Recently, the central network information office and other departments said that in view of the non-standard collection and use of facial features and other biometric information, the app special governance working group will carry out special research and in-depth detection.
the “collection and use of biometric information such as facial features” mentioned here is commonly known as “face brushing” by the public. Nowadays, “face brushing” has become a common way of public communication and transaction. For example, when you stay in a hotel, you have to face the camera to check your body; after ordering a meal, you can pay by looking at the camera; when you go to the public toilet, you need to look at the machine for a few seconds before you can take out the paper.
with the increasing diversity of application scenarios of face recognition technology, it not only brings convenience to life, but also has the risk of abuse. For example, some people complained about the mandatory collection of household face information. Experts said that the application of new technologies has the characteristics of high efficiency and convenience, but we should also pay attention to boundary issues when integrating into life. For the application of face recognition technology, it should be relatively strict security control.
“technology is neutral, but whether technology application needs to be controlled and the degree of control depends on the risk and control ability of society to a certain technology application.” LV Laiming, a professor at the Law School of Beijing business and Technology University, believes that compared with other personal information, biological information has uniqueness and lifetime invariance. Once the information collected by biometric technology such as face recognition is leaked, the victim can not prevent and remedy by changing the information.
Liu Deliang, a professor at the Law School of Beijing Normal University, believes that in social interaction, personal facial features can be used by the parties to identify and determine their identity, so as to ensure the safety of communication, transaction and public security. Therefore, the regulatory authorities should pay attention to effectively prevent the abuse risk of biometric features, mainly to regulate the party using face recognition technology, and then clarify its risk responsibility.
so, is face information “private”? “Now that the public has generalized the concept of privacy, we have provided our facial features to others countless times on various occasions.” Liu Deliang believes that recognition through artificial intelligence is more efficient than human eye recognition. There is no problem in using face recognition technology in the public domain. The external features of the face do not belong to the category of privacy. There is little difference between being recognized by a machine and being recognized by other people’s eyes.
for the safety control of the application of face recognition technology, LV Laiming said that in addition to the principle of “user consent”, for the application of face recognition technology, the application principles, scope and conditions, procedures, etc. should be specified through mandatory provisions, so as to limit the application field of face recognition, and the method of obtaining user’s consent should be restricted The user should authorize the face recognition information separately, regularly or one-time together with other information, and clarify the obligation of the party who collects and uses the face recognition information after the authorization period is exceeded and the specific purpose is achieved. At the same time, it is necessary to establish a security risk assessment and publicity system for face recognition technology, implement certain market access requirements, and prohibit the use of face recognition technology if it does not have the ability of security protection or the risk is difficult to control.
in addition, experts suggest that a risk warning system for face recognition and user selection channels should be established, operators should be required to clearly prompt users about the safety risks of face recognition, and set up security or verification channels for non face recognition. In other words, in addition to the specific situation, the user can choose whether to accept the face recognition method.