Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityAccess ManagementIdentity ManagementPhysical Security

TRUST - the Five Essential Rules of Consumer Privacy in the Age of Face Recognition

By Peter Trepp
eye-scan1-900px.jpg
August 27, 2018

We live in a world in which the concepts of privacy, security and convenience are often in opposition to each other. When conflicts occur, both consumers and companies can suffer greatly. One of the best examples of this paradox was Netflix’s infamous years-long contest to create a recommendation algorithm.

Launched in 2006, the goal of Netflix’s contest seemed logical enough: use customer viewing and review data to personalize recommendations that would create happier customers and improve customer retention. Sounds like a win/win, right?

Unfortunately, the contest – which had more than 50,000 contestants – ended in a privacy scandal that might have sunk a less robust company. Netflix took a wrong turn when it sent more than 100 million “anonymous” (but real) customer movie ratings, subscriber identification numbers and more data to all its contestants to play with. The idea of releasing such a massive database out into the world raised eyebrows even before the ensuing privacy lawsuit, Doe v. Netflix, was filed.

In 2007, two researchers from The University of Texas at Austin identified individual Netflix customers by matching the data sets with film ratings on IMDb. The plaintiff in the lawsuit was an in-the-closet lesbian mother who claimed that the data had not been sufficiently anonymous. Netflix settled, paying $9 million to a fund that benefited privacy groups. The company also agreed to change its data retention policies. Years later, after the company transitioned to a mostly streaming platform, and Netflix wisely added additional features that allowed customers to delete viewing history, thereby enabling them to self-govern their own data.

The lesson in this story is that customers want convenience, but only if reasonable precautions are taken to protect privacy and security. For instance, facial recognition (which is becoming increasingly popular in public settings to increase security or even on your smartphone to unlock without typing) can make boarding a plane faster and with less hassle at the gate. However, travelers will want to know where and how their face images are being stored, and what they can be connected to later, before they opt in. 

In the digital age, the concept of privacy is dynamic and increasingly difficult to define. So how can companies deliver amazing experiences on demand without violating privacy?

A new set of rules is needed for any company doing business in the 21st century. I propose a new set of guidelines called TRUST:

  • Training
  • Responsible Data Handling
  • Un-Enrollment
  • Self-Regulation
  • Transparency

The TRUST model is general and flexible enough to be adapted by virtually any business, but it’s especially fit for companies handling biometrics and personally identifiable information.

TRAINING

Every situation is different, but companies should adopt ongoing privacy training just as they have for topics like sexual harassment and fire safety. When people aren’t trained properly in the use of powerful technologies, the door for abuse is left wide open. When applicable, this should also include compliance with local, state, federal – and in the case of things like GDPR – recommended global practices.

At my own company, we have adopted a set of best practices for proper training and responsible data-handling for anyone who uses facial recognition services. Compared to databases used by insurers, hospitals, banks or even many marketing departments, biometric databases contain relatively little sensitive personally identifiable information. With that said, we take the storage of biometric data seriously. All customers undergo extensive training on proper data handling, including how to set up data security permission-levels in the system and how to audit the database. We also provide customers with a knowledge base containing educational content about proper data handling.

RESPONSIBLE DATA HANDLING

The nightmare scenario for any consumer is what happened to some Uber customers when employees, in 2016, used location data to routinely spy on them, including certain politicians and even Beyonce. When creating data handling policies, companies should begin by asking themselves these questions: how many people truly need access to customer data? How can we create data layers that can further restrict access to certain types of information to a very specific set of employees? Once these policies are decided, then technological firewalls need to be put in place to make enforcement possible.

But every situation is different. For facial recognition, we have, through product design, attempted to prevent discriminatory profiling by race, age, gender or national origin. Customers using the product for security purposes are unable to report on demographics, by design.

UN-ENROLLMENT

While not enforceable outside Europe, GDPR has raised awareness about the importance of the total deletion of personal data upon request. This has caused a lot of anxiety for companies, since virtually any tracking technology, ranging from websites to Internet browsers, tracks “anonymous” visitors and attempts to eventually marry this data with personally identifiable information. While this data is sometimes helpful, it is typically not critical, and could be used to identify someone eventually.

In facial recognition, we refer to all non-matched “unknown” individuals on camera as anonymous. We automate the routine purging of this type of data, as often as nightly, depending on the circumstance. This is an example where the technological delta between old-school video surveillance and face recognition actually makes it possible to make surveillance less intrusive for ordinary citizens.

SELF-REGULATION

When industries don’t adequately respect consumer privacy, government steps in with regulations. To date, for example, there is very little government oversight of social media data handling, principally because to some degree, the largest providers have gradually rolled individual controls into the platforms. While even Mark Zuckerberg admits that some government regulation may still be needed, the industry has already done a lot to lead by example.

My company and companies like ours are working in a cross-industry capacity with law enforcement, retailers and other security vendors to establish reasonable data security standards, including a certification process. Considering that only three states and one Canadian province currently have biometric surveillance regulations, this isn’t just good stewardship – it’s also very practical work that benefits both the community and industry.

By the way, self-regulation isn’t always in lieu of government regulation. There are times when government is absolutely needed. However, industry can often lead the way by beginning governance efforts before regulations are put into place.

TRANSPARENCY

More corporate privacy scandals are due to a lack of transparency than any other reason. A recent example is MoviePass, which shocked its customer base when its CEO announced that the company was using its mobile app to track user activities before and after movies. When it comes to everyday consumer applications, going transparent is far easier than it is for the security industry.

With that said, whenever practical, organizations should disclose the use of biometric surveillance. We recommend customers to disclose that face recognition is in use to safeguard the public, including signage and help with public disclosures, to help encourage this in actual practice. However, in some very unique cases, such as government intelligence, security issues prevent overt signage. Certain conditions may prevent those tasked with protecting public spaces from disclosing that they are using biometric surveillance, as a clandestine approach may make it easier to catch dangerous criminals.

Still, we believe that it’s vital that all of us – in every industry – help lead our customers into a state of greater transparency. I’m convinced that our society is moving toward transparency, as brands like Jet Blue, CaliBurger and many more have announced their use of face recognition. Outside the biometric industry, Whole Foods is set to become the first grocery retailer to offer full GMO transparency, while Zappos invites customers into its headquarters, and at times, even into departmental meetings.

Whatever business you find yourselves in, if possible, encourage transparency. Building a in a black box, especially in regards to data handling, inevitably leads to consumer backlash. At the end of the day, the best way to encourage brand loyalty is through an authentic social contract built on TRUST. It’s the right thing to do.

KEYWORDS: facial recognition privacy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Peter trepp ceo facefirst
Peter Trepp is the CEO of FaceFirst, a provider of face recognition technology. As an executive leader, investor and entrepreneur, Peter has helped numerous technology companies achieve successful exits, including ServiceMesh’s purchase by CSC, BlackLine’s sale to Silver Lake Sumeru, and RedHat's acquisition of Inktank. He earned his MBA at the prestigious UCLA Anderson School.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Arteco Facial Recognition Algorithm - Security Magazine

    Facial Recognition Technology: Minimizing Risk in the Face of Increasing Liability

    See More
  • SEC0719-Cyber-Feat-slide1_900px

    Privacy: The Age of Context – Ensuring the Benefits of Sharing Outweigh the Risks

    See More
  • facialrecognition

    In the Age of Facial Recognition, The Human Element is Still Necessary

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing