Subject Recognition is based on the retailer’s information on Auror, which is deliberately restricted to prohibit the collection of sensitive information such as ethnicity, race, religion, political affiliation, or sexual orientation.
It is strictly used for identification of POIs for crime prevention and safety purposes only. It cannot in any way be used for profiling, categorization, prediction, tracking, monitoring behavior, or targeted marketing purposes.
To be enrolled to the list, a POI must already exist within the retailer’s information on Auror and meet the retailer’s strict criteria for ‘Extreme Threat’, ‘Serious Threat’ or ‘High Loss’.
Retailers cannot manually or arbitrarily enroll any profile to the POI list. The software suggests enrollments based on the retailer’s criteria and they can review these suggestions based on their own policies.
There are no shared POI lists between retailers and they cannot be shared with law enforcement. Law enforcement cannot access the Subject Recognition module or POI lists using Auror.
Identification is based on historic images linked to previously recorded events within a maximum 24 month period.
Biometric data is never entered or stored within the retailer’s information on Auror, regardless of a match. All processing of biometric data takes place within the integrated third-party FRT software.
If there is no match, the image and temporary biometric template is only ever processed by the integrated third-party FRT software and discarded immediately.
A human is always in the loop. No decisions are made exclusively through automation. Built-in integrity tools provide retailers with full auditability and transparency.
Retailers can apply strict access controls around Subject Recognition information. All activity is auditable and monitored.
Retailers and individual users of Auror are required to adhere to all applicable local laws and internal policies.
All information held on behalf of our retail customers is end-to-end encrypted. Auror is also SOC2, Type 2 compliant and regularly undergoes cyber security penetration testing.