SlideShare a Scribd company logo
How to Maintain Employee Biometric
Information Privacy
And Avoid Liability With Confidence
2
Jennifer Long, J.D.
Duane Morris LLP
Michelle Lanter Smith
CMO, EPAY Systems
Webinar Hosts:
3
Agenda
• Intro to EPAY
• What is Biometric Information
• Illinois Biometric Information Privacy Act
• Employer To Do List
• Question and Answer Session
Who is EPAY Systems
CHICAGO BASED
TECH COMPANY
PROVIDER OF COMPLETELY
UNIFIED, FULL SERVICE
HCM SOLUTIONS
SERVING HOURLY
WORKFORCE ENVIRONMENTS
INDUSTRY LEADER FREE PREMIUM
CUSTOMER SUPPORT
CUSTOMER RETENTION
FOUNDED 2001
UNIQUELY FLEXIBLE CLOUD BASED TIME &
LABOR MANAGEMENT TECHNOLOGY
24 HOURS/DAY
7 DAYS/WEEK,
365 DAYS/YEAR
75,000+ WORKSITES
99%
Don’t Let Those
Fingerprints Convict HR
COMPLIANCE TIPS IN BIOMETRIC INFORMATION PRIVACY
• Biometric information is obtained from
scanning or collecting a person’s individual
characteristics.
• Any metrics related to human features
• Unique, permanent, collectible.
And why is it such a
big deal?
6
What is
Biometric
Information?
WWW.EPAYSYSTEMS.COM
WWW.EPAYSYSTEMS.COM 7
What is Biometric Information?
Biometric information includes:
• Retina/Iris Scans
• Fingerprints
• Palm prints or hand scans
• Voice Prints
• Facial Scans
WWW.EPAYSYSTEMS.COM 8
Why Are Companies Using Biometric
Information?
Can be more secure than a password:
• Biologically immutable
• Unique to the user
• Can’t forget
• Can’t change
• Hard to duplicate
WWW.EPAYSYSTEMS.COM 9
Poll: Is your company using biometric
information?
If so, what type?
• No, we aren’t using biometric info yet
• Yes, we use facial scans
• Yes, we use fingerprints
• Yes, we use retinal/iris scans
• Yes, we use palm scans
• Yes, we use another form
WWW.EPAYSYSTEMS.COM 10
How are companies using biometric
information?
Can be more secure than a password:
• Phones/Tablets
• Security Access
• Time Clocks
• Electronic Purchasing
• Banking/Finance
• IT Network Security
WWW.EPAYSYSTEMS.COM 11
Poll: How is your company using
biometric information?
Where are you using biometric information?
• Physical/building security access
• Time clocks
• IT network security
• Laptops/phones/tablets
• Electronic purchasing
• Banking/finance logins
• Other
WWW.EPAYSYSTEMS.COM 12
But as with anything else… What is the
risk?
Biometric Information Concerns:
• Hackers
• Can’t be changed
• Can be duplicated
• Legal compliance
• Liability for failure to secure
HARD TO FIX
WWW.EPAYSYSTEMS.COM 13
Biometric Information Privacy Laws
As with anything in HR, employers have multi-pronged compliance obligations:
• State biometric privacy information laws:
• Illinois (2008)
• Texas (2009)
• Washington (2017)
• State data breach notification laws
• General privacy laws (GDPR, CCPA)
• Laws specific to an employer’s industry or use of data
WWW.EPAYSYSTEMS.COM 14
Illinois Biometric Information Privacy
Act
First in the Country, Then…
• Law passed with little fanfare, effective 10/3/2008
• First in the country
o Texas followed in 2009
o Washington third in 2017
• Regulates all private entities’ (including employers)
use and collection of biometric information
• Legislature concerned with heightened risk of identity
theft with biometric information
• 740 ILCS 14/1 et. seq.
WWW.EPAYSYSTEMS.COM 15
What is a “Biometric identifier” ?
• Retina/iris scan
• Fingerprint
• Voiceprint
• Hand scan
• Face scan
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 16
Covers:
• Any info, regardless of how captured, converted, stored or
shared, that is based on biometric identifiers
o Washington – same breadth
o Texas – just biometric identifiers
• Includes info that is converted into code or templates
• Does not include: signatures, photographs, demographic data, tattoo
descriptions, physical descriptions.
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 17
What is required of employers?
WRITTEN NOTICE and CONSENT
If employer captures, collects, purchases, receives, obtains any biometric
information (any info based on biometric identifier), must do following in
advance:
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 18
WRITTEN NOTICE and CONSENT
1. Develop written, publicly available policy:
• Retention schedule
• Guidelines for permanent destruction
Purpose of use = satisfied or Max within 3 years of last transaction
2. Inform employee in writing that biometric info is being
collected/stored/used
• Specific purpose
• Length of term
3. Obtain employee’s written, executed release
• As a condition of employment
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 19
Employer obligations:
• Cannot sell, lease, trade, or otherwise profit
• Cannot disclose, redisclose or disseminate without specific consent (few
exceptions)
• Must store, transmit and protect from disclosure all biometric info using
reasonable standard of care within employer’s industry
• Must store, transmit and protect from disclosure all biometric info in as least as
protective as manner in which employer stores other confidential/sensitive info
• Washington: Helpful exception for info used by employers for “security
purposes”
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 20
EACH violation:
• Negligent violations: $1,000 liquidated damages (or actual, whichever is
greater)
• Intentional/reckless violations: $5,000 liquidated damages (or actual,
whichever is greater)
• Private right of action
• Injunctive relief
• Attorneys’ fees/costs
• Or enforcement by Attorney General
• Washington/Texas: Only civil penalties by AG’s office
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 21
Potential employer liability:
• Damages can reach $1M+++ easily in even small class actions
o Fingerprint time-keeping
o Door security
o Facial recognition software
= Multiple violations per day / per employee
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 22
Why are we still talking about a 2008 law?
• Laid dormant until recently:
o 2015: Social media cases for facial recognition on photographs
(Facebook, Shutterfly, Snapchat)
o 2016: $1.5M settlement by L.A. Tan for member fingerprint swiping (37K+
class members; $150/each)
o 2017: Employers targeted
o 2018 & beyond: Even small employers targeted
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 23
Why are we still talking about a 2008 law?
NOW:
• 200++ pending class actions
• Between 6/2017 - 10/2017, at least 30 class actions filed
• 2019: 60 state court actions + 30 federal
More laws coming?
• Laws have been introduced in AK, AZ, CT, DE, FL, MA, MI, MT, NH, NYC
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 24
Rosenbach v. Six Flags, 2019 IL 123186 (Jan. 25, 2019)
• Teen guest in 2014
• Question: Is mere technical violation of BIPA sufficient to support class
action claims?
• Answer: Yes, no allegation of actual injury required
• Supreme Court: Statute is unambiguous
• Further opens the floodgates!
Illinois Biometric Information Privacy
Act
WWW.EPAYSYSTEMS.COM 25
• EU privacy law with data protection/security rules that require data
controllers (e.g., employers) to comply with requirements for
processing personal data
• “Personal Data” includes biometric information
• Applies to US companies:
o Any EU employees, even if company not in EU
o Processing data: EU data or by EU entity
o Targeting people in EU (offering services)
• Limits / Consent / Rights
• Claims by employees
• Fines up to US $23M or 4% of global revenue, whichever is greater
General Data Protection Regulations
Data (GDPR)
WWW.EPAYSYSTEMS.COM 26
• Similar to GDPR
• CA privacy law with data protection/security rules with requirements for
processing consumer personal data
• “Personal Data” includes biometric information
o Even broader than IL (body imagery, sleep/health data, etc.)
