{"id":456,"date":"2011-01-24T16:53:11","date_gmt":"2011-01-24T21:53:11","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=456"},"modified":"2022-09-26T08:46:06","modified_gmt":"2022-09-26T12:46:06","slug":"biometrics-privacy-and-identity-theft-what-are-you-risking","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/","title":{"rendered":"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking?"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\">Is Biometric Technology Synonymous With A Violation Of Privacy?<\/span><\/strong><\/p>\n<p><strong style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-16293 size-medium aligncenter\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/01\/Privacy-600x334.jpg\" alt=\"Privacy\" width=\"600\" height=\"334\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/01\/Privacy-600x334.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/01\/Privacy-768x427.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/01\/Privacy.jpg 800w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">In certain circles, it\u2019s virtually impossible to mention the words \u201cbiometric identification\u201d without also having a spirited discussion about how using biometric technology purportedly is a direct violation of an individual\u2019s right to privacy.\u00a0 The issue regarding biometrics and privacy is if someone enrolls in a biometric identification system (referred to as a \u201cbiometric template\u201d), they are providing an image of their fingerprint, finger vein, palm vein, iris pattern or other physiological characteristic which is stored on a server or a computer.\u00a0 As a result, the following two fears are the most common about what could happen to the stored \u201cimage\u201d:<\/p>\n<ol style=\"text-align: justify;\">\n<li>Identity Theft &#8211; It can be stolen by a computer hacker and used to steal someone\u2019s identity similar to if someone were to steal your social security number<\/li>\n<li>Government Database \u2013 Your biometric template can and will be used by the federal, state or local government to create a national registry of all citizens<\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\">The Truth About How Biometrics Really Works<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">The truth of the matter is that biometric identity enrollment templates stored on a server or computers are not actually images at all.\u00a0 They are a mathematical representation of the data points that a biometric algorithm extracts from the scanned <strong><a title=\"fingerprint\" href=\"https:\/\/m2sys.com\/biometric-fingerprint-readers.htm\" target=\"_blank\" rel=\"noopener noreferrer\">fingerprint<\/a><\/strong>, <strong><a title=\"finger vein\" href=\"https:\/\/www.m2sys.com\/finger-vein-reader\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=fingervein\" target=\"_blank\" rel=\"noopener noreferrer\">finger vein<\/a><\/strong>, <strong><a title=\"palm vein\" href=\"https:\/\/www.m2sys.com\/palm-vein-reader\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=palmvein\" target=\"_blank\" rel=\"noopener noreferrer\">palm vein<\/a><\/strong> or <strong><a title=\"iris\" href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=autotilt\" target=\"_blank\" rel=\"noopener noreferrer\">iris<\/a><\/strong>.\u00a0 The identity template is simply a binary data file, a series of zeros and ones. \u00a0The algorithm then uses the template to positively identify an individual during subsequent fingerprint scans.\u00a0 No image is ever stored or transmitted across a network.\u00a0 In addition, the algorithm is \u201cone way\u201d which means that the template that is extracted is nearly impossible to be used to recreate the original biometric image.\u00a0 In other words, it is nearly impossible to reverse engineer the data that is sent to positively identify an individual and successfully \u201csteal\u201d their biometric identity.<\/p>\n<p style=\"text-align: justify;\">At M2SYS, we employ several important security features to ensure that the privacy of those using our <strong><a title=\"Hybrid Biometric Platform\" href=\"https:\/\/m2sys.com\/hybrid-biometric-platform.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Hybrid Biometric Platform<\/a><\/strong> system is fully protected:<\/p>\n<p style=\"text-align: justify;\">\u2022 No images are ever stored<\/p>\n<p style=\"text-align: justify;\">\u2022 Biometric data is stored in a proprietary format unique to the algorithm used in Hybrid Biometric Platform<\/p>\n<p style=\"text-align: justify;\">\u2022 All biometric data is stored using the AES 128 bit encryption algorithm<\/p>\n<p style=\"text-align: justify;\"><strong><a title=\"Advanced Encryption Standard (AES)\" href=\"https:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Encryption Standard (AES)<\/a><\/strong>, also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government. \u00a0It is used worldwide and has been analyzed extensively, as was the case with its predecessor, the Data Encryption Standard (DES).