DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.

Slides:



Advertisements
Similar presentations
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
Advertisements

BIOMETRIC VOTING SYSTEM
Biometrics By: Ashley Rodriguez. Biometrics An automated method of recognizing a person based on physical or behavioral traits. Consist of two main classes.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
By: Monika Achury and Shuchita Singh
FIT3105 Biometric based authentication and identity management
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Going beyond passwords
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Marjie Rodrigues
Security-Authentication
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
By Alvaro E. Escobar 1 Biometrics Agenda I. Video II. Biometric Overview III. Biometric Technologies IV. Accuracy Metrics V. BioPrivacy Concerns.
Biometrics Investigating Facial and Fingerprint Scanning Technologies prepared by Group
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Biometrics.
By: Kirti Chawla. Definition Biometrics utilize ”something you are” to authenticate identification. This might include fingerprints, retina pattern, iris,
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Issues on Designing Biometric Systems September 7, 2005.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Biometric Technologies
BIOMETRICS.   technology/9742-1_ html.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
An Introduction to Biometrics
Biometrics Dr. Nermin Hamza
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Biometrics Security in Banking Systems Image processing in ATM
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
BIOMETRICS: FACIAL RECOGNITION TECHNOLOGY
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
BY: Michael Etse and Maverick Fermill
Presentation transcript:

DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB DATA PROTECTION COMMISSIONER PRIME MINISTER’S OFFICE

DATA PROTECTION OFFICE THIS PRESENTATION WILL ATTEMPT TO SHOW THAT THE CHALLENGES ARE MULTI-FACETTED AND THAT THERE IS NO CLEAR AND DEFINITE ANSWER TO THE ADVANTAGES AND DISADVANTAGES OF BIOMETRIC TECHNOLOGY

DATA PROTECTION OFFICE WHAT IS BIOMETRIC DATA? Identification and verification have long been accomplished by showing something you have, such as a licence or a passport. Sometimes it also required something you know, such as a password or a PIN. As we move into a time when we need more secure and accurate measures, we begin to look at using something you are: biometrics

DATA PROTECTION OFFICE Biometrics is the development of statistical and mathematical methods applicable to data analysis problems in the biological sciences. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). For our use, biometrics refers to technologies for measuring and analyzing a person's physiological or behavioral characteristics, such as fingerprints, irises, voice patterns, facial patterns, and hand measurements, for identification and verification purposes

DATA PROTECTION OFFICE Uses of Biometrics: Biometrics are used in two major ways: Identification and Verification. Identification is determining who a person is. It involves taking the measured characteristic and trying to find a match in a database containing records of people and that characteristic. This method can require a large amount of processing power and some time if the database is very large. It is often used in determining the identity of a suspect from crime scene information

DATA PROTECTION OFFICE Verification is determining if a person is who they say they are. It involves taking the measured characteristic and comparing it to the previously recorded data for that person. This method requires less processing power and time, and is often used for accessing places or information

DATA PROTECTION OFFICE How It Works: Biometric devices consist of a reader or scanning device, software that converts the gathered information into digital form, and a database that stores the biometric data for comparison with previous records. When converting the biometric input, the software identifies specific points of data as match points. The match points are processed using an algorithm into a value that can be compared with biometric data in the database

DATA PROTECTION OFFICE Types of Biometrics: There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification. Examples of physical biometrics include: Bertillonage - measuring body lengths (no longer used) Bertillonage Fingerprint - analyzing fingertip patterns Fingerprint

DATA PROTECTION OFFICE Facial Recognition - measuring facial characteristics Facial Recognition Hand Geometry - measuring the shape of the hand Hand Geometry Iris Scan - analyzing features of colored ring of the eye Iris Scan Retinal Scan - analyzing blood vessels in the eye Retinal Scan Vascular Patterns - analyzing vein patterns Vascular Patterns DNA - analyzing genetic makeup DNA

DATA PROTECTION OFFICE Examples of behavioral biometrics include: Speaker Recognition - analyzing vocal behavior Speaker Recognition Signature - analyzing signature dynamics Signature Keystroke - measuring the time spacing of typed words Keystroke

