Biometrics & Accessibility

Size: px
Start display at page:

Download "Biometrics & Accessibility"

Transcription

1 Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com

2 Biometrics Research Group, Inc. Biometrics Research Group is a leading research vendor and publisher.

3 What are Biometrics? Biometrics are measurable physical and behavioral characteristics that enable the establishment and verification of an individual s identity.

4 Biometric Modalities Fingerprint Recognition Iris Recognition Hand Geometry Voice Recognition Retinal Scan Technology Facial Thermography Rapid DNA & DNA Profiling Gait Recognition Gesture Recognition

5 Biometric Marketplace Global biometrics market will grow to US$15 billion by 2015 from its 2012 estimated value of US$7 billion.

6 Biometric Marketplace

7 Biometric Marketplace Fingerprint recognition was valued at US$5 billion in 2012 and is expected to reach nearly US$10 billion in 2015.

8 Biometric Marketplace Face, iris, vein, and voice recognition biometric technologies together form the second largest segment. This sector is worth an estimated US$2 billion in 2010 and is expected to reach US$5 billion in 2015.

9 Biometric Marketplace Face, iris, vein, and voice recognition biometric technologies together form the second largest segment. This sector is worth an estimated US$2 billion in 2010 and is expected to reach US$5 billion in 2015.

10 Biometric Marketplace Biometrics has mainly be used by government for security and border control applications. Traditional use of biometric technologies by government have been a contributing factor to myths about biometric technology. General skepticism about government can be considered a major factor that drives skepticism and myths about biometrics.

11 Biometric Myths Biometrics are a new concept. Myth. Physical size, face shape, complexion and other noticeable features have been used to identify people for thousands of years.

12 Biometric Myths Use of biometrics can lead to injury. Myth. Eye scan technology and hardware do not use organ-damaging lasers.

13 Biometric Myths Biometrics authenticates identity. Myth. Biometrics do not authenticate a specific identity, but only the person "enrolled" in a system.

14 Biometric Myths Biometric data is ubiquitous. Myth. The world as depicted in the movie "Minority Report" simply does not exist. Fingerprint data captured by a commercial fingerprint system does not automatically and instantaneously end up in law enforcement databases.

15 Biometric Myths Stolen body parts can be used for biometric authentication. Myth. With most biometric technologies, an element of "aliveness" detection is required.

16 Biometric Myths Biometrics are infallible. Myth. Biometric technologies are subject to error. i.e., Smaller fingerprint sensors can be inaccurate. i.e., Skin conditions and ageing can affect performance. i.e., Certain biometric modalities will perform poorly or not at all for people with disabilities.

17 Biometric Reality Biometrics, like all other technologies, can fail. Academic Shoshana Magnet notes that technical literature often points out that biometric technology frequently malfunction. Magnet argues that biometric system fail because rendering human bodies in biometric code falsely assumes that people s bodies are always the same and unchanging over time. By focusing on moments when biometrics fail, Magnet demonstrates that they fail more often when women, people of color and people with disabilities are subjected to their use.

18 Biometric Reality Magnet has argued in previous academic articles with colleagues that despite biometrics and other security systems being marketed as objective and neutral, they in fact, only reinforce existing social inequalities. Such social inequalities include physical and mental disabilities. For example, certain eye-based biometrics will not work with the blind.

19 Accessibility Considerations It should be a fundamental tenet of the design, engineering and manufacture of all the components of the enrolment process that consideration should be given at each stage of the development to the accessibility requirements of disabled people.

20 Accessibility Considerations Consideration should be taken to make the processes of enrolment and verification barrier free, in order to make processes accessible, especially to disabled persons.

21 Accessibility Considerations In regard to facial, iris or fingerprint scanning, the pattern recognition software or optical scanner should be capable of compensating for distortion caused by a disabled person, i.e., keeping their head or hands high still in one position for long enough. The equipment should compensate to be able to produce an acceptable recognition of the intended biometric of the individual.

22 Accessibility Considerations Instead of using a single biometric modality for disabled persons, use multi biometric solutions such as two Factor Authentication (2FA)

23 What is 2FA? Two-factor authentication adds a second level of authentication to an account log-in. 2FA requires the user to have two out of three types of credentials before being able to access an account: Something you know, such as a Personal Identification Number (PIN), password, or a pattern Something you have, such as an ATM card, phone, or fob Something you are, such as a biometric like a fingerprint or voice print

24 2FA: Emerging security approach Two-factor authentication allows for either replacement or augmentation of passwords.

