{"id":3050,"date":"2025-04-07T09:52:14","date_gmt":"2025-04-07T07:52:14","guid":{"rendered":"https:\/\/trustlab.upct.es\/2025\/04\/07\/datos-biometricos\/"},"modified":"2025-09-19T10:41:03","modified_gmt":"2025-09-19T08:41:03","slug":"biometric-data","status":"publish","type":"post","link":"https:\/\/trustlab.upct.es\/en\/2025\/04\/07\/biometric-data\/","title":{"rendered":"Biometric Data"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3050\" class=\"elementor elementor-3050 elementor-1944\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de69e90 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"de69e90\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e86ff41 elementor-widget elementor-widget-heading\" data-id=\"e86ff41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is biometric data?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bdc1de6 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"bdc1de6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c475ea8 elementor-widget elementor-widget-text-editor\" data-id=\"c475ea8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Biometric data are those unique physical or behavioral characteristics of an individual that can be used for identification or verification. This data includes traits such as fingerprints, facial recognition, iris, voice, and the way we write or walk.<\/p><p>Unlike passwords or ID cards, biometric data is unique, non-transferable and difficult to forge, making it a key tool in digital security. However, their use also poses challenges in terms of privacy and personal data protection.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-171211f elementor-widget elementor-widget-heading\" data-id=\"171211f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are biometric data used for?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d3eb31 elementor-widget elementor-widget-text-editor\" data-id=\"4d3eb31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Biometric data has multiple applications, from access to mobile devices to airport security and banking transactions. Some of the main functions include:<\/p><ul><li><strong>Authentication and access:<\/strong> used in mobile devices (Face ID, fingerprint), access cards and time and attendance systems.<\/li><li><strong>Security and surveillance:<\/strong> Police and security forces use them to identify people through facial or fingerprint recognition.<\/li><li><strong>Banking and digital payments:<\/strong> Many financial institutions have implemented biometric authentication to improve transaction security.<\/li><li><strong>Health and medical records:<\/strong> Used to identify patients and avoid medical errors in hospitals and clinics.<\/li><li><strong>Immigration and customs<\/strong>: At airports and borders, biometric scanners are used to verify identities and streamline immigration processes.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d293417 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"d293417\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a06e8d elementor-widget elementor-widget-image\" data-id=\"2a06e8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"766\" height=\"257\" src=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2024\/12\/cabecera_ctf.jpg\" class=\"attachment-large size-large wp-image-2864\" alt=\"\" srcset=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2024\/12\/cabecera_ctf.jpg 766w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2024\/12\/cabecera_ctf-300x101.jpg 300w\" sizes=\"(max-width: 766px) 100vw, 766px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a4ac3d elementor-widget elementor-widget-heading\" data-id=\"3a4ac3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Types and examples of the most common biometric data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1666c11 elementor-widget elementor-widget-text-editor\" data-id=\"1666c11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Biometric data are divided into two broad categories:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48d84a2 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"48d84a2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f7d08d e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"7f7d08d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7270b29 elementor-widget elementor-widget-heading\" data-id=\"7270b29\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Physical biometric data<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06e596d elementor-widget elementor-widget-text-editor\" data-id=\"06e596d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These are physical characteristics of the body that do not change over time. Examples include:<\/p><p>\ud83d\udd39 <strong>Fingerprints<\/strong> &#8211; Used in access systems and mobile devices.<\/p><p>\ud83d\udd39<strong> Facial recognition<\/strong> &#8211; Employed in security and phone unlocking.<\/p><p>\ud83d\udd39<strong> Iris and retina<\/strong> &#8211; One of the most accurate methods, used in airports and access control.<\/p><p>\ud83d\udd39 <strong>Hand geometry<\/strong> &#8211; Less common, but used in some industries for personnel control.