• Applies to companies doing business in CA:
o For profit
o Includes web-based
o Minimum gross revenue defined
• Limits / Consent / Rights
• Effective 01/01/2020 (rights look back to 7/1/2019)
California Consumer Privacy Act
(CCPA)
WWW.EPAYSYSTEMS.COM 27
• In 2018, all 50 states = data breach notification laws
• Laws require notification to consumers (includes employees) when personal
data is compromised through a breach of company records
• Very state specific requirements
• “Personal data” can include biometric information
o AZ, CO, DE, IA, IL, LA, MD, NE, NM, NC, OR, SC, SD, TX, WI, WY
• Violations include state agency investigations and steep penalties
($150,000+)
State Data Breach Notification &
Other Laws
WWW.EPAYSYSTEMS.COM 28
Review and evaluate:
• Data collection practices
• Data policies
• Retention schedules
• Notices
• Authorizations
• Vendor contracts
o Only collect what is needed
o Only retain as long as needed
Employer To Do List
WWW.EPAYSYSTEMS.COM 29
• Generally, IL = most conservative obligations
• IL BIPA: Must have publicly available, written biometric
information policy and written authorization from each employee
o What is collected
o Purpose of collection
o How long retained
o Destruction
o Rights
o Ensure no sale or disclosure of biometric information
o “Reasonable industry standard of care”
Employer To Do List
WWW.EPAYSYSTEMS.COM 30
• Confirm vendor obligations and check for compliance +
indemnification
o Do not rely on vendor’s compliance
• Protocols in place (obtaining authorization, destroying data,
breach notifications, etc.)
o Coordinate all privacy / data use policies
• Make affirmative decisions on biometric information use and
collection as considering software, discussing with vendors,
etc.
Employer To Do List
31WWW.EPAYSYSTEMS.COM 31
Questions?
Review today’s slides
Take a 2-minute Tour
Request a personalized demo
Next Steps
Connect with us
on Social Media
Visit Our Website
www.EPAYsystems.com
33WWW.EPAYSYSTEMS.COM 33
Thank You!
Jennifer L. Long, J.D.
312-499-6736
jlong@duanemorris.com

More Related Content

PPTX
Data Privacy Introduction
PPT
Personal privacy and computer technologies
PDF
Privacy and Data Security
PPTX
Presentation on Information Privacy
PPT
Privacy and Data Security: Risk Management and Avoidance
PPTX
Information privacy and Security
PPTX
Information Privacy
PPT
Privacy and personal information
Data Privacy Introduction
Personal privacy and computer technologies
Privacy and Data Security
Presentation on Information Privacy
Privacy and Data Security: Risk Management and Avoidance
Information privacy and Security
Information Privacy
Privacy and personal information

What's hot (19)

PPT
Data Security and Privacy Landscape 2012 (September 2012)
PPT
“Privacy Today” Slide Presentation
PPTX
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
PPT
Legal & moral issues in e commerce
PPTX
Enforcement and Litigation Trends and Developments in Privacy and Data Security
PDF
Legal ethical issues E commerce
PPT
Legal instrumentation in e commerce
PPTX
India'a Proposed Privacy & Personal Data Protection Law
PPTX
social, legal and ethical issues of e-commerce..
PPTX
Data Protection in India
PPTX
Biometric Personal Data, Legal and Technological Utilization Issues
PPT
Consumer Privacy
PPT
Legal social ethical
PPTX
GDPR and EA Commissioning a web site part 2 - Legal Environment
PPTX
Unit 6 Privacy and Data Protection 8 hr
PDF
Legal aspects of e commerce
PDF
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
PPTX
Privacy in simple
PPTX
Legal vectors - Survey of Law, Regulation and Technology Risk
Data Security and Privacy Landscape 2012 (September 2012)
“Privacy Today” Slide Presentation
Data Protection & Security Breakfast Briefing - Master Slides_28 June_final
Legal & moral issues in e commerce
Enforcement and Litigation Trends and Developments in Privacy and Data Security
Legal ethical issues E commerce
Legal instrumentation in e commerce
India'a Proposed Privacy & Personal Data Protection Law
social, legal and ethical issues of e-commerce..
