3. What privacy concerns might arise from the use of biometric authentication techniques?
knowledge, the increased deployment of certain types of biometric technologies does bring with it the concept of biometric information being gathered, and biometric identification functions being performed, without consent. This would facilitate, if not be an instantiation of, unauthorized use of biometric technology. Unnecessary collection. Biometric technology, in its various iterations, is normally deployed as a means of addressing a specific identity verification problem. Primary examples include controlling physical access to specific locations, controlling logical access to specific data, or ensuring that an individualdoes not enroll multiple times in a single-identity system. A potential fear, if and when biometric technologies become pervasive, is that they will be deployed in situations where there is little to no benefit to strong user authentication or identification. Unnecessary collection would also facilitate unauthorized use of biometric technology. Unauthorized use. Unauthorized uses of the biometric technology are seen to represent the greatest risk biometrics pose to privacy. It is not the intended uses ofbiometrics that are seen as problematic, but the ways in which it might be used forpurposes than originally intended. “Unauthorized use” concerns use can be classified as forensic usage and usage as unique identifier. Forensic usage. Given the use of fingerprints as the primary means of forensic identification, it is natural that the requirement to provide one’s fingerprints to receive public benefits should be looked at with hesitation. The fear is that information provided for public or private sector usage will facilitate police searches, both automated and through use of latent images. By virtue of this, every database with a biometric could be used as a database of criminal records, representing a significant increase in the potentially intrusive investigative powersof the state.Usage as unique identifier. The use of biometrics to monitor, link and track a person’s daily activities is another commonly held fear. Being that biometric technologies are based on physiological or behavioral characteristics, and that some of these characteristics (such as fingerprints) are unique, the fear is that biometric technology can thereby serve as a unique identifier. The fear is that biometric information in "identifiable form", that is, as "raw image" biometrics, will be used to link information..
You've reached the end of your free preview.
Want to read all 9 pages?
- Winter '14
- Freeware, Proprietary software, Software licenses