“More than 700 schools now our fingerprint scanners in canteens or libraries, or to register pupils.” www.teachernet.gov.uk “Biometric systems currently.

Slides:



Advertisements
Similar presentations
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Advertisements

Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Beach Park Schools Beach Park, Illinois Introduces.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
What is Biometric identification 1 ? –Biometrics is the use of automated methods to recognize a person based on a physical characteristic. –Biometric technologies.
Biometric Authentication Andrea Blanco Binglin Li Brian Connelly.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
CUTTING EDGE TECHNOLOGIES. MADE BY : MAHA SAHER ALI (PROCTOR) CLASS: XI ISLAMABAD COLLAGE FOR GIRLS F-6/2 ISLAMABAD.
Aristotle International Integrity™ Age and ID Verification Presentation to ISTTF September 23, 2008 Aristotle’s Integrity™ ISTTF Presentation 9/23/2008.
Introduction to Fingerprint Biometrics By Tamar Bar.
George Turner Effectiveness of Biometric Security CS591 Semester Project
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
{ BORN CONNECTED © By: Autumn Coomes. Shelby Wathen, Chelsea Sams, & Cameron Buckman.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Data Protection Act.
Geoff Lacy. Outline  Definition  Technology  Types of biometrics Fingerprints Iris Retina Face Other ○ Voice, handwriting, DNA  As an SA.
Data Protection Act. Lesson Objectives To understand the data protection act.
PROVIDING THOROUGH PROTECTION FOR OUR CLIENTS AND THEIR ASSOCIATES. WITH BIOMETRICS INC.
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
BIOMETRICS IN RETAIL Ben McDaniel Paul Acken Wesley McAhren.
The Social Effect of Information System
IdentiTrip 2006 Our Skills Making your Job Easier.
LOCAL AGENCY MUST STILL RUN A FILE CHECK (QHW) TO DETERMINE WARRANTS/HOLDS II. If name is not on CCH, prints are compared to all fingerprints in AFIS for.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
Protecting Personal Information at Fermilab. What You Will Learn F Why must we protect personal information? F What are the laboratory policies governing.
The Future of Biometrics. Operation and performance In a typical IT biometric system, a person registers with the system when one or more of his physical.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.
Hand Scanning for Entering the Building  Hand scanning will keep intruders out and improve the security between the bank and their clients.  This reliable.
ICT Infrastructure Used By Organisations Additional Exercise ANSWERS.
Biometrics Authentication Technology
General Election 2010 What the Parties Say – Human Rights and Freedoms.
Biometrics.
IdentiTrip 2006 Key Features & Benefits All data imported from MIS system Quick MIS upload annually for new intake and class changes No manual input of.
ICT in Education. Use of computers for school / college administration Schools and colleges employ staff, pay for goods and services, keep records of.
IdentiTrip Key Features & Benefits All data imported from MIS system Quick MIS upload annually for new intake and class changes No manual input of pupil.
Before finger scanning The school was using meal tickets with bar codes and ID numbers to identify the students at lunch time. The card and number system.
Identity Theft How it happens and how to avoid it.
SOR Fingerprints “The Submission Process”. Objectives Registration Prints SOR Termination/Mail-In Registrations Charge Field (Reason Fingerprinted) Image.
SECRETARIAT OF POLICE1 Presentation to Select Committee on Security and Constitutional Affairs on the Criminal Procedures (Forensic) Amendment Act 28 July.
Software. Because databases can get very big, it is important to decide exactly what is going to be stored in each field. Fields can be text, number,
Retinal & Iris Scanners
ATM with Biometric Technology Group 7 Priyanka Hulsurkar. Suryadevara Sai Krishna. Adwait Mulye.
Drill 11/15 Why is it wise to invest your money? Why is it wise to invest your money? Why is a house a good investment? Why is a car a bad investment?
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Unit 32 – Networked Systems Security
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
{ Biometric Sensing and Associated Devices Chris Lange 4/18/16 Abstract: Biometric sensors are used for many things today, from unlocking your phone to.
Management Information Systems & School Registration 1.
Identity Theft It’s a crime!
School ... What was it like?.
Data Protection Act.
Stovall and Klee Security
Karley Biometrics We strive to bring you a high- quality product that will increase your productivity and the security of our nation.
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Teacher instruction Print PowerPoint as hand-outs for pupils folder
A Real Problem % 5,000 #1 $2,100 12% 6% Identity Fraud
BSC Biometric Security System
Margaret Brown 3rd period October 14, 2007
BSC Biometric Security System
Biometric technology.
How the Biometrics Works
15-5 Automated Fingerprint Identification System
Presentation transcript:

“More than 700 schools now our fingerprint scanners in canteens or libraries, or to register pupils.” “Biometric systems currently used in schools are based on fingerprint recognition technology. The system works by taking measurements of the fingerprint, but they do not capture a complete image. This means that the original fingerprint cannot be reconstructed from the data.” Becta, Government’s schools ICT agency "If a child has never touched a fingerprint scanner, there is zero probability of being incorrectly investigated for a crime.” Brian Drury, IT Security consultant CITIZENSHIP ACTIVITY Fingerprint Technology - Biometrics

"While people are still nervous about fingerprints and still have a concern that fingerprints are associated with criminality, we're gradually moving away from that. It's amazing how many schools are starting to use fingerprints just as a simple mechanism for checking kids in and out.'‘ James Hall, Chief Executive Identity and Passport service, August 2007 "It has been suggested that fingerprinting in schools is part of a concerted attempt to 'soften up' the younger generation for increased state privacy intrusion, including initiatives such as ID cards and DNA testing.'‘ The Information Commissioner’s Office, July 2007 “You can change your bank account number and password if the government loses it. But fingerprints and fingerprint templates are for life. One slip-up and your identity is permanently compromised.” CITIZENSHIP ACTIVITY

“Proposals to fingerprint children aged 11 to 15 as part of new passport and ID card plans are being considered…Under existing plans every passport applicant over 16 will have details - including fingerprints - added to a National Identity register from Last month the opposition parties expressed anger that all fingerprints collected for ID cards would be cross-checked against prints from 900,000 unsolved crimes.” BBC News 24, Sunday, 4 March 2007 “There is no better test of a registration system than to launch it in a school (Loughborough Grammar School) of 1,000 inquisitive boys – the boys haven’t hacked into it, and if they can’t, no one can!” John Weitzel, Headmaster, Loughborough Grammar School CITIZENSHIP ACTIVITY

QUESTIONS TO CONSIDER Should our school introduce fingerprint scanning; For the library? For the School Kitchens’? For registration? What are the benefits and risks of fingerprint technology (known as biometric technology)? Should everyone’s fingerprints be on file or should we be able to decide? CITIZENSHIP ACTIVITY

SOME BENEFITS: Cuts down on bullying Students can’t lose money Quick, it cuts down on administration time by 35% Doubles the books borrowed from Library Increases uptake of School Meals by 20% CITIZENSHIP ACTIVITY SOME RISKS: Swipe cards are 100% accurate, fingerprint scanners only 93% Questions of security, what if the fingerprint data goes missing? Who can access this information? Police have a right to?