Data Protection in India
Biometric Personal Data, Legal and Technological Utilization Issues
Consumer Privacy
Legal social ethical
GDPR and EA Commissioning a web site part 2 - Legal Environment
Unit 6 Privacy and Data Protection 8 hr
Legal aspects of e commerce
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Privacy in simple
Legal vectors - Survey of Law, Regulation and Technology Risk
Ad

Similar to How to Maintain Biometric Privacy & Avoid Liability With Confidence (20)

PPTX
Privacy Implications of Biometric Data - Kevin Nevias
PDF
Biometrics research.pdf
PDF
Biometrics research.pdf
PPTX
Three trends in cybersecurity
PDF
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
PPTX
Biometrics in the Workplace
PDF
ISSA Web Conference - Biometric Information Security Management
PPT
Covered Entity Presentation Regarding Business Associates[1]
PDF
New Technologies in the Workplace: Privacy Issues
PDF
HKGCC_Luncheon_20160413
PDF
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
PPTX
How to Secure Data Privacy in 2024.pptx
PDF
How to Secure Data Privacy in 2024.pdf
PPTX
Evolving Issues in Workplace Privacy
PPTX
Time & Attendance - Biometrics in the workplace.
PDF
A Comprehensive Look at the State of Biometrics Exposures
PPTX
Web hipaa hitech and privacy
PDF
The Most Wonderful Time of the Year for Health-IT...NOT
PDF
Examples of international privacy legislation
PDF
Technology Trends: Value Office
Privacy Implications of Biometric Data - Kevin Nevias
Biometrics research.pdf
Biometrics research.pdf
Three trends in cybersecurity
Biometric Privacy In The Workplace - Attorney Todd M. Friedman
Biometrics in the Workplace
ISSA Web Conference - Biometric Information Security Management
Covered Entity Presentation Regarding Business Associates[1]
New Technologies in the Workplace: Privacy Issues
HKGCC_Luncheon_20160413
CIS 2015- Assessing the Risk of Identity and Access- Venkat Rajaji
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pdf
Evolving Issues in Workplace Privacy
Time & Attendance - Biometrics in the workplace.
A Comprehensive Look at the State of Biometrics Exposures
Web hipaa hitech and privacy
The Most Wonderful Time of the Year for Health-IT...NOT
Examples of international privacy legislation
Technology Trends: Value Office
Ad

More from EPAY Systems (20)

PPTX
Paradigm Shift - Reengineering Your Workforce for the COVID-19 Era and Beyond
PPTX
How to Implement & Leverage Workforce Analytics and Drive Labor Costs Down
PPTX
Key Legislative Updates for the Hourly Workforce
PPTX
Strategies to Combat the Labor Shortage: How to Retain Your Workers & Keep Yo...
PPTX
How to Reduce Scheduling Headaches & Increase ROI
PPTX
Time Theft Take Down: Preventing Time Theft for the Hourly Workforce
PPTX
Workforce Reporting: Utilizing Dashboards and Reports to Optimize Your Workforce
PDF
Combat Workforce Time Theft - EPAY Systems
PDF
2019 Must-Have HR Tools
PDF
How to Write an RFP
PDF
Background Checks: How to Stay Compliant with the Onslaught of Legal Changes ...
PDF
I-9 Compliance: Adapting to Trump's Increased Immigration Enforcement
PDF
Workforce Reporting: How to Show a Return on Your HR Investment
PDF
The Future Workforce: The Gig Economy and the Challenges of a Contingent Work...
PDF
5 Steps to Cut Your Turnover
PDF
2018 Department Of Labor Rules and Surprise Visits
PPTX
Do I Have to Pay for That? Navigating the Common Pitfalls of Wage and Hour Laws
PDF
How to Lower Healthcare Costs in the Face of Healthcare Reform Uncertainty
PDF
Put an End to Workforce Time Theft
PDF
10 Tips for Reducing Wokers' Compensation Costs
Paradigm Shift - Reengineering Your Workforce for the COVID-19 Era and Beyond
How to Implement & Leverage Workforce Analytics and Drive Labor Costs Down
Key Legislative Updates for the Hourly Workforce
Strategies to Combat the Labor Shortage: How to Retain Your Workers & Keep Yo...
