”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Computer Security Computer Security is defined as:
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Signature (unit, name, etc.) Introduction to biometrics from a legal perspective Yue Liu Mar NRCCL, UIO.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
By: Monika Achury and Shuchita Singh
CS294-1 Deeply Embedded Networks Privacy Discussion 11/25/03 David Culler University of California, Berkeley.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Biometrics & the Privacy Paradigm: Separating Fact from Fiction Ann Cavoukian, Ph.D. Information & Privacy Commissioner/Ontario Security.
Face Recognition and implications on society By Zubin Singh ICS 131.
The Role of Computers in Surveillance ~ Katie Hatland.
Video- and Audio-based Biometric Person Authentication Motivation: Applications. Modalities and their characteristics. Characterization of a biometric.
Usable Biometrics Ashley Brooks Usability and Privacy Cranor, Reiter, and Hong April 11, 2006.
Biometrics: Ear Recognition
DATA PROTECTION OFFICE TITLE:-THE CHALLENGES IMPOSED BY BIOMETRIC TECHNOLOGY ON DATA PROTECTION AND PRIVACY PRESENTED BY MRS DRUDEISHA CAULLYCHURN- MADHUB.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Biometrics. Outline What is Biometrics? Why Biometrics? Physiological Behavioral Applications Concerns / Issues 2.
1 When hate speech tangles privacy... When hate speech tangles privacy...
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003
Anonymity, Security, Privacy and Civil Liberties
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
W-9 COMPUTERS AND THE LAW Contract Law Copyright Law Trademark Law Patent Law Tort Law Computer Crime Utility Law or Telecommunications Law Constitutional.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
ISYS205 Strategic Uses of Information Systems Fall, 2001 Ethical Issues in Information Systems Greg Fulton Anuja Desai Tom Schaeffer.
Personal Information How Not to Share Information And What Information Can be Shared By: Joshua Polson.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
Objective 1. Bellringer  What does it mean to be an American? What kind of rights do you receive as an American?
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Biometrics Authentication Technology
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
PRESENTATION ON BIOMETRICS
Biotechnology By Denise Ogden Using Biometrics in online learning systems.
Biometrics Group 3 Tina, Joel, Mark, Jerrod. Biometrics Defined Automated methods or recognizing a person based on a physiological and behavioral characteristics.
Background established on June 18, 1951 Universal Bank since 1994 publicly listed as “SECB” has one of the lowest non- performing loan ratios (NPL) capital.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Biometrics Ryan Epling. What Are Biometrics? “Automated methods of verifying or recognizing a living person on the basis of some physiological characteristics,
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Creating a Culture of Privacy Michael Kaiser Executive Director National Cyber Security
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Judicial Training on Data Protection and Privacy Rights
Athina Antoniou and Lilian Mitrou
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Managed IT Service Providers - Endecom.com
Seminar Presentation on Biometrics
Facial Recognition in Biometrics
A Gift of Fire Third edition Sara Baase
Biometrics.
A Gift of Fire Third edition Sara Baase
A SEMINAR REPORT ON BIOMETRICS
Faculty of Science IT Department Lecturer: Raz Dara MA.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Chap 4 Day 5, Aim: How does the court interpret “privacy”?
IT and Society Week 2: Privacy.
Definition Of Computer Security
Presentation transcript:

”Billboard that looks back”

 What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics to determine or verify identity  Automated use: Automation means that computers or machines are used to verify or determine identity through behavioral or physiological characteristics  Physiological / behavioral characteristics:  Physiological biometrics are based on direct measurements of a part of the human body.  Behavioral biometrics are based on measurements and data derived from an action and therefore indirectly measure characteristics of the human body.  Determine vs. verify: Some biometric systems can determine the identity of a person from a biometric database without that person first claiming an identity. In verification systems a person claims a specific identity and the biometric system either confirms or denies that claim.  Identity: An individual is a singular, unique entity, but an individual can have more than one identity

 Informational privacy: ◦ Biometrics raise some of the same issues that arise when any personal information is collected ◦ Some special concerns can be mentioned:  Unnecessary collection  Unauthorized collection  Unauthorized use and function creep

 Physical privacy: ◦ The right to be free from unwanted, unreasonable intrusions or searches of one´s body ◦ Also, freedom from contact or monitoring by others, which might include searches, video surveillance and other forms of monitoring

 Use of biometric technologies becoming prevalent  Biomerics have a practical application in both public and private sectors  Orwellian future can´t be excluded ◦ Two diverging viewpoints:  Biometrics is seen as one of the most serious threats to the freedom of individuals and societies  Biometrics constitutes a potential solution to privacy ◦ At the heart of the debate is the balance between human rights and civil liberties and the intrusion on these rights in the name of security  The principal question : to ensure the full respect of fundamental rights!!!