{"id":6667,"date":"2016-04-16T04:00:54","date_gmt":"2016-04-16T08:00:54","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=6667"},"modified":"2018-07-10T01:43:12","modified_gmt":"2018-07-10T05:43:12","slug":"can-employees-refuse-enrollment-in-a-biometric-system","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/","title":{"rendered":"Can Employees Refuse Enrollment In a Biometric System?"},"content":{"rendered":"<p><em>This is a repurposed <\/em><a href=\"https:\/\/www.m2sys.com\/blog\/retail-point-of-sale\/do-employees-have-a-right-to-refuse-enrollment-in-a-biometric-system\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=right%20to%20refuse\"><strong><em>post<\/em><\/strong><\/a><em>\u00a0on enrollment in a biometric system that was originally published on the M2SYS Blog, August 05, 2011<\/em><\/p>\n<figure id=\"attachment_6668\" aria-describedby=\"caption-attachment-6668\" style=\"width: 361px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-6668\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in.jpg\" alt=\"Enrollment Through a biometric system\" width=\"361\" height=\"239\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in.jpg 1920w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in-300x199.jpg 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in-768x509.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in-1024x678.jpg 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in-606x401.jpg 606w\" sizes=\"(max-width: 361px) 100vw, 361px\" \/><figcaption id=\"caption-attachment-6668\" class=\"wp-caption-text\">Many organizations worldwide have implemented or are considering implementing biometric time clocks for employee time and attendance<\/figcaption><\/figure>\n<p>Considering the many benefits of biometric technology for identification and authentication, some people raise concerns about privacy and security issues. Many people believe that when placed in the wrong hands, a person\u2019s biometric data in\u00a0a biometric system can be misused resulting in severe consequences. Some advocates also believe that collecting individual biometric credentials (even when used by the private sector for uses such as employee authentication) is a violation of individual privacy. This post is an explanatory approach to this issue in an attempt to clarify why privacy violations should not be a concern when it comes to biometric technology.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Biometrics is a Growing Identification Technology<\/h2>\n<p>&nbsp;<\/p>\n<div align=\"center\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/qZo0vvgf8M0?rel=0&amp;showinfo=0\" frameborder=\"0\" allow=\"allowfullscreen\"><\/iframe><small style=\"font-size: 12px; font-style: italic; display: block; text-align: center;\">Affordable Biometric Time Clock Software<\/small><\/div>\n<p>&nbsp;<\/p>\n<p>Understanding biometric technology must be predicated by an explanation of how it works. First, it should be noted that biometric technology deployments for identification and authentication <a href=\"https:\/\/findbiometrics.com\/technavio-biometric-workforce-management-303317\/\"><strong>are on the rise<\/strong><\/a><strong> globally<\/strong>. Regardless of whether you believe the technology violates individual privacy, more businesses and governments around the world are starting to use biometrics for individual identification.<\/p>\n<p>Increasingly, businesses are catching on to the unique benefits and security that biometric technology offers to positively identify an individual by their physiological characteristics.\u00a0 The rapid growth of biometric technology seemed to begin shortly after we shifted to a society aggressively focused on safety and security in the wake of the rise in global terrorism, identity theft, and fraud in all aspects of life from banking to employee time and attendance.<\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/rightpunch-biometric-time-clock\/?utm_source=Article-Can-Employees-Refuse&amp;utm_medium=RightPunch&amp;utm_campaign=Blog-DisplayAds\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-6492\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/RightPunch-1.png\" alt=\"Affordable Biometric Time Clock Software\" width=\"300\" height=\"250\" \/><\/a>As the price points of biometric technology dropped and the technology became more refined, deployments began to shift from government to the private sector as companies took notice that biometrics had strong potential to help them with problems such as employee time theft, inventory shrink, identity theft, compliance, and fraud.\u00a0 Widespread adoption by the private sector fueled the growth of biometric systems designed to positively identify individuals to prevent these problems and with this growth came increased scrutiny (specifically how individual biometric data was stored and what it may be used for other than identification) by Privacy advocates and proponents of civil liberty protections.\u00a0 Their collective feelings are that biometric system violates individual privacy without a 100% guarantee that templates are safely stored and unable to be stolen and governments are using the data to track citizens and subsequently disseminating the information collected to external entities.<\/p>\n<p>These arguments have merit but perhaps a closer look at how the technology works would help uncover some answers to these concerns and clear up some misconceptions about biometric technology.<\/p>\n<h2>The Privacy Issue \u2013 How Does Biometric Technology Actually Work?