How to Reduce Scheduling Headaches & Increase ROI
Time Theft Take Down: Preventing Time Theft for the Hourly Workforce
Workforce Reporting: Utilizing Dashboards and Reports to Optimize Your Workforce
Combat Workforce Time Theft - EPAY Systems
2019 Must-Have HR Tools
How to Write an RFP
Background Checks: How to Stay Compliant with the Onslaught of Legal Changes ...
I-9 Compliance: Adapting to Trump's Increased Immigration Enforcement
Workforce Reporting: How to Show a Return on Your HR Investment
The Future Workforce: The Gig Economy and the Challenges of a Contingent Work...
5 Steps to Cut Your Turnover
2018 Department Of Labor Rules and Surprise Visits
Do I Have to Pay for That? Navigating the Common Pitfalls of Wage and Hour Laws
How to Lower Healthcare Costs in the Face of Healthcare Reform Uncertainty
Put an End to Workforce Time Theft
10 Tips for Reducing Wokers' Compensation Costs

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
A Presentation on Artificial Intelligence
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Electronic commerce courselecture one. Pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Machine Learning_overview_presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Network Security Unit 5.pdf for BCA BBA.
Encapsulation_ Review paper, used for researhc scholars
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A Presentation on Artificial Intelligence
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MYSQL Presentation for SQL database connectivity
Electronic commerce courselecture one. Pdf
Spectral efficient network and resource selection model in 5G networks
Machine Learning_overview_presentation.pptx
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

How to Maintain Biometric Privacy & Avoid Liability With Confidence

  • 1. How to Maintain Employee Biometric Information Privacy And Avoid Liability With Confidence
  • 2. 2 Jennifer Long, J.D. Duane Morris LLP Michelle Lanter Smith CMO, EPAY Systems Webinar Hosts:
  • 3. 3 Agenda • Intro to EPAY • What is Biometric Information • Illinois Biometric Information Privacy Act • Employer To Do List • Question and Answer Session
  • 4. Who is EPAY Systems CHICAGO BASED TECH COMPANY PROVIDER OF COMPLETELY UNIFIED, FULL SERVICE HCM SOLUTIONS SERVING HOURLY WORKFORCE ENVIRONMENTS INDUSTRY LEADER FREE PREMIUM CUSTOMER SUPPORT CUSTOMER RETENTION FOUNDED 2001 UNIQUELY FLEXIBLE CLOUD BASED TIME & LABOR MANAGEMENT TECHNOLOGY 24 HOURS/DAY 7 DAYS/WEEK, 365 DAYS/YEAR 75,000+ WORKSITES 99%
  • 5. Don’t Let Those Fingerprints Convict HR COMPLIANCE TIPS IN BIOMETRIC INFORMATION PRIVACY
  • 6. • Biometric information is obtained from scanning or collecting a person’s individual characteristics. • Any metrics related to human features • Unique, permanent, collectible. And why is it such a big deal? 6 What is Biometric Information? WWW.EPAYSYSTEMS.COM
  • 7. WWW.EPAYSYSTEMS.COM 7 What is Biometric Information? Biometric information includes: • Retina/Iris Scans • Fingerprints • Palm prints or hand scans • Voice Prints • Facial Scans
  • 8. WWW.EPAYSYSTEMS.COM 8 Why Are Companies Using Biometric Information? Can be more secure than a password: • Biologically immutable • Unique to the user • Can’t forget • Can’t change • Hard to duplicate
  • 9. WWW.EPAYSYSTEMS.COM 9 Poll: Is your company using biometric information? If so, what type? • No, we aren’t using biometric info yet • Yes, we use facial scans • Yes, we use fingerprints • Yes, we use retinal/iris scans • Yes, we use palm scans • Yes, we use another form
  • 10. WWW.EPAYSYSTEMS.COM 10 How are companies using biometric information? Can be more secure than a password: • Phones/Tablets • Security Access • Time Clocks • Electronic Purchasing • Banking/Finance • IT Network Security
  • 11. WWW.EPAYSYSTEMS.COM 11 Poll: How is your company using biometric information? Where are you using biometric information? • Physical/building security access • Time clocks • IT network security • Laptops/phones/tablets • Electronic purchasing • Banking/finance logins • Other