25 2FA Market Size The global multi-factor authentication market is expected to reach US$5.45 billion by 2017, at a compound annual growth rate (CAGR) of 17.3 percent from 2012 to Arguably, a portion of 2FA market growth will be driven by technological innovation seeking to make biometric modalities more accessible. Such changes will be initiated by legislation and regulation in North America and European Union member states.

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means: Introduction Who are you?? Biometrics CSE 190-B00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication

More information

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How

More information

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified? Introduction Who are you?? Biometrics CSE 190-C00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

Biometrics: primed for business use

Biometrics: primed for business use Article Biometrics: primed for business use Introduction For the regular traveller, identity and security checks are becoming ever more intrusive. Walk though an airport today, and you are likely to be

More information

Biometric Technology for DLID

Biometric Technology for DLID Canada Day at DLID Summit, Houston, Texas, February 29 th, 2004 An introduction to the science (as applied to Canadian requirements) Ian Williams Principal www.idsysgroup.com Biometrics: Defined Automatically

More information

Research Article. ISSN (Print)

Research Article. ISSN (Print) Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Biometrics Technology for Human Recognition

Biometrics Technology for Human Recognition Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system

More information

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference John Kendall Director Public Sector and Security Programs, Asia-Pacific 27 May 2015 Key Border Security Challenges

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

Biometric Authentication

Biometric Authentication CS 361S Biometric Authentication Vitaly Shmatikov Biometric Authentication Nothing to remember Passive Nothing to type, no devices to carry around Can t share (usually) Can be fairly unique if measurements

More information

International Journal of Research and Review E-ISSN: ; P-ISSN:

International Journal of Research and Review   E-ISSN: ; P-ISSN: International Journal of Research and Review www.gkpublication.in E-ISSN: 2349-9788; P-ISSN: 2454-2237 Original Research Article Biometric Finger Print: Its Authentication and Effectiveness on Health Care

More information

Recommended Practice 1701 l

Recommended Practice 1701 l Recommended Practice 1701 l Background: The International Traveler Scheme aims to bring registered travelers schemes together under one overall program. The purpose of an International Traveler Scheme

More information

The Angola National ID Card

The Angola National ID Card The Angola National ID Card Advanced document security for a widely dispersed population 25 by Uwe Ludwig The Republic of Angola in south-central Africa is bordered by Namibia to the South, the Democratic

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

International Biometrics & Identification Association

International Biometrics & Identification Association International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy Boston, 14-18 February 2008 AAAS Annual Meeting 1 Joint Research Centre (JRC) The European Commission s Research-Based Policy Support Organisation Biometrics in Border Management Grand Challenges for Security,

More information

Background and Status of the Tanzania National ID System

Background and Status of the Tanzania National ID System 1 Background and Status of the Tanzania National ID System 2 Coverage INTRODUCTION IMPLEMENTATION STATUS KEY TECHNOLOGIES CHALLENGES WAY FORWARD 3 INTRODUCTION Introduction- Tanzania at Glance. Total Area:

More information

Consumer Attitudes About Biometric Authentication

Consumer Attitudes About Biometric Authentication Consumer Attitudes About Biometric Authentication A UT CID Report by Rachel L. German and K. Suzanne Barber May 2018 The Center for Identity greatly appreciates and acknowledges the following organization

More information

Opinion 3/2012 on developments in biometric technologies

Opinion 3/2012 on developments in biometric technologies ARTICLE 29 DATA PROTECTION WORKING PARTY 00720/12/EN WP193 Opinion 3/2012 on developments in biometric technologies Adopted on 27 th April 2012 This Working Party was set up under Article 29 of Directive

More information

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

LEGISLATION. The BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT LEGISLATION The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT" SECTION 1. NEW LAW A new section of law to be codified in the (Appropriate Statutes of State, hereafter Statutes ), unless

More information

CASE STUDY 2 Portuguese Immigration & Border Service

CASE STUDY 2 Portuguese Immigration & Border Service CASE STUDY 2 Portuguese Immigration & Border Service Page 1 Table of Contents EXECUTIVE SUMMARY... 3 1 CUSTOMER NAME... 4 2 BUSINESS CASE BUSINESS DRIVERS... 4 3 CHALLENGE... 4 4 SOLUTION DESCRIPTION...

More information

BIOMETRICS IN A HUMANITARIAN CONTEXT

BIOMETRICS IN A HUMANITARIAN CONTEXT BIOMETRICS IN A HUMANITARIAN CONTEXT Andrew Hopkins & Justin Hughes 1 Presentation Overview s global footprint The Genesis of Biometrics within The Biometrics Implementation Project Conclusions, the Future

More information

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: Introduction Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic: As a process: 1. A measurable biological (anatomical and physiological) and

More information

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011] [To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the ----------, 2011] Government of India MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department

More information

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY Presented By: Cristian Morosan - University of Houston CRISTIAN MOROSAN ASSISTANT PROFESSOR CONRAD N. HILTON COLLEGE UNIVERSITY OF HOUSTON

More information

Prepared by Space and Naval Warfare Systems Center Atlantic

Prepared by Space and Naval Warfare Systems Center Atlantic System Assessment and Validation for Emergency Responders (SAVER) Biometric Systems Application Note June 2015 Prepared by Space and Naval Warfare Systems Center Atlantic Approved for public release, distribution

More information

Here s our nickel tour of biometrics well, okay, that d be a dollar or

Here s our nickel tour of biometrics well, okay, that d be a dollar or In This Chapter Chapter 1 Understanding Biometrics Getting a handle on biometrics Sampling physiological and behavioral biometrics Defining biometric systems Protecting biometric systems Here s our nickel

More information

(Approved December 30, 2010) AN ACT

(Approved December 30, 2010) AN ACT (H. B. 2167) (Conference) (No. 237-2010) (Approved December 30, 2010) AN ACT To amend Article 14, Article 216, Article 225, and Article 235, and add a new Article 235-A to Act No. 149 of June 18, 2004,

More information

Smart Voting System using UIDAI

Smart Voting System using UIDAI IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Smart Voting System using UIDAI Mrs. Nandhini M 1 Mr. Vasanthakumar M 2 1 Assistant Professor 2 B.Tech Final Year Student

More information

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS? ACCENTURE CITIZEN SURVEY ON BORDER MANAGEMENT AND BIOMETRICS 2014 FACILITATING THE DIGITAL TRAVELER EXPLORING BIOMETRIC BARRIERS With

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

The Open Biometrics Initiative and World Card

The Open Biometrics Initiative and World Card The Open Biometrics Initiative and World Card Notes on RealTechSupport for Biometrics Marc Böhlen, MediaRobotics Lab, University at Buffalo Out-collect the data collectors WhatTheHack2005, The Netherlands

More information

The Perception of Biometric Technology: A Survey

The Perception of Biometric Technology: A Survey The Perception of Biometric Technology: A Survey Stephen J. Elliott, Ph.D. Department of Industrial Technology, Purdue University West Lafayette, Indiana, USA elliottgpurdue.edu Sarah A. Massie Department

More information

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program

U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program U.S. Department of Homeland Security: Improved homeland security management and biometrics through the US-VISIT program US-Visit In the wake of the attacks of September 11, 2001, the United States federal

More information

The Biometric Devil's in the Details

The Biometric Devil's in the Details Published on Security Management (http://www.securitymanagement.com) The Biometric Devil's in the Details By Ben Rothke CISSP, QSA, and Benjamin Tomhave, MS, CISSP December 2008 After numerous false starts,

More information

INTRODUCTION BACKGROUND. Chapter One

INTRODUCTION BACKGROUND. Chapter One Chapter One INTRODUCTION BACKGROUND The U.S. Army has a growing need to improve access control for its many systems, both in wartime and in peacetime. In wartime, the Army s dependence on information as

More information

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT

AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT AADHAR BASED ELECTRONIC VOTING SYSTEM USING BIOMETRIC AUTHENTICATION AND IOT Sarankumar.V 1, Sasikumar.M 1, Ramprabu.K 1, Sathishkumar.A 1 Mr. S. Gladwin Moses Stephen 2 1 Student, 2 Assistant Professor