<\/p><p>\ud83d\udd39 <strong>DNA<\/strong> &#8211; Mainly used in criminalistics and paternity testing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8140796 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"8140796\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b1564f9 elementor-widget elementor-widget-heading\" data-id=\"b1564f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Behavioral biometric data<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41e3ddc elementor-widget elementor-widget-text-editor\" data-id=\"41e3ddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These are based on a person&#8217;s behavior and can change over time. Examples include:<\/p><p>\ud83d\udd38 <strong>Voice recognition<\/strong> &#8211; Used in virtual assistants and bank authentication.<\/p><p>\ud83d\udd38 <strong>Typing dynamics<\/strong> &#8211; Analyzes speed and pressure when typing on a keyboard.<\/p><p>\ud83d\udd38 <strong>Gait pattern<\/strong> &#8211; Gait analysis can be used in security.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8285c1c e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"8285c1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-478e271 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"478e271\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58ac149 elementor-widget elementor-widget-heading\" data-id=\"58ac149\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Are you interested in cybersecurity? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23b5587 elementor-widget elementor-widget-text-editor\" data-id=\"23b5587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At TRUST lab we share exclusive content, updates and practical tips on digital privacy, data protection and cybersecurity. \ud83d\udee1\ufe0f<br \/><strong>Subscribe to our newsletter and stay one step ahead.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8dbc9fd elementor-widget elementor-widget-shortcode\" data-id=\"8dbc9fd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2888-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2888\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/3050#wpcf7-f2888-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2888\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2888-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n <label> Your name\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n\n<label>Your email\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n\n<button style=\"background-color: #1625ee; color: white;\">Send<\/button> <p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"46\"\/><script>document.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );<\/script><\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe5151 elementor-widget elementor-widget-heading\" data-id=\"dbe5151\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How biometric data is collected and processed <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-30a0da3 elementor-widget elementor-widget-text-editor\" data-id=\"30a0da3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Biometric data is collected through specialized sensors in different devices, ranging from fingerprint scanners to facial recognition cameras.<\/p><p>1\ufe0f\u20e3 <strong>Capture:<\/strong> The biometric characteristic is obtained (example: a fingerprint).<\/p><p>2\ufe0f\u20e3 <strong>Conversion to digital data:<\/strong> It is transformed into a mathematical algorithm or encryption.<\/p><p>3\ufe0f\u20e3 <strong>Secure storage:<\/strong> Stored in encrypted databases.<\/p><p>4\ufe0f\u20e3 <strong>Verification or authentication:<\/strong> When a user tries to access, the system compares the data with those registered.<\/p><p>Throughout this process, it is essential to guarantee the security and privacy of the data, since a leak can compromise the identity of the users.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b189940 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"b189940\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"494\" src=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-1024x632.jpg\" class=\"attachment-large size-large wp-image-2865\" alt=\"\" srcset=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-1024x632.jpg 1024w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-300x185.jpg 300w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-768x474.jpg 768w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-1536x948.jpg 1536w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-2048x1264.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4f9e84 elementor-widget elementor-widget-heading\" data-id=\"e4f9e84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Importance of biometric data in GDPR and privacy <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f105d0 elementor-widget elementor-widget-text-editor\" data-id=\"6f105d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The European Union&#8217;s <strong>General Data Protection Regulation<\/strong> (GDPR) <strong>classifies biometric data as sensitive data<\/strong>, which means that its use is highly regulated.