Saturday August 24, 2019
Home Lead Story Microsoft Wan...

Microsoft Wants Regulation For Facial Recognition Technology To Start in 2019

Microsoft is one of several companies playing a leading role in developing facial recognition technology

0
//
Microsoft,
Microsoft currently has 54 Azure Cloud regions -- more than AWS and Google combined.

Given the potential for abuse of the fast advancing facial recognition technology, governments across the world need to start adopting laws to regulate this technology in 2019, Microsoft President Brad Smith has said.

“Unless we act, we risk waking up five years from now to find that facial recognition services have spread in ways that exacerbate societal issues,” warned Smith in a blog post on Thursday.

“The time for action has arrived,” he said, adding that the industry must also exercise restraint while using this technology.

Speaking of the benefits of the technology, the Microsoft President mentioned that police in New Delhi recently trialled facial recognition technology and identified almost 3,000 missing children in four days.

Similarly, historians in the US have used the technology to identify the portraits of unknown soldiers in Civil War photographs taken in the 1860s.

Researchers successfully used facial recognition software to diagnose a rare, genetic disease in Africans, Asians and Latin Americans.

And in October, the National Australia Bank designed a proof of concept to enable customers to withdraw money from an Automatic Teller Machine using facial recognition and a PIN.

Microsoft
Regulation for facial recognition technology must start in 2019: Microsoft. Pixabay

But at the same time, the potential for abuse of this technology is huge, Smith said, adding that certain uses of this technology could lead to biased decisions and discrimination.

Moreover, the widespread use of this technology can lead to new intrusions into people’s privacy, he said.

“The use of facial recognition technology by a government for mass surveillance can encroach on democratic freedoms,” Smith added.

Also Read- Fujifilm Launches its Medium Format Mirrorless Camera in India

“While we believe that new laws and regulations are indispensable, we also recognise that they are not a substitute for the responsibility that needs to be exercised by tech companies,” he said.

Microsoft is one of several companies playing a leading role in developing facial recognition technology.

The company, Smith said, would start adopting new principles to manage the issues surrounding facial recognition technology in the first quarter of 2019. (IANS)

Next Story

Microsoft, Google and Intel Join Hands to Create the Confidential Computing Consortium

Microsoft joins Google, Intel for data protection consortium

0
google
Confidential computing technologies offer the opportunity for organisations to collaborate on their data sets. Pixabay

Microsoft has joined other industry partners like Google and Intel to create the Confidential Computing Consortium, a new organisation that will be hosted at The Linux Foundation.

The consortium will include other founding members Alibaba, ARM, Baidu, IBM, Intel, Red Hat, Swisscom and Tencent.

In this organisation, the industry can come together to collaborate on open source technology and frameworks to support new confidential computing scenarios.

“The Confidential Computing Consortium will be dedicated to defining and accelerating the adoption of confidential computing,” Mark Russinovich, CTO, Microsoft Azure, wrote in a blog post on Wednesday.

Confidential computing technologies offer the opportunity for organisations to collaborate on their data sets without giving access to that data, to gain shared insights and to innovate for the common good.

intel
The consortium will include other founding members Alibaba, ARM, Baidu, IBM, Intel, Red Hat, Swisscom and Tencent. Pixabay

As computing moves from on-premises to the public cloud and the edge, protecting data becomes more complex.

Also Read: Is China Heading Towards Another Cultural Revolution?

“There are three types of possible data exposure to protect against. One is data at rest and another data in transit. While there’s always room to improve and innovate, the industry has built technologies and standards to address these scenarios.

“The third possible exposure — or as I like to think of it, the critical ‘third leg of the stool’ — is data in use. Protecting data while in use is called confidential computing,” Russinovich explained. (IANS)