Solved

IT Management

Posted on 2014-02-04
3
306 Views
Last Modified: 2014-02-06
I am looking for information or arguement against using a biometric system to clock employees in or out or list of questions of what it should achieve.
0
Comment
Question by:YRMC_Infrastructure
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
netcmh earned 500 total points
Comment Utility
The argument I would make against using the technology right now is the cost associated with it. Not just the hardware/software purchasing, but the implementation in your exisiting infrastructure. The bang for the buck is not satisfactory, yet.

By design, it is supposed to replace all forms of authentication on your network. If you have other forms of authentication still running, then bypassing the biometrics based requirements is possible; and therefore renders your investment void.

Even using it for something as simple, in some minds, as the clocking system; either the actual data or the representation of the data has to be stored somewhere to enable authentication. Securing that is another investment you should be willing to incorporate into the solution, not as an addon, but as a core. Thats PII, right there. Privacy advocates and compliance requirements will be through the roof on this. With biometric data leakage, it's not just network access you'll be liable for, it would be the user's entire life accesses - their homes, their cars, their bank accounts - if they've decided to integrate. This isn't some pipe dream. With standardization emergence, it's only a matter of time.

Hope my 2 cents helped.
0
 

Author Closing Comment

by:YRMC_Infrastructure
Comment Utility
b
0
 
LVL 20

Expert Comment

by:netcmh
Comment Utility
Thanks for the grade. Good luck.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Here is the example of setting up enterprise library configuration in asp.net. One of the great enhancements that comes with the Enterprise Library is the Enterprise Library Configuration Console. This can be found on your Start menu under Progra…
Hi Everyone Now IIS AppPool issues is something we have always had because of the amazing custom development and in-house applications we have :) The issues we had were getting out of control and it was time to do something about it, just for…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now