Who has access to your face?

SMART Estate Security 2025 Access Control & Identity Management, Residential Estate (Industry), AI & Data Analytics

Your face defines who you are, but in the age of AI and social media, your facial features can be used against you. This was seen with the recent Coldplay ‘kiss cam’ scandal, where social media users were able to uncover the offending CEO and the company’s chief people officer in a short time.


Lance Fanaroff.

Even if you are not guilty, AI deepfake apps give everyday people the tools to superimpose your facial features into offending situations. While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts, such as identifying you when accessing your online banking.

In this time where boundaries are blurred and multiple parties seem to be vying for your data, who has access to your face? And when is it safe to use facial biometrics?

The difference between facial recognition and biometrics

Facial biometrics is being used more in banking and other highly secure environments to verify a person’s identity. This is a completely safe process where your facial identity confirms your identity, but is not held by the company in any way or used for any other purpose.

Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii says, “One of the prevailing misconceptions is that, by scanning your facial features, companies can hold onto your data and use it for surveillance or identity theft. The reality is that opt-in biometrics are the most secure way to identify someone and keep their information and identity safe from misuse – and these differ a great deal from biometrics used for surveillance.”

When facial features are used for surveillance, this is referred to as facial recognition. Facial recognition is a specific application of facial biometrics that identifies or verifies an individual by comparing a live facial image or video frame against a database of known faces.

This can be used for various purposes, including security, law enforcement and access control. For example, facial recognition has been put to use in some boroughs in the UK1 to scan the faces of ordinary citizens, triggering an alert if features match those of a person on a watch list. The boundaries of facial recognition and its applications are a growing concern and topic for global debate.

Fanaroff emphasises that, when South African consumers are asked to scan their facial features to access their personal online credentials, for example, during banking, this process is completely safe. “Remote biometric onboarding links a person’s biometric data, whether their face or fingerprint, to their personal banking profile so that they, and only they, can access the account safely and securely. Opt-in biometric onboarding with liveness detection protects institutions and their clients from fraud. Users do it on their own terms to access their accounts, as opposed to surveillance.”

Facial biometric data is not stored by the organisations using it to authenticate their clients. Fanaroff explains, “iiDENTIFii, for example, makes use of a biometric hash technology to protect identifying information. A biometric hash is a cryptographic transformation of biometric data into a string of characters that acts like a unique digital fingerprint or face print. As it is a one-way process that is achieved without using Personally Identifiable Information (PII) data, it is both secure and private.”

The safety of facial data needs to be an ongoing priority

South Africa’s private and public sector needs to work together to ensure that facial biometrics is used securely, and that the public understands the difference between this and facial recognition used in surveillance.

iiDENTIFii’s inaugural Identity Index 2024 – South Africa Edition2 says, “Despite the trend towards investing in Identity Verification (IDV) solutions, such as facial biometrics, there are still some significant barriers to implementation, with 31% citing regulatory compliance and 23% citing user acceptance as the most substantial barriers. This points towards an opportunity for more coordinated industry-wide approaches to digital identity, from stronger collaboration to a sustained commitment to investing in advanced technologies.”

The regulation of how any biometric PII data is used needs to occur frequently and rigorously. Maxine Most, principal of Acuity Market Intelligence, a thought leader on emerging identity verification technologies, says, “In the past, when digital systems have been put in place, it has opened users up to function creep with data, meaning that corrupt actors use the data for purposes for which it was not intended. Regulatory compliance is, therefore, critical in building these systems in a way that prevents this. Systems need to be built with privacy first so that they cannot be abused.”

“Our use of biometric hash technology at iiDENTIFii illustrates that it is possible to use facial data to provide secure identification, without retaining identifying personal information,” says Fanaroff.

In South Africa, consumers can protect themselves by only using opt-in biometric verification and authentication services. Businesses can collaborate with regulatory authorities to create a landscape that protects individuals and prioritises privacy and security. “From a South African perspective, the use of robust facial biometric technologies needs to be highly secure and controlled so that consumers can transact on these platforms confidently.”

For more information contact iiDentifii, +27 21 286 9104, info@iidentifii.com, www.iidentifii.com

[1] tinyurl.com/2mxtpe7c

[2] tinyurl.com/54vtdpnj




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Impro announces Primo update
News & Events Access Control & Identity Management Integrated Solutions
Impro Technologies recently held a launch event in which it introduced a series of new products, from new readers through to its updated Primo access management software.

Read more...
IQSight SmartSuite integration with XProtect
Surveillance News & Events AI & Data Analytics
Milestone Systems and IQSight have strengthened their collaboration with the release of SmartSuite, a consolidated plug-in suite for Milestone XProtect video management software, to cut installation time for system integrators by 70%.

Read more...
If you cannot prove identity, you cannot claim security
Access Control & Identity Management Information Security
Cybersecurity planning for 2026 is a structural change in how attacks are executed and how trust is exploited, demanding that companies stop layering tools on top of infrastructure and instead prioritise intelligence and identity.

Read more...
The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Crime behaviour insights more important than ever
Leaderware Editor's Choice Surveillance Training & Education AI & Data Analytics
Behavioural surveillance skills are as essential now as they have ever been, especially in situations where quick evaluation of context is needed. Training operators in behavioural recognition skills is a vital part of control room success.

Read more...
Large-scale AI boosts manufacturing efficiency
Hikvision South Africa Surveillance Industrial (Industry) AI & Data Analytics
Video systems, once used mainly for security, are rapidly becoming one of the most valuable sources of operational data in factories and industrial parks, accelerating smart manufacturing process.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.