The California Consumer Privacy Act ("CCPA") was enacted in early 2018 as a political compromise to stave off a poorly drafted, and plaintiff’s friendly ballot initiative. Although the CCPA is scheduled to go into force in early 2020, there is a great deal of confusion regarding the requirements of the CCPA, including the degree to which it aligns with other privacy regulations such as the European General Data Protection Regulation (“GDPR”).
To help address that confusion, BCLP published the California Consumer Privacy Act Practical Guide, and is publishing a multi-part series that discusses the questions most frequently asked by clients concerning the CCPA.
Q. Can an application use facial recognition technology to authenticate a user under the GDPR?
One of the differences between the GDPR and the Privacy Directive that preceded it can be found in how the two frameworks define “special categories” of information. Specifically under the Privacy Directive, the term referred to
. . . personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, and the processing of data concerning health or sex life.1
The GDPR expanded the definition to include “the processing of genetic data, [and] biometric data for the purposes of uniquely identifying a natural person.”2 “Biometric data” in turn was defined to include data “resulting from specific technical processing relating to the physical, [or] physiological . . . characteristics of a natural person, which allow or confirm the unique identification of that natural person, such as facial images . . . .”3 This is consistent with the position taken by the Article 29 Working Party, a pre-GDPR advisory body formed to provide independent counsel to the European Commission on data protection matters, that the use of facial recognition technology “as a means for identification and verification” falls within the definition of “biometric data.”4
As with other “special category” data, the use of facial recognition technology is “prohibited” by default unless one of ten exceptions enumerated within the GDPR applies.5 For most consumer-oriented apps the only exception likely to apply would be the “explicit consent” to the use of the technology by the data subject.6 The net result is that in order to use facial recognition technology as an authentication mechanism to an App, the opt-in consent of the user must be obtained. It should be noted that the Article 29 Working Party has suggested that “[i]n order for the consent to be valid, an alternative, and equally secure, access control system must be in place (such as a strong password)” and that the “alternative privacy friendly option should be the default.”7
In addition to obtaining opt-in consent, the owner of the application that uses facial recognition technology will likely be considered the controller of the reference image (i.e., the image against which the user will be indirectly compared) and the reference template (i.e., the algorithm, measurements, or values against which future images will be directly compared).8 As a result, the normal obligations of a controller will likely apply such as the obligation to (1) distribute a privacy notice to the user, (2) minimize the length of time that the data will be maintained, (3) respond to access, modification, and deletion requests, (4) protect the reference image and the reference template (e.g., encrypt them)9, and (5) require processors to adhere to the contractual obligations found within Article 28. One oddity is that in the case of facial recognition technology the Article 29 Working Party took the position that if a data subject made an access request, a controller might have to provide access to “both the original images, and the template generated in the context of facial recognition.”10 As the template is not likely to be in a format that could be understood by a data subject, it’s not clear how it could, or would, be produced and to what benefit it would confer on a recipient. In addition to the “normal” obligations of a controller, because biometric data is considered a “special” category of data there is the possibility that a company may need to conduct a Data Protection Impact Assessment and/or appoint a Data Protection Officer.
In comparison to Europe, the United States does not have a federal statute that governs the use of facial recognition technology. While the Federal Trade Commission has provided a list of recommended practices, those recommendations do not exceed the requirements imposed by the GDPR. On the state level, Illinois has the most restrictive statute governing the use of facial recognition technology. The Illinois Biometric Information Privacy Act (“BIPA”) was enacted in 2008, and governs the collection and use of “biometric identifiers,” a term which excludes a photograph by itself, but includes a “scan of . . . face geometry.”11 BIPA imposes notice, consent, data retention, and data security requirements that are more restrictive, in some respects, than those imposed under the GDPR. Specifically:
- Notice. Pursuant to BIPA, a company may not “collect, capture, purchase, receive through trade, or otherwise obtain” a biometric identifier unless the company (1) informs an individual in writing that the identifier is being collected or stored, (2) explains the purpose of the collection, and (3) explains the “length of term” for which the identifier will be stored and used.12
- Consent. After providing notice a company must obtain “a written release” from the individual consenting to the capture and storage of the information.13
- Data Retention. BIPA requires companies that store biometric identifiers to make a “written policy” available to the public explaining (1) the time period in which the identifier is retained, and (2) the “guidelines” followed by the company to “permanently destroy” the identifier following the retention period.14 While the obligation to disclose a retention period can also be found within the GDPR, BIPA mandates that a company delete the data “within 3 years of the individual’s last interaction with the private entity.”15
- Data security. BIPA requires companies that store or transmit such identifiers to do so in a manner that is “the same as or more protective than the manner in which the private entity stores, transmits, and protects other confidential and sensitive information.”16
Damages. BIPA permits individuals whose biometric identifiers were captured or used in violation of the statute to bring suit and recover up to $5,000 of liquidated damages.17 In addition, a consumer may seek attorneys’ fees, costs, and injunctive relief.18