Advertisement

Legal Aspects: Biometric Data, Evidence Rules and Trusted Identities

  • Els J. KindtEmail author
Chapter
  • 1.8k Downloads
Part of the Advances in Computer Vision and Pattern Recognition book series (ACVPR)

Abstract

Biometric characteristics could play an increasing role as means for binding electronic documents and transactions to a person and for identifying that person. However, one of the conditions for biometric methods to be used as an electronic signature is that spoofing vulnerabilities are adequately assessed and appropriate solutions are developed. Anti-spoofing measures are also crucial in electronic identity schemes which may include biometric characteristics. For these schemes, privacy and data protection issues remain to be solved as well.

Keywords

Electronic Signature Civil Code Electronic Identification Biometric Data Biometric System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

This chapter was made possible thanks to the funding and work performed for the BEAT project (EU FP7, grant agreement number \(284989\)), the Fidelity project (EU FP7, grant agreement number \(284862\)) and the B-CCENTRE project (Prevention of and Fight against Crime Programme of the EU, European Commission, DG Home Affairs). The author further thanks prof. dr. P. Van Eecke for the review and his comments to this chapter.

References

  1. 1.
    OECD (2011) Digital identity management: enabling innovation and trust in the internet economy. http://www.oecd.org/sti/ieconomy/49338380.pdf
  2. 2.
    EC (2000) Directive 2000/31/EC of the European parliament and of the council of 8 Jun 2000 on certain legal aspects of information society services, in particular electronic commerce, in the internal market (O.J. L 178), pp 1–16Google Scholar
  3. 3.
    EC (2000) Directive 1999/93/EC of the European parliament and of the council of 13 Dec 1999 on a community framework for electronic signatures (O.J. L 13), pp 12–20Google Scholar
  4. 4.
    Article 29 Data Protection Working Party (2012) opinion 3/2012 on developments in biometric technologies WP193Google Scholar
  5. 5.
    Li S (ed) (2009) Encyclopedia of Biometrics, Springer, p 1296, at the term “Spoofing”, also available at http://www.springer.com/computer/image+processing/book/978-0-387-73002-8
  6. 6.
    Kindt E (2012) The processing of biometric data. A comparative legal analysis with a focus on the proportionality principle and recommendations for a legal framework. Ph.D. thesis, KU Leuven. KU Leuven Law LibraryGoogle Scholar
  7. 7.
    Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication, security and privacy. http://www.ipc.on.ca/images/resources/bio-encryp.pdf
  8. 8.
    EC (2010) A digital agenda for Europe (COM(2010) 245 final/2). Communication from the Commission to the European Parliament, the Council, the Economic and Social Committee and the Committee of the RegionsGoogle Scholar
  9. 9.
    EC (2012) Proposal for a regulation to the European parliament and of the council on electronic identification and trust services for electronic transactions in the internal market (COM(2012) 238 final), p 56Google Scholar
  10. 10.
    Alsenoy B, Kindt E, Dumortier J (2011) Privacy and data protection aspects of e-government identity management. In: van der Hof S, Groothuis MM (eds) Innovating Government, Information Technology and Law Series, vol 20, pp 251–282. T. M. C. Asser Press doi: 10.1007/978-90-6704-731-9_15. http://dx.doi.org/10.1007/978-90-6704-731-9_15

Copyright information

© Springer-Verlag London 2014

Authors and Affiliations

  1. 1.KU LeuvenLeuvenBelgium

Personalised recommendations