Intelligent CISO Issue 32 | Page 45

Industries and businesses that embrace data mining will learn to adapt to market cycle indicators and amply be prepared to moderate dramatic events .
industry unlocked
That said , we recognise that core temperature monitoring may provide insights to the community concern trending mentioned above . With Fazing Labs , we ’ re modelling the ability to protect the identification of the ‘ target ’ until such time that a reading is abnormal .
Should that occur , our intention is to use our regular CCTV capabilities to identify the individual and approach them in a respectful way . This is opposite of how airports perform security screening today where 100 % of the population is processed as being a security risk until cleared .
Ideally , this approach to temperature checks provides a more humanistic , considerate and timely approach to not interrupting the flow or worse , inadvertently create queues that compromise social distancing .
In consideration that temperature is not a confirmation of COVID-19 , the reasonable expectation would be for that guest to be escorted to a secondary screening using an approved rapid test method .

Industries and businesses that embrace data mining will learn to adapt to market cycle indicators and amply be prepared to moderate dramatic events .

As the primary ( temperature ) and secondary ( rapid test ) data points are gathered , this would be mapped against the total population travelling over the same time . The result is a trend report that can ideally assist public health agencies and transportation officials discern models of concern and determination of allowing mass travel or implement moderate restrictions to stem or stop the spread .
Can you use this data for contact tracing at a later date ? If so , how does this process work ?
We have other systems in place that support contact tracing should that become a requirement . This is done through sensor technology currently at our security checkpoint with the intent of deploying sensors from roadway to gateway ( boarding gate ).
The sensor tech provides capture of mac addresses for any Bluetooth or Wi-Fi enabled device . While we don ’ t know who the individual is that ’ s carrying the device , we do know that that device travelled throughout our facilities and path that individual took while on-premise .
Our leap to leverage this data for the greater good is to provide this to independent and approved contact trace organisations ( e . g . Apple , Google or similar ) in the interest of data privacy concerns .
Should the individual confirm via their contact trace app , our data would enable cross comparison of their device mac address ( es ) against all other www . intelligentciso . com
45