Biometric data has become the preferred standard for identity verification. Amazon recently made headlines by rolling out biometrics-based passkeys that let users access accounts and services by simply showing their face. This eliminates the need to remember cumbersome passwords.Moreover, biometrics are nearly impossible to subvert, especially now that they are often accompanied by liveness detection capabilities that can distinguish between a picture and a real person’s face, thus helping to thwart imposters.Biometrics promise to improve security and drastically improve the user experience. According to one of our recent surveys, more than half of consumers would rather sign up for a new product or service using biometrics and this easy verification makes them more likely to continue using the product or service.Despite the benefits, organizations should consider some important factors for successful biometric implementation: Offer Opt-In/Opt-Out choices: Give users control over their biometric data usage and offer alternatives for those unwilling to provide biometrics. Various studies suggest that Americans are quite willing to use biometrics. However, their trust and comfort levels are heavily dependent on the context in which biometrics are implemented. While consumers are often more trusting of biometrics in financial services, they are less trusting of their use by big tech and social media companies. Ethically, we can make all users comfortable by offering clear OptIn/OptOut procedures, which gives users complete control over how their biometric data gets used. If a person does not wish to provide his or her biometric data, organizations should always offer an alternative means for verifying identity. In the vast majority of cases, the desire for convenience will win out and most people will choose the biometric method. An excellent case in point: airports around the country have noted that by using biometrics, they can board flights in a fraction of the time it takes using standard identification documents. Avoid bias: Choose algorithms trained on diverse global datasets to minimize bias. In recent weeks, there’s been a lot of news about bias in biometrics. When looking at all the biometric options available in the market, there’s often a big discrepancy in terms of various algorithms’ ability to achieve demographic neutrality and equity, thus treating all individuals equitably. Therefore, to eliminate bias based on age, gender or race, make sure the algorithm selected has been trained on extremely diverse data sets from around the world. Make sensible investments: SaaS products allow affordable implementation for businesses of all sizes. Leverage existing infrastructure when possible: From a technical perspective, only large, established companies could afford to implement biometrics in the past because of the heavy up-front investment of time and work required. Today, smaller organizations have the opportunity to implement SaaS-based biometric offerings ideal for businesses of any size and immediately functional. Additionally, in physical access control applications (ensuring authorized individuals can access a facility), there’s great news in that in many cases, organizations don’t have to add new infrastructure (like cameras or readers) or replace existing infrastructure. They can leverage the equipment they already have along with the bring-your-own-device (BYOD) trend. Biometrics combined with BYOD automatically offers the superior security levels associated with multi-factor authentication (MFA). In short, when evaluating biometric offerings, it’s important to always consider how much money, time and resources the company has available to get an application up and running. Avoid “ripping and replacing” as much as possible, as this generates waste. Practice transparency: Clearly explain biometric data collection, transfer, retention and deletion protocols. Use encryption and anonymization techniques. Never store biometrics with PII. Also, when implementing biometrics, organizations must stay fully transparent in terms of how the data gets collected, transferred for processing and retained; and how and when it’s discarded. Specifically, organizations will want to highlight the added protections put in place; and the extent (if any) to which biometric data is shared with third-parties.
Identity, Decentralized identity and verifiable credentials
Four ethical and technical considerations for deploying biometrics

Today’s columnist, Dr. Mohamed Lazzouni of Aware, offers four ethical issues security teams need to consider while deploying biometrics. (Stock Photo, Getty Images)
An In-Depth Guide to Identity
Get essential knowledge and practical strategies to fortify your identity security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds