Experts ponder future of workplace biometrics

Experts, academics and members of the public and private sector met in Westminster today to discuss the future of biometric technology.

The use of biometrics in businesses could be commonplace in the near future, but it's warned that it will take just one big biometric fraud' from blowing it all out of the water.

A cross-section of people including members of the Identity and Passport Service, biometric academic experts and businesses including Lockheed Martin met today to discuss the potential of workplace biometric technology.

Hugh Carr Archer, chief executive of biometric firm Aurora, mentioned an example of a company using facial biometrics that saved six per cent of its wage bill by making sure that employees were there when they claimed to be.

"Fred, for example, clocks on work [for Bill] when the foreman's not looking, while Bill's at home putting his feet up. The foreman creates three ghost workers because he can then get their pay packets," he said.

"You introduce a biometric such as face recognition for those clocking on in the workforce, and you get benefits."

Systems such as the IRIS system in use at Heathrow can get people "fast-tracked" through queues more quickly. An example of a school using facial recognition technology to record attendance for sixth formers, was also cited as an example.

However, Archer recognised that there were huge security implications to discuss with the implementation of biometrics. He said that most observers were most interested in its privacy implications when it came to the school facial recognition scheme.

"[It's received] a lot of press attention from all the main daily newspapers, local radio and television," he said of the interest. "Most of the questions were about whether it was intrusive. So how do you think people are going to react about having their biometric data stored?"

Toby Stevens, director of the Enterprise Privacy Group, said that he did not think that biometrics necessarily infringed privacy, but that it had the incredible potential to do so.

"They are a lighting rod to privacy issues," he said. "This is because of personal sensitivities my face, my fingers, my eyes, my voice and they may carry information to you that I may not wish to convey."

He said that businesses needed to prove that biometrics have no privacy issues in order to gain the trust of potential users.

Stevens believed businesses had to ask themselves whether it was the right technology to use, whether it was trying to identity or authenticate, and whether they should use biometric templates or images for systems.

"If we start now in the relatively youthful day of the technology in following principles, we can build an overall public trust in the ability for us to handle biometrics correctly," he said.

"Disregard them now at our peril because we will lose public trust. It only takes one massive fraud on the back of a biometric scheme, and that could blow it for every application out there."

IT PRO has already published a short guide on biometric technologies that businesses could use.

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

What is the Computer Misuse Act?
Policy & legislation

What is the Computer Misuse Act?

2 Mar 2021
What is cloud-to-cloud backup?
cloud backup

What is cloud-to-cloud backup?

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021