<\/p><p>Main requirements of the GDPR on biometric data:<\/p><p>\u2705 <strong>Explicit consent:<\/strong> cannot be collected without the user&#8217;s authorization.<\/p><p>\u2705 <strong>Specific purpose:<\/strong> They must be used only for the stated purpose.<\/p><p>\u2705 <strong>Protection and security: <\/strong>Companies must implement advanced security measures.<\/p><p>\u2705 <strong>Right to be forgotten:<\/strong> Users can request deletion of their data.<\/p><p>The misuse of biometric data can lead to millions of dollars in fines, so it is essential that companies comply with these regulations to protect users&#8217; privacy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6398203 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"6398203\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c333199 elementor-widget elementor-widget-text-editor\" data-id=\"c333199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Biometric data has revolutionized the way we identify ourselves, providing greater security and convenience in many areas. However, their use must always be backed by robust regulations and best practices to avoid privacy risks.<\/p><p><span style=\"font-weight: 400;\">At <a href=\"https:\/\/trustlab.upct.es\/\">TRUST Lab<\/a>,<\/span>\u00a0we are committed to promoting the responsible use of biometric data, ensuring compliance with current regulations and the protection of digital identity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3a45a7 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"e3a45a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6751163 elementor-widget elementor-widget-text-editor\" data-id=\"6751163\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Want to learn more about how to protect yourself in the digital world? At TRUST Lab we share useful resources and relevant cybersecurity news.<\/p><p><strong>Join our community<\/strong> and get access to exclusive content and key updates.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-790c902 elementor-button-align-end elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-mobile-button-align-center elementor-widget elementor-widget-form\" data-id=\"790c902\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;step_next_label&quot;:&quot;Siguiente&quot;,&quot;step_previous_label&quot;:&quot;Anterior&quot;,&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" name=\"Nuevo formulario\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"3050\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"790c902\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Biometric Data - TrustLab\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"3050\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-33 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-name\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tNombre\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Nombre y apellidos*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-33 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-email\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tCorreo electr\u00f3nico\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[email]\" id=\"form-field-email\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Email*\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-acceptance elementor-field-group elementor-column elementor-field-group-field_9d08dad elementor-col-100 elementor-field-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t<label for=\"form-field-field_9d08dad\" class=\"elementor-field-label elementor-screen-only\">\n\t\t\t\t\t\t\t\tprivacy policy\t\t\t\t\t\t\t<\/label>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-subgroup\">\n\t\t\t<span class=\"elementor-field-option\">\n\t\t\t\t<input type=\"checkbox\" name=\"form_fields[field_9d08dad]\" id=\"form-field-field_9d08dad\" class=\"elementor-field elementor-size-sm  elementor-acceptance-field\" required=\"required\">\n\t\t\t\t<label for=\"form-field-field_9d08dad\">He le\u00eddo y acepto la <a style=\"color:#6D7C82\" href=\"\/aviso-legal\/\"><u>pol\u00edtica de privacidad<\/u><\/a><\/label>\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha elementor-field-group elementor-column elementor-field-group-field_3a2a740 elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_3a2a740\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6LeQMEcqAAAAAB9rGQdfuahcIpGNJoW2LF5mQfRh\" data-type=\"v2_checkbox\" data-theme=\"light\" data-size=\"normal\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-sm\" type=\"submit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Enviar<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39482bb elementor-widget elementor-widget-heading\" data-id=\"39482bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-221b2d1 rael-faq-box-layout-yes align-at-left elementor-widget elementor-widget-rael-faq\" data-id=\"221b2d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"rael-faq.