Legal Aspects: Biometric Data, Evidence Rules and Trusted Identities
- 1.8k Downloads
Biometric characteristics could play an increasing role as means for binding electronic documents and transactions to a person and for identifying that person. However, one of the conditions for biometric methods to be used as an electronic signature is that spoofing vulnerabilities are adequately assessed and appropriate solutions are developed. Anti-spoofing measures are also crucial in electronic identity schemes which may include biometric characteristics. For these schemes, privacy and data protection issues remain to be solved as well.
KeywordsElectronic Signature Civil Code Electronic Identification Biometric Data Biometric System
This chapter was made possible thanks to the funding and work performed for the BEAT project (EU FP7, grant agreement number \(284989\)), the Fidelity project (EU FP7, grant agreement number \(284862\)) and the B-CCENTRE project (Prevention of and Fight against Crime Programme of the EU, European Commission, DG Home Affairs). The author further thanks prof. dr. P. Van Eecke for the review and his comments to this chapter.
- 1.OECD (2011) Digital identity management: enabling innovation and trust in the internet economy. http://www.oecd.org/sti/ieconomy/49338380.pdf
- 2.EC (2000) Directive 2000/31/EC of the European parliament and of the council of 8 Jun 2000 on certain legal aspects of information society services, in particular electronic commerce, in the internal market (O.J. L 178), pp 1–16Google Scholar
- 3.EC (2000) Directive 1999/93/EC of the European parliament and of the council of 13 Dec 1999 on a community framework for electronic signatures (O.J. L 13), pp 12–20Google Scholar
- 4.Article 29 Data Protection Working Party (2012) opinion 3/2012 on developments in biometric technologies WP193Google Scholar
- 5.Li S (ed) (2009) Encyclopedia of Biometrics, Springer, p 1296, at the term “Spoofing”, also available at http://www.springer.com/computer/image+processing/book/978-0-387-73002-8
- 6.Kindt E (2012) The processing of biometric data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework. Ph.D. thesis, KU Leuven. KU Leuven Law LibraryGoogle Scholar
- 7.Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication, security and privacy. http://www.ipc.on.ca/images/resources/bio-encryp.pdf
- 8.EC (2010) A digital agenda for Europe (COM(2010) 245 final/2). Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the RegionsGoogle Scholar
- 9.EC (2012) Proposal for a regulation to the European parliament and of the council on electronic identification and trust services for electronic transactions in the internal market (COM(2012) 238 final), p 56Google Scholar
- 10.Alsenoy B, Kindt E, Dumortier J (2011) Privacy and data protection aspects of e-government identity management. In: van der Hof S, Groothuis MM (eds) Innovating Government, Information Technology and Law Series, vol 20, pp 251–282. T. M. C. Asser Press doi: 10.1007/978-90-6704-731-9_15. http://dx.doi.org/10.1007/978-90-6704-731-9_15