<\/h2>\n<p>Most people believe that when an individual places their finger on a fingerprint reader to register their identity in a biometric system, an image of their fingerprint is stored somewhere on a server or a computer.\u00a0 In actuality this is typically not the case.\u00a0 Instead, the biometric matching software extracts and stores something that is known as an identity template.\u00a0 This is a mathematical representation of data points that a biometric algorithm extracts from the scanned fingerprint.<\/p>\n<p>The biometric identity template is simply a binary data file, a series of zeros and ones.\u00a0 The algorithm then uses the template to positively identify an individual during subsequent fingerprint scans.\u00a0 No image is ever stored or transmitted across a network.<\/p>\n<p>In addition, the algorithm is \u201cone way\u201d which means that it is nearly impossible to recreate the original biometric image from the template.\u00a0 In other words, it is nearly impossible to reverse engineer the data that is sent to positively identify an individual and successfully \u201csteal\u201d their biometric identity.<\/p>\n<p>Understanding these processes is central to realizing how the danger of identity theft or a security breach is significantly lessened, if not completely eliminated, through the use of a proprietary algorithm with data encryption and no stored image.\u00a0 Biometric templates are also not linked to anything in a closed system that can positively identify an individual outside of that system.<\/p>\n<p>However, privacy advocates strongly feel that the idea of to assemble a comprehensive citizen knowledge base and thus exercise covert control of society in general is a violation of individual privacy and proves to be a valid point.<\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/m2easyscan-usb-fingerprint-reader\/?utm_source=Article-Can-Employees-Refuse&amp;utm_medium=EasyScan&amp;utm_campaign=Blog-DisplayAds\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6497\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/ES-3.png\" alt=\"A Variety of Fingerprint Scanners and Fingerprint Sensor Technologies for Varying Industry Conditions\" width=\"557\" height=\"128\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/ES-3.png 557w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/ES-3-300x69.png 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><\/a><\/p>\n<h2>Can an Employee Claim that using a Biometric System is a Violation of Their Privacy?<\/h2>\n<p>If you adopt <a href=\"https:\/\/www.m2sys.com\/rightpunch-biometric-time-clock\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=RightPunch\"><strong>biometric technology for time and attendance<\/strong><\/a>, access control or another deployment within a business, do employees have a right to refuse participation on the grounds that it violates their privacy and\/or individual civil liberties?\u00a0\u00a0 It brings up an interesting question.\u00a0 Without irrefutable proof that a biometric database can\u2019t be hacked into and the templates reverse engineered into images, if an employee did decide to decline participation, would they be able to prove their claim that the technology did in fact violate their civil liberties?<\/p>\n<p>There have not been any known cases here in the U.S. of an employee taking their employer to court for their refusal to enroll in a biometric identification system that resulted in wrongful termination or a violation of their equal opportunity rights.\u00a0 In fact, most employees would agree to the <a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/the-top-seven-advantages-of-a-biometric-identification-management-system\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=top%20seven%20advantages\"><strong>advantages of using biometric technology<\/strong><\/a> for workforce management. However, shouldn\u2019t biometric information be treated as any other personally identifiable data that an employer keeps on file like social security numbers, pictures, or bank information if you request a direct deposit?\u00a0 Information that, if stolen, could be used to recreate your identity?<\/p>\n<p>Most companies already have policies in place that govern the safe protection of this data and biometrics should arguably be included and not treated any differently.\u00a0 It should be treated the same way as the data you have already given up and is stored just by being an employee of the company.<\/p>\n<p>Most employers also monitor their employee\u2019s activities while they are at work which could include video, email and telephone monitoring.\u00a0 An employee is then asked to sign that they received and read the employee manual that explicitly states their acknowledgement that they will be monitored throughout their employment tenure.\u00a0 Remember that this is not a request for permission to be monitored; it is an agreement that the employer will be doing it.<\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/case-study-yarco-deploys-finger-vein-biometric-time-clock-with-kronos\/?utm_source=Article-Can-Employees-Refuse&amp;utm_medium=CaseStudy&amp;utm_campaign=Blog-DisplayAds\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6498\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/Case-Study-Display-Ads.png\" alt=\"Biometric Technology for WFM\" width=\"564\" height=\"188\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/Case-Study-Display-Ads.png 564w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/Case-Study-Display-Ads-300x100.png 300w\" sizes=\"(max-width: 564px) 100vw, 564px\" \/><\/a><\/p>\n<h2>Conclusion<\/h2>\n<p>It is important to note if you have a Twitter or Facebook account, purchase on the Internet, use credit cards at brick and mortar establishments, subscribe to publications on the Internet, have any form of insurance or bank account, etc. you no longer have any privacy. If you use one or more credit cards, the credit card company knows where you eat, what you eat, what kind of car you drive, where you live, what insurance you have, where you spend your vacations, what you read, how much you spend on shoes and more.