International Biometrics & Identification Association

Similar documents
CPSC 467b: Cryptography and Computer Security

SUMMARY INTRODUCTION. xiii

Biometrics: primed for business use

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Research Article. ISSN (Print)

Biometrics Technology for Human Recognition

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

Case: 1:16-cv Document #: 1 Filed: 03/04/16 Page 1 of 16 PageID #:1 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS

Biometrics Overview. Introduction. Biometrics is a general term used alternatively to describe a characteristic or a process. As a characteristic:

BIOMETRICS - WHY NOW?

CRS Report for Congress

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

Biometrics from a legal perspective dr. Ronald Leenes

Emergence of multimodal biometrics at the Border Biometrics Institute Asia-Pacific Conference

Running head: GAP ANALYSIS OF THE DEPARTMENT OF HOMELAND 1

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

Recommended Practice 1701 l

An overview of the European approach to the cross-jurisdictional and societal aspects of biometrics

Consumer Attitudes About Biometric Authentication

Case Study. MegaMatcher Accelerator

Singapore's Automated Clearance using Biometrics

The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers

Introduction-cont Pattern classification

DHS Biometric Screening

NATIONAL INSTRUCTION 2 of 2013 THE MANAGEMENT OF FINGERPRINTS, BODY-PRINTS AND PHOTOGRAPHIC IMAGES

GDPR in access control and time and attendance systems using biometric data

Biometrics in the Workplace. The Promise and Peril of It s Use

BIOMETRICS 101. Facial Recognition in Oregon

INTRODUCTION BACKGROUND. Chapter One

Biometric Technology for DLID

Opinion 3/2012 on developments in biometric technologies

Prepared by Space and Naval Warfare Systems Center Atlantic

Achieving Interoperability

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

The Case for implementing a Bio-Metric National ID for Voting and/or to replace the Social Security Card

July 13, Dear Ms. Behuniak:

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

I. PARTIES AUTHORITIES

Biometrics in Border Management Grand Challenges for Security, Identity and Privacy

Machine Readable Travel Documents: Biometrics Deployment. Barry J. Kefauver

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

The Open Biometrics Initiative and World Card

Biometrics & Accessibility

Case: 1:17-cv Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1

Frequently Asked Questions for Participating Members and Organizations

SECURE REMOTE VOTER REGISTRATION

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER U.S. CUSTOMS AND BORDER PROTECTION DEPARTMENT OF HOMELAND SECURITY

Green Freight Asia Privacy Policy

DHS Biometrics Strategic Framework

e-passports: Uses, Limitations, and Impact on Simplifying Passenger Travel Initiatives

REPORT VOLUME 6 MAY/JUNE 2017

Expert Q&A on Biometrics in the Workplace: Recent Developments and Trends

NEW YORK IDENTITY THEFT RANKING BY STATE: Rank 6, Complaints Per 100,000 Population, Complaints (2007) Updated January 25, 2009

TEXAS DEPARTMENT OF PUBLIC SAFETY 5805 NORTH LAMAR BOULEVARD POST OFFICE BOX 4087, AUSTIN, TX /

DATA PROTECTION (JERSEY) LAW 2005 CODE OF PRACTICE & GUIDANCE ON THE USE OF CCTV GD6

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

CHAPTER 1 RECORDS RETENTION AND DISPOSITION

Biometrics: New Laws and Potential Litigation Implications

TRUE IDENTITY IBORDERS BIOTHENTICATE: SECURING BORDERS WITH BIOMETRICS POSITIONING PAPER

a. Suspend or discontinue user access to the information;

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

Global Entry Program. Information Guide

The Legal Workforce Act 1 Section-by-Section

Arrival and Departure Information System Information Sharing Update

Identity Verification in Passport Issuance

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER. to the DEPARTMENT OF HOMELAND SECURITY

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

Enhanced Driver s Licence (EDL) and Enhanced Identification Card (EIC) Program

Frequently Asked Questions for Participating Members and Organizations

Biometrics Glossary. Introduction. Glossary Terms

The public consultation consisted of four different questionnaires targeting respectively:

Interstate Commission for Adult Offender Supervision

EDPS Opinion 7/2018. on the Proposal for a Regulation strengthening the security of identity cards of Union citizens and other documents

NEW YORK STATE INTELLIGENCE CENTER PRIVACY POLICY

Connecticut Informational Guide for Noncriminal Justice Use of Criminal History Record Information (CHRI)

Biometric Authentication

CHARLESTON COUNTY AVIATION AUTHORITY APPLICATION FOR AIRPORT AOA/PUBLIC AREA BADGE

The changes are aimed at fighting both terrorism and identity theft.

EXHIBIT G PRIVACY AND INFORMATION SECURITY PROVISIONS

Position Paper IDENT Implementation for U.S. VISIT

Point of Contact (POC): District s contact person when SDDCI sends out Audit information, the contact person when an onsite Audit is scheduled.

HOW CAN BORDER MANAGEMENT SOLUTIONS BETTER MEET CITIZENS EXPECTATIONS?

