SlideShare a Scribd company logo
1 of 2
Download to read offline
The Impact of Biometric Identification on Civil
Liberties
Biometrics has made the process of identifying people easy. This is
helpful in authentication and has many applications. While there is no
doubt about the benefits of biometrics, there are concerns about its
use. These concerns are related to privacy and civil liberties are listed
by Bahaa Abdul Hadi.
The concerns about biometrics
Biometrics makes use of fingerprints, facial patterns, and iris patterns
of individuals to identify them. This is a secure method of identifying
people and is very helpful in authentication. Biometrics helps in
enhanced security and allows authentication to happen faster. Today,
biometrics is used in many areas and its vast benefits have made it
popular.
A major concern that biometrics presents is the privacy of
individuals. Since personal data that identifies them is stored in a
database, there is a serious risk of breach of privacy. There are also
risks related to loss of civil liberties of individuals. Let’s look at the
key issues involved:
● Since biometrics can be used to identify people, it is possible to
track people through surveillance. In countries like China,
cameras can zoom in on people on the streets and identify them.
This is a serious concern and makes people vulnerable since
they can be tracked and monitored.
● Civil liberties can be affected as people with political views
opposed to the government can be put under surveillance. Such
a surveillance can be used to track and harass dissidents.
● While biometrics is a secure way of authentication, the data is
stored on public databases. There is a serious risk of this data
being hacked. If biometric data of individuals are accessed by
criminals, it poses serious problems. Their financial data can be
breached. Hackers may be able to locate them and even carry
out fraud.
● Biometric data collected for a legitimate purpose can be
misused in the future if not managed well. The biometric data
may be shared with others without informing individuals. This is
a serious breach of civil liberties.
● Biometric data contains details of an individual’s gender, race,
sexual orientation, etc. There is a possibility that this data may
be used by businesses to discriminate people. This again is a
violation of civil liberties.
● Police officers can track people using biometric data. This can
be a problem for people who want to legitimately protest against
the government or any other organization. They can be identified
while protesting and subject to harassment.
Conclusion
All these are serious concerns and governments need to work out
ways to address them. The benefits of biometrics must not be
overshadowed by infringement of civil liberties.
Thank you for your interest in Bahaa Abdul Hadi blogs. For more
information, please stay tuned to www.bahaaabdulhadi.com

More Related Content

Similar to The Impact of Biometric Identification on Civil Liberties.pdf

Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
GiannisBasa
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
aulasnilda
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
RAJU852744
 
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
hiij
 

Similar to The Impact of Biometric Identification on Civil Liberties.pdf (17)

Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
Ai
AiAi
Ai
 
The How of Biometrics
The How of BiometricsThe How of Biometrics
The How of Biometrics
 
Biometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization IssuesBiometric Personal Data, Legal and Technological Utilization Issues
Biometric Personal Data, Legal and Technological Utilization Issues
 
Privacy in the Age of AI Strategies for Navigating Ethical Challenges.pptx
Privacy in the Age  of AI Strategies  for Navigating  Ethical  Challenges.pptxPrivacy in the Age  of AI Strategies  for Navigating  Ethical  Challenges.pptx
Privacy in the Age of AI Strategies for Navigating Ethical Challenges.pptx
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx1Ethical Biometric Use23 Feb 2020Table of Cont.docx
1Ethical Biometric Use23 Feb 2020Table of Cont.docx
 
AWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for GovernmentAWS Institute | Digital Identity: The Opportunity for Government
AWS Institute | Digital Identity: The Opportunity for Government
 
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
BIOMETRIC TECHNOLOGY TOWARDS PREVENTION OF MEDICAL IDENTITY THEFT: PHYSICIANS...
 
Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.Implications of Biometric Data Analysis.
Implications of Biometric Data Analysis.
 
EEE3122
EEE3122EEE3122
EEE3122
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Biometrics Essay
Biometrics EssayBiometrics Essay
Biometrics Essay
 
Biometrics in Security
Biometrics in SecurityBiometrics in Security
Biometrics in Security
 
GHC-2014-Lavanya
GHC-2014-LavanyaGHC-2014-Lavanya
GHC-2014-Lavanya
 
BAHADI - AUG06.pdf
BAHADI - AUG06.pdfBAHADI - AUG06.pdf
BAHADI - AUG06.pdf
 

More from Bahaa Abdulhadi

More from Bahaa Abdulhadi (20)

Biometric Analytics & Internet of Things
Biometric Analytics & Internet of ThingsBiometric Analytics & Internet of Things
Biometric Analytics & Internet of Things
 
Biometric Analytics for Border Control..
Biometric Analytics for Border Control..Biometric Analytics for Border Control..
Biometric Analytics for Border Control..
 
Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.Integration of AI & Biometric Analytics.
Integration of AI & Biometric Analytics.
 
Biometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare DomainBiometric Analytics in Healthcare Domain
Biometric Analytics in Healthcare Domain
 
Impact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI VerticalImpact of Biometric Analytics in BSFI Vertical
Impact of Biometric Analytics in BSFI Vertical
 
Biometric Analytics & Workplace Security
Biometric Analytics & Workplace SecurityBiometric Analytics & Workplace Security
Biometric Analytics & Workplace Security
 
Biometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen AuthenticationBiometric Analytics: Next-Gen Authentication
Biometric Analytics: Next-Gen Authentication
 
Biometric Analytics: The Future of Security
Biometric Analytics: The Future of SecurityBiometric Analytics: The Future of Security
Biometric Analytics: The Future of Security
 
Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?Is Neural Biometrics Fool-Proof?
Is Neural Biometrics Fool-Proof?
 
Neural Biometrics for Healthcare
Neural Biometrics for HealthcareNeural Biometrics for Healthcare
Neural Biometrics for Healthcare
 
Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?Can Neural Biometrics Change the Game?
Can Neural Biometrics Change the Game?
 
The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram) The Science Behind EEG (Electroencephalogram)
The Science Behind EEG (Electroencephalogram)
 
Next chapter in biometrics
Next chapter in biometrics Next chapter in biometrics
Next chapter in biometrics
 
The Future of Biometric Patterns
The Future of Biometric PatternsThe Future of Biometric Patterns
The Future of Biometric Patterns
 
Facial Recognition Biometric Patterns
Facial Recognition Biometric PatternsFacial Recognition Biometric Patterns
Facial Recognition Biometric Patterns
 
Biometric Patterns in Healthcare
Biometric Patterns in HealthcareBiometric Patterns in Healthcare
Biometric Patterns in Healthcare
 
Biometric Patterns & Security
Biometric Patterns & SecurityBiometric Patterns & Security
Biometric Patterns & Security
 
Understanding Biometric Patterns
Understanding Biometric PatternsUnderstanding Biometric Patterns
Understanding Biometric Patterns
 
Role of Biometrics in Law Enforcement
Role of Biometrics in Law EnforcementRole of Biometrics in Law Enforcement
Role of Biometrics in Law Enforcement
 
Biometrics & Citizen Services
Biometrics & Citizen ServicesBiometrics & Citizen Services
Biometrics & Citizen Services
 

Recently uploaded

Recently uploaded (20)

IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 

The Impact of Biometric Identification on Civil Liberties.pdf

  • 1. The Impact of Biometric Identification on Civil Liberties Biometrics has made the process of identifying people easy. This is helpful in authentication and has many applications. While there is no doubt about the benefits of biometrics, there are concerns about its use. These concerns are related to privacy and civil liberties are listed by Bahaa Abdul Hadi. The concerns about biometrics Biometrics makes use of fingerprints, facial patterns, and iris patterns of individuals to identify them. This is a secure method of identifying people and is very helpful in authentication. Biometrics helps in enhanced security and allows authentication to happen faster. Today, biometrics is used in many areas and its vast benefits have made it popular. A major concern that biometrics presents is the privacy of individuals. Since personal data that identifies them is stored in a database, there is a serious risk of breach of privacy. There are also risks related to loss of civil liberties of individuals. Let’s look at the key issues involved: ● Since biometrics can be used to identify people, it is possible to track people through surveillance. In countries like China, cameras can zoom in on people on the streets and identify them. This is a serious concern and makes people vulnerable since they can be tracked and monitored. ● Civil liberties can be affected as people with political views opposed to the government can be put under surveillance. Such a surveillance can be used to track and harass dissidents. ● While biometrics is a secure way of authentication, the data is stored on public databases. There is a serious risk of this data being hacked. If biometric data of individuals are accessed by
  • 2. criminals, it poses serious problems. Their financial data can be breached. Hackers may be able to locate them and even carry out fraud. ● Biometric data collected for a legitimate purpose can be misused in the future if not managed well. The biometric data may be shared with others without informing individuals. This is a serious breach of civil liberties. ● Biometric data contains details of an individual’s gender, race, sexual orientation, etc. There is a possibility that this data may be used by businesses to discriminate people. This again is a violation of civil liberties. ● Police officers can track people using biometric data. This can be a problem for people who want to legitimately protest against the government or any other organization. They can be identified while protesting and subject to harassment. Conclusion All these are serious concerns and governments need to work out ways to address them. The benefits of biometrics must not be overshadowed by infringement of civil liberties. Thank you for your interest in Bahaa Abdul Hadi blogs. For more information, please stay tuned to www.bahaaabdulhadi.com