Welcome!

News Feed Item

IBIA Expresses Disappointment on Enactment of Florida Law Prohibiting Use of Biometrics in Schools

WASHINGTON, DC -- (Marketwired) -- 05/15/14 -- The International Biometrics & Identification Association (IBIA) expresses its deep disappointment that Florida Governor Rick Scott has signed a bill (SB 188) that prohibits the collection of student biometric information in K -12 schools in the state of Florida. IBIA had testified in legislative hearings in opposition to the bill and had urged Gov. Scott to veto the bill upon its passage. "This legislation prevents Florida's public schools from realizing the many benefits that biometrics can provide to student safety and security as well as enhanced productivity of school operations," said Robert Harbour, IBIA's Chairman.

IBIA believes this law is a misguided attempt to protect student privacy and sets a bad precedent by broadly prohibiting the use of an innovative and beneficial technology. In today's world, virtually everything depends on knowing with a high degree of assurance 'who' we are dealing with. This is especially important in our schools where children, our most vulnerable population, spend most of their days. For many critical purposes -- foremost, the security, safety, and privacy of our children but also the productivity and the efficiency of our schools -- we need to identify with a high degree of assurance 'who' is entering our schools, using school facilities, attending classes, eating school lunches.

Biometric identification, based on an individual's unique physical attributes, is the only way to positively identify an individual. Other means of identification -- cards, PINS, passwords, visual inspection of students -- are ineffective. Cards can be lost or stolen or shared; ID numbers and passwords are easily forgotten, especially for younger students. As for relying on visually looking at students, no one can remember all the students that come and go in a school.

Concern about the theft of biometric information, because it represents a permanent feature of a person, is based on misinformation. Biometric information is protected even if it cannot be reset or changed. Biometric data is typically stored in the form of a template, a mathematical representation of features used only for matching purposes. Theft of a biometric template only yields a meaningless string of numbers with no context or value to a hacker.

Biometric technology has been used for student ID in thousands of K-12 school districts across the country for almost 15 years. It has proven to be a faster, safer, and more cost-effective solution than other methods of identification -- especially with today's security concerns and reporting requirements.

A key driver for biometrics is the school cafeteria. Accurate records are critical for reimbursement from the federal government's $13 billion free and reduced lunch and breakfast programs. Speed and efficiency are essential so that students have enough time to eat. With cafeteria lines moving faster, there is greater student participation that results in better nutrition for students and increased federal funding to school districts. Biometrics are used in other school areas, as well, for example, access at school entrances, attendance checking, the library, the nurse's office, and the bus.

It is vitally important to separate fact from emotion and misinformation. IBIA supports best practices for the responsible use of biometric technology, including parental notice, informed consent, and data protection and deletion.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
"We focus on composable infrastructure. Composable infrastructure has been named by companies like Gartner as the evolution of the IT infrastructure where everything is now driven by software," explained Bruno Andrade, CEO and Founder of HTBase, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
Cloud applications are seeing a deluge of requests to support the exploding advanced analytics market. “Open analytics” is the emerging strategy to deliver that data through an open data access layer, in the cloud, to be directly consumed by external analytics tools and popular programming languages. An increasing number of data engineers and data scientists use a variety of platforms and advanced analytics languages such as SAS, R, Python and Java, as well as frameworks such as Hadoop and Spark...
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, Doug Vanderweide, an instructor at Linux Academy, discussed why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers wit...
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
When growing capacity and power in the data center, the architectural trade-offs between server scale-up vs. scale-out continue to be debated. Both approaches are valid: scale-out adds multiple, smaller servers running in a distributed computing model, while scale-up adds fewer, more powerful servers that are capable of running larger workloads. It’s worth noting that there are additional, unique advantages that scale-up architectures offer. One big advantage is large memory and compute capacity...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
The taxi industry never saw Uber coming. Startups are a threat to incumbents like never before, and a major enabler for startups is that they are instantly “cloud ready.” If innovation moves at the pace of IT, then your company is in trouble. Why? Because your data center will not keep up with frenetic pace AWS, Microsoft and Google are rolling out new capabilities. In his session at 20th Cloud Expo, Don Browning, VP of Cloud Architecture at Turner, posited that disruption is inevitable for comp...
"When we talk about cloud without compromise what we're talking about is that when people think about 'I need the flexibility of the cloud' - it's the ability to create applications and run them in a cloud environment that's far more flexible,” explained Matthew Finnie, CTO of Interoute, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
SYS-CON Events announced today that Datanami has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datanami is a communication channel dedicated to providing insight, analysis and up-to-the-minute information about emerging trends and solutions in Big Data. The publication sheds light on all cutting-edge technologies including networking, storage and applications, and thei...