<\/p>\n<p>If you use most social media platforms, you have publicly given up every bit of privacy you ever had. Although these are personal preferences, it makes the argument hard to justify that enrollment in a biometric system is any more egregious that most of the other daily online and offline activities that we participate in.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a repurposed post\u00a0on enrollment in a biometric system that was originally published on the M2SYS Blog, August 05,<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Biometric system","_yoast_wpseo_title":"Can Employees Refuse Enrollment In a Biometric System?","_yoast_wpseo_metadesc":"Many believe that data collection through a biometric system is a violation of individual privacy but a closer look at the technology tells a different","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[67],"tags":[],"class_list":["post-6667","post","type-post","status-publish","format-standard","hentry","category-biometric-hardware"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Can Employees Refuse Enrollment In a Biometric System?<\/title>\n<meta name=\"description\" content=\"Many believe that data collection through a biometric system is a violation of individual privacy but a closer look at the technology tells a different\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can Employees Refuse Enrollment In a Biometric System?\" \/>\n<meta property=\"og:description\" content=\"Many believe that data collection through a biometric system is a violation of individual privacy but a closer look at the technology tells a different\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-16T08:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-10T05:43:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in.jpg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\"},\"headline\":\"Can Employees Refuse Enrollment In a Biometric System?\",\"datePublished\":\"2016-04-16T08:00:54+00:00\",\"dateModified\":\"2018-07-10T05:43:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/\"},\"wordCount\":1228,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Hardware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/\",\"name\":\"Can Employees Refuse Enrollment In a Biometric System?\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2016-04-16T08:00:54+00:00\",\"dateModified\":\"2018-07-10T05:43:12+00:00\",\"description\":\"Many believe that data collection through a biometric system is a violation of individual privacy but a closer look at the technology tells a different\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Can Employees Refuse Enrollment In a Biometric System?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can Employees Refuse Enrollment In a Biometric System?","description":"Many believe that data collection through a biometric system is a violation of individual privacy but a closer look at the technology tells a different","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/","og_locale":"en_US","og_type":"article","og_title":"Can Employees Refuse Enrollment In a Biometric System?","og_description":"Many believe that data collection through a biometric system is a violation of individual privacy but a closer look at the technology tells a different","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2016-04-16T08:00:54+00:00","article_modified_time":"2018-07-10T05:43:12+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/04\/clock-in.jpg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0"},"headline":"Can Employees Refuse Enrollment In a Biometric System?","datePublished":"2016-04-16T08:00:54+00:00","dateModified":"2018-07-10T05:43:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/"},"wordCount":1228,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Hardware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/","name":"Can Employees Refuse Enrollment In a Biometric System?","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2016-04-16T08:00:54+00:00","dateModified":"2018-07-10T05:43:12+00:00","description":"Many believe that data collection through a biometric system is a violation of individual privacy but a closer look at the technology tells a different","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/can-employees-refuse-enrollment-in-a-biometric-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Can Employees Refuse Enrollment In a Biometric System?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Shakib Khan","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/6667"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=6667"}],"version-history":[{"count":10,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/6667\/revisions"}],"predecessor-version":[{"id":9469,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/6667\/revisions\/9469"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=6667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=6667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=6667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}