1
Encryption : All data is encrypted.
2
Anti-profiling: Designed to prevent profiling by race/age/gender or national origin.
3
Spoofing: Stereoscopic lens prevent the use of photos being used to spoof the system.
4
Approval process: User privilege functionality ensures management approval prior to implementing watch-lists and creates an audit trail to prevent unauthorized usage.
5
Data Integrity: Built in data policies, audits, and user privileges.
6
Personal Data: Personal Data:Images are cross-referenced through unique alphanumerical identifiers.