More information

ABC and Integrated Border management

ABC and Integrated Border management ABC and Integrated Border management A solution concept for integrated border management and ABC ICAO MRTD Symposium 2014 - Montreal Dr. Matthias Kreuseler Mühlbauer ID Services GmbH Current Situation

More information

International Organization for Migration (IOM) Identity Management and Biometrics

International Organization for Migration (IOM) Identity Management and Biometrics International Organization for Migration (IOM) Identity Management and Biometrics FLORIAN G. FORSTER Table of Content IOM IOM, Identity (ID) Management & Biometrics - ID management basis: MIGoF, ICAO TRIP

More information

Child Check In Quick Start Guide. v 9.5. Local: (706) Atlanta: (404) Toll Free: (866)

Child Check In Quick Start Guide. v 9.5. Local: (706) Atlanta: (404) Toll Free: (866) Child Check In Quick Start Guide v 9.5 Local: (706) 864-4055 Atlanta: (404) 551-4230 Toll Free: (866) 475-1699 www.caaministries.org CHILD CHECK IN OVERVIEW What is child check in? The child check in system

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21916 Updated February 7, 2005 CRS Report for Congress Received through the CRS Web Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues Summary Daniel

More information

Biometrics from a legal perspective dr. Ronald Leenes

Biometrics from a legal perspective dr. Ronald Leenes Biometrics from a legal perspective dr. Ronald Leenes TILT - Tilburg Institute for Law, Technology, and Society outline introduction biometrics, use legal aspects privacy/data protection biometrics as

More information

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives

6. Presentation of Pakistan. Economic Cooperation Organization - ECO. Syed Mushabir Hussain, 15th April, Registration initiatives 6. Presentation of Pakistan Economic Cooperation Organization - ECO Syed Mushabir Hussain, 15th April, 2013 1 of 33 Contents Introduction Registration initiatives Projects of National importance Future

More information

BIOMETRICS 101. Facial Recognition in Oregon

BIOMETRICS 101. Facial Recognition in Oregon BIOMETRICS 101 Facial Recognition in Oregon SB 640 Approved by the Oregon Legislature in 2005 Codified in Oregon Revised Statutes ORS 807.024 807.026 Purpose - To address the growing problem of identity

More information

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM

SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM SECURITY, ACCURACY, AND RELIABILITY OF TARRANT COUNTY S VOTING SYSTEM Updated February 14, 2018 INTRODUCTION Tarrant County has been using the Hart InterCivic eslate electronic voting system for early

More information

TABLE OF CONTENTS. Executive Summary. Introduction. Public Safety Border Control & Law Enforcement

TABLE OF CONTENTS. Executive Summary. Introduction. Public Safety Border Control & Law Enforcement 0------0 く TABLE OF CONTENTS 01 Executive Summary 02 Introduction 04 06 09 13 Public Safety Border Control & Law Enforcement Personal Safety Social Services & Consumer Applications Biometric Trends Video

More information

Position Paper IDENT Implementation for U.S. VISIT

Position Paper IDENT Implementation for U.S. VISIT Position Paper IDENT Implementation for U.S. VISIT LDENT Proven Value o Currently supporting 14,000+ trained active users and over 2,200 workstations (including international locations) o Currently approximate1

More information

Computer Security Seminar Biometrics. Aviv Abramovich Spring 2015 University of Haifa

Computer Security Seminar Biometrics. Aviv Abramovich Spring 2015 University of Haifa Computer Security Seminar Biometrics Aviv Abramovich Spring 2015 University of Haifa Contents Section 1 Introduction Section 2 Systems 1. Handwritten Signatures 2. Face Recognition 3. Bertillonage 4. Fingerprints

More information

European Biometrics Portal. Biometrics in Europe. Trend Report

European Biometrics Portal. Biometrics in Europe. Trend Report European Biometrics Portal Biometrics in Europe Trend Report 2007 Brussels, January 2007 Disclaimer This report is copyrighted European Community. Unisys (Belgium) is responsible for the content of this

More information

NASS Resolution Reaffirming Support for the National Electronic Notarization Standards

NASS Resolution Reaffirming Support for the National Electronic Notarization Standards NASS Resolution Reaffirming Support for the National Electronic Notarization Standards Adopted on July 12, 2006 Reaffirmed on July 13, 2011 Mission Statement It is the goal of the National Association

