{"id":102,"date":"2007-04-10T22:59:21","date_gmt":"2007-04-11T03:59:21","guid":{"rendered":"http:\/\/www.trustyetc.com\/trustyblog\/2007\/04\/10\/biometrics-in-education\/"},"modified":"2007-04-10T22:59:21","modified_gmt":"2007-04-11T03:59:21","slug":"biometrics-in-education","status":"publish","type":"post","link":"https:\/\/www.trustyetc.com\/trustyblog\/2007\/04\/10\/biometrics-in-education\/","title":{"rendered":"Biometrics in Education"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/www.thejournal.com\/images\/news\/fingerprint2.jpg\" alt=\"Fingerprint\" align=\"right\" \/><a href=\"http:\/\/www.thejournal.com\/articles\/20494\">T.H.E. Journal<\/a> has an article discussing the legal issues involved in using biometrics in a public school.  If you aren\u2019t familiar with <a href=\"http:\/\/en.wikipedia.org\/wiki\/Biometric\">these devices<\/a>, they are used to authenticate a person using a personal attribute that cannot be stolen or duplicated.  Typical methods involve finger prints, retinal scans or facial recognition.  The idea is that your fingerprint is always with you (for your use) and someone else cannot easily steal it (for his use).<\/p>\n<p>If you have tried to get kindergarten students to remember a password, you probably already know how biometric authentication can benefit young children.  Try giving a password to a first grader and telling her not to tell anyone the \u201csecret\u201d word.  Most first graders can keep a secret for about two minutes.<\/p>\n<p>The article brings up privacy issues that may halt the use of biometrics in schools.  Some states have already passed legislation that restricts biometric use.  They require the school to jump through technical \u201choops\u201d if a biometric is used to collect personal information from a student.<\/p>\n<p>The article suggests that fingerprints could be used to disclose health information of an individual.  This sounds a little too much like <a href=\"http:\/\/www.imdb.com\/title\/tt0119177\/\">Gattaca<\/a> to me.<\/p>\n<p>I\u2019m scratching my head.  The first question I have is \u201cwhat good is a database of identification markers?\u201d  If you look at the data stored by a fingerprint biometric device, the whole fingerprint isn\u2019t there.  Only enough points to uniquely identify that user are saved.  From that data, someone cannot recreate the original fingerprint.<\/p>\n<p>If I have a database of all fingerprints I could do like Tom Cruise in one of the Mission Impossible movies and make a glove with someone else\u2019s fingerprints.  I suppose that could be worth something someday.  Today it could log me into a first grader\u2019s session of Reader Rabbit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>T.H.E. Journal has an article discussing the legal issues involved in using biometrics in a public school. If you aren\u2019t familiar with these devices, they are used to authenticate a person using a personal attribute that cannot be stolen or &hellip; <a href=\"https:\/\/www.trustyetc.com\/trustyblog\/2007\/04\/10\/biometrics-in-education\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[336],"class_list":["post-102","post","type-post","status-publish","format-standard","hentry","category-edtech","tag-edtech"],"_links":{"self":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/comments?post=102"}],"version-history":[{"count":0,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/posts\/102\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/media?parent=102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/categories?post=102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trustyetc.com\/trustyblog\/wp-json\/wp\/v2\/tags?post=102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}