<acronym id="0m0og"><center id="0m0og"></center></acronym>
<acronym id="0m0og"></acronym>
<acronym id="0m0og"><small id="0m0og"></small></acronym>
<rt id="0m0og"></rt><acronym id="0m0og"><small id="0m0og"></small></acronym>
<acronym id="0m0og"><center id="0m0og"></center></acronym><rt id="0m0og"><small id="0m0og"></small></rt>
<rt id="0m0og"><small id="0m0og"></small></rt>
This website uses cookies to store information on your device,Cookies can enhance your user experience and help our website work normally.
For more information,please read our cookie policy and privacy policy.
Home Page > News Center > Notice Guidelines on the Use of Biometric Data

Guidelines on the Use of Biometric Data

Release time:2018-12-22Views:
Share the Website to

Guidelines on the Use of Biometric Data

Biometric Data User refers to any person who collects or use biometric data utilizing ZKTeco’s device, hardware and software

1. The purpose of biometric data collection

1.1. Use of biometric data & related activities

It is data user’s responsibility to inform all users or persons whose biometric data are collected, that all the collected biometric data are only used for time attendance and access control purposes.

1.2. Lawful and fair means

Data User must collect users’ biometric templates only on a legal and fair basis. 

1.3. Adequate but not excessive

ZKTeco’s devices and all biometric templates stored in its management software are built with precise algorithms and may be in various methods encrypted, in order to prevent data leakage of users to the greatest extent.

2. Accuracy and Duration of Retention

2.1. Accuracy of personal data held

ZKTeco, with rich experience of software and hardware development, to the greatest extent ensures that all biometric data and personal data are stored accurately, in order to provide customers best user experience.

2.2. Personal data not being kept longer than is necessary

When using ZKTeco’s software and hardware, data user is responsible for ensuring that all users’ data are not stored in ZKTeco’s software and hardware unless necessary.

2.3. Prevent any personal data transferred to the data processor from being kept longer than necessary

ZKTeco’s hardware applies different biometric templates during operation, but all templates are not remained in the CPU of the hardware, and after users’ biometric templates are deleted in ZKTeco’s hardware and software (according to actual situation), the templates are permanently deleted and not remained in any format. 

3. Use of Personal Data

3.1. Not being used for a new purpose without prescribed consent

If data user wishes to apply the collected biometric templates to any purpose other than any use authorized, they are responsible for reintroducing to the users and obtain their consents before doing so.

4. Security of Personal Data

4.1. Practicable steps being taken to ensure no unauthorized or accidental access, processing, erasure, loss, use and transfer

ZKTeco’s applied biometric algorithms do not collect complete biometric features of the collected persons, instead only 10 to 50 feature points are collected for calculation. Even if biometric templates are illegally obtained, it is not possible to reorganize them into complete biometric features. In ZKTeco’s software and hardware, various advanced electronic encryption techniques have been applied for the greatest extent of protection to data security.

5. Openness – Information be Generally Available

5.1. Data User should provide policies and practices in relation to personal data.

5.2. Data User should publicize the kinds of biometric data held.

5.3. Data User should inform the main purposes for which biometric data are used.

6. Access to Personal Data

6.1. Data user should know that, all data subjects have the rights to access and correct his or her personal data.

Frequently ask question of biometric data:

I. What is Biometric Data?

Physiological data born with an individual

  • DNA samples, fingerprint, palm veins, iris, retina
  • Facial images and hand geometries

Behavioral data developed by an individual
  • hand writing pattern, typing rhythm, gait, voice

II. Is Biometric Data Personal Data?

Biometric data alone is not regarded as personal data according to law, as it may not reveal identities. However, 
if biometric data is stored in a database that links customers/staff members, they are personal data.

《Guidelines on the Use of Biometric Data》For document download please click here.

