Skip to content

Biometrics – What’s In Your Data?

Last updated on June 23, 2020

As mentioned in a previous post about data privacy, our personal data is often misused with or without our consent. Recently the Illinois Supreme Court ruled on the side of privacy in Rosenbach v. Six Flags.

While the Illinois Biometric Information Privacy Act is one of the strictest privacy laws in the United States, other states need to take biometric technologies such as facial, thumb print, and voice recognition more seriously.

Nationally, HIPPA laws are taken very seriously, why shouldn’t your biometric data be treated the same? Biometrics are used every day to access cellphones, computers and facilities.

Common sources of biometric data are:
• Face
• Fingerprint
• Iris
• Voice

Many mobile applications used today in the medical and banking industry rely on biometric authentication. This adds a second or third factor of security that passwords can never match. Unlike passwords, you cannot change your biometrics.

Biometric technologies add convenience as well, especially for customers. You would be hard pressed to leave the house without a face, finger or eyeball. But, as a general rule of thumb, the more convenient something is, the less secure it becomes.

When biometric data is not protected, it can be accessed and used criminally. It would be the ultimate identity theft. It is imperative that we understand how our biometric data is being used, stored and protected. Our very livelihood is at risk.

“Privacy – like eating and breathing – is one of life’s basic requirements.”
― Katherine Neville

Biometric Types

Published inNews

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *