top of page
headerBgWaves.png

Face recognition with human review

QuantumEye helps teams recognise individuals involved in previous incidents, using similarity scoring and a simple review workflow. It is designed to support day to day operations without overclaiming certainty.

Face recognition Indicent Card.png
zoomed.png

Overview

A practical workflow for busy stores

This module is built around a simple idea. The system suggests, people confirm. You get consistent decisions, better incident history, and faster handover when a case needs to be escalated.

The system suggests a possible match

The platform compares the current face with faces from previous confirmed incidents. When similarity is high, it suggests a match for review. No automatic action is taken. Nothing is escalated without a human checking it.

Flagged individual QE_2x.png
Flagged individual QE_2x.png

Staff reviews and decides

A staff member reviews the clip, the face image, and the incident details. They confirm or reject the suggestion. The decision is recorded as part of the audit history.

Incidents are linked clearly

When confirmed, the new incident is linked to previous related incidents. This builds a clear history across visits and locations. No manual searching through folders. Everything stays connected.

avatar.png
Past.png
BgLine2.png

See how face recognition
works in practice

QuantumEye suggests potential matches based on previous confirmed incidents. Your team reviews, confirms, and keeps full control.

See how face recognition, review workflows, and reporting connect in one structured flow.

Face recognition hero.png

Frequently asked questions

Got questions about QuantumEye face recognition module?

We’ve got answers.

  • QuantumEye compares faces captured during a confirmed security incident with faces linked to previous confirmed incidents.
     

    If similarity is high, the system suggests a possible match to your team. It does not make automatic decisions. All matches require human review before any action is taken.

  • No.

    The system does not build a general identity database of everyone who enters the store. Faces are stored only in the context of confirmed incidents and in line with configured retention policies.

  • QuantumEye is designed around data minimisation and controlled use.
     

    Face recognition is applied only for legitimate retail security purposes, with configurable retention controls, role-based access, and full audit logging. Final compliance depends on how the system is deployed and managed within your organisation.

  • The system only suggests possible matches.
     

    A staff member reviews the face image, video clip, and incident context before confirming or rejecting the suggestion. No automatic escalation occurs without human confirmation.

  • Yes, if configured.

    When the same individual is confirmed across multiple incidents, the system can link related events across stores within the same organisation, helping build a structured incident history.

  • Suggested matches can be reviewed in the QuantumEye web dashboard, through the native QuantumEye mobile app, or via secure alert notifications.
     

    For operational use, the native QuantumEye mobile app is recommended, as it provides the fastest and most structured review workflow, including side-by-side image comparison, incident context, and confirmation controls.

    The same human review requirement applies across all access points.

Privacy & Compliance

Privacy-First Face Recognition

QuantumEye’s face recognition module is designed for legitimate retail security use. It operates under strict data minimisation principles, requires human confirmation before escalation, and supports structured governance controls.
 

The platform is built to help retailers improve loss prevention while aligning with UK GDPR and enterprise security expectations.

GDPR & Data Governance

Designed around privacy by design and accountability principles.

Data Protection Controls

✅ Data minimisation by default

✅ Faces stored only after confirmed incidents 

✅ Human confirmation before escalation

✅ Configurable retention and deletion policies 

✅ Full audit trail of review decisions 

Security & Certification

Enterprise-grade security standards supporting regulated retail deployments.

Information Security Standards

✅ ISO 27001 – Information Security Management 

✅ ISO 9001 – Quality Management Systems 

✅ Role-based access control 

✅ Encrypted data storage and transmission 

✅ Secure cloud infrastructure environment 

bottom of page