Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Logical SecurityAccess ManagementIdentity ManagementPhysical SecurityVideo Surveillance

Facial Recognition Technology: Minimizing Risk in the Face of Increasing Liability

By David Oberly, Jeffrey Rosenthal, Ana Tagvoryan
Arteco Facial Recognition Algorithm - Security Magazine
February 26, 2020

At the turn of the century, facial recognition technology was more science fiction than fact. Rapid advances have fueled a proliferation of this technology — which continues to expand into new areas of public and private life. At the same time, various states and municipalities are enacting new, stringent laws regulating the use of facial recognition technology by commercial entities. It is thus imperative that all companies using facial recognition technology take actionable steps to leverage it in an effective fashion that complies with current/anticipated laws.

Overview of Facial Recognition Technology

Facial recognition technology involves of using “biometrics” (i.e., individual physical characteristics) to digitally map an individual’s facial “geometry.”  These measurements are then used to create a mathematical formula known as a “facial template” or “facial signature.” This stored template or signature is then used to compare the physical structure of an individual’s face to confirm their identity or uniquely identify that individual.

Technological advancements continue to unlock new ways for companies to utilize facial template data to improve the efficiency and effectiveness of their operations. Today, it is commonplace to use your face to unlock a smartphone or “check in” at the airport. But while facial recognition technology has produced a myriad of benefits, its use also carries significant privacy risks. Unlike other forms of mutable personally-identifiable information, once compromised, facial template and other forms of biometric data lose their ability to be used as a secure identifying feature.

The Rise of Biometric Privacy Regulation (And Corresponding Risk)

To combat the risk posed by facial template data and other biometric data, several states enacted laws that regulate the collection and use of facial template data by business entities.

Illinois’ Biometric Information Privacy Act (“BIPA”) is considered the most stringent state law. Under BIPA, a private entity cannot collect or store facial template data without first providing notice, obtaining written consent and making certain disclosures.  BIPA also contains a private right of action provision that permits recovery of statutory damages between $1,000 and $5,000.

Beyond Illinois, Texas and Washington have also enacted biometric privacy laws covering facial recognition technology, which impose similar requirements related to notice, consent, and mandatory security measures.

This new wave of biometric privacy laws has created substantial liability. This risk arises primarily because of the statutory damages made available under BIPA, which the Illinois Supreme Court made much easier to recover due to a 2019 ruling that plaintiffs can pursue BIPA claims even where no actual harm or damage is sustained. As just one example of the tremendous liability posed by BIPA, in early 2020, Facebook settled a major BIPA class lawsuit for a staggering $550 million. Moving forward, companies utilizing facial template data in connection with their business operations will continue to see a flurry of BIPA class action filings.

In addition, many states without laws regulating facial recognition technology ramped up their efforts at the start of 2020 to enact similar laws of their own.

For example, at the start of the year Washington’s legislature introduced the Washington Privacy Act (“WPA”) which, among other things, imposes a stringent set of requirements and limitations on biometric data and the use of facial recognition technology. Importantly, one version of the bill proposed by the Washington House of Representatives contained a private right of action provision with statutory penalties of $50,000 for each negligent violation, and $100,000 for intentional violations. If enacted, the WPA would provide the greatest amount of statutory damage awards in any piece of U.S. data privacy legislation.

Even if the WPA fails to make it into law, it is clear the risk of potential legal liability — with corresponding sky-high damage awards—will increase exponentially in the immediate future.

Fortunately, there are several best practices companies can implement to minimize the risk of becoming embroiled in high-stakes class action litigation stemming from the use of facial template or other biometric data.

Biometric Data/Facial Recognition Privacy Policy

As a starting point, companies should ensure transparency as to how they collect, use, store, and dispose of facial template data used during business operations by implementing a detailed facial recognition-specific privacy policy.

