28.02.2013 Views

Biometric Technology Application Manual - ITI Observatorio ...

Biometric Technology Application Manual - ITI Observatorio ...

Biometric Technology Application Manual - ITI Observatorio ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Section 1 6 Introduction<br />

<strong>Biometric</strong>s for Identity Management<br />

What is identity management? Identity management<br />

is defined as “the registration, storage, protection,<br />

issuance, and assurance of a user’s personal identifier(s)<br />

and privilege(s) in an electronic environment in a secure,<br />

efficient, and cost-effective manner.” 4<br />

Identity management is an increasing concern across the<br />

public and private sectors. In the private sector it is most<br />

frequently thought of in the context of identity theft. According<br />

to FDIC figures, 10 million Americans suffered<br />

identity theft in 2003 with a cost to business in excess<br />

of US$50 billion and a personal impact that is difficult to<br />

estimate. As staggering as this sum is, identity theft is at<br />

the heart of significantly broader economic vulnerabilities<br />

and national security concerns. Using biometrics to<br />

develop identity theft countermeasures has direct impact<br />

on civil infrastructure protection.<br />

Authentication and identification of people are critical to<br />

eliminating threats to national security and public safety,<br />

and securing business transactions. As technology<br />

advances and public policy debates continue over the<br />

pros and cons of national identity programs, the identity<br />

management industry continues to grow and change.<br />

Specific to biometric technologies, increased attention<br />

to homeland security, for example, has spurred significant<br />

growth.<br />

Organizations, whether public or private, large or small,<br />

4 According to Daon. <strong>Biometric</strong> Identity Management in Large-<br />

Scale Enterprises. Used with permission.<br />

Version 2 – Summer 2008

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!