cover image: 20/20 access & privacy excellence... 20 years in the making : Twenty/twenty access and privacy excellence

Premium

20.500.12592/51rz0c

20/20 access & privacy excellence... 20 years in the making : Twenty/twenty access and privacy excellence

29 Aug 2007

In the early -80s, I was working as the head of the Research Services Department at the Office of the Attorney General of Ontario. [...] The system will then compare the image of the submitted sample (or the template extracted from it) with the biometric data of the enrolee. [...] The matching of the live biometric to the sample is all that is necessary to authenticate the individual as an eligible user. [...] Views of the Privacy Community The global privacy and data protection community have consistently argued against the use of biometrics for most one-to-many identification purposes, and against the creation of large, centralized or interoperable databases of biometric data: • Resolution of International Data Protection Authorities;6 • Opinions of the European EDPS and Article 29 Working Party;7 and [...] For example, if an attacker were able to interject a false Yes response at a proper point of the communication between the biometrics and the application, he could pose as a legitimate user to any of the applications, thus bypassing the biometric part.
internet computer security data protection ethics verification database software board of directors biometrics cheque identity theft identification computing and information technology computing computer networking directors privacy, right of authentication biometric credit history anonymity biometric data digital signature signatures public key

Authors

Cavoukian, Ann

Pages
251
Published in
Canada

Related Topics

All