{"id":2566,"date":"2014-02-18T22:21:31","date_gmt":"2014-02-18T22:21:31","guid":{"rendered":"http:\/\/ncjolt.org\/?p=2566"},"modified":"2020-06-04T20:53:56","modified_gmt":"2020-06-04T20:53:56","slug":"stakeholders-developing-voluntary-code-of-conduct-for-use-of-facial-recognition-technology","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/stakeholders-developing-voluntary-code-of-conduct-for-use-of-facial-recognition-technology\/","title":{"rendered":"Stakeholders Developing Voluntary Code of Conduct for Use of Facial  Recognition Technology"},"content":{"rendered":"<p>As millions around the world will tune in to watch the 2014 Winter Olympics in the coming weeks, the prestigious competition\u2019s host country, Russia, is employing innovative technology to do some crucial watching of its own.\u00a0 With high concerns regarding the possibility of security breaches leading up to the start of this year\u2019s games, the city of Sochi has developed several efforts to make sure this season\u2019s Olympic games progress as smoothly as possible. The Sochi International Airport is doing its best, for example, to protect this year\u2019s host city with the use of facial recognition technology developed by Silicon Valley\u2019s Artec Group.<br \/>\nSochi International Airport is not alone. Many Facebook Users temporarily witnessed one of the many uses of commercial facial recognition technology.\u00a0\u00a0 Due to privacy concerns involving the innovative technology\u2019s growth, the <a href=\"http:\/\/www.ntia.doc.gov\/\">National Telecommunications &amp; Information Administration<\/a> (NTIA) recently held a meeting to discuss a voluntary code of conduct for the commercial use of facial recognition technology.\u00a0 The February meeting was the first of <a href=\"http:\/\/www.ntia.doc.gov\/other-publication\/2013\/privacy-multistakeholder-meetings-regarding-facial-recognition-technology-feb\">several<\/a> that will take place in the coming months until June 2014.<\/p>\n<blockquote><p>The discussions generally aim to develop a code of conduct that will address how the Consumer Privacy Bill of Rights should be applied to facial recognition technology and how to \u201cbest to ensure that consumers\u2019 rights to control, transparency, security, access and accuracy, focused collection, and accountability are respected within the context of current and emerging commercial uses of facial recognition technology.\u201d<\/p><\/blockquote>\n<p>The discussions generally aim to develop a code of conduct that will address how the <a href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/privacy-final.pdf\">Consumer Privacy Bill of Rights<\/a> should be applied to facial recognition technology and how to \u201cbest to ensure that consumers\u2019 rights to control, transparency, security, access and accuracy, focused collection, and accountability are respected within the context of current and emerging commercial uses of facial recognition technology.\u201d The Bill of Rights aims to further the <a href=\"http:\/\/www.nist.gov\/nstic\/NSTIC-FIPPs.pdf\">Fair Information Practice Principals<\/a> (FIPPs), a framework consisting of standards in evaluating privacy concerns associated with systems, processes and programs, by informing consumers of what is to be expected of companies that handle personal data and emphasizing the FIPP\u2019s adoption.<br \/>\nThe current privacy discussions of facial recognition technology come almost two years after the White House presented its \u201cPrivacy Blueprint,\u201d an initiative including principals aimed at applying the Consumer Privacy Bill of Rights to various types of business frameworks.\u00a0 The Privacy Blueprint also encompassed a multistakeholder process for the development of legally enforceable codes. In announcing the multistakeholder meetings, NTIA notes current issues with facial recognition technology include transparency, protecting sensitive data, and implementing controls for consumers.<br \/>\nSome <a href=\"http:\/\/www.mercurynews.com\/business\/ci_25108220\/sochi-airport-uses-silicon-valley-facial-recognition-software\">sources<\/a> have suggested the facial recognition could become fully integrated into airport security by 2025. On the premise that \u201cincreased commercial use of facial recognition threatens a fundamental understanding of the right to privacy the ability of individuals to decide when to disclose their actual identity to others,\u201d the <a href=\"http:\/\/epic.org\/\">Electronic Privacy Information Center<\/a> (EPIC) <a href=\"http:\/\/epic.org\/privacy\/facerecognition\/EPIC-ltr-NTIA-FaceRecog.pdf\">recently<\/a> urged NTIA to \u201crequire[] companies collecting, handling, storing, and transmitting such data to adhere to the Fair Information Practices.\u201d<br \/>\nIn the first meeting, NTIA\u2019s objective was simply to provide stakeholders with a general background on privacy issues relating to how facial recognition technology is currently being used and could potentially be used in the future.\u00a0 The next stakeholder meeting, which is to take place in the next couple of weeks, will include the beginning discussions of a code of conduct.\u00a0 The meeting will also focus on constructing a plan for creating such a code.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As millions around the world will tune in to watch the 2014 Winter Olympics in the coming weeks, the prestigious competition\u2019s host country, Russia, is employing innovative technology to do some crucial watching of its own.\u00a0 With high concerns regarding the possibility of security breaches leading up to the start of this year\u2019s games, the <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/stakeholders-developing-voluntary-code-of-conduct-for-use-of-facial-recognition-technology\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2566"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=2566"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2566\/revisions"}],"predecessor-version":[{"id":7502,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/2566\/revisions\/7502"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=2566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=2566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=2566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}