european union flags

European Union Contemplates Banning Facial Recognition For Three To Five Years

While the ban is on the table, EU leadership ultimately says it would be a “far-reaching measure” with the potential to stifle the development of the technology.

The leadership of the European Union is considering a ban on facial recognition technology in public spaces for up to five years that would give companies that time period to work out policies that would prevent abuse, Reuters reported.

An 18-page white paper obtained by Reuters and other news outlets lays out EU leaders’ concerns with facial recognition systems used by law enforcement agencies across the globe, including many EU countries.

“Building on these existing provisions, the future regulatory framework could go further and include a time-limited ban on the use of facial recognition technology in public spaces,” the white paper reads, according to Reuters. “[During a three to five year period] a sound methodology for assessing the impacts of this technology and possible risk management measures could be identified and developed.”

While the facial recognition ban is on the table, the authors of the white paper ultimately did not recommend the ban as one of three policy options that the Commission should pursue, Fortune reported.

“Such a ban would be a far-reaching measure that might hamper the development and uptake of this technology,” the authors wrote, stating that it would be better to focus on enforcing existing measures in the EU’s data protection laws such as the General Data Protection Regulation (GDPR).

Read More: GDPR: Here's What You Need to Know

The new European Commission President Ursula von der Leyen has already pledged to introduce a new legislative agenda for artificial intelligence within the first 100 days of her administration, which began on Dec. 1.

A spokesman for the Commission declined to comment on the leak of the white paper but told Fortune: “To maximize the benefits and address the challenges of Artificial Intelligence, Europe has to act as one and will define its own way, a human way. Trust and security of EU citizens will therefore be at the center of the EU’s strategy.”

The white paper included recommendations to impose regulations on developers and users of AI, including facial recognition, and that authorities should be appointed to monitor enforcement of the regulations, according to Reuters.

EU leadership will seek feedback on the white paper when it is released and then make a final decision. Margrethe Vestager, the digital chief for the EU, will likely present the Commission’s proposals in February.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3