More information

E-gate case study: The German EasyPASS Project

E-gate case study: The German EasyPASS Project E-gate case study: The German EasyPASS Project Benjamin Marzahn Federal Office for Information Security (BSI) Benjamin Marzahn 20.TAG/MRTD Montreal, 7.-9. September 2011 1 BSI activities regarding emrtds

More information

fraud prevention done right

fraud prevention done right fraud prevention done right 1 Lessons learned after reading Thank you for your interest in identity document fraud prevention! After reading this brief document you have gained more knowledge about: Difference

More information

Data Breach Charts. November 2017

Data Breach Charts. November 2017 Data Breach Charts November 2017 DATA BREACH CHARTS The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for

More information

Marc R. Rosenblum. MPI Webinar July 30, E-Verify: Analysis and Recommendations for Reform

Marc R. Rosenblum. MPI Webinar July 30, E-Verify: Analysis and Recommendations for Reform Marc R. Rosenblum Migration Policy Institute MPI Webinar July 30, 2009 E-Verify: Analysis and Recommendations for Reform Overview of Talk Background on E-Verify Analysis of the current system Two sets

More information

Council of the European Union Brussels, 30 January 2017 (OR. en)

Council of the European Union Brussels, 30 January 2017 (OR. en) Council of the European Union Brussels, 30 January 2017 (OR. en) 5633/17 FAUXDOC 6 COMIX 56 NOTE From: Presidency To: Working Party on Frontiers/False Documents/Mixed Committee (EU-Iceland/Liechtenstein/Norway/Switzerland)

More information

German Federal Ministry of the Interior 20 August / 6

German Federal Ministry of the Interior 20 August / 6 German Federal Ministry of the Interior 20 August 2008 1 / 6 KEESING Journal of Documents & Identity Issue October 2008 Andreas Reisen As Head of Biometrics, Travel & ID Documents, Registration Division

More information

Biometrics in the Workplace. The Promise and Peril of It s Use

Biometrics in the Workplace. The Promise and Peril of It s Use Biometrics in the Workplace The Promise and Peril of It s Use Panelists John Alvin Henderson Administrative Judge EEOC - Baltimore Sunita Bali Perkins Coie, San Francisco, CA Anthony Zaller Zaller Law

More information

Voting Corruption, or is it? A White Paper by:

Voting Corruption, or is it? A White Paper by: Voting Corruption, or is it? A White Paper by: By: Thomas Bronack Bronackt@gmail.com JASTGAR Systems, Mission and Goal (917) 673-6992 Eliminating Voting Fraud and Corruption Our society is too far along

More information

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual.

1. Delete the words and registration. 3. Delete the word person and substitute therefor the word individual. SENATE AMENDMENTS TO THE NATIONAL IDENTIFICATION AND REGISTRATION BILL, 2017 Provision Long title Amendment 1. Delete the words and registration. 2. Delete the words verification and the authentication

More information

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents EDPS Opinion 7/2018 on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents 10 August 2018 1 Page The European Data Protection Supervisor ( EDPS

More information

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead

AGENDA. Focal Ideas A systemic approach. The enrolment The deliverance The control. Needs & Challenges Conclusion Look ahead AGENDA Focal Ideas A systemic approach The enrolment The deliverance The control Needs & Challenges Conclusion Look ahead 3 Focal Ideas 4 Key Factors to achieve Security Balance Identity Chain [processes]

More information

Ten Years of Reforms Structural impact

Ten Years of Reforms Structural impact 2006 2015 Ten Years of Reforms Structural impact CONTENTS LIFE-SAVING OPERATIONS BOOSTED BY REFORMS 4 TO MAKE THIS POSSIBLE 6 FLEXIBILITY THROUGH PARTNERSHIP 8 IMPROVED DELIVERY 10 INNOVATION AS A DRIVER

More information

New York State Photo Identification Guidelines

New York State Photo Identification Guidelines 1. Introduction There are various ways to conduct a fair and reliable identification procedure. The guidelines below outline how a neutral, fair and reliable identification procedure can be conducted by

