BBx ID Solutions

OUR VALUES 

 

Passion

We are fully standing behind the idea to use individual biometric factors to secure the identity of a person. We are not able to take fully away the fear against biometrics, but we certainly can do a lot to make people understand biometric solutions and its value for them.

We will deliver comfort to the people, secured by biometrics.

Flexibility

No biometric solution looks like the other – if so, then it will not run properly. It is a big difference to run a biometric system inside or outside, as well as it makes a big difference if a few persons or many thousands use a biometric solution.

Whatever the challenge for companies to use biometric solutions will be today and in the future, we will take care to find the right solution. Therefore, we work closely together with a broad network of experienced partners. But much more, we need the willingness and trust of our customers to make the biometric journey successful.

Together we will find the right way, no matter if it is going left, right, or up.

Customer Focus

Many biometric identification projects, roll outs, deployments are going to fail. This is not acceptable for a customer who spent time, resources and money to get a well-running solution.

From day one on, we deeply look to all parameters an individual biometric identification solution for an individual customer will have, to sort out all eventualities coming up to run the final solution smoothly.

We want the customer to love running a biometric solution and we would love them to proudly report about it.

OUR COMMITMENT

We commit ourselves to the “Three Laws of Biometrics” as described from the Biometric Institute:

POLICY – comes first: Any use of biometrics is proportionate, with basic human rights, ethics and privacy at its heart.

PROCESS – follows policy: Safeguards are in place to ensure decisions are rigorously reviewed, operations are fair and operators are accountable.

TECHNOLOGY – guided by policy and process: Know your algorithm, biometric system, data quality and operating environment and mitigate vulnerabilities, limitations and risks.