  • 12. WWW.EPAYSYSTEMS.COM 12 But as with anything else… What is the risk? Biometric Information Concerns: • Hackers • Can’t be changed • Can be duplicated • Legal compliance • Liability for failure to secure HARD TO FIX
  • 13. WWW.EPAYSYSTEMS.COM 13 Biometric Information Privacy Laws As with anything in HR, employers have multi-pronged compliance obligations: • State biometric privacy information laws: • Illinois (2008) • Texas (2009) • Washington (2017) • State data breach notification laws • General privacy laws (GDPR, CCPA) • Laws specific to an employer’s industry or use of data
  • 14. WWW.EPAYSYSTEMS.COM 14 Illinois Biometric Information Privacy Act First in the Country, Then… • Law passed with little fanfare, effective 10/3/2008 • First in the country o Texas followed in 2009 o Washington third in 2017 • Regulates all private entities’ (including employers) use and collection of biometric information • Legislature concerned with heightened risk of identity theft with biometric information • 740 ILCS 14/1 et. seq.
  • 15. WWW.EPAYSYSTEMS.COM 15 What is a “Biometric identifier” ? • Retina/iris scan • Fingerprint • Voiceprint • Hand scan • Face scan Illinois Biometric Information Privacy Act
  • 16. WWW.EPAYSYSTEMS.COM 16 Covers: • Any info, regardless of how captured, converted, stored or shared, that is based on biometric identifiers o Washington – same breadth o Texas – just biometric identifiers • Includes info that is converted into code or templates • Does not include: signatures, photographs, demographic data, tattoo descriptions, physical descriptions. Illinois Biometric Information Privacy Act
  • 17. WWW.EPAYSYSTEMS.COM 17 What is required of employers? WRITTEN NOTICE and CONSENT If employer captures, collects, purchases, receives, obtains any biometric information (any info based on biometric identifier), must do following in advance: Illinois Biometric Information Privacy Act
  • 18. WWW.EPAYSYSTEMS.COM 18 WRITTEN NOTICE and CONSENT 1. Develop written, publicly available policy: • Retention schedule • Guidelines for permanent destruction Purpose of use = satisfied or Max within 3 years of last transaction 2. Inform employee in writing that biometric info is being collected/stored/used • Specific purpose • Length of term 3. Obtain employee’s written, executed release • As a condition of employment Illinois Biometric Information Privacy Act
  • 19. WWW.EPAYSYSTEMS.COM 19 Employer obligations: • Cannot sell, lease, trade, or otherwise profit • Cannot disclose, redisclose or disseminate without specific consent (few exceptions) • Must store, transmit and protect from disclosure all biometric info using reasonable standard of care within employer’s industry • Must store, transmit and protect from disclosure all biometric info in as least as protective as manner in which employer stores other confidential/sensitive info • Washington: Helpful exception for info used by employers for “security purposes” Illinois Biometric Information Privacy Act
  • 20. WWW.EPAYSYSTEMS.COM 20 EACH violation: • Negligent violations: $1,000 liquidated damages (or actual, whichever is greater) • Intentional/reckless violations: $5,000 liquidated damages (or actual, whichever is greater) • Private right of action • Injunctive relief • Attorneys’ fees/costs • Or enforcement by Attorney General • Washington/Texas: Only civil penalties by AG’s office Illinois Biometric Information Privacy Act
  • 21. WWW.EPAYSYSTEMS.COM 21 Potential employer liability: • Damages can reach $1M+++ easily in even small class actions o Fingerprint time-keeping o Door security o Facial recognition software = Multiple violations per day / per employee Illinois Biometric Information Privacy Act
  • 22. WWW.EPAYSYSTEMS.COM 22 Why are we still talking about a 2008 law? • Laid dormant until recently: o 2015: Social media cases for facial recognition on photographs (Facebook, Shutterfly, Snapchat) o 2016: $1.5M settlement by L.A. Tan for member fingerprint swiping (37K+ class members; $150/each) o 2017: Employers targeted o 2018 & beyond: Even small employers targeted Illinois Biometric Information Privacy Act
  • 23. WWW.EPAYSYSTEMS.COM 23 Why are we still talking about a 2008 law? NOW: • 200++ pending class actions • Between 6/2017 - 10/2017, at least 30 class actions filed • 2019: 60 state court actions + 30 federal More laws coming? • Laws have been introduced in AK, AZ, CT, DE, FL, MA, MI, MT, NH, NYC Illinois Biometric Information Privacy Act
  • 24. WWW.EPAYSYSTEMS.COM 24 Rosenbach v. Six Flags, 2019 IL 123186 (Jan. 25, 2019) • Teen guest in 2014 • Question: Is mere technical violation of BIPA sufficient to support class action claims? • Answer: Yes, no allegation of actual injury required • Supreme Court: Statute is unambiguous • Further opens the floodgates! Illinois Biometric Information Privacy Act
  • 25. WWW.EPAYSYSTEMS.COM 25 • EU privacy law with data protection/security rules that require data controllers (e.g., employers) to comply with requirements for processing personal data • “Personal Data” includes biometric information • Applies to US companies: o Any EU employees, even if company not in EU o Processing data: EU data or by EU entity o Targeting people in EU (offering services) • Limits / Consent / Rights • Claims by employees • Fines up to US $23M or 4% of global revenue, whichever is greater General Data Protection Regulations Data (GDPR)
  • 26. WWW.EPAYSYSTEMS.COM 26 • Similar to GDPR • CA privacy law with data protection/security rules with requirements for processing consumer personal data • “Personal Data” includes biometric information o Even broader than IL (body imagery, sleep/health data, etc.) • Applies to companies doing business in CA: o For profit o Includes web-based o Minimum gross revenue defined • Limits / Consent / Rights • Effective 01/01/2020 (rights look back to 7/1/2019) California Consumer Privacy Act (CCPA)
  • 27. WWW.EPAYSYSTEMS.COM 27 • In 2018, all 50 states = data breach notification laws • Laws require notification to consumers (includes employees) when personal data is compromised through a breach of company records • Very state specific requirements • “Personal data” can include biometric information o AZ, CO, DE, IA, IL, LA, MD, NE, NM, NC, OR, SC, SD, TX, WI, WY • Violations include state agency investigations and steep penalties ($150,000+) State Data Breach Notification & Other Laws
  • 28. WWW.EPAYSYSTEMS.COM 28 Review and evaluate: • Data collection practices • Data policies • Retention schedules • Notices • Authorizations • Vendor contracts o Only collect what is needed o Only retain as long as needed Employer To Do List
  • 29. WWW.EPAYSYSTEMS.COM 29 • Generally, IL = most conservative obligations • IL BIPA: Must have publicly available, written biometric information policy and written authorization from each employee o What is collected o Purpose of collection o How long retained o Destruction o Rights o Ensure no sale or disclosure of biometric information o “Reasonable industry standard of care” Employer To Do List
  • 30. WWW.EPAYSYSTEMS.COM 30 • Confirm vendor obligations and check for compliance + indemnification o Do not rely on vendor’s compliance • Protocols in place (obtaining authorization, destroying data, breach notifications, etc.) o Coordinate all privacy / data use policies • Make affirmative decisions on biometric information use and collection as considering software, discussing with vendors, etc. Employer To Do List
  • 32. Review today’s slides Take a 2-minute Tour Request a personalized demo Next Steps Connect with us on Social Media Visit Our Website www.EPAYsystems.com
  • 33. 33WWW.EPAYSYSTEMS.COM 33 Thank You! Jennifer L. Long, J.D. 312-499-6736 jlong@duanemorris.com