Biometric Data

Our Clients may choose to enable the use of biometric technologies to assist in rapid identification and confirmation of a user’s identity. Given the fact that biometric finger technology is relatively new we have included additional information in this area.  Biometric verification may be used for a number of school related end user services, such as rapid verification of registered users, including staff, students, visitors or contractors for the provision of/access to restricted, user specific electronic tasks.

These services may include functionality such as:

-          Visitor sign-in

-          Class/Schedule lookup

-          Password reset

-          Late sign in

-          Early departure

-          Print/Fund top-up

-          Canteen purchases

As biometric verification cannot be guaranteed to be 100% accurate, other verification steps may also be included, to confirm the user’s identity.

Biometric finger-scan data collection is conducted by placing a finger on the ‘finger-scanning’ device on the relevant unit or computer.

Importantly, we do not store a copy of the user’s fingerprint, instead we follow a process called finger-scanning, which involves hashing extracted features of the finger, to enable a ‘best guess’ comparison. We are unable to, and understand it is unlikely that one could, construct a fingerprint or replicate a copy of a user’s fingerprint from a hashed feature extract of a finger-scan.  Finger-scan data is stored in alignment with our Protection of data provision.

We follow the following process when registering a user’s finger-scan. This process provides an indicative process flow that may vary slightly between devices.

Step 1 – Image capture (held in RAM based, non-permanent memory)

Step 2 – Best image selection (quality of images, up to 5 analysed for ‘best capture’)

Step 3 – Image optimisation, contract and noise reduction applied to image

Step 4 – Feature analysis and extraction

Step 5 – Hash template created (Finger-scan data)

Step 6 – Hash template stored (Finger-scan data)

Step 7 – Image discarded 

We follow the following process when confirming a user’s identity.

Step 1 – Image capture (held in RAM based, non-permanent memory)

Step 2 – Image optimisation, contract and noise reduction applied to image

Step 3 – Feature analysis and extraction

Step 4 – Live hash template created (Finger-scan data)

Step 5 – Image discarded

Step 6 – Comparison and matching between stored templates and live hash

Step 7 – Template matching score (with variance tolerance)

Given the nature of the biometric data stored, it is not practical to provide this in a human readable format. Accordingly, requests for copies of this data will be denied in accordance with Data Protection legislation. However, biometric data will be removed from our services, including end-point devices, upon request. Further, this personal data is managed in alignment with our destruction and retention of data provision.