Biometric Data
Our Clients may choose to enable the use of biometric technologies to assist in rapid identification and confirmation of a user’s identity. Given the fact that biometric finger technology is relatively new we have included additional information in this area. Biometric verification may be used for a number of school related end user services, such as rapid verification of registered users, including staff, students, visitors or contractors for the provision of/access to restricted, user specific electronic tasks.
These services may include functionality such as:
- Visitor sign-in
- Class/Schedule lookup
- Password reset
- Late sign in
- Early departure
- Print/Fund top-up
- Canteen purchases
As biometric verification cannot be guaranteed to be 100% accurate, other verification steps may also be included, to confirm the user’s identity.
Biometric finger-scan data collection is conducted by placing a finger on the ‘finger-scanning’ device on the relevant unit or computer.
Importantly, we do not store a copy of the user’s fingerprint, instead we follow a process called finger-scanning, which involves hashing extracted features of the finger, to enable a ‘best guess’ comparison. We are unable to, and understand it is unlikely that one could, construct a fingerprint or replicate a copy of a user’s fingerprint from a hashed feature extract of a finger-scan. Finger-scan data is stored in alignment with our Protection of data provision.
We follow the following process when registering a user’s finger-scan. This process provides an indicative process flow that may vary slightly between devices.
Step 1 – Image capture (held in RAM based, non-permanent memory)
Step 2 – Best image selection (quality of images, up to 5 analysed for ‘best capture’)
Step 3 – Image optimisation, contract and noise reduction applied to image
Step 4 – Feature analysis and extraction
Step 5 – Hash template created (Finger-scan data)
Step 6 – Hash template stored (Finger-scan data)
Step 7 – Image discarded
We follow the following process when confirming a user’s identity.
Step 1 – Image capture (held in RAM based, non-permanent memory)
Step 2 – Image optimisation, contract and noise reduction applied to image
Step 3 – Feature analysis and extraction
Step 4 – Live hash template created (Finger-scan data)
Step 5 – Image discarded
Step 6 – Comparison and matching between stored templates and live hash
Step 7 – Template matching score (with variance tolerance)
Given the nature of the biometric data stored, it is not practical to provide this in a human readable format. Accordingly, requests for copies of this data will be denied in accordance with Data Protection legislation. However, biometric data will be removed from our services, including end-point devices, upon request. Further, this personal data is managed in alignment with our destruction and retention of data provision.