<acronym id="0m0og"><center id="0m0og"></center></acronym>
<acronym id="0m0og"></acronym>
<acronym id="0m0og"><small id="0m0og"></small></acronym>
<rt id="0m0og"></rt><acronym id="0m0og"><small id="0m0og"></small></acronym>
<acronym id="0m0og"><center id="0m0og"></center></acronym><rt id="0m0og"><small id="0m0og"></small></rt>
<rt id="0m0og"><small id="0m0og"></small></rt>
This website uses cookies to store information on your device,Cookies can enhance your user experience and help our website work normally.
For more information,please read our cookie policy and privacy policy.
Home Page > News Center > Notice Guidelines on the Use of Biometric Data

Guidelines on the Use of Biometric Data

Release time:2018-12-22Views:
Share the Website to

Guidelines on the Use of Biometric Data

Biometric Data User refers to any person who collects or use biometric data utilizing ZKTeco’s device, hardware and software

1. The purpose of biometric data collection

1.1. Use of biometric data & related activities

It is data user’s responsibility to inform all users or persons whose biometric data are collected, that all the collected biometric data are only used for time attendance and access control purposes.

1.2. Lawful and fair means

Data User must collect users’ biometric templates only on a legal and fair basis. 

1.3. Adequate but not excessive

ZKTeco’s devices and all biometric templates stored in its management software are built with precise algorithms and may be in various methods encrypted, in order to prevent data leakage of users to the greatest extent.

2. Accuracy and Duration of Retention

2.1. Accuracy of personal data held

ZKTeco, with rich experience of software and hardware development, to the greatest extent ensures that all biometric data and personal data are stored accurately, in order to provide customers best user experience.

2.2. Personal data not being kept longer than is necessary

When using ZKTeco’s software and hardware, data user is responsible for ensuring that all users’ data are not stored in ZKTeco’s software and hardware unless necessary.

2.3. Prevent any personal data transferred to the data processor from being kept longer than necessary

ZKTeco’s hardware applies different biometric templates during operation, but all templates are not remained in the CPU of the hardware, and after users’ biometric templates are deleted in ZKTeco’s hardware and software (according to actual situation), the templates are permanently deleted and not remained in any format. 

3. Use of Personal Data

3.1. Not being used for a new purpose without prescribed consent

If data user wishes to apply the collected biometric templates to any purpose other than any use authorized, they are responsible for reintroducing to the users and obtain their consents before doing so.

4. Security of Personal Data

4.1. Practicable steps being taken to ensure no unauthorized or accidental access, processing, erasure, loss, use and transfer

ZKTeco’s applied biometric algorithms do not collect complete biometric features of the collected persons, instead only 10 to 50 feature points are collected for calculation. Even if biometric templates are illegally obtained, it is not possible to reorganize them into complete biometric features. In ZKTeco’s software and hardware, various advanced electronic encryption techniques have been applied for the greatest extent of protection to data security.

5. Openness – Information be Generally Available

5.1. Data User should provide policies and practices in relation to personal data.

5.2. Data User should publicize the kinds of biometric data held.

5.3. Data User should inform the main purposes for which biometric data are used.

6. Access to Personal Data

6.1. Data user should know that, all data subjects have the rights to access and correct his or her personal data.

Frequently ask question of biometric data:

I. What is Biometric Data?

Physiological data born with an individual

  • DNA samples, fingerprint, palm veins, iris, retina
  • Facial images and hand geometries

Behavioral data developed by an individual
  • hand writing pattern, typing rhythm, gait, voice

II. Is Biometric Data Personal Data?

Biometric data alone is not regarded as personal data according to law, as it may not reveal identities. However, 
if biometric data is stored in a database that links customers/staff members, they are personal data.

《Guidelines on the Use of Biometric Data》For document download please click here.

