Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security NewswireVideo Surveillance

Researchers Call for New Federal Authority to Regulate Facial Recognition

biometrics
June 8, 2020
A group of artificial intelligence experts recently proposed a new model for managing facial recognition technologies at the federal level.

In a white paper titled, “Facial Recognition Technologies in the Wild: A Call for a Federal Office,” the authors propose an FDA-inspired model that categorizes these technologies by degrees of risk and would institute corresponding controls.

lead author Erik Learned-Miller of the University of Massachusetts Amherst’s College of Information and Computer Sciences, explains, “There are a lot of problems with face recognition, like breach of privacy, surveillance, unequal performance across sub-groups and profiling. Due to the high stakes situations in which this technology is being deployed, such as in police work, financial decision-making and analysis of job applicants, harms from inaccuracies or misuse are a real and growing problem.”

Further, “People have proposed a variety of possible solutions, but we argue that they are not enough. We are proposing a new federal office for regulating the technology. We model it after some of the offices in the Food and Drug Administration for regulating medical devices and pharmaceuticals.”

He says that the FDA provides a model or precedent of centralized regulation for managing complex technologies with major societal implications. Such an independent agency would encourage addressing the facial recognition technologies ecosystem as a whole. The white paper describing the researchers’ proposal is accompanied by a primer and basic introduction to the terminology, applications and difficulties of evaluating this complex set of technologies.

Learned-Miller’s co-authors are Joy Buolamwini of MIT’s Media Lab and founder of the Algorithmic Justice League, computer scientist Vicente Ordóñez of the University of Virginia, and Jamie Morgenstern at the University of Washington. The project was supported by a grant from the MacArthur Foundation.

The authors write that while various cities and states have begun to pass laws that provide oversight of facial recognition technologies, these individual measures are not enough to guarantee the consistent protection of people’s rights or set shared expectations for organizations that buy and sell in the tech market. Although the task is complex, this white paper provides actionable recommendations.

Buolamwini adds, “This paper is a starting point for how we as a society might establish redlines and guidelines for a complex range of facial recognition technologies.” Left unchecked, they threaten to propagate discrimination and intensify the risks for eroding civil liberties and human rights,” she and co-authors write.

Last year, Learned-Miller and two others received an award from the International Conference on Computer Vision for work on one of the most influential face datasets in the world, Labeled Faces in the Wild. It has been used by companies like Google and Facebook to test their facial-recognition accuracy.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security facial recognition privacy surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • albany new york ordinance would require oversight of security technology used including facial recognition

    City in New York wants to regulate surveillance technology

    See More
  • biometrics

    New York School District Stops Plans for Facial Recognition Due to Privacy Concerns

    See More
  • facial recognition

    China to Require Facial ID for Citizens to Get New Phone Number, Use Internet

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic-Sensing.gif

    Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing