The idea of being identified by facial recognition software can make some people feel uneasy because a face is very personal to an individual. Yet facial recognition technology can be deployed securely and privately.
The Data Futures Partnership found that being transparent about how data is proposed to be used is a crucial step towards community acceptance. This has been our experience too. If you clearly explain the reasons for using facial recognition (think security and safety), where data will be stored and what safeguards will be taken to protect that information, then people are more inclined to accept the technology.
This article contains answers to the most pressing questions, but you should also check out:
We commissioned an expert lawyer to develop a comprehensive guide about Australian Privacy Laws in relation to facial recognition software 👉 Download the guide
Like any new technology, facial recognition has accumulated some big myths since its inception 👉 Discover what is true and what is not.
Every time an employee, contractor or visitor presents their face in front of Doorkeeper, they will be guided through a personalised check in flow. Rules can include identity and temperature checks, questionnaires, site induction and compliance status, and integrations.
Whenever a face is detected on Doorkeeper, it is transformed to an embedding. The Nirovision AI will analyse it, assess its quality and provide a verdict on whether it matches an identity in the database.
If there is a match, and the person in question fulfilled their check-in requirements, Doorkeeper will check them in, creating a digital record of entry. Next time they are seen, they will be checked out. Details such as the person's name and the location and time they entered are collected and retained for 60 days for auditing and contact tracing purposes.
The Nirovision AI performs facial recognition by comparing faces detected on Doorkeeper against identities in a database. An identity is a representation of a person in the database - a collection of faces and associated metadata. This metadata can include a name and label, but may also contain none of these.
Nirovision applications are accessed via HTTPS using Transport Layer Security (TLS) encryption.
All client data, including thumbnails, results and metadata is stored and encrypted in disparate cloud systems, built solely on the Asia Pacific (Sydney) region of the AWS (Amazon Web Services) platform.
All client data, including thumbnails, results and metadata is stored and encrypted in disparate cloud systems, built solely on the Asia Pacific (Sydney) region of the AWS (Amazon Web Services) platform.
Event metadata expires after 60 (sixty) days by default. The database comprising all your identities -the model- has no expiration date, with your local Doorkeeper/s containing a copy of the latest model available to operate.
No. Nirovision will not sell your data nor send it to any third-party company without your explicit consent.
Nirovision will only access your data, with permission, for specific troubleshooting purposes.
More information about this can be found in our privacy policy.
In addition to inquiring your local Site Administrator, Nirovision's Privacy Policy can be accessed here and contains information about how:
you can access and seek correction of your personal information held by Nirovision;
you can complain to Nirovision about a breach of the Australian Privacy Principles (APPs) contained in the Privacy Act 1988 (Cth);
Nirovision collects holds and uses your personal information;
you can contact Nirovision.
The Nirovision AI is resilient to changes such as haircuts and shaves, though very drastic changes may require the enrolment of an additional face.
Doorkeeper will inform you if you've been checked in successfully or not.
We understand that the language of biometrics can be quite complex and confusing, so we have prepared a list of terms you will come across when researching and reviewing facial recognition solutions and vendors.