CODE OF PRACTICE FOR COMMUNITY- BASED CCTV SYSTEMS

Privacy Impact Assessment Update for the. E-Verify RIDE. DHS/USCIS/PIA-030(b) May 6, 2011

Data Breach Charts. November 2017

STATE DATA SECURITY BREACH NOTIFICATION LAWS

MACHINE READABLE TRAVEL DOCUMENTS (MRTDs)

BADGE APPLICATION FORM KALAMAZOO / BATTLE CREEK INTERNATIONAL AIRPORT

The Upcoming International Biometric Vocabulary Standard

ST. CLOUD REGIONAL AIRPORT FINGERPRINTING AND BADGE APPLICATION

MODEL LEGISLATION GUIDELINES FOR PUBLIC VIDEO SURVEILLANCE: A GUIDE TO PROTECTING COMMUNITIES AND PRESERVING CIVIL LIBERTIES THE CONSTITUTION PROJECT

ORDINANCE NO. 7,592 N.S. ADDING CHAPTER 2.99 TO THE BERKELEY MUNICIPAL CODE, ACQUISITION AND USE OF SURVEILLANCE TECHNOLOGY

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

Transcription:

International Biometrics & Identification Association 1

Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com For the American Legislative Exchange Council States and Nation Policy Summit Scottsdale, AZ December 1, 2011

Topics Introduction to IBIA Fundamentals of biometrics Public policy considerations

About IBIA A trade association that promotes using technology effectively and appropriately to determine identity and enhance security, privacy, productivity and convenience Non-profit 501(c)(6) trade association founded in 1998 and based in Washington, DC

Fundamentals of Biometrics

Definition of Biometrics Automated method of identifying or verifying the identity of a living person based on unique biological or behavioral characteristics

Examples of Biometrics Fingerprint Face Iris Vascular Palm Hand Voice Signature

Typical Biometric Applications Law enforcement criminal history check Civil background check Border security and immigration Access to secure facilities and areas Access to information systems Protection of sensitive information Time and attendance School lunch payments Benefit eligibility verification

Benefits of Biometrics Allows rapid identification of criminals, combatants or terrorists Enhances homeland security and fights crime Convenient way to access secure facilities or information systems Nothing to remember Can t be guessed, stolen, shared, lost, or forgotten Prevents impersonation Protects against identity theft Higher degree of non-repudiation Enhances privacy Protects against unauthorized access to personal information

Recent Biometric Advances Rapidly falling cost Increased accuracy and speed Maturing international standards Widespread adoption Led by government applications Next wave will be mobile device security

How do Biometrics Work? Enrollment: Present biometric Capture Process Store No Match Compare Matching: Match Present biometric Capture Process

Fingerprint Recognition Measures characteristics of the ridge pattern on the skin surface of the fingers One of the oldest and most widely used biometrics

How a Fingerprint is Processed Starts with fingerprint image Typical size 70-90 KBytes

Feature Extraction Find Minutiae points: Ridge Endings Ridge Bifurcations Ridge Direction

Template Generation Generate template record Store in template repository Typical size <500 bytes

Iris Recognition Measures features associated with the random texture of the colored part of the eye Measures up to 266 unique features Uses near-infrared sensor from a distance of 6 inches to several feet Popular for facility access and transportation/border security

Facial recognition Analyzes features of the face and/or the relative distances between features (e.g., eyes, nose and mouth) Capture methods Still camera Video Thermal imaging

Is There One Best Biometric? No - A biometric should be selected based on specific application requirements Each technology exhibits differences in Cost Usability Matching accuracy Physical packaging User acceptance Maturity

Biometrics & Public Policy

Public Acceptance of Biometrics Nearly two-thirds of U.S. citizens are concerned about identity theft and 58% of Americans would be willing to provide biometric data to protect that identity. Source: Unisys Security Index Report October, 2009

Privacy Issues Public perception is both positive and negative Tool to help protect privacy, or... Threat to privacy The technology is less of an issue than the application Regardless, there is a need to develop policies for the protection and privacy of biometric data

Other Perceptions Criminal connotation Religious or cultural objections Can it cause physical harm? More education is needed

Privacy Considerations Biometric identifiers should be treated as personally identifiable information (PII) Safeguard biometric data to ensure that it is not misused or compromised Don t distribute or share biometric data without informed consent or the authority of law

Private Sector Recommendations Develop policies that clearly disclose how biometrics will be collected, stored, accessed and used Limit the use of biometric data beyond its intended purpose Protect confidentiality and integrity of databases containing biometric data

Public Sector Recommendations Develop clear legal standards that define and limit the conditions under which public institutions or agencies may acquire, access, store, share and use biometric data and other PII Protect confidentiality and integrity of databases containing biometric data

Legislative Considerations Legislation that would limit the use of biometrics should be narrow and not overly broad Better to target specific applications Should not inhibit or unduly burden legitimate applications of biometric technology Limiting the general use of biometrics presents an obstacle to its beneficial use

Legislative Example The State of Illinois Biometric Information Privacy Act (740 ILCS 14) provides an example of broad state legislation that requires biometric data protection by private entities Requires establishment of retention schedule and destruction guidelines Requires disclosure and consent for collection Inhibits sale or distribution of biometric identifiers without prior consent Requires same standards of care to store, transmit and protect biometric data as other confidential and sensitive information

IBIA is a Resource IBIA staff is available to assist policy makers and legislators in developing appropriate policies and laws concerning the use of biometrics and other person identification technologies

Questions?

For More Information Contact: International Biometrics & Identification Association 919 18 th Street, N.W. Suite 901 Washington, DC 20006 (202) 508-6300 Web: www.ibia.org Email: info@ibia.org