Before signing the application you should read the basic information on data protectio here
Basic information about Data Protection
Responsible Party ICAR VISION SYSTEMS, S.L.
Purpose Commercial research.
Recipients Data may be provided to other companies in the group and to third party companies in the technology sector.
Rights Access, rectification, cancellation, opposition, limitation of processing, data portability, and to not be the object of automated individualized decisions.
identity. (From b. Lat. identitas, -atis). f. Own set of an individual or of a community that characterize over other traits. It is the definition of the Royal Academy of the Spanish Language (RAE) for the word identity. Simple and clear, but in the digital and hyperconnected world we live in, does not meet the entire current concept of identity. Let's see why.
Beyond the RAE definition, the identity of a person is composed, like a puzzle, of many pieces that accumulate over time. First of all what we are and differentiates us from others, as explained in the definition, but must also include biographical, demographic, legal data ... in short, what we're adding to the distinctive quality over the years.
This growing identity is reflected in the numerous documents we generate: our name, sex and age in the National Identity Card or Passport, or bank accounts and medical affiliations, and even our fingerprint, among other data, are shaping our complex identity.
And we they can steal such identity? The answer is yes. The concepts of identity theft and identity fraud refer to crimes in which a person obtains and uses another person's personal information for their own benefit. And they are probably the most widespread crime in the XXI century.
This type of fraud reaches really outrageous numbers. As an example to clarify this magnitude, and keeping to a single sector and country, in the health sector of the United States in 2013, 1.8 million * Americans suffered identity theft in the healthcare environment. The objective is clear: medical care on behalf of another person for not paying bills. And not all were committed by professional criminals, are often the family themselves who consciously share their identities to receive services that are not contracted.
In France, a 2009 study by a research organization in the private sector, CREDOC, found that 210,000 French adults were victims of identity theft each year, at a cost of about € 4 billion ($ 6.3 million) year to individuals, public entities and insurance companies.
If we analyze the economic impact of this activity for the companies involved see annual losses between 1% and 4% of its turnover.
What can we do to prevent this type of fraud?
The need to be sure of who customers are is critical, and therefore customer identity validation is becoming increasingly difficult.
Clearly the first step is to check the biographical data, ie reflected in the documentation that the person carries. Just validate that documentation to prove identity and technological methods exist that automate the process ensuring security levels almost impassable.
The Icar solution provides automatic identification of customers by reading and authenticating identity documents to create electronic images, extracting, classifying and storing this data in the entity's different repositories and applications so that it remains accessible in real time.
The system also simultaneously detects up to 99% of falsified identity documents, providing a dramatic reduction in identity fraud.
From ICAR, experts in developing technologies for identifying individuals through biometric techniques also offer a second check. What if the person carrying ID CArd is not really your own? What if the documents are not of that person or are a perfect fake? You need to take another step: identify the person.
We must check that the person is really who they say they. And only you can do it with what we are. You have to identify that person with biometric techniques, physiological or behavioral traits that are unique and inseparable from an individual, such as your fingerprint, your iris or voice, among others.
Realizing this double check, get a double layer of security that largely prevent fraud phishing: validation of documents and biometric identity verification.
*(Source “2013 Surveyon Medical IdentityTheft” http://www.ponemon.org/blog/2013-survey-on-medical-identity-theft)