The particular Role of Biometric Technologies in Info Protection

Recently, a news story came up out concerning a rash of break-ins at the Congressional offices located within Washington, DC. Inverters stolen included computer system equipment, personal items, items left in treatment and possibly secret or private information. The investigation will be still ongoing. One might assume authorities offices are immune to burglaries or even thieves given typically the high level of security deployed. However, this is simply not the situation.


Today a lot of people enjoy the convenience involving employing their laptops or even USB flash drives to hold and hold information. These equipment are small , and simple to use. By nature of the compact size the product can be easily missing or stolen.

Occasionally a company may well allow employees in order to use their laptop computers or flash drives to carry company data that may be accessed outdoors of the business office to be effective on different projects at their own leisure. This exercise might seem benign, nevertheless what happens in the event that flash disks or perhaps laptop is missing or stolen? A lot of companies do set up devices to observe laptops if that they are lost or perhaps stolen, but these devices usually perform not deploy technology to protect the particular data stored on laptops. Problem becomes which is more important, the laptop or the data stored?

In the present complex information age, protecting one’s details and privacy has never been more important. 1 would expect significant corporations holding each of our data, like certification bureaus, healthcare firms and advanced authorities offices to protect each of our data, but this is not constantly the truth. Accidents carry out happen and occasionally the theft of personal, private or perhaps confidential data could leave an particular person or company very vulnerable.

Biometrics is usually a leading technology which utilizes the individual’s unique neurological identity to give an exact identification associated with the individual. Every person has unique eye and fingerprint autographs which biometrics technologies uses to employ sophisticated algorithms to confirm ones identity.

Though, biometric technology is considered really high-tech, applications applied are usually pretty simple and entail either a simple retinal eye scan to confirm identification or possibly a person just swiping their little finger on the scanner sort device. Though, biometrics is not a common household name, the safety provided by the use of Biometric technology is undeniable when compared in order to the potential destroyed which can be caused by certainly not securing governmental office buildings, confidential or private information.

Personal information stashed on an USB show disk, if taken or lost, may potentially compromised the rightful owner. Hopefully a “good Samaritan” will find typically the lost disk and even return it again to rightful operator. Yet , the lost or damaged disk could likewise end up within the possession of the identity thief who can use typically the unprotected data upon the flash disk to his advantage. Given unrestricted entry to the files an identity thief can seriously give up the rightful owner.

Not necessarily uncommon intended for people to carry details on laptops or perhaps flash disks like their names, tackle information on letters written, financial info on spread bedsheets, telephone numbers, e-mail addresses as well as credit card numbers. This information is absolutely gold for an identity thief.

For instance , in case identity thieves manage to secure the Social Security quantity they could make use of this information to get a job, rent a house and in many cases secure a bank account. An identify thief can use stolen data to give to be able to police during a good arrest. If they do not turn up for their court date, a warrant for arrest could be issued in the assumed brand. Thereby the true owner of typically the data is composed. Sometimes the damage can easily be undone, nevertheless this would consider time and can guide to personal embarrassment.

By using biometric applications one could at least restrict the potential destruction, which may be caused in the event that data stored will be lost or taken as the data are unable to be accessed with no the owner’s distinctive biometric signature, we. e. fingerprint.