Briefing on the Responsible Use and Sharing of Biometric Data in Counter-terrorism

This briefing aims to map out some of the implications of the adoption of identification systems based on biometrics in a counter-terrorism context.

Key advocacy points
  • The processing of biometric data, including collection, analysis, storing, sharing must be prescribed by law and limited to what is strictly and demonstrably necessary to achieve a legitimate aim.

  • Laws that protect biometric data must be accessible to the public and sufficiently clear and precise to enable persons to foresee its application and the extent of the intrusion with someone’s privacy.

  • There is need to guard against function creep, which is the unqualified support for ever expanding biometric databases (and the integration of existing ones) coupled with expanding access to the data to a wider range of law enforcement and security agencies.

Advocacy
report cover

Identification systems across the world increasingly rely on biometric data. In the context of border management, security and law enforcement, biometric data can play an important role in supporting the investigation and prevention of acts of terrorism.

This Briefing aims to map out some of the implications of the adoption of identification systems based on biometrics.