You’re probably familiar with the term “Biometric Identification” – using your unique finger prints, facial recognition, voice or retinas to identify you. They may be unique, but when installed on a computer, the information is still a string of numbers, it’s digitized.
The article, “Biometric Identification and Identity Theft”, by Jake Stroup at “the balance” states that when the information is stored on a computer, a database is a database, whether it’s a credit card number or a digital voice print. A hacker can still steal such data from a computer or network.
“As far as security is concerned, many experts agree that maintaining “token” forms of identification are probably superior. Token identification is a card, password, personal identification number (PIN), etc. It is something that can be canceled or changed if it is lost, misplaced or stolen. On the other hand, biometric identification can’t be lost, misplaced, or loaned to a friend, but it also can’t be replaced if it’s compromised either. This reality, combined with certain privacy issues (tracking, profiling, consumer-related privacy issues, etc.), is making experts give serious consideration to whether biometrics are a viable option on a large scale.
More information on Biometric Identification in our next post.
Please go to lloydkenney.wearelegalshield.com for more information on how you can protect you and your family through IDShield and LegalShield. Contact us at email@example.com.
For information on other services we have available, please visit performanceplanning.ca.
Please share this information to help keep others safe.