A double-edged sword

In the post-Sept. 11 world, biometrics has finally managed to transform its image. Once seen as the ultimate invasion-of-privacy tool, many now view it as a valid security shield that can actually protect citizens from identity thieves and other malevolent types.

But that doesn't mean privacy is no longer a major issue of concern in biometric applications. Privacy advocates warn against the dangers of biometric information being misused or combined with personal data in large databases in such a way as to make it a de facto national identifier.

"One of the reasons privacy is such a problem in this country is that the Social Security number has been so widely adopted," said David Pierce, research director for the Independence Institute. "But if you end up substituting this national ID database and, in effect, turn it into a national biometric database, then the possibility of collecting too much data on individuals becomes all the more serious."

Still, privacy advocates recognize the potential benefits biometrics offers for safeguarding privacy. To ensure that the technology is beneficial and not abused, they suggest that agencies adhere to the following guidelines:

n Adopt strict procedures to ensure that the biometric data is used only for its core purpose and is promptly destroyed when no longer needed.

n Do not share the data with other agencies or with private organizations.

n Keep the biometric data in a separate database and do not link it with other personal identifiers, such as Social Security number, date of birth or mother's maiden name.

n Provide users with an easily accessible privacy policy specific to biometrics that includes all fair information practices.

n If biometric data is somehow compromised, make sure there are procedures in place for users to file a complaint and receive adequate redress.

n Consider having a privacy audit performed. This will provide an objective view of whether system security is appropriate for the data being held, and it can help highlight potential privacy weak points.

n Use biometrics in tandem with a public-key infrastructure or password system. That way if biometric data is corrupted, a user has another way to prove his or her identity.

IN THIS SERIES

Main story: Positive ID required

Featured

  • Cybersecurity

    DHS floats 'collective defense' model for cybersecurity

    Homeland Security Secretary Kirstjen Nielsen wants her department to have a more direct role in defending the private sector and critical infrastructure entities from cyberthreats.

  • Defense
    Defense Secretary James Mattis testifies at an April 12 hearing of the House Armed Services Committee.

    Mattis: Cloud deal not tailored for Amazon

    On Capitol Hill, Defense Secretary Jim Mattis sought to quell "rumors" that the Pentagon's planned single-award cloud acquisition was designed with Amazon Web Services in mind.

  • Census
    shutterstock image

    2020 Census to include citizenship question

    The Department of Commerce is breaking with recent practice and restoring a question about respondent citizenship last used in 1950, despite being urged not to by former Census directors and outside experts.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.