On Wed, 27 May 2009, Bradshaw, Phillip wrote:
> 1. It is data
> 2. It relates to a living individual (usually)
> 3. The individual it relates to can be identified from other information
> which is in the possession of the data controller
I don't disagree with the first two.
But how does a mathematical summary of the fingerprint identify anyone?
It doesn't. As for obtaining other information, the only way you are
going to be able to map that mathematical summary to a living person (ie,
identify them from the data you have on the flash device) is by having the
living person's fingerprints and generating their mathematical summary and
comparing them - but then you have to know who the person is in the first
place to get the fingerprints, so why would you be bothering?
I suppose we don't know enough about the mathematical algorithm to know
how likely a collision is (ie, the chance that the mathematical summary
will match more than one fingerprint).
. . . . . . . . . . . . . . . . . . . . . . . . .
Jethro R Binks
Computing Officer, IT Services, University Of Strathclyde, Glasgow, UK
All archives of messages are stored permanently and are
available to the world wide web community at large at
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)