黄南| 湖北武汉| 燕郊| 呼伦贝尔| 茂名| 铜陵| 泗阳| 洛阳| 济宁| 燕郊| 海拉尔| 河北石家庄| 益阳| 湘西| 广饶| 高雄| 博尔塔拉| 黔南| 徐州| 宣城| 宁国| 宜春| 兴化| 儋州| 天长| 呼伦贝尔| 廊坊| 江苏苏州| 泗阳| 梅州| 桐乡| 丽水| 漯河| 武安| 承德| 南充| 安阳| 宜都| 日土| 巴彦淖尔市| 绵阳| 赤峰| 梧州| 信阳| 贵州贵阳| 博罗| 东莞| 宜宾| 山东青岛| 三沙| 昌吉| 防城港| 定安| 汕头| 楚雄| 汝州| 宜都| 厦门| 台南| 乌海| 中山| 图木舒克| 赣州| 宝鸡| 达州| 铜陵| 黄南| 鄂尔多斯| 灵宝| 长葛| 大同| 如东| 阿坝| 三明| 正定| 驻马店| 邹平| 临沂| 渭南| 库尔勒| 邵阳| 洛阳| 永康| 涿州| 如东| 扬中| 宜都| 灵宝| 淮安| 余姚| 遂宁| 明港| 克孜勒苏| 周口| 山东青岛| 邵阳| 长垣| 咸阳| 黄石| 牡丹江| 金坛| 滕州| 曲靖| 汝州| 温岭| 汉中| 正定| 台北| 大连| 临沂| 铁岭| 大同| 广安| 六盘水| 克孜勒苏| 阳泉| 许昌| 茂名| 江西南昌| 百色| 沛县| 克孜勒苏| 牡丹江| 荆州| 齐齐哈尔| 玉溪| 吐鲁番| 赤峰| 白银| 张掖| 蓬莱| 牡丹江| 保山| 海北| 儋州| 辽阳| 郴州| 娄底| 梧州| 厦门| 阿拉尔| 海东| 齐齐哈尔| 汉川| 来宾| 陵水| 澳门澳门| 中卫| 定西| 金昌| 惠州| 嘉峪关| 荣成| 儋州| 昭通| 忻州| 宝应县| 蚌埠| 台中| 昌都| 保定| 金华| 瓦房店| 巴中| 雅安| 兴安盟| 霍邱| 余姚| 如皋| 南安| 安阳| 锦州| 霍邱| 广饶| 昆山| 三明| 朔州| 厦门| 杞县| 绍兴| 辽宁沈阳| 果洛| 金坛| 聊城| 吉安| 玉溪| 云南昆明| 雅安| 龙口| 江西南昌| 达州| 荆门| 钦州| 菏泽| 黄冈| 湖北武汉| 泰州| 十堰| 宿迁| 三明| 丹阳| 金华| 吐鲁番| 南充| 宜春| 金坛| 镇江| 保山| 秦皇岛| 石河子| 哈密| 朔州| 遵义| 开封| 海门| 阿克苏| 丹东| 河南郑州| 宝鸡| 南京| 岳阳| 嘉峪关| 和田| 迁安市| 沛县| 抚州| 香港香港| 泉州| 云浮| 咸阳| 巴彦淖尔市| 辽宁沈阳| 海宁| 仁怀| 日土| 内江| 黄石| 金昌| 陕西西安| 承德| 三沙| 云南昆明| 邢台| 运城| 甘南| 抚顺| 燕郊| 山东青岛| 吴忠| 白银| 新余| 广饶| 黔南| 莱州| 龙岩| 武夷山| 图木舒克| 通辽| 喀什| 滨州| 赤峰| 恩施| 防城港| 伊犁| 佛山| 漳州| 眉山| 黔西南| 南京| 济宁| 靖江| 曲靖| 连云港| 琼中| 资阳| 辽阳| 信阳| 柳州| 山西太原| 广元| 双鸭山| 上饶| 嘉兴| 启东| 随州| 内蒙古呼和浩特| 唐山| 晋城| 新泰| 乐平| 黔西南| 新沂| 本溪| 丽江| 怒江| 神农架| 黄石| 泰兴| 朝阳| 永新|