The following is a list of common questions that we receive from customers and interested parties about our venue technology products.  While these products are in development, we are experienced at matching objects to assist with access control or stadium security.  With all technology, the education process to better understand the intent of the problem or the effectiveness of an intended solution is an important part of gaining acceptance and adoption.

Relying on Human oversight of our technology:

  • What we do:  In our security products, our systems escalate potential threats that are handled by human intervention of trained professional personnel.  Prior to this technology, security personnel would review pictures as well as carry picture books of persons of interest (POIs) and attempt to identify them as they walked the event.  This prior approach, to manually identify potential issues, was often unsuccessful and fraught with missed opportunities to identify true threats.                                              
  • What we don’t do:  Our technology is not used to replace human security.  Instead, its used to enhance a human’s naturally constrained ability to identify a potentially disruptive person.  When there is a positive identification, it is given to trained security personnel to take appropriate security measures to ensure the safety of fans and performers.

Using smart cameras:

  • What we do:  Cameras are used in both our access control and security products to reliably identify persons of interest.  For access control, the individual provides facial information for access and the entrant’s face is cross-referenced to an access list.  In a security product, the individual is compared against the known list and if not a match, no further action is taken and no data is stored.  Our smart cameras add an additional data layer that is designed to identify only those individuals who present a security risk based upon verified, pre-existing information.
  • What we don’t do:  Unlike standard security cameras common to public and private venues, no video, images or personally identifiable information (PII) is stored by security personnel or the technology.  All information is immediately disposed of if there is no match to a POI.

Ensuring visual recognition:

  • What we do:  For any of our products, smart cameras are located at the entrance points of venues which allow the software to measure a person’s key facial landmarks, which are unique to each of us to accurately identify individuals.
  • What we don’t do:  We don’t recognize every person or consumer – the system is looking for a visual match of those that are of interest (those allowed in to provide access, or persons of potential interest for security).  In each instance, the system seeks to ensure safety for fans at high value events.

Retention of Information:

  • What we do:  Any information of the general public used by FanGuard is not stored, but rather discarded immediately after there is not a match.  When there is a positive identification of a potential threat, it is given to trained security personnel to take appropriate security measures to ensure the safety of fans, general population and performers.                  
  • What we don’t do:  No information of the general public is stored or sent to a central command post. If our system does not identify you or an object you have as a security concern, your image is discarded immediately.  This data is not used for marketing, hospitality or retained in databases of local security teams.  

Measuring the success of our technology:

  • What we do:  With access control, our technology expedites access time to a facility, improving the overall experience.  For security, the ability to manage the security of large events is greatly enhanced.  As proof of the success of the work, the technology is able to identify 10X as many persons of interest than the regular human surveillance at a large venue in an early pilot.
  • What we don’t do:  Human limitations make it difficult, if not impossible, for security personnel to check the identification of all fans entering a stadium for general access.  Conversely, identification of potential security threats from the tens of thousands of fans attending a given event is extremely challenging without the assistance of technology.  We don’t determine if a person is a direct match, rather just use our technology to aid in the screening process to expedite verification.

Gaining Consent:

  • What we do:  In our access control products, all participants provide consent for their likeness, with the benefit of expedited access.  For our security products, in all venues and tickets there are signs that indicate that fans are on private property and might be filmed.  Certain states have more stringent rules around such filming, and in those instances, FanGuard is not used.
  • What we don’t do:  We do not store any information of fans that aren’t direct matches for either access or security.  While being filmed in public places such as shopping malls, transportation centers and convenience stores can be disconcerting, these actions are done to aid public safety.  

Where we deploy our solutions:

  • What we do:  We use our technology in areas where biometric analysis is allowed under local laws or ordinances.
  • What we don’t do:  Certain states do not allow capture of people’s images such as Illinois.  As a result, we do not deploy the visual matching solution at events or locations in these states.
ISM Connect
100 S. Main St.
Doylestown, PA 18901