Ide kerülhet az előadás címe Julia Sziklay: Facial recognition – a relevant example of biometric data collection Sarajevo, 12-05-2016.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Verification of Eligibility for Public Benefit Technical College System of Georgia Office of Adult Education FY15.
STI, Part of Al Falasi Group UAE
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
FACE RECOGNITION TECHNOLOGY. OUTLINE WHAT IS BIOMETRICS? WHAT IS BIOMETRICS? WHAT IS FACIAL RECOGNITION TECHNOLOGY? WHAT IS FACIAL RECOGNITION TECHNOLOGY?
ACT-IAC Igniting Innovation 2014 February 6, 2014.
Ide kerülhet az előadás címe Enforcement of personal data protection in Hungary by Dr. Attila Péterfalvi "Business and Security" Research Center for Legal.
BARTEX Your Logo Here BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM BARTEX CORPORATION’S BORDER REGISTRATION and SECURITY SYSTEM.
Ide kerülhet az előadás címe Data protection implications of the use of RPAS and recommendations – Budapest, 5th February 2015.
Privacy Policy, Law and Technology Carnegie Mellon University Fall 2007 Lorrie Cranor 1 Data Privacy.
The Role of Computers in Surveillance ~ Katie Hatland.
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Facial Recognition Facial recognition software - based on the ability to recognize a face and then measure the various features of the face. Each human.
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Compiled by Celeste The following slides are DIRECT QUOTE from source: R. Kelly Rainer, Jr. & Hugh Watson, (2012). Management Information Systems, John.
Amber Vision – June 25, 2010 Presentation to: West Virginia Board of Education Superintendent’s Leadership Institute.
Ide kerülhet az előadás címe Dr. Attila Péterfalvi: The Hungarian „case” (Independence of the DPA) Belgrade,
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Ide kerülhet az előadás címe CCTV operation at work Belgrade, 11 th April 2013.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
The BOSS Project: Recent Advances in Facial Scanning Adam C. Champion.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
”Billboard that looks back”  What is biometric identification? ◦ Biometrics can be defined as the automated use of physiological or behavioral characteristics.
BIOMETRICS.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Hungarian Ministry of Interrior Rules concerning the handling of personal data are regulated by the following legislation at the field of alien policing.
Biometrics Authentication Technology
Unified Border Information System - UBIS A Needs Assessment.
Twelve Guiding Principles for the Regulation of Surveillance Camera Systems Presented by: Alastair Thomas Date: 23 rd October 2013.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
Biometric Technologies
Wil Haywood Rossana Bua Rhishi Katoch Kelvyn Araujo-Valdez Steve Kim.
FriendFinder Location-aware social networking on mobile phones.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Ide kerülhet az előadás címe Role of Data Protection Authorities – boundaries between lawful and unlawful processing of personal data Budapest, 17 September.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
ZAGAZIG UNIVERSITY-BENHA BRANCH SHOUBRA FACULTY OF ENGINEERING ELECTRICAL ENGINGEERING DEPT. COMPUTER SYSTEM DIVISION GRAUDATION PROJECT 2003.
Privacy: HIPAA Emerson Murphy-Hill. Rosie Callender, RHIA, web.msm.edu/hipaa/An%20Introduction%20to%20HIPAA.ppt What is HIPAA? A Federal Law Created in.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Situation Analysis Access to Court Decisions in Georgia
An Initiative to help lost children / adults.
Ide kerülhet az előadás címe
Databases Chapter 16.
Issues of personal data protection in scientific research
Athina Antoniou and Lilian Mitrou
Authentication.
Facial Recognition What is it and how does it work? 1. LEAs collect photo mugshots of arrestees and ask other government agencies (like the DMV or the.
FACE DETECTION USING ARTIFICIAL INTELLIGENCE
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Facial Recognition [Biometric]
Facial Recognition in Biometrics
Biometrics.
Privacy and Information
AFIS and CODIS Duyen & Ladaysha.
Biometric technology.
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Title of poster... M. Author1, D. Author2, M. Author3
Dashboard eHealth services: actual mockup
Faculty of Science IT Department Lecturer: Raz Dara MA.
Risk Management and Human Relations
8.02 Discuss considerations for safety and security.
IT and Society Week 2: Privacy.
Presentation transcript:

Ide kerülhet az előadás címe Julia Sziklay: Facial recognition – a relevant example of biometric data collection Sarajevo,

Biometric data - ‚Biometric data' means any data relating to the physical, physiological or behavioural characteristics of an individual, which allow their unique identification, such as facial images. - The processing of photographs will not systematically be processing of special categories of personal data as they will only be covered by the definition of biometric data when being processed through a specific technical means allowing the unique identification or authentication of an individual - Processing biometric data on large scale filing system present specific risk. (General Data Protection Regulation)

Facial recognition Multiple kinds: -face detection: software in phone cameras („it’s Mum”) -facial characterization: discerns demographics of a face, smart billboards („a teenager white male”) -verification: activating a laptop or phone only when the camera sees an approved visage -identification of an unknown person: a database connects a stranger’s face to a name or other identifier A. online form („software identifies you from a picture uploaded to Facebook”) B. offline form („software identifies you by taking your picture while you’re just walking around”)

Hungary The technology is widely used to identify known or suspected criminals at entry points such as airports. Hungary: nationwide Introduction From 1 January 2016 onwards, facial data of residents (and in some cases also foreigners wishing to cross the borders) of Hungary will be stored in a database which can be accessed by Hungarian law enforcement authorities. The encoded profiles, generated from identification photos, will be used by a facial recognition programme and may be combined with other databases.

Data protection concerns and solutions The general and uniform personal identification mark (personal number) for unrestricted use is unconstitutional. (1991) Mass use of covered/secret surveillance seriously harms privacy. The big governmental databases shall not contain biometric profile reference data bases. A separate and closed governmental database shall set up. The biometric database shall not include personal data (names, addresses etc.), the persons can be identified by a so-called “contact or hash-code” and the forwarded images are immidiately deleted after the codes are created. In case of request the forwarded image is transformed into a new code which is compared with the stored contact codes. I case of a hit the authorised authorities can contact the big governmental database. Authorities with requesting rights are limited (police, secret services, the anti-terrorist super police)

NAIH address: H-1125 Budapest, Szilágyi Erzsébet fasor 22/c. H-1530 Budapest, Pf. 5. Tel.: Fax: Thank you for your attention!