More information

SECURE REMOTE VOTER REGISTRATION

SECURE REMOTE VOTER REGISTRATION SECURE REMOTE VOTER REGISTRATION August 2008 Jordi Puiggali VP Research & Development Jordi.Puiggali@scytl.com Index Voter Registration Remote Voter Registration Current Systems Problems in the Current

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

Government of Pakistan NADRA Headquarters, Islamabad

Government of Pakistan NADRA Headquarters, Islamabad Abbaba Government of Pakistan NADRA Headquarters, Islamabad 1 Who We Are 2 Social Support Initiatives 3 Future Strategy National Database and Registration Authority Registrar General of Pakistan NADRA

More information

REVIEW OF THE COMMON CASH FACILITY APPROACH IN JORDAN HEIDI GILERT AND LOIS AUSTIN. The Cash Learning Partnership

REVIEW OF THE COMMON CASH FACILITY APPROACH IN JORDAN HEIDI GILERT AND LOIS AUSTIN. The Cash Learning Partnership REVIEW OF THE COMMON CASH FACILITY APPROACH IN JORDAN HEIDI GILERT AND LOIS AUSTIN The Cash Learning Partnership REVIEW OF THE COMMON CASH FACILITY APPROACH IN JORDAN October 2017 Review Team Heidi Gilert:

More information

Cross-Border & Regional Identity Management

Cross-Border & Regional Identity Management Cross-Border & Regional Identity Management Grahame Saunders: Chief Technology Officer: NEC Africa April 2017 Who we are Leading social value innovator Provides telecommunications, IT and Enterprise business

More information

NC General Statutes - Chapter 14 Article 60 1

NC General Statutes - Chapter 14 Article 60 1 Article 60. Computer-Related Crime. 14-453. Definitions. As used in this Article, unless the context clearly requires otherwise, the following terms have the meanings specified: (1) "Access" means to instruct,

More information

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers ERNCIP XXXXXXXXX TG ERNCIP TRAFFIC LIGHT PROTOCOL GREEN when completed The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers ERNCIP Thematic Group Applied

More information

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes

IC Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15 Chapter 15. Ballot Card and Electronic Voting Systems; Additional Standards and Procedures for Approving System Changes IC 3-11-15-1 Applicability of chapter Sec. 1. Except as otherwise provided,

More information

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit. PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD

More information

CITY OF LAKE WORTH, TEXAS APPLICATION FOR EMPLOYMENT An Equal Opportunity Employer

CITY OF LAKE WORTH, TEXAS APPLICATION FOR EMPLOYMENT An Equal Opportunity Employer CITY OF LAKE WORTH, TEXAS APPLICATION FOR EMPLOYMENT An Equal Opportunity Employer It is the policy of the City of Lake Worth not to discriminate in its hiring or employment practices on the basis of race,

More information

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER CONTENTS Executive summary 4 Sophisticated security threats stretch national borders 5 Widespread adoption of biometrics

More information

Singapore's Automated Clearance using Biometrics

Singapore's Automated Clearance using Biometrics Singapore's Automated Clearance using Biometrics Dr. Yau Wei Yun 1 & Ms. Koh Ting Ting 2 Institute for Infocomm Research, Singapore 1 Ministry of Home Affairs 2 Biometric Passports Meant for better border

More information

Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim

Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim Acceptance of Biometric in the Kingdom of Saudi Arabia by Bushra Mohamed Elamin Elnaim RESEARCH PROPSAL i Running Head: RESEARCH PROPOSAL Acceptance of Biometric in the Kingdom of Saudi Arabia Bushra Mohamed

More information

MoneyPad, The Future Wallet

MoneyPad, The Future Wallet MoneyPad, The Future Wallet What Is MONeYPaD? Money Pad - A form of credit card or smart card similar to floppy disk, which is introduced to provide, secure e-cash transactions. The Money Pad introduced

More information

Biometrics how to put to use and how not at all?

Biometrics how to put to use and how not at all? 1 Biometrics how to put to use and how not at all? How to handle security problems of biometrics and how to handle security and privacy problems caused by biometrics? Andreas Pfitzmann TU Dresden, Fakultät

More information

1. Electronic means relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic, or similar capabilities.

1. Electronic means relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic, or similar capabilities. NASS Resolution Reaffirming Support for the National Electronic Notarization Standards Adopted on July 12, 2006 Reaffirmed on July 13, 2011; Amended and Reaffirmed on July 17, 2016 Mission Statement It

More information

Biometrics How to Put to Use and How Not at All?

Biometrics How to Put to Use and How Not at All? Biometrics How to Put to Use and How Not at All? Andreas Pfitzmann TU Dresden, Faculty of Computer Science, 01062 Dresden, Germany Andreas.Pfitzmann@tu-dresden.de Abstract. After a short introduction to

More information

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey

MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services. East African Community e-passport: Kenyan Journey MINISTRY OF INTERIOR AND COORDINATION OF NATIONAL GOVERNMENT Department of Immigration Services East African Community e-passport: Kenyan Journey Peter Kimaile Chief ICT Officer Presentation Outline Overview

More information

TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS

TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL (TWIC) FACTS TWIC RULEMAKING STATUS In response to comments received on the joint TSA/CG Notice of Proposed Rule Making (NPRM) published 22 May 2006, TSA

More information

Young Adult Perception and Acceptance of Biometric Technology

Young Adult Perception and Acceptance of Biometric Technology Young Adult Perception and Acceptance of Biometric Technology By Anthony Allen Submitted in Partial Fulfillment of the Requirements For the Degree of Master of Science In the Computer Science and Information

More information

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending,

FEDERAL BIOMETRICS DISJOINTED PROGRESS. Bottom Line Up Front. Federal Biometric Spending, DISJOINTED PROGRESS JULY 2016 Bottom Line Up Front Despite significant advances and proliferation of biometric technology in the commercial market, the federal government has yet to take full advantage

More information

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1 Gap Analysis of the Department of Homeland Security s Use of Biometrics Camille J. Acred Southwestern College Professional Studies MSA 570 Homeland

More information

The problems with a paper based voting

The problems with a paper based voting The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand

More information

Identity Documents Act

Identity Documents Act Issuer: Riigikogu Type: act In force from: 01.09.2013 In force until: 30.04.2014 Translation published: 04.11.2013 Amended by the following acts Passed 15.02.1999 RT I 1999, 25, 365 Entry into force 01.01.2000

More information

NASS Support for the Revised National Electronic Notarization Standards

NASS Support for the Revised National Electronic Notarization Standards NASS Support for the Revised National Electronic Notarization Standards Adopted on July 12, 2006; Reaffirmed on July 13, 2011 and July 17, 2016; Amended and readopted on February 19, 2018 Mission Statement

More information

Mauritania integrated epassport Project. JW ter Hennepe Sales Manager Morpho. October 10, 2012 Montreal

Mauritania integrated epassport Project. JW ter Hennepe Sales Manager Morpho. October 10, 2012 Montreal Mauritania integrated epassport Project JW ter Hennepe Sales Manager Morpho October 10, 2012 Montreal BACKGROUND A LARGE COUNTRY WITH A STRATEGIC POSITION IN NORTH AFRICA MAURITANIA 1,030,631 KM² HIGH

More information

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9

More information

Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview. 17 January 2007 Seattle, WA

Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview. 17 January 2007 Seattle, WA Transportation Worker Identification Credential (TWIC) Final Rulemaking Overview 17 January 2007 Seattle, WA Highlights of Presentation Program Challenges TWIC Rulemaking Status Applicability Enrollment

More information

Einsatz von Fingerabdrücken im Europäischen Visumverfahren. Bundesverwaltungsamt (BVA) Bundesamt für Sicherheit in der Informationstechnik (BSI)

Einsatz von Fingerabdrücken im Europäischen Visumverfahren. Bundesverwaltungsamt (BVA) Bundesamt für Sicherheit in der Informationstechnik (BSI) Einsatz von Fingerabdrücken im Europäischen Visumverfahren Bundesverwaltungsamt (BVA) Bundesamt für Sicherheit in der Informationstechnik (BSI) Agenda EU Visa Information System (VIS) Experiences from

More information

The United Nations study on fraud and the criminal misuse and falsification of identity

The United Nations study on fraud and the criminal misuse and falsification of identity The United Nations study on fraud and the criminal misuse and falsification of identity Facts and figures Total volume of fraud losses for the UK in 2005 was US$ 27.4 billion (ACPO study). Online banking

More information