1 Encryption : All data is encrypted. 2 Anti-profiling: Designed to prevent profiling by race/age/gender or national origin. 3 Spoofing: Stereoscopic lens prevent the use of photos being used to spoof the system. 4 Approval process: User privilege functionality ensures management approval prior to implementing watch-lists and creates an audit trail to prevent unauthorized usage. 5 Data Integrity: Built in data policies, audits, and user privileges. 6 Personal Data: Personal Data:Images are cross-referenced through unique alphanumerical identifiers.