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id='rael-faq-wrapper-357' class=\"rael-faq-wrapper\">\n\t\t\t<div class=\"rael-faq-container rael-faq-layout-accordion\" data-layout=\"accordion\">\n\t\t\t\t\t\t\t\t\t\t<div id=\"rael-accordion-a8cb999\" class=\"rael-faq-accordion rael-active\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"rael-accordion-title\" aria-expanded=\"true\" role=\"tab\">\n\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon rael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<span class=\"rael-question-a8cb999 rael-question-span\" tabindex=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat if they get my biometric data?\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"rael-accordion-content\" role=\"tabpanel\" style=\"display:block;\">\n\t\t\t\t\t\t\t\t<span>\n\n\t\t\t\t\t\t\t\t\t<span><p><strong>Unlike a password, biometric data cannot be changed<\/strong>. You cannot generate a \"new fingerprint\" or \"reset your face\". This makes such a <strong>breach much more serious and long-lasting<\/strong>.<\/p><p>\u00a0<\/p><p>If your biometric data is compromised:<\/p><p>\u00a0<\/p><ul><li>They can be used for <strong>impersonation<\/strong>, especially in authentication systems without additional layers of security.<\/li><li>There are documented cases <strong>of deepfakes, unauthorized access and bank fraud<\/strong> using leaked biometric data.<\/li><li>The only real defense is for platforms to <strong>use strong encryption, multi-factor authentication and access limits<\/strong>.<\/li><\/ul><p>Therefore, the <strong>protection<\/strong> of this data <strong>must be maximized<\/strong>, both on the part of companies and users.<\/p><\/span>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div id=\"rael-accordion-4441d39\" class=\"rael-faq-accordion rael-active\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"rael-accordion-title\" aria-expanded=\"true\" role=\"tab\">\n\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon rael-accordion-icon-left\">\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-angle-right\" viewBox=\"0 0 256 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M224.3 273l-136 136c-9.4 9.4-24.6 9.4-33.9 0l-22.6-22.6c-9.4-9.4-9.4-24.6 0-33.9l96.4-96.4-96.4-96.4c-9.4-9.4-9.4-24.6 0-33.9L54.3 103c9.4-9.4 24.6-9.4 33.9 0l136 136c9.5 9.4 9.5 24.6.1 34z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"rael-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-angle-up\" viewBox=\"0 0 320 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M177 159.7l136 136c9.4 9.4 9.4 24.6 0 33.9l-22.6 22.6c-9.4 9.4-24.6 9.4-33.9 0L160 255.9l-96.4 96.4c-9.4 9.4-24.6 9.4-33.9 0L7 329.7c-9.4-9.4-9.4-24.6 0-33.9l136-136c9.4-9.5 24.6-9.5 34-.1z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<span class=\"rael-question-4441d39 rael-question-span\" tabindex=\"0\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tWhat is the difference between biometric data and personal data?\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"rael-accordion-content\" role=\"tabpanel\" style=\"display:block;\">\n\t\t\t\t\t\t\t\t<span>\n\n\t\t\t\t\t\t\t\t\t<span><p>All biometric data is <strong>personal data<\/strong>, but <strong>not all personal data is biometric<\/strong>.<\/p><table><tbody><tr><td width=\"200\"><p><strong>Data type<\/strong><\/p><\/td><td width=\"215\"><p><strong>Examples<\/strong><\/p><\/td><td width=\"186\"><p><strong>Sensitivity<\/strong><\/p><\/td><\/tr><tr><td width=\"200\"><p><strong>Personal data<\/strong><\/p><\/td><td width=\"215\"><p>Name, DNI, email, address<\/p><\/td><td width=\"186\"><p>Medium<\/p><\/td><\/tr><tr><td width=\"200\"><p><strong>Biometric data<\/strong><\/p><\/td><td width=\"215\"><p>Fingerprint, face, voice, iris<\/p><\/td><td width=\"186\"><p>High (sensitive data according to RGPD)<\/p><\/td><\/tr><\/tbody><\/table><p>The key point: <strong>biometric data allows you to identify yourself uniquely<\/strong>, without the need for documents or passwords. For this reason, they are treated more strictly in terms of privacy and require <strong>explicit consent and advanced protection measures<\/strong>.<\/p><\/span>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is biometric data? Biometric data are those unique physical or behavioral characteristics of an individual that can be used for identification or verification. This data includes traits such as fingerprints, facial recognition, iris, voice, and the way we write or walk. Unlike passwords or ID cards, biometric data is unique, non-transferable and difficult to [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-3050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/comments?post=3050"}],"version-history":[{"count":10,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3050\/revisions"}],"predecessor-version":[{"id":3216,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3050\/revisions\/3216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media\/3051"}],"wp:attachment":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media?parent=3050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/categories?post=3050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/tags?post=3050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}