Objetivo
Sets the rules and safeguards for building, procuring, integrating, and operating biometric identification AI so privacy is protected, misuse is prevented, and regulations are met in every region where we operate.
Alcance y definiciones
Applies to all teams, contractors, systems, and third parties handling biometric AI. Both internal builds and external services are covered.
- Biometric data includes: face, iris, fingerprint, DNA, voice patterns, gait, typing patterns, and any physical sensor-based identity signal.
Usos permitidos y prohibidos
Biometric AI may only be used for approved purposes and is explicitly banned from certain scenarios.
- Permitted uses: identity verification for secured access, fraud-prevention workflows, access control for restricted zones, sanctioned R&D after formal review.
- Prohibited uses: mass surveillance of public spaces, covert biometric capture, emotion inference, profiling of protected/vulnerable groups, biometric-based hiring or HR decisions.
Privacidad, consentimiento y manejo de datos
Biometric collection must be minimal, purpose-bound, consent-based, and transparent.
- Inform users at collection; provide opt-out unless required for physical access.
- Prefer templates over raw media storage; encrypt in transit and at rest.
- Support traceable deletion and justify every retention period.
Controles de seguridad, precisión y equidad
Evaluate biometric models across demographics and suspend deployments if harm is detected.
- Measure demographic false positives/negatives; conduct quarterly fairness testing.
- Maintain version control, reproducibility, and require vendors to disclose training data provenance.
Supervisión humana y escalamiento
Biometric AI cannot make final determinations alone where outcomes affect individuals.
- Require trained human review for high-impact actions.
- Provide appeal channels, reversible decisions, and the ability to challenge outcomes.
Expectativas de registro, monitoreo y auditoría
Comprehensive telemetry must allow rapid investigation and pause of risky activity.
- Log all biometric inference events; tie data access to identities; keep logs tamper-resistant.
- Governance reviews usage monthly and can pause systems if risk spikes.
Respuesta a incidentes y cumplimiento
Misuse, breaches, or unintended activations trigger the major incident workflow and regulatory reporting timelines.
- Potential sanctions: system shutdown, access removal, vendor suspension, employee discipline.