{"id":4668,"date":"2015-04-17T02:34:06","date_gmt":"2015-04-17T06:34:06","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?page_id=4668"},"modified":"2022-03-11T05:32:51","modified_gmt":"2022-03-11T10:32:51","slug":"law-enforcement","status":"publish","type":"page","link":"https:\/\/www.m2sys.com\/blog\/law-enforcement\/","title":{"rendered":"Law Enforcement &#8211; Biometric Case Studies"},"content":{"rendered":"<div class=\"caseStudiesWrap\">\n<div class=\"caseStudy\">\n\t\t<img loading=\"lazy\" decoding=\"async\" alt=\"idvision-logo\" class=\"wp-image-4766 aligncenter\" height=\"90\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/03\/idvision-logo.png\" width=\"90\" style=\"margin-bottom: 0;\"><br \/>\n\t\t<strong>Client:<\/strong> ID Vision<br \/>\n\t\t<strong>Product:<\/strong> <a href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system-api\/\" target=\"_blank\" rel=\"noopener noreferrer\">CloudABIS<\/a> <br \/>\n\t\t<strong>Industry:<\/strong> Law Enforcement <br \/>\n\t\t<strong>Country:<\/strong> Oman <br \/>\n\t\t<strong>Use:<\/strong> Biometric Database for Soldier Identification and rationing system.<\/p>\n<div style=\"padding-top: 30px;\">\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-on-biometric-database-for-soldier-identification\/\">Download Case Study<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"caseStudy\">\n\t\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"wp-image-4766 aligncenter\" height=\"64\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/07\/egypt-flag.png\" width=\"65\"><br \/>\n\t\t<strong>Client:<\/strong> Egyptian Military Academy<br \/>\n\t\t<strong>Product:<\/strong> <a href=\"https:\/\/www.m2sys.com\/bioplugin\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bio-Plugin\u2122<\/a> <br \/>\n\t\t<strong>Industry:<\/strong> Law Enforcement <br \/>\n\t\t<strong>Country:<\/strong> Egypt <br \/>\n\t\t<strong>Use:<\/strong> Biometric Database of Army Personnel<\/p>\n<div style=\"padding-top: 30px;\">\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-fingerprint-biometrics-database-egyptian-military-academy\/\">Download Case Study<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"caseStudy\">\n\t\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"wp-image-4766 aligncenter\" height=\"64\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/06\/iraq-flag.png\" width=\"65\"><br \/><strong>Client:<\/strong> The Iraqi Govt. (Kurdistan Province of Sulaymaniyah)<br \/><strong>Product:<\/strong> <a href=\"https:\/\/www.m2sys.com\/automated-fingerprint-identification-system-afis\/\">ABIS\/AFIS<\/a> <br \/><strong>Industry:<\/strong> Border Control <br \/><strong>Country:<\/strong> Iraq <br \/><strong>Use:<\/strong> Biometric Border Control<\/p>\n<div style=\"padding-top: 5px;\">\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-border-control-iraq-case-study\/\">Download Case Study<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"caseStudy\">\n\t\t<img loading=\"lazy\" decoding=\"async\" alt=\"\" class=\"wp-image-4766 aligncenter\" height=\"64\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/01\/Salt-Lake-County-Sheriff-tiny.png\" width=\"65\"><br \/><strong>Client:<\/strong> Salt Lake County, UT Sheriff\u2019s Office<br \/><strong>Product:<\/strong> <a href=\"https:\/\/www.m2sys.com\/bioplugin\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bio-Plugin\u2122<\/a> <br \/><strong>Industry:<\/strong> Law Enforcement<br \/><strong>Country:<\/strong> U.S.A. <br \/><strong>Use:<\/strong> Prisoner Identification<\/p>\n<div style=\"padding-top: 5px;\">\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/salt-lake-county-ut-sheriffs-office-case-study\/\">Download Case Study<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<div style=\"width: 98%; display: block; border: 1px solid #e1e1e1; padding-top: 10px; padding-bottom: 10px; padding-left: 10px; text-align: left; overflow: hidden;\">\n<h4 style=\"font-size: 20px;\"><img loading=\"lazy\" decoding=\"async\" alt=\"case-study-icon-update\" class=\"alignnone size-full wp-image-5230\" height=\"25\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/05\/case-study-icon-update.png\" style=\"vertical-align: middle;\" width=\"30\"> M2SYS Technology Case Studies on Biometrics<\/h4>\n<div style=\"width: 33%; float: left;\">\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/government\/\" style=\"color: #606872; font-size: 12px; font-weight: bold;\">\u00bb Government<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/banking\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Banking and Financial Services<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/workforce\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Workforce Management<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/biometric-fingerprint-jail-inmate-visitor-identification\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Jail Inmate &#038; Visitor Identification<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/visitor-management\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Visitor Management<\/a>\n\t<\/div>\n<div style=\"width: 25%; float: left;\">\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/education\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Education<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/single-sign-on\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Single Sign-On<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/healthcare\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Healthcare<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/border-control\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Border Control<\/a>\n\t<\/div>\n<div style=\"width: 33%; float: left;\">\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/biometric-integration\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Biometric Integration<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/membership-management\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Membership Management<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Law Enforcement<\/a><br \/>\n\t\t<a href=\"https:\/\/www.m2sys.com\/blog\/church-membership-management\/\" style=\"color: #606872; font-size: 12px;\">\u00bb Church Membership Management<\/a>\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Client: ID Vision Product: CloudABIS Industry: Law Enforcement Country: Oman Use: Biometric Database for Soldier Identification and rationing system. Download<\/p>\n","protected":false},"author":386,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"_acf_changed":false,"_lmt_disableupdate":"no","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"class_list":["post-4668","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Law Enforcement - Biometric Case Studies<\/title>\n<meta name=\"description\" content=\"M2SYS Technology case studies on biometric deployment for law enforcement agencies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Law Enforcement - Biometric Case Studies\" \/>\n<meta property=\"og:description\" content=\"M2SYS Technology case studies on biometric deployment for law enforcement agencies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-11T10:32:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/03\/idvision-logo.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/\",\"name\":\"Law Enforcement - Biometric Case Studies\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2015-04-17T06:34:06+00:00\",\"dateModified\":\"2022-03-11T10:32:51+00:00\",\"description\":\"M2SYS Technology case studies on biometric deployment for law enforcement agencies.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Law Enforcement &#8211; Biometric Case Studies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Law Enforcement - Biometric Case Studies","description":"M2SYS Technology case studies on biometric deployment for law enforcement agencies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/law-enforcement\/","og_locale":"en_US","og_type":"article","og_title":"Law Enforcement - Biometric Case Studies","og_description":"M2SYS Technology case studies on biometric deployment for law enforcement agencies.","og_url":"https:\/\/www.m2sys.com\/blog\/law-enforcement\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_modified_time":"2022-03-11T10:32:51+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/03\/idvision-logo.png"}],"twitter_card":"summary_large_image","twitter_site":"@m2sys","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement\/","url":"https:\/\/www.m2sys.com\/blog\/law-enforcement\/","name":"Law Enforcement - Biometric Case Studies","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2015-04-17T06:34:06+00:00","dateModified":"2022-03-11T10:32:51+00:00","description":"M2SYS Technology case studies on biometric deployment for law enforcement agencies.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/law-enforcement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Law Enforcement &#8211; Biometric Case Studies"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/pages\/4668"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/386"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=4668"}],"version-history":[{"count":43,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/pages\/4668\/revisions"}],"predecessor-version":[{"id":17072,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/pages\/4668\/revisions\/17072"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=4668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}