DATA PROTECTION OFFICE IS BIOMETRIC DATA PERSONAL DATA? Biometric data is personal information as defined under section 2 of the DPA which provides: "personal data" means - data which relate to an individual who can be identified from those data; or data or other information, including an opinion forming part of a database, whether or not recorded in a material form, about an individual whose identity is apparent or can reasonably be ascertained from the data, information or opinion;”

DATA PROTECTION OFFICE Biometric data is derived from an individual, is used to verify or determine a person's identity, and depending on the technology, may be a highly distinctive representation of a physiological or behavioral characteristic

DATA PROTECTION OFFICE IS BIOMETRIC DATA PRIVACY-NEUTRAL, PRIVACY-PROTECTIVE OR PRIVACY-INVASIVE? Biometrics can be deployed in a privacy-invasive fashion, in a privacy-neutral fashion, and in a privacy-protective fashion. Biometric technology is what we make it. Biometrics are neither a protector nor an enemy of privacy; instead, the type of deployment determines the relation between biometrics and privacy. The basic classifications of privacy are personal and informational

DATA PROTECTION OFFICE Personal Privacy. For some people, the use of biometrics is seen as inherently offensive. Being required to verify one’s identity through a finger-scan or voice- scan can be seen as intrusive, impersonal, or mistrustful. These objections to biometrics are based on personal privacy. Informational Privacy. A more common objection to biometrics is based on informational privacy; how biometric data might be misused, tracked, linked, and otherwise abused. Potential privacy-invasive misuses of biometrics are as follows:

DATA PROTECTION OFFICE Unnecessary or unauthorized collection – gathering biometric information without the user’s permission or knowledge, or gathering biometric data without explicitly defined purposes Unauthorized use – using biometric information for purposes other than those for which it was originally acquired Unauthorized disclosure – sharing or transmitting biometric information without the user’s explicit permission Unique identifier – using biometric information to track a user across various databases, to link different identities, and to amalgamate personal data for the purposes of surveillance or social control

DATA PROTECTION OFFICE Improper storage – storing biometric information in logical proximity to personal data such as name, address, social security number Improper transmission – transmitting biometric information in logical proximity to personal data such as name, address, social security number Forensic usage – using biometric information to facilitate investigative searches, which may be categorized as unreasonable search and seizure Function creep – gradually using biometric data for a variety of purposes beyond its original intention and scope

DATA PROTECTION OFFICE IS BIOMETRIC DATA SENSITIVE INFORMATION? Biometric information is itself sensitive information. It is a unique, high quality data about a person's physical characteristics which needs to be treated with care. When we collect biometric information from a person, we are not just collecting information about that person, but information of that person. Biometric information cuts across both informational privacy and physical privacy. It can reveal sensitive information about us; our health, genetic background, age and it is unique to each of us

DATA PROTECTION OFFICE Because biometric data is sensitive, and there are situations in which biometric systems could be misused, protections tantamount to the deployment-specific risks are necessary at all possible stages of the data's lifecycle

DATA PROTECTION OFFICE DO BIOMETRIC COMPARISONS RESULT IN EXACT, 100% MATCHES? Unique biometric templates are generated every time a user interacts with a biometric system. As an example, two immediately successive placements of a finger on a biometric device generate entirely different templates. and never generate an identical template. Therefore, for most technologies, there is simply no such thing as a 100% match. This is not to imply that the systems are not secure

DATA PROTECTION OFFICE IS THE DPA TECHNOLOGICAL NEUTRAL AND WHY? DPA is technologically neutral meaning that it regulates information handling without referring to specific technologies that facilitate information handling. Technological neutrality does not mean that we should not take into consideration technological change. Technological neutrality allows the DPA to be adequately flexible to accommodate technological change. A privacy regime must not go out of date every time technology changes!

DATA PROTECTION OFFICE Biometrics technology is a science, the ambit of which has not yet been clearly defined. There are many aspects of that technology which have not yet been discovered in their entirety. Is it then wise to say that they are 100% reliable? Obviously not. This is why we need some very strong safeguards, both in terms of physical and technical security safeguards to be able to defeat any potential side effects this technology may have on the privacy rights of individuals, if we opt to use it in our daily lives, coupled with effective laws such as the Data Protection Act

DATA PROTECTION OFFICE THANK YOU ANY QUESTIONS OR COMMENTS?