Privacy policies should encompass the following issues: (1) notice that facial template data is being collected and/or stored; (2) the current and reasonably foreseeable purposes for which the company utilizes facial template data; (3) how facial template data will be used; (4) a description of the protective measures used to safeguard facial template data; and (5) the company’s facial template data retention and destruction policies and practices. These policies should also strictly prohibit the disclosure of any individual’s facial template data without their consent and should ban the company and its employees from selling or otherwise profiting from any such data.

This facial recognition privacy policy should be made publicly-available, which, at a minimum, should entail inclusion in the entity’s broader online privacy policy.

Written Notice

Second, to further support the principle of transparency, companies should provide conspicuous, advance notice of the use of facial recognition technology before any facial template data is captured, used, or stored. In so doing, companies should offer consumers meaningful notice regarding how facial templates are created, and how such data will be used, shared and stored by the company. Where appropriate, or required by law, contextual and just-in-time notices may be necessary.

Consent

Third, when feasible, companies should obtain express, affirmative consent from consumers before any data derived from facial recognition technology is collected, used, or stored.

The Federal Trade Commission (FTC) recommends companies obtain consumers’ affirmative consent before capturing or using facial template data, at a minimum, where a company intends to use consumers’ facial template data in a way that diverges from what was represented when the company originally collected the consumer’s data, and where a company intends to use facial recognition to identify anonymous images of a consumer to someone who could not otherwise identify that individual without assistance.

Written Release

Fourth, companies should obtain signed, written consent — in the form of a written release — from consumers authorizing the company to collect, use and store their facial template data prior to the time any such data is captured or used for any purpose.

In signing the written consent, the consumer should acknowledge he/she has read the company’s facial recognition privacy policy, as well as the more specific, written notice provided regarding the company’s capture and use of facial template data. This consent should also make clear the consumer consents to those policies and guidelines, as well as to the capture and use of their facial template data, including the company’s ability to share such data with any service providers or third-party vendors.

Data Security Measures

Finally, companies must ensure they implement effective data security safeguards to protect all data captured, used and stored through facial recognition technology from improper disclosure, access or acquisition. Companies should ensure they safeguard facial template data: (1) using the reasonable standard of care applicable to their given industry; and (2) in a manner that is the same or more protective than that in which the company stores, transmits and protects other forms of sensitive personal information. Companies should also periodically assess their facial template data security measures and complete any updates/modifications to their security programs to address and neutralize any new or evolving threats and vulnerabilities.

Conclusion

Facial recognition could potentially change almost every aspect of our daily lives. And companies using facial recognition technology must comply with an increasingly complex maze of laws, which will only become more difficult to navigate moving forward.

As such, companies that incorporate facial recognition technology into their business practices (even those operating in jurisdictions where no facial recognition or other biometric laws are on the books) should consider taking proactive measures to create/implement compliance programs that encompass the principles and practices described above. By doing so, companies can ensure they maintain legal compliance to mitigate potential risk. Including experienced counsel in this process remains an important first step that can pay significant dividends.

 

KEYWORDS: facial recognition security technology smartphone video surveillance

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Oberly david 00 headshot 4c print frame
David J. Oberly is an Associate at Blank Rome LLP and is also a member of the Firm’s Cybersecurity & Data Privacy Group, and the firm’s corporate litigation practice group.
Rosenthal jeff 2558 headshot 4c print frame
Jeffrey N. Rosenthal is a Partner at Blank Rome LLP. He concentrates his complex corporate litigation practice on consumer and privacy class action defense, and regularly publishes and presents on class action trends, attorney ethics and social media law.
Tagvoryan ana 33033 headshot 4c print frame
Ana Tagvoryan is Partner and Co-Chair of the Class Action Defense team at Blank Rome LLP and has over a decade of experience defending high-stakes, consumer class claims in and out of the courtroom across the nation.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • eye-scan1-900px.jpg

    TRUST - the Five Essential Rules of Consumer Privacy in the Age of Face Recognition

    See More
  • facialrecognition

    In the Age of Facial Recognition, The Human Element is Still Necessary

    See More
  • Face mask pandemic

    NIST launches investigation of face masks’ effect on face recognition software

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!