Category

Typically the Role of Biometric Technologies in Information Protection

Recently, a news story came up out concerning some sort of rash of break-ins at the Congressional offices located within Washington, DC. Items stolen included personal computer equipment, personal items, products left in treatment and possibly private or private data. The investigation is usually still ongoing. One particular might assume govt offices are immune to burglaries or perhaps thieves given the high level regarding security deployed. On the other hand, this is simply not the situation.

Today many people appreciate the convenience associated with employing their laptops or even USB flash devices to carry and hold information. These gadgets are small , and simple to use. By nature of their small size the product could be easily lost or stolen.

Often Printer rentals may well allow employees in order to use their laptops or flash devices to carry firm data that can be accessed outside of the workplace to be effective on numerous projects at their own leisure. This training might appear benign, but what happens when flash disks or even laptop is missing or stolen? Many companies do set up devices to trail laptops if they are lost or stolen, but these devices usually do not deploy technological innovation to protect typically the data stored in laptops. Problem will become which is essential, the laptop or the data stored?

In the current complex information age, protecting one’s info and privacy has never been more important. 1 would expect major corporations holding our own data, like licensing bureaus, healthcare businesses and higher level federal government offices to safeguard the data, but this is not constantly the situation. Accidents carry out happen and often the theft of personal, private or even confidential data could leave an personal or company quite vulnerable.

Biometrics is a leading technological innovation which utilizes an individual’s unique neurological identity to offer an exact identification involving the individual. Each person has unique eye and fingerprint validations which biometrics technology uses to use sophisticated algorithms in order to confirm ones identity.

Though, biometric technology is considered quite high-tech, applications utilized are usually pretty simple and entail either an easy retinal eye check out to confirm identity or possibly a person basically swiping their little finger over a scanner variety device. Though, biometrics is not a popular household name, the security provided by the use of Biometric technology is unquestionable when compared in order to the potential broken which can get caused by not really securing governmental office buildings, confidential or private data.

Personal information stashed on an USB show disk, if stolen or lost, may potentially compromised the particular rightful owner. With any luck , a “good Samaritan” will find the lost disk plus return it again to rightful operator. Yet , the shed disk could also end up in the possession of the identity thief that can use typically the unprotected data about the flash hard drive to his benefit. Given unrestricted gain access to to the info an identity crook can seriously compromise the rightful owner.


Not necessarily uncommon intended for people to carry info on laptops or flash disks just like their names, tackle information on words written, financial info on spread bedsheets, telephone numbers, e mail addresses and even credit card numbers. These details is absolutely gold to an identity thief.

For example , when identity thieves handle to secure your own Social Security quantity they could make use of this information to have a job, rent a house and also secure a banking account. A great identify thief can use stolen details to give to police during a good arrest. If they do not show up for their court docket date, a call for for arrest could be issued inside the assumed brand. Thereby the correct owner of typically the data is composed. Sometimes destruction can be undone, but this would consider time and may guide to personal distress.

By using biometric applications one could at least reduce the potential destruction, which is often caused if data stored is usually lost or taken since the data cannot be accessed with out the owner’s distinctive biometric signature, we. e. fingerprint.

Leave a Reply

Your email address will not be published. Required fields are marked *