. Many employers do not need that complexity for standard office access.
I've seen ID card projects drift into compliance problems because nobody asked a basic question early enough. What data needs to be on the card, in the access system, and in the print workflow?
Keep the visible card data to the minimum needed for identification. Full names may be appropriate. Dates of birth, payroll numbers, or detailed departmental information usually are not. If the card carries a unique identifier, make sure it does not expose something meaningful on its own, such as an employee number that can be tied back easily through other internal systems.
The same principle applies to photo handling. Staff images are personal data. If you collect them for badge printing, define who can access them, where they are stored, how long rejected images are kept, and whether your print supplier acts as a processor under UK GDPR. If teams use an external provider for photo packs, application forms, or supporting print materials, online document printing services for HR and operations teams can be useful, but only if the supplier's data handling terms have been checked properly.
Start with a pilot in one controlled area. Test lost-card reporting, revocation speed, reader failures, and what happens when an employee changes role but keeps the same card. Those are the points where weak system design usually shows up.
Ask direct questions of any installer or access control provider. How are encryption keys handled? What data is stored on the card versus in the back-end system? Can cards be disabled immediately? How are contractor and temporary staff credentials segregated from permanent employee records? Overton Security gives a useful overview of how electronic access control systems are typically structured, which helps when you need to challenge vague supplier answers.
Cheap credentials often create expensive exceptions. If the card can be cloned, if access logs are incomplete, or if personal data sits in too many places, the problem stops being a badge issue and becomes a security and compliance issue.
A card programme often starts to fail at the printer, not in the design file. The practical problems are usually mundane: a new starter turns up before their card is ready, a replacement request sits in someone's inbox, or a print bureau receives more personal data than it needs. Those are operational issues, but in the UK they can become compliance issues quickly if photo files, employee numbers, or access-related data are handled carelessly.

In-house printing usually works best where hiring is steady, replacement volumes are high, or site access has to be issued the same day. It gives operations, HR, or security teams direct control over print timing, stock, and failed-card handling. That control matters if a line manager expects a contractor or new employee to be active on site within hours.
The cost is not just the printer. It is the process around it.
Someone has to manage blank card stock, ribbons, printer cleaning, template control, reprints, and secure disposal of spoiled cards. Access to the printer PC also needs attention, because it often holds staff photos, card layouts, and export files that count as personal data. If the machine sits in an open office or is shared casually between teams, the risk is obvious. Unauthorised printing, copied image files, and poor version control are common weak points.
Outsourcing makes more sense when card issuance happens in planned batches and the workforce is relatively stable. A decent bureau can improve print consistency and reduce pressure on internal teams, especially if HR is already stretched.
The trade-off is supplier exposure to employee data. Before sending any photo pack or print file outside the business, check exactly what the supplier needs and remove everything else. In many cases, the printer does not need full HR records, dates of birth, or internal notes. Under UK GDPR, that is a straightforward data minimisation point, and it is often missed because card production gets treated as admin rather than processing.
Contracts matter here. Confirm retention periods for artwork and photos, how failed prints are destroyed, who can access jobs in production, and whether subcontractors are involved. For teams reviewing similar admin workflows, these online document printing options for HR and operations teams show the same make-or-buy questions that come up with ID card fulfilment.
Mobile credentials can reduce the need for plastic cards, but they do not reduce the need for control. They shift the workload into app access, device changes, support queries, and policy enforcement.
That creates a different privacy risk profile. A physical card usually carries limited visible data. A digital credential may sit inside a wider employee app that also touches location data, device identifiers, or other account information. If the business adopts mobile ID, define what data the app collects, who can see it, and what happens on personal devices, especially in BYOD environments.
Whichever route you choose, treat printing and fulfilment as a controlled process, not a back-office task. The right decision is the one your team can run consistently, audit properly, and keep within your data-handling rules when volumes rise or staff change quickly.
A staff identity card programme succeeds or fails in the handover moments. New starter. Role change. Lost card. Contractor extension. Resignation. If your policy is vague at those points, the card system won't stay secure for long.

A complete lifecycle should follow identity proofing → issuance → activation → revocation, and a strong operational benchmark is the ability to revoke a lost or terminated employee's access credentials within minutes, not days, with delayed revocation described as a common and critical audit finding in workplace access reviews in this reference on credential lifecycle practice.
That standard matters because many organisations still treat revocation as an admin tidy-up. It isn't. It's a control point.
Your written policy should state:
If a leaver can still use yesterday's card today, the policy isn't the problem on paper. It's the broken handoff between HR and access control.
A launch email isn't enough. Employees need to know what the card is for, where it must be worn, how it interacts with doors or systems, and what to do if it stops working.
The cleanest rollouts usually include:
A manager briefing
Line managers need the script before staff ask questions.
A controlled distribution window
Don't leave uncollected active cards sitting at reception.
A lost-card escalation path
Staff should know exactly who to contact and what happens next.
An exception process
Temporary workers, visitors, and remote hires will test your policy first.
If you're onboarding employees remotely, this guide to remote onboarding best practices is a useful reference because remote joiners expose lifecycle gaps quickly, especially around identity verification, shipping, and activation timing.
Offboarding is a formal process. Recover assets, close access, update systems. But it also involves people who have worked together and want to acknowledge a departure properly. Many teams handle that social side with a virtual leaving card or use a personalized ecard for birthdays and milestones. That doesn't replace policy. It complements it by keeping the process human while the controls stay disciplined.
A thoughtful ID card programme protects access, respects employee data, and makes daily operations easier. If your team also wants a simple way to handle the human side of onboarding, farewells, and workplace milestones, Firacard offers collaborative digital cards that colleagues can sign together from anywhere.
You've probably done this before. Someone sends a PDF, you open it, spot one line that needs changing, and assume it'll take ten seconds.
You can feel when a card is almost there but still hard to read. The message works, the photos are good, and the jokes land. Then the layout starts
You've said yes to helping with the raffle. Then the practical questions land all at once. What should the ticket look like, how many should y