X
X

Find Your Specialist

X

Contact Us

Go Back

Culture of Compliance – Leveraging Biometrics & Document Data Security: Smart Eye Technology

Data security is a top concern for modern organizations. What are your options to keep your information safe? Sabrina Serafin meets with Dexter Caffey of Smart Eye Technology to discuss his company’s new biometric document security software and how leveraging data security can help your company succeed.

Culture of Compliance is available on iTunes, Google Play Music and Spotify. Listen now using the player below or download for later.

Leveraging Biometrics & Document Data Security: Smart Eye Technology Transcript

This transcript was assembled by hand and may contain some errors.

It has been edited for readability.

Sabrina: Welcome to Frazier & Deeter’s Culture of Compliance podcast series, where we discuss compliance as a competitive advantage in today’s marketplace. I’m Sabrina Serafin, Partner and National Leader of Frazier and Deeter’s Process, Risk & Governance practice. Today we’re talking to Dexter Caffey, the CEO of Smart Eye technology. Welcome, Dexter.

Dexter: Thank you for having me, Sabrina. My friends always told me I had a face for radio, so thank you so much.

Sabrina: Well, we’re really excited to have you here, because data security is arguably the biggest topic in the boardroom today. Corporate Board Member magazine ranked data security as the single biggest concern for board members. One of the most common vulnerabilities is screen snooping, when someone visits your screen without your permission. This is such a pervasive problem that in 2017, a study by the University of Munich found that 97% of respondents had suffered from some form of screen snooping.

So, today we want to take a look at the emerging use of biometrics in protecting data. The use of fingerprint technology has become increasingly affordable to the point that the latest consumer laptops feature fingerprint log in. Dexter Caffey’s company is taking biometrics to the next level, trying to address unauthorized viewing of documents. Dexter, could you tell us the story of how you decided to found Smart Eye Technology?

Dexter: When I was in Israel a little over a year ago, I was at a cybersecurity event, and I noticed the gentleman who I was speaking with had his laptop open. This was one of the cybersecurity experts who was getting ready to go up on stage and talk. And I noticed that I could see his document, and I said to myself, “Why should I be able to see any document that’s on his computer?” So I said, “What if we created software to where, whenever I viewed any type of document that’s on your computer, it literally was shut off, because it would not recognize my face or iris?”

Sabrina: Great, so, I’m thinking of examples: Working on an airplane, working in a coffee house, or any public place. So, describe to us how the application actually works.

Dexter: The way Smart Eye Technology works is that the app must first be downloaded, and once the app is downloaded, you must first register your face, your iris, your voice and your fingerprint inside the app before you can have access to anything in the app. After that is done, if you wanted to share a document with, let’s say, a co-worker or someone outside of the organization, they must first download the app, and then they must register their face, their iris, their voice and their fingerprint.

At that point, you can share any document that you decide to upload to Smart Eye Technology, whether it’s a PDF document, a Word document. You can then decide what level of security that you want on each document. For example, if you have a low level document and you told the other person, just your face needs to be recognized before this document opens, you just simply push a button that says “facial recognition only.” So, when that document goes to the other person, immediately the document will open up based on recognizing the other person’s face. If someone walks behind that other person as they’re viewing that document, facial recognition as well as iris recognition will kick in and realize that the other person is an unauthorized viewer, and a notification will come up, and the document will shut off within two seconds.

In addition, the sender can decide if the user is allowed to edit the document, yes or no. Also, the sender can restrict Wi-Fi. In other words, if you’re on your office’s Wi-Fi, the document will open up for you. But if you go outside the office, the document will not open up for you, so you can determine which Wi-Fi can be used as well. Also, you can select the time limit, 24 hours, 72 hours, however long you decide for that person to have physical access to that document, and if they can have access to that document online or offline, you can determine that as well. So, it gives the sender 100% control of the flow of the document.

Sabrina: Wow this sounds like an enormous advancement in security for corporate security officers. So, walk us through the highest level of security through this app.

Dexter: The highest level of security is the four multi biometric level. In other words it’s your iris combined with your face, your voice and your fingerprint, and all those levels of security must first be accessed before you can take a look at any particular document that was sent to you. But we also have an additional level of security.

