IGF 2020 WS #292 FaceApp, Fakes, and Biometrics: How to Protect Your Digital

    Subtheme

    Organizer 1: Daniil Lipin, Cyber rights clinic (Legal aid society)
    Organizer 2: Natalia Krapiva, Access Now

    Speaker 1: Daniil Lipin, Civil Society, Eastern European Group
    Speaker 2: Natalia Krapiva, Civil Society, Western European and Others Group (WEOG)
    Speaker 3: Alexander Isavnin, Technical Community, Eastern European Group

    Moderator

    Natalia Krapiva, Civil Society, Western European and Others Group (WEOG)

    Online Moderator

    Daniil Lipin, Civil Society, Eastern European Group

    Rapporteur

    Daniil Lipin, Civil Society, Eastern European Group

    Format

    Panel - Auditorium - 90 Min

    Policy Question(s)

    Trust and identity, Digital Safety to enable a healthy and empowering digital environment for all

    We will discuss the existing approaches to the protection of digital identity and engage the audience to help identify gaps and propose solutions.

    SDGs

    GOAL 5: Gender Equality
    GOAL 16: Peace, Justice and Strong Institutions
    GOAL 17: Partnerships for the Goals

    Description:

    Commercial collections of personal data, such as images of faces and other biometric information, are susceptible to breach by malicious actors and abuse by public authorities, by way of access to this data and government-led or sponsored surveillance and hacking. Fraudsters and impersonators can use this data to create fake social media and bank accounts. Photos of individuals' faces can also be used for FaceID Bruteforce databases. However, as in the recent example of FaceApp, individuals themselves often give the rights to their images by uploading them and agreeing to the terms of service that essentially mean giving away all of users rights. While an individual’s images and other biometric information is usually protected by the law, in practice, it becomes an individual’s personal responsibility to protect their digital identity from copying and misuse.

    Expected Outcomes

    Identify ways to inform and protect users from collection and abuse of their personal identification data.

    We expect that the topic of discussion itself will open up a lot of questions. A lot of people today are already worried about the possible risks for them that are caused by the discussed gaps. Most likely there will be a lot of people who want to speak. We will invite them to a discussion in the long run. Perhaps we can invite to cooperation...

    Relevance to Internet Governance: The possibility of the existence and activity of a digital identity in the network: verification of identity, protection of digital identity from copying. How fully a subject can exist virtually from the point of view of law and law. What needs and rights can a person realize realistically. As far as public authorities or important services allow a person to choose online life and work. These studies will allow us to talk about how the digital personality should be perceived by the courts and law enforcement agencies as a value to be protected and protected.

    Relevance to Theme: As far as network users and digital identity holders can count on protecting their digital rights offline. Should national laws take into account the citizen’s right to contractual jurisdiction for their digital identity? Is there a future for social networks like digital states (Satus in statu)

    Online Participation

     

    Usage of IGF Official Tool.