{"id":1170,"date":"2011-03-02T08:14:25","date_gmt":"2011-03-02T16:14:25","guid":{"rendered":"\/?p=1170"},"modified":"2011-03-02T08:23:16","modified_gmt":"2011-03-02T16:23:16","slug":"touch2id-testimonials","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1170","title":{"rendered":"Touch2Id Testimonials"},"content":{"rendered":"<p><img class=\"alignright\" style=\"float: right;\" src=\"\/wp-content\/images\/2010\/12\/touch2id.jpg\" alt=\"\" hspace=\"10\" \/>Last\u00a0summer\u00a0I<a href=\"http:\/\/www.google.com\/url?sa=t&amp;source=web&amp;cd=1&amp;sqi=2&amp;ved=0CBcQFjAA&amp;url=https%3A%2F%2Fwww.identityblog.com%2F%3Fp%3D1142&amp;ei=yGluTfmsNoXGlQe_ys3sAg&amp;usg=AFQjCNFczyh3WhELYJDCRJ-h1AhzKjN0DA\"> wrote about\u00a0<\/a>the British outfit called <a href=\"http:\/\/www.touch2id.co.uk\/\" class=\"broken_link\">touch2id<\/a>.\u00a0 They had developed a system that sounded pretty horrible when I first heard about it &#8211; a scheme to control underage drinking by using\u00a0peoples&#8217; fingerprints\u00a0rather than\u00a0getting them to present\u00a0identity cards.\u00a0 I assumed it would be another of the hair-brained biometric schemes I had come across in the past\u00a0&#8211;\u00a0like <a href=\"\/?p=734\">this one<\/a>, or <a href=\"\/?p=775\">this<\/a>, or\u00a0<a href=\"https:\/\/www.identityblog.com\/?s=fingerprint\">these<\/a>.<\/p>\n<p>But no.\u00a0 The approach was completely different.\u00a0\u00a0Not only was the\u00a0system popular with its early adopters, but\u00a0its developers\u00a0had really thought through the privacy issues.\u00a0\u00a0\u00a0There was no database of fingerprints, no record linking a fingerprint to a natural person.\u00a0 The system was truly one of &#8220;minimal disclosure&#8221; and privacy by design:<\/p>\n<ul>\n<li>To register,\u00a0people\u00a0presented their ID documents and, once verified, a\u00a0template of their fingerprint was stored on a Touch2Id card that\u00a0was <em>immediately<\/em>\u00a0given to them.\u00a0 The fingerprint was <em>NOT stored in a database<\/em>.\u00a0<\/li>\n<li>When\u00a0people with the cards wanted to have a drink, they\u00a0would wave their card over a machine similar to a credit card reader, and press their finger on the machine.\u00a0\u00a0If their finger matched the template on their card, the light came on indicating they were of drinking age and they\u00a0could be served.<\/li>\n<\/ul>\n<p>A single claim:\u00a0 &#8220;<em>Able to drink<\/em>&#8220;.\u00a0 Here we had\u00a0well designed\u00a0technology\u00a0offering an experience that\u00a0the people using it\u00a0liked\u00a0way better than the current &#8220;carding&#8221; process &#8211; and which was\u00a0much more\u00a0protective of\u00a0their privacy.\u00a0 &#8220;Privacy by design&#8221; was\u00a0delivering tangible\u00a0benefits.\u00a0 Merchants didn\u2019t have to worry about making mistakes.\u00a0 Young people didn\u2019t have to worry about being\u00a0discriminated against\u00a0(or being embarassed) just because they \u201clooked young\u201d or got\u00a0a haircut.\u00a0 No identifying information was being released to the merchants.\u00a0 No name, age or photo was stored on the cards.\u00a0 The movements of young people\u00a0were not tracked.\u00a0 And so on.<\/p>\n<p>Today touch2id published\u00a0<a href=\"\/wp-content\/images\/2010\/12\/Testimonials2010.pdf\">Testemonials <\/a>&#8211; an\u00a0impressive summary of their project consisting of reviews by\u00a0individuals involved.\u00a0\u00a0It is clear that those who liked it loved it.\u00a0\u00a0It would be interesting to find\u00a0out\u00a0to what\u00a0extent\u00a0these rave reviews\u00a0are\u00a0typical of those who tried the system.\u00a0\u00a0<\/p>\n<p>At any rate, it&#39;s instructive to compare the positive outcome of this pilot with all the biometric proposals that have crashed onto the shoals of privacy invasion.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A good example of &#8220;Privacy By Design&#8221; delivering tangible benefits<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[48,37,2],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1170"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1170"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1170\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}