So, if you try to fool us with your face or your iris, we have what’s called blinking recognition. So the blinking that’s coming from your iris, it must come from that particular iris, and not any other one. You can’t fool us with a picture. It has to be literally the blinking from that eye. We also have another level of security for face. On the back of your phone, there’s a camera, and you’ll put your index finger on the back of the phone, and it will capture your pulse. That pulse must also match up with the pulse in your face. So, therefore, they have to be exactly the same, or else you will the access will not be granted.

Sabrina: How is this going to impact the way organizations are currently managing access to their data?

Dexter: One of the important things right now that’s going on is, a lot of times right now, most companies send data through e-mail, whether it’s documents, whether it’s other reports, they send it all through e-mail as attachments. And Smart Eye Technology allows companies to send those documents through the app, where they’re not intercepted by hackers. And another advantage of Smart Eye Technology is that this can’t be forwarded or downloaded. It’s always in the app. And so, the person who sent you that document has the ability to say, “This can or cannot be downloaded, or it can or cannot be shared.” So, the sender of that has 100% control of that document.

Sabrina: Are you in the beta testing phase yet, and what types of companies will be involved in providing feedback?

Dexter: The beta testing will actually began in the second quarter of 2019, and we have a variety of companies, anywhere from accounting firms to the banking industry.

Sabrina: For the listeners to have a higher degree of security awareness, how is Smart Eye Technology providing the users comfort that their personal biometric information is being protected by Smart Eye?

Dexter: We are actually using cloud storage, so the biometrics are all encrypted and protected inside of the cloud that we’re using.

Sabrina: Since the idea of smart AI technology came to you, what types of challenges have you had going from concept to actually developing the end product?

Dexter: Well, one of the challenges is that we’re currently developing the iris recognition, and each particular individual has a different iris, and your iris has six times more identifiable characteristics than your fingerprint. So, therefore, even if you look at tribes in Africa, there are different tribes that have different types of irises, different shapes. So, getting all of those different types of irises inside of the database, that’s a challenge.

Sabrina: So, what you are providing your users is more control around the document that is being delivered. Whereas right now, when we pass along a document, we may be able to encrypt it. We may be able to put a password on it, but we can’t necessarily control where that sits. We can’t necessarily control who that gets forwarded to. And so, Smart Eye Technology takes control over that document, and gives it back to the originator. Beyond limiting who can view the document, you’re also limiting the ability to print, to post, edit, share. This has been great, very educational. Thank you very much, Dexter, I appreciate you being with us today.

Dexter: Thank you so much for having me.

Sabrina: For our audience, thank you for listening to Frazier & Deeter’s Culture of Compliance podcast. Please join us for our next episode as we continue to discuss transforming various compliance requirements into investments in your business.

Related Articles

Privacy Overview

When you use or access the Site, we use cookies, device identifiers, and similar technologies such as pixels, web beacons, and local storage to collect information about how you use the Site. We process the information collected through such technologies, which may include Personal Information, to help operate certain features of the Site (e.g., to prevent online poll participants from voting more than once), to enhance your experience through personalization, and to help us better understand the features of the Site that you and other users are most interested in.

You can enable or disable our use of cookies per category.

When you use or access the Site, we use cookies, device identifiers, and similar technologies such as pixels, web beacons, and local storage to collect information about how you use the Site. We process the information collected through such technologies, which may include Personal Information, to help operate certain features of the Site (e.g., to prevent online poll participants from voting more than once), to enhance your experience through personalization, and to help us better understand the features of the Site that you and other users are most interested in.

You can enable or disable our use of cookies per category.

Necessary Always Enabled

Essential cookies enable you to navigate our Site and use certain features, such as accessing secure areas of our Site and using other features of our service that require us to keep track of certain information as you navigate from page to page. Although some of these cookies are “required” to enable certain functionality, you can disable them in the browser, but doing so will limit your ability to use the features supported by such cookies.

Functionality cookies are cookies that support features of the Site, such as remembering your preferences.

These cookies collect information about how you use our Site, including which pages you go to most often and if they receive error messages from certain pages. These cookies are only used to improve how our Site functions and performs.

From time-to-time, we may engage third parties that track individuals who visit our Site. These third parties may track your use of the Site for purposes of providing us with certain marketing automation features (to help us improve our outreach to current and prospective clients) and providing you with targeted advertisements.