\u00a0 AES was adopted by the <strong><a title=\"National Institute of Standards and Technology (NIST)\" href=\"https:\/\/www.nist.gov\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">National Institute of Standards and Technology (NIST)<\/a><\/strong> as U.S. FIPS PUB 197 in November 2001 after a 5-year standardization process.<\/p>\n<p style=\"text-align: justify;\"><style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/01\/Hybrid-Biometric-Platform-Display-Ads.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>Hybrid Biometric Platform\u2122<\/span><\/h2>\r\n\t\t\t<h3>1 Integration, 1 platform, any form of biometrics<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Supports: <\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>\u2022 Fingerprint, finger vein, iris and facial recognition <\/p>\r\n\t\t\t\t<p>\u2022 Client: Windows XP, Vista, 7, 10 (32 and 64 bit) <\/p>\r\n\t\t\t\t<p>\u2022 Server: Windows 2000, 2003, 2008, 2012 (32 and 64 bit)<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/hybrid-biometric-platform\/?utm_source=Biometrics%2C+Privacy+and+Identity+Theft+%E2%80%93+What+Are+You+Risking%3F&amp;utm_medium=Hybrid+Biometric+Platform%E2%84%A2&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\">Can You Really \u201cSteal\u201dSomeone\u2019s Biometric Identity? <\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">Notice we said \u201cnearly\u201d impossible.\u00a0 It is certainly \u201cpossible\u201d that a hacker can reverse engineer <strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometrics-data-security\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=privacy%20in%202015\">biometric data<\/a><\/strong> and recreate an image.\u00a0 Anything is possible.\u00a0 But the question is, why?\u00a0 What would they be able to do with that image?\u00a0 <strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/5-factors-consider-choosing-best-biometric-modality\/?utm_source=blog&amp;utm_campaign=5%20biometric%20modality%20considerations&amp;utm_medium=blog%20post\">Fingerprint biometric technology<\/a><\/strong> has matured in sophistication over the years and is nearly impossible to fool with a photocopy, mold or any other variation of a person\u2019s fingerprint. <strong><a title=\"Vascular biometrics\" href=\"https:\/\/www.m2sys.com\/fingerprint-vein-biometrics-comparison.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Vascular biometrics<\/a><\/strong> (e.g. \u2013 finger vein and palm vein) require blood to be running through the veins in order for the near infrared light to successfully capture the finger or palm vein pattern.<\/p>\n<p style=\"text-align: justify;\">Furthermore, <strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=refuse%20enrollment\">biometric enrollment<\/a><\/strong> in any system or for any type of identification purpose requires someone to be physically present at the time of enrollment.\u00a0 It is not physically possible to enroll in a biometric system using anything other than your own physiological characteristics.<\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"text-decoration: underline;\">Don\u2019t Speculate, Educate<\/span><\/strong><\/p>\n<p style=\"text-align: justify;\">Our role as a <strong><a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/top-5-biometric-regulatory-bodies\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=top%20regulatory%20bodies\">biometric research and development<\/a><\/strong> company is to not only advance the growth of the technology throughout the world but also to educate on how the technology works.\u00a0 If you are unsure about how safe biometric technology is, we encourage you to educate yourself on the facts.\u00a0 Do not speculate, theorize or make assumptions based on what you have \u201cheard\u201d from others.\u00a0 <strong><a title=\"Our blog\" href=\"https:\/\/www.m2sys.com\/fingerprint-vein-biometrics-comparison.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Our blog<\/a><\/strong> makes for a great resource to read about biometric functionality and see firsthand examples of its application across many vertical markets.\u00a0 Read, educate and learn.\u00a0 <strong><a title=\"Contact us\" href=\"https:\/\/m2sys.com\/biometric-fingerprint-products-contact.htm\" target=\"_blank\" rel=\"noopener noreferrer\">Contact us<\/a><\/strong> if you have questions beyond what you find on our Web site or blog. \u00a0In addition, if your customers are skeptical of using biometrics and you want to reach out and ease their concerns, we are happy to write a guest blog post on your Web site, write an article for your company newsletter or customize a flyer for you to post\/distribute proactively before you implement a biometric identification system. \u00a0M2SYS is always more than happy to provide you with anything you need to make the transition to biometric identification a smooth one!<\/p>\n<p style=\"text-align: justify;\">If you feel that <strong><a href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/future-ecommerce-strategy\/?utm_source=blog&amp;utm_medium=guest%20blog%20post&amp;utm_campaign=biometrics%20for%20ecommerce\">biometric technology<\/a><\/strong> is a violation of your privacy, please explain to us why you feel this way in the comments section below.\u00a0 We welcome respectful comments, thoughts, and opinions on our blog posts at any time!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is Biometric Technology Synonymous With A Violation Of Privacy? In certain circles, it\u2019s virtually impossible to mention the words \u201cbiometric<\/p>\n","protected":false},"author":3,"featured_media":16293,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[39,17,29,10,46,22,16,62,50,11,73,47],"class_list":["post-456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-biometric","tag-biometric-systems","tag-biometric-technology","tag-finger-vein","tag-fingerprint-reader","tag-fingerprint-recognition","tag-fingerprint-scanner","tag-identity-theft","tag-iris-recognition","tag-palm-vein","tag-privacy","tag-vascular-technology"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics, Privacy and Identity Theft \u2013 What Are You Risking? - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking? - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Is Biometric Technology Synonymous With A Violation Of Privacy? In certain circles, it\u2019s virtually impossible to mention the words \u201cbiometric\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2011-01-24T21:53:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-26T12:46:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/01\/Privacy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\"},\"headline\":\"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking?\",\"datePublished\":\"2011-01-24T21:53:11+00:00\",\"dateModified\":\"2022-09-26T12:46:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/\"},\"wordCount\":919,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric\",\"biometric systems\",\"biometric technology\",\"finger vein\",\"fingerprint reader\",\"Fingerprint recognition\",\"fingerprint scanner\",\"identity theft\",\"Iris recognition\",\"palm vein\",\"privacy\",\"vascular technology\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/\",\"name\":\"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking? - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2011-01-24T21:53:11+00:00\",\"dateModified\":\"2022-09-26T12:46:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking? - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking? - Digital Transformation of Government Services","og_description":"Is Biometric Technology Synonymous With A Violation Of Privacy? In certain circles, it\u2019s virtually impossible to mention the words \u201cbiometric","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2011-01-24T21:53:11+00:00","article_modified_time":"2022-09-26T12:46:06+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2011\/01\/Privacy.jpg","type":"image\/jpeg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0"},"headline":"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking?","datePublished":"2011-01-24T21:53:11+00:00","dateModified":"2022-09-26T12:46:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/"},"wordCount":919,"commentCount":3,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric","biometric systems","biometric technology","finger vein","fingerprint reader","Fingerprint recognition","fingerprint scanner","identity theft","Iris recognition","palm vein","privacy","vascular technology"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/","name":"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking? - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2011-01-24T21:53:11+00:00","dateModified":"2022-09-26T12:46:06+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-privacy-and-identity-theft-what-are-you-risking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics, Privacy and Identity Theft \u2013 What Are You Risking?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/456"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=456"}],"version-history":[{"count":19,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/456\/revisions"}],"predecessor-version":[{"id":18777,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/456\/revisions\/18777"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16293"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}