07.05.2013 Views

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

Descarga archivo PDF (20MB) - Biometría

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

procedures started. What about recording more than one biometric element to protect that<br />

individual’s identity? What about recording the iris apart from the fingerprints and facial image?<br />

In this way incumbency government agencies could offer different forms of validating the<br />

identity and moreover, it could turn it more accurate and less feasible to theft when more than<br />

one biometric data is required to verify, for example, facial plus iris, iris plus fingerprint, etc.<br />

In this manner a triangle of biometric data is constituted (dactyl-facial-iris) with which<br />

the individual, in different situations and circumstances will be able to assert and certify<br />

his or her biometric identity. Now then, what gives this triangle the dimensionality is the<br />

DNA as its record (on the occasions allowed by the Law) will provide the last biometric<br />

data to explore.<br />

These four biometric aspects constitute each of the planes of a pyramid where its vertex achieves<br />

that in every occasion, registration, verification for administrative procedures, accidents and<br />

acts related to security, among others, the citizen and the State have the tools with which<br />

they can assert their rights and obligations in an effective and quick manner integrating every<br />

individual and including him or her socially and equitably to his or her pairs.<br />

Ciber identity<br />

Today we live in a digital world, and it is true that the “Internet” has grown as a big bazaar.<br />

Nevertheless, every bazaar has codes, structures and rules. The Internet is not the exception.<br />

Domains, class subdomains, protocols and others integrate the organization of these huge<br />

communications channels that brings frontiers closers and provides freedom of participation<br />

and opinion.<br />

The Internet was born with one objective: to interchange information and to share knowledge.<br />

But it exceeded its own clients, from an “elite” it turned to be the popular tool it is today.<br />

And for being the main tool of the “digital democracy” we have to know and spread its risks,<br />

facilitate its use making it usable and accessible for everybody and to establish the mechanisms<br />

to take care our ecosystem.<br />

To protect this tool, it would be necessary to define what supports it and what constrains it.<br />

From the technological point of view we further have to define projects to ensure sustainability<br />

and to ensure its usability and accessibility, its “service qualities and its guarantees”.<br />

To this regards it is worth mentioning that, as it is of public knowledge, the access to the<br />

“Internet” has increasingly become more critical to the sensitiveness of its use and contents,<br />

as well as to the communications, transactions, administrative procedures, and on-line banking<br />

strategies, among others, and this demands the development of a protection framework of “the<br />

Network” and of the most important material it possesses, WE the persons.<br />

The technological aspect is being taken care of and strengthened, as it was mentioned above,<br />

from various layers; from the electronics, communications and data centres, undertaking the<br />

“Policies of Datacenters Qualifications” that integrate part of the efforts for “Protection of Critical<br />

Information Infrastructures” and the “Argentina Connected” project. But, what about the users?<br />

302

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!