iProov is committed to protecting your privacy and your rights when we process your data. This Privacy Notice explains what personal information we collect when you use our Application and how we use it. The notice also explains your rights and how to exercise them should you wish to do so.
When you use the iProov Application, iProov is a Controller of your data as we make certain decisions within our application on how your data is used and processed. We are asking you to assist in iProov demonstrating our products so we can showcase our capabilities and the services we offer to our customers.
When you use the iProov Application you must provide us with your consent to collect and use your data. You can withdraw your consent at any time.
The personal data we collect is:
iProov also collects other data when you use the iProov Application. This data is not personal data but is shown here for transparency purposes.
Genuine Presence and Liveness Assurance:
Each time that you submit imagery for the purposes of authentication (an “authentication attempt”) iProov uses automated imagery analysis and biometric matching technology to verify you as a living person, to detect impersonation and spoofing attempts.
iProov processes your facial imagery (we call this “enrolment imagery”) when enrolling a user in the service. This allows us to perform face-matching during subsequent authentication attempts. We process the enrolment imagery to create a biometric template which can be used for face-matching against authentication attempts. This biometric template is linked to a user’s unique user identifier “User ID”. iProov may update and change the biometric template over time to improve the performance of the matching.
For the purposes of identifying that the person performing the authentication attempt is the same as in the enrolment imagery, iProov compares the biometric template from imagery taken in the authentication attempt with the biometric template taken from the user’s enrolment imagery. The resulting probability of a match between the two biometric templates determines whether iProov issues a pass or fail result for the authentication attempt.
Each time that you submit palm print imagery for the purposes of authentication (an “authentication attempt”) iProov uses automated imagery analysis and biometric matching technology to verify you as a living person, to detect impersonation and spoofing attempts.
iProov processes your palm print imagery (we call this “enrolment imagery”) when enrolling a user in the service. This allows us to perform palm print-matching during subsequent authentication attempts. We process the enrolment imagery to create a biometric template which can be used for palm print-matching against authentication attempts. This biometric template is linked to a user’s unique user identifier “User ID”.
iProov may update and change the biometric template over time to improve the performance of the matching.
For the purposes of identifying that the person performing the authentication attempt is the same as in the enrolment imagery, iProov compares the biometric template from imagery taken in the authentication attempt with the biometric template taken from the user’s enrolment imagery.
The resulting probability of a match between the two biometric templates determines whether iProov issues a pass or fail result for the authentication attempt.
To perform anti-spoofing, which allows us to detect fraud or fake imagery in authentication attempts, we use sophisticated machine-learning algorithms. These algorithms automatically combine the data from the authentication attempt, including imagery and other sensor data “Combined User Data”. The resulting values these algorithms produce enable the system to determine whether the authentication attempt is likely to be bona fide or an attempted spoof.
For your benefit, we monitor and analyse data on authentication attempts, where it is determined to be a potentially fraudulent attempt as a part of the demonstration authentication process, to improve the accuracy of our authentications. We process imagery from authentication attempts to train, update and improve the accuracy of iProov’s biometric testing.
Where data is collected from you it can be used to train the iProov algorithms to improve accuracy and efficacy. When your data is used for algo training it is deidentified so that it cannot be traced back to you as a data subject.
When iProov collects your personal information, we use the data for the following purposes:
A) Consent to process your data
B) To conduct our business and fulfil a legitimate interest. In particular:
C) To fulfil a contract between iProov and the organisation taking part in this demonstration or trial
iProov hosts its demonstration and trial application in the United Kingdom and does not transfer data to other countries.
iProov keeps your data for a maximum of thirty (30) days after your last use of the iProov Application. After this point your data is permanently anonymised so it cannot be used to identify you.
iProov uses third party suppliers as a part of the iProov Application. Depending on what is being demonstrated or trialled, the following third party vendors are used. These companies have separate privacy notices to iProov and we would request that you review and agree to their terms also. iProov has no control over their terms and they are different to the ones in this document.
Under the law of certain countries, you have the following rights around iProov’s use of your data. These rights include:
iProov has a data protection officer who can be contacted at DPO@iproov.com. If you have any questions about this Privacy Notice or about any requests to exercise your legal rights, please send an email to this address.
You have the right to make a complaint at any time to the Information Commissioner’s Office (ICO), the UK’s supervisory authority for data protection issues (www.ico.org.uk). We would, however, appreciate the chance to deal with your concerns before you approach the ICO so would request that you contact us in the first instance.
We are registered with the ICO under number ZA441165.
iProov Limited (we, us or iProov) is a company incorporated in England & Wales under company number 07866563 whose registered office is at 14 Bank Chambers, 25 Jermyn Street, London SW1Y 6HR, England.
This Acceptable Use Policy (“Acceptable Use Policy”) sets forth guidelines for acceptable use of the iProov Services which are provided by iProov Limited or a member of its group of companies (“iProov” “we” or “us”), including software and any associated documentation provided by iProov in connection therewith (as used herein, collectively the “Services”).
By using the Services, you acknowledge that you have read, understood, and agreed to comply with the terms of this Acceptable Use Policy.
You agree to ensure that there is no breach of this Acceptable Use Policy by you or (where relevant) your employees, consultants or other trial users, and you acknowledge that you will be liable and responsible for any such breach. For the purposes of this Acceptable Use Policy, references to “you” includes any natural person or entity that uses or accesses the Services.
The iProov Application is considered to be a test system provided by iProov to approved users to enable them to evaluate iProov’s products.
As a user of the iProov Application you are responsible for all data that is entered and used within the application. iProov takes this data and undertakes various processing activities and acts as a Data Controller for this data.
The following restrictions and limitations shall apply to your access to and use of the Services, and your breaches of any of the following shall be deemed a misuse of the Services and a breach of your obligations:
1. You agree to use the Services for lawful purposes only.
2. You agree to use your own identity when using the service.
3. You agree to minimising the data that could be collected by the iProov Application by not using the application in an area where other data may be collected in the video stream when using your camera. This data could be other people, documents or other information that may be used to identify other people who are not part of the iProov Application use.
4. Your users or participants are a minimum 18 years of age.
5. You will not, and will not allow a third party to:
A) copy, modify, sell, sub-license, rent, or transfer the Services to any third party;
B) attempt to defeat, circumvent or disable any copy protection mechanism in the Services;
C) modify, distribute, alter, or tamper with the Services;
D) reverse engineer, disassemble, or decompile the Services or apply any other process or procedure to derive the source code of any software included in the Services (except to the extent applicable legal requirements don’t allow this restriction, and then only after you have given us notice and an opportunity to resolve any interoperability issues);
E) introduce any infringing, obscene, libellous, or otherwise unlawful data or material into the Services;
F) access all or any part of the Services in order to build or facilitate the build of a product or service which competes with the Services;
G) remove, obscure, or alter any intellectual property right or confidentiality notices or legends appearing in or on any aspect of any of the Services;
H) introduce or attempt to introduce any form of computer virus, malware, worm or other form of malicious software to any part of the Services; or
I) introduce into or distribute through the Services any imagery or other content that: (a) does not meet iProov’s stated guidelines or requirements; (b) is sexually explicit or indecent; (c) is discriminatory based on race, gender, colour, religious belief, sexual orientation or disability; (d) may infringe iProov’s intellectual property rights, or is capable of causing damage or injury to any person or property.
6. In addition to the restrictions set out above, the below is conduct deemed by us to be inappropriate, improper or harmful to our reputation, network, or the Services and therefore prohibited when using the Services:
A) causing, aiding, encouraging, or facilitating any end user to point to or otherwise direct traffic to any material in breach of any applicable legal requirements;
B) accessing or using the iProov Services other than as expressly permitted by your Agreement;
C) knowingly generate Transactions that are prevented from completing;
D) attempt to spoof the Services, including by means of images or by injecting digital data into the iProov APIs, without iProov’s specific written approval;
E) probe or attempt to penetrate Service, either through access to Services or other online methods, by communication with iProov staff, by attempted physical access to iProov facilities or sites of third party servers hosting the Services or elements of it, without iProov’s specific written approval;
F) submit Transactions or TCP/IP traffic to iProov at a sustained rate faster than that agreed in writing with, or in the absence of such agreement specified from time to time by, iProov;
G) test the throughput, performance, latency, simultaneous Transaction capacity or other performance parameters of the Services without the written agreement of iProov;
H) publish or publicly disclose statistical measures of the performance of the Services, nor existence or details of any spoof attempts made against the Services, without the written agreement of iProov;
I) indicate or suggest that the Services are provided without the involvement of iProov;
J) using, encouraging, aiding or facilitating the use of the Services to (including by pointing to web sites or locations that) create, transmit, distribute or store material that: violates trademark, patent, copyright, trade secret or other intellectual property laws, violate the privacy, publicity or other personal rights of others, include tools designed for compromising security (including but not limited to password guessing programs, cracking tools or network probing tools), violate any applicable legal requirements related to export control, data protection or anti-terrorism, or impair the privacy of communications; or
K) attempting to penetrate or manipulate, or encourage, aid or facilitate the penetration or manipulation of, the security features of the Services or any other system (including but not limited to unauthorized access to or use of data, systems or networks, probing, scanning or testing the vulnerability of a system or network, breaching security authentication measures, unauthorized monitoring of data or traffic, interfering with the service of any user, host or network by any means; forging any TCP/IP packet header or any part of a message header).
In addition to the other rights or remedies available to us, we may (i) immediately, temporarily suspend Services where continued use of Services (a) breaches applicable legal requirements, (b) will have an adverse impact on our network or systems, or (c) we reasonably believe suspension is necessary to mitigate any damage or liability resulting from breach of this Acceptable Use Policy; and (ii) notify the appropriate law-enforcement agencies of any breach of this Acceptable Use Policy.
We reserve the right to modify or replace this Acceptable Use Policy at any time and at our sole discretion. We will indicate at the top of this Acceptable Use Policy the date such document was last updated.