Applications Access Control Physical facilities, Computer networks, Websites Transaction Authentication Telephone banking, e-Commerce Speech data Management Voice messaging, Search engines Law Enforcement Forensics, Home incarceration