Who has access to your face?

SMART Estate Security 2025 Access Control & Identity Management, Residential Estate (Industry), AI & Data Analytics

Your face defines who you are, but in the age of AI and social media, your facial features can be used against you. This was seen with the recent Coldplay ‘kiss cam’ scandal, where social media users were able to uncover the offending CEO and the company’s chief people officer in a short time.


Lance Fanaroff.

Even if you are not guilty, AI deepfake apps give everyday people the tools to superimpose your facial features into offending situations. While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts, such as identifying you when accessing your online banking.

In this time where boundaries are blurred and multiple parties seem to be vying for your data, who has access to your face? And when is it safe to use facial biometrics?

The difference between facial recognition and biometrics

Facial biometrics is being used more in banking and other highly secure environments to verify a person’s identity. This is a completely safe process where your facial identity confirms your identity, but is not held by the company in any way or used for any other purpose.

Lance Fanaroff, co-founder and chief strategy officer of iiDENTIFii says, “One of the prevailing misconceptions is that, by scanning your facial features, companies can hold onto your data and use it for surveillance or identity theft. The reality is that opt-in biometrics are the most secure way to identify someone and keep their information and identity safe from misuse – and these differ a great deal from biometrics used for surveillance.”

When facial features are used for surveillance, this is referred to as facial recognition. Facial recognition is a specific application of facial biometrics that identifies or verifies an individual by comparing a live facial image or video frame against a database of known faces.

This can be used for various purposes, including security, law enforcement and access control. For example, facial recognition has been put to use in some boroughs in the UK1 to scan the faces of ordinary citizens, triggering an alert if features match those of a person on a watch list. The boundaries of facial recognition and its applications are a growing concern and topic for global debate.

Fanaroff emphasises that, when South African consumers are asked to scan their facial features to access their personal online credentials, for example, during banking, this process is completely safe. “Remote biometric onboarding links a person’s biometric data, whether their face or fingerprint, to their personal banking profile so that they, and only they, can access the account safely and securely. Opt-in biometric onboarding with liveness detection protects institutions and their clients from fraud. Users do it on their own terms to access their accounts, as opposed to surveillance.”

Facial biometric data is not stored by the organisations using it to authenticate their clients. Fanaroff explains, “iiDENTIFii, for example, makes use of a biometric hash technology to protect identifying information. A biometric hash is a cryptographic transformation of biometric data into a string of characters that acts like a unique digital fingerprint or face print. As it is a one-way process that is achieved without using Personally Identifiable Information (PII) data, it is both secure and private.”

The safety of facial data needs to be an ongoing priority

South Africa’s private and public sector needs to work together to ensure that facial biometrics is used securely, and that the public understands the difference between this and facial recognition used in surveillance.

iiDENTIFii’s inaugural Identity Index 2024 – South Africa Edition2 says, “Despite the trend towards investing in Identity Verification (IDV) solutions, such as facial biometrics, there are still some significant barriers to implementation, with 31% citing regulatory compliance and 23% citing user acceptance as the most substantial barriers. This points towards an opportunity for more coordinated industry-wide approaches to digital identity, from stronger collaboration to a sustained commitment to investing in advanced technologies.”

The regulation of how any biometric PII data is used needs to occur frequently and rigorously. Maxine Most, principal of Acuity Market Intelligence, a thought leader on emerging identity verification technologies, says, “In the past, when digital systems have been put in place, it has opened users up to function creep with data, meaning that corrupt actors use the data for purposes for which it was not intended. Regulatory compliance is, therefore, critical in building these systems in a way that prevents this. Systems need to be built with privacy first so that they cannot be abused.”

“Our use of biometric hash technology at iiDENTIFii illustrates that it is possible to use facial data to provide secure identification, without retaining identifying personal information,” says Fanaroff.

In South Africa, consumers can protect themselves by only using opt-in biometric verification and authentication services. Businesses can collaborate with regulatory authorities to create a landscape that protects individuals and prioritises privacy and security. “From a South African perspective, the use of robust facial biometric technologies needs to be highly secure and controlled so that consumers can transact on these platforms confidently.”

For more information contact iiDentifii, +27 21 286 9104, info@iidentifii.com, www.iidentifii.com

[1] tinyurl.com/2mxtpe7c

[2] tinyurl.com/54vtdpnj




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Risks of fire safety in residential environments
Fire & Safety Residential Estate (Industry)
ASP Fire is highlighting the significant fire risks in residential environments and stressing the importance of proactive fire-safety management at the household level.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.