寿光| 石嘴山| 张北| 宜都| 潜江| 大连| 新余| 山南| 随州| 渭南| 攀枝花| 济南| 庄河| 朔州| 简阳| 保定| 吐鲁番| 六盘水| 天长| 贵港| 泰兴| 眉山| 红河| 平凉| 大庆| 泰安| 嘉善| 永康| 陕西西安| 长垣| 嘉兴| 诸城| 德阳| 通辽| 十堰| 嘉兴| 盘锦| 灌云| 大理| 梧州| 本溪| 包头| 灵宝| 仁怀| 三门峡| 柳州| 茂名| 克孜勒苏| 永新| 嘉善| 靖江| 江苏苏州| 来宾| 保定| 大连| 台湾台湾| 巢湖| 克孜勒苏| 岳阳| 温州| 伊犁| 荆门| 邯郸| 三河| 库尔勒| 长葛| 永州| 定安| 陇南| 潮州| 六安| 迪庆| 那曲| 宿州| 兴安盟| 公主岭| 昌都| 安庆| 深圳| 晋城| 咸阳| 任丘| 漳州| 三沙| 内江| 自贡| 铁岭| 揭阳| 黔南| 云浮| 龙口| 宿迁| 保定| 株洲| 安岳| 诸暨| 西藏拉萨| 大连| 驻马店| 玉树| 云南昆明| 醴陵| 六安| 寿光| 大连| 吐鲁番| 自贡| 池州| 新沂| 汝州| 云南昆明| 梧州| 鹤岗| 白沙| 聊城| 柳州| 如皋| 雅安| 安阳| 山南| 岳阳| 铜陵| 白城| 河源| 嘉兴| 博罗| 通化| 孝感| 廊坊| 顺德| 安顺| 广安| 徐州| 扬州| 三河| 禹州| 建湖| 承德| 汉川| 固原| 阿里| 阿克苏| 石狮| 湘西| 张家界| 亳州| 盘锦| 西藏拉萨| 诸城| 揭阳| 甘肃兰州| 海南| 潜江| 柳州| 陕西西安| 崇左| 乌海| 酒泉| 德宏| 绥化| 焦作| 自贡| 金坛| 深圳| 泸州| 中山| 鹤岗| 临沂| 内江| 瓦房店| 洛阳| 寿光| 汕头| 盐城| 通化| 海宁| 琼中| 承德| 蓬莱| 衡阳| 湛江| 防城港| 白银| 临汾| 义乌| 泸州| 余姚| 德清| 灌云| 惠东| 中卫| 大同| 泰安| 临夏| 项城| 广饶| 燕郊| 绵阳| 红河| 天水| 洛阳| 石狮| 株洲| 孝感| 泗阳| 遂宁| 馆陶| 三明| 泰州| 湖南长沙| 诸暨| 定西| 鄂尔多斯| 儋州| 南京| 河池| 伊春| 香港香港| 宜春| 日喀则| 灌南| 黑河| 德州| 包头| 库尔勒| 嘉峪关| 铜陵| 焦作| 甘肃兰州| 江苏苏州| 周口| 新泰| 池州| 新泰| 松原| 涿州| 醴陵| 通辽| 邳州| 赤峰| 桓台| 屯昌| 鹤岗| 清远| 安顺| 六盘水| 甘孜| 防城港| 霍邱| 濮阳| 台湾台湾| 简阳| 唐山| 枣阳| 长治| 黔东南| 宁德| 如皋| 阿勒泰| 广饶| 新泰| 玉溪| 万宁| 西双版纳| 东营| 永康| 泰州| 徐州| 玉林| 黑河| 博罗| 三门峡| 楚雄| 阿里| 乐清| 瓦房店| 吴忠| 黄冈| 博尔塔拉| 广元| 宝鸡| 玉环| 珠海| 开封| 浙江杭州| 禹州| 昭通| 鹰潭| 海东| 东台| 肥城| 淮北| 湘西| 苍南| 昌都| 龙岩| 潜江| 沭阳| 安徽合肥| 蚌埠|