CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Document

FACIAL RECOGNITION TECHNOLOGY: Current and Planned Uses by Federal Agencies

By GAO

Reading Time: 1 min read
in Document, Report

Why GAO Did This Study Facial recognition—a type of biometric technology—mimics how people identify or verify others by examining their faces. Recent
advancements have increased the accuracy of automated FRT resulting in increased use across a range of applications. As the use of FRT continues to expand, it has become increasingly important to understand its use across the federal government in a comprehensive way.

GAO was asked to review the extent of FRT use across the federal government. This report identifies and describes how agencies used FRT in fiscal year 2020, including any related research and development and interactions with non-federal entities, and how agencies plan to expand their use of FRT through fiscal year 2023.

GAO surveyed the 24 agencies of the Chief Financial Officers Act of 1990, as amended, regarding their use of facial recognition technology. GAO also interviewed agency officials and reviewed documents, such as system descriptions, and information provided by agencies that reported using the technology.

 

GET REPORT

Tags: BiometricsBiometrics DocumentsBiometrics ReportsDocumentsfacial recognitionGAOGovernmentGovernment Accountability OfficeReportsUnited States
ADVERTISEMENT

Related Posts

Designing an ethical, socially accountable facial recognition system

Designing an ethical, socially accountable facial recognition system

January 24, 2023
Using Mobile Device Biometrics for Authenticating First Responders

Using Mobile Device Biometrics for Authenticating First Responders

January 24, 2023
Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects

Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects

January 24, 2023
How Do I Know If An MSP Is Right For My Organization?

How Do I Know If An MSP Is Right For My Organization?

January 20, 2023

More Articles

Book

Trust No One: Inside the World of Deepfakes

November 7, 2022
Quotes

“We use a lots of honeypots in a lot of different ways…”

January 12, 2022

BIT X BIT: In Bitcoin We Trust (2018)

March 7, 2021
Book

Cybersecurity for Beginners

October 18, 2020
Incidents

DDoS attacks on Andorra linked to Minecraft tournament

January 25, 2022
Cyber101

Implementation Group 2 (IG2)

March 10, 2022
Alerts

HPE Security Advisory

October 5, 2021
Alerts

Microsoft Warns of Destructive Malware Targeting Ukrainian Organizations

January 17, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.