Biometrics in the Workplace. The Promise and Peril of It s Use
|
|
- Poppy Francis
- 6 years ago
- Views:
Transcription
1 Biometrics in the Workplace The Promise and Peril of It s Use
2 Panelists John Alvin Henderson Administrative Judge EEOC - Baltimore Sunita Bali Perkins Coie, San Francisco, CA Anthony Zaller Zaller Law Group, El Segundo, CA
3 Overview What are Biometrics? Title VII and Biometrics Religious Accommodations Biometrics and Medical Records (ADAAA claims) Biometrics State Privacy Laws Illinois California Texas
4 Biometrics Defined Generally defined as the measurement or analysis of unique physical or behavioral characteristics (such as fingerprints and voice patterns) especially as a means of verifying personal identity.
5
6 Examples of Biometrics Fingerprint/palm biometrics: Apple Iphone Government PIV cards Palm reader Facial recognition software Apple Iphone Iris recognition software TSA precheck
7 Utility of using Biometrics in the Workplace Assures that the actual employee is present at the worksite (no timecard fraud) Site security (lessens chance of unauthorized access to work site) Concerns often prompted by: Costs of policing employees through other means Concerns about safety through unauthorized access/former employees Intellectual property theft/corporate espionage Insurance/other liability risks of not using biometrics
8 Biometrics and Title VII Title VII religious accommodation EEOC v. Consol Energy, Inc. - Case from West Virginia involving a coal miner, working for Consol Energy. The charging party, Beverly Butcher, was a general laborer for the coal company for 35 years. Company decided to use a new biometric device to make sure that the people who were at the facility were their employees, and that they were showing up to work when they said they were. The biometric device was a hand scanner workers checking in or out at the end of the day would scan his or her right hand through the scanner the shape of the hand was linked to the worker s unique personal number.
9 EEOC v. Consol Energy Mark of the Beast Butcher was an evangelical Christian and an ordained minister; he believed that the requirement that employees scan their hands in to clock in and out signified the mark of the beast, a reference to a passage from the Book of Revelations, in which the antichrist marked his followers with a sign indicating that they were allied with him. And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. (Revelations, 13:16-17) Several cases previous to this, but not litigated with the EEOC, related to bar codes containing the mark of the beast, and religious objections related to that.
10 EEOC v. Consol Energy Biometrics and Title VII Butcher complains to his supervisors that he does not want to sign in using the device. He writes a letter seeking an exemption from the biometrics policy. Supervisors review the letter, and decide that Butcher s interpretation of the bible is wrong, so they deny him the accommodation. Also, there are other employees who, due to hand injuries, cannot sign in using their hands. They are granted an exemption and can enter their employee identification number on a keypad. Butcher resigns in protest, and ultimately goes to the EEOC. EEOC files lawsuit on Butcher s behalf receives a verdict of $600,000. Consol appealed to the Fourth Circuit the court again found for the EEOC, stating that the question of whether Butcher s beliefs were valid is immaterial. They were sincerely held, and the employer had a reasonable accommodation which was readily available and which would not create an undue hardship.
11 Confidential Requirements - Biometrics and the ADAAA/GINA ADAAA requires that, with regard to any medical records maintained by the employer, that they be collected and maintained in separate forms and in separate medical files and [are] treated as a confidential medical record. 42 U.S.C. Section 12112(d)(3). Exceptions for supervisors reviewing the medical records related to work restrictions and accommodations, first aid personnel, and the government. ADA also requires that confidential medical information not be disclosed except under limited circumstances. GINA also requires that any employer or union in possession of an employee s genetic information treat the information as a confidential medical record of the employee; that the information be maintained on separate forms and in separate medical files, and that the information not be disclosed to third parties except under certain narrow circumstances. 42 U.S.C. Section 206.
12 Confidential Requirements - Biometrics and the ADAAA/GINA Biometric data can be considered confidential medical information AND genetic information, within the ambit of the ADAAA and GINA. Employers who do not segregate the data and control its dissemination may be at increased risk of litigation.
13 Biometrics and State Privacy Laws Washington, Illinois, and Texas all have statutes regulating companies use of biometric data. Illinois has received a significant amount of attention because it s statute provides for a private right of actions for violations of its biometrics law (BIPA), whereas Texas and Washington state do not. Key features of Illinois BIPA (enacted in 2008) Requires company to obtain informed consent prior to data collection Permits a limited right of disclosure Mandates for data protection and destruction Prohibits profiling based on biometrics Negligent violations 1k, intentional, 5k Private right of action
14 Illinois BIPA What does informed consent mean? Statute requires that collecting entity obtain consent before it may collect, capture, purchase, receive through trade, or otherwise obtain biometric information. Notification must be in writing Must describe the biometric information being collected or stored Must describe the length of time that the information will be collected or stored Must obtain a written authorization prior to collecting info
15 BIPA - Informed Consent in Texas and Washington Washington requires notice and consent in certain circumstances related to biometric markers requirement that the company first: Provide notice; Obtain consent; or Create a mechanism to prevent the subsequent use of a biometric identifier for a commercial purpose Statute directs that notice and consent requirement is context-dependent Texas BIPA states that notice must be given through a procedure reasonably designed to be readily available to affected individuals.
16 What is a Biometric Marker in the Context of BIPAs? In Washington: Data generated by automatic measurements of an individual s biological characteristics, such as fingerprints, voiceprints, eye, retinas, irises, or other unique biological patterns or characteristics that is used to identify a specific individual. Excludes: physical or digital photographs Video or audio recordings or data generated from those recordings Data used for health care treatment, payment, or operations under HIPPA Illinois and Texas are similar in their definitions, however they expressly include a scan of hand or face geometry
17 Illinois BIPA Definition and Exclusions Defines a biometric marker as retinas or iris scan, fingerprint, voiceprint, or scan of hand or face geometry Excludes: Writing samples Written signatures Photographs Human biological samples used for valid scientific tests or screenings Demographic data Tattoo descriptions Physical descriptions (height, weight, eye color, etc.) Information gathered from a patient in a health care setting
18 BIPAs and Disclosure of Biometric Markers All three states prohibit the disclosure or dissemination of biometric identifiers, except in certain specific instances. If the individual has consented If disclosure required under other laws If in response to court process If the transaction is necessary to complete a financial transaction which the person has authorized
19 Biometric Marker Data Destruction Illinois: Businesses must destroy biometric information when the initial purposes of collecting or obtaining such identifiers or information has been satisfied or within 3 years of the individuals' last interaction with the private entity, whichever occurs first. Washington: Biometrics should not be kept any longer than is reasonably necessary Texas: Data must be destroyed within a reasonable time, but no later than the first anniversary of the date the purpose for collecting the identifier expires.
20 Illinois BIPA and Private Litigation Employers sued for using biometric markers (fingerprints) for time clocks and for failing to properly segregate the records: Roundy s, InterContinental Hotels Group, Zayo Group Take-Two Interactive Shutterfly and L.A. Tan Facial Recognition Software Facebook, Google, Apple,
Emerging Biometric Data Risks
Emerging Biometric Data Risks January 24, 2018 Paul Karlsgodt Melinda McLellan Melissa Siebert Speakers Paul Karlsgodt Partner Denver pkarlsgodt@bakerlaw.com 303.764.4013 Melinda L. McLellan Partner New
More informationExpert Q&A on Biometrics in the Workplace: Recent Developments and Trends
Resource ID: w-012-5864 Expert Q&A on Biometrics in the Workplace: Recent Developments and Trends PRACTICAL LAW LABOR & EMPLOYMENT Search the Resource ID numbers in blue on Westlaw for more. An Expert
More informationBiometric Information Privacy Act Litigation Explosion
PRIVACY LAW INSLER Understanding the Biometric Information Privacy Act Litigation Explosion BY CHARLES N. INSLER The Biometric Information Privacy Act has made Illinois a national litigation hotbed, spawning
More informationBiometrics: New Laws and Potential Litigation Implications
COMPLIANCE & ETHICS FORUM FOR LIFE INSURERS Biometrics: New Laws and Potential Litigation Implications 2018 CEFLI Annual Conference Denver, Colorado September 10-12, 2018 Biometrics: New Laws and Potential
More informationLEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"
LEGISLATION The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT" SECTION 1. NEW LAW A new section of law to be codified in the (Appropriate Statutes of State, hereafter Statutes ), unless
More informationPRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16
PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention
More informationPRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD
More informationCase: 1:16-cv Document #: 1 Filed: 03/04/16 Page 1 of 16 PageID #:1 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS
Case: 1:16-cv-02870 Document #: 1 Filed: 03/04/16 Page 1 of 16 PageID #:1 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS JOSEPH WEISS, individually and on behalf of all others similarly situated,
More informationInternational Biometrics & Identification Association
International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com
More information2017 IL App (2d) No Opinion filed December 21, 2017 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT
No. 2-17-0317 Opinion filed December 21, 2017 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT STACY ROSENBACH, as Mother and Next ) Appeal from the Circuit Court Friend of Alexander Rosenbach and on
More informationTHE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL
PRIOR PRINTER'S NO. PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 1 Session of 01 INTRODUCED BY ELLIS, IRVIN, RABB, MILNE, PICKETT, BAKER, DAVIS, QUIGLEY, BOBACK, CHARLTON, O'NEILL,
More informationData Breach Charts. November 2017
Data Breach Charts November 2017 DATA BREACH CHARTS The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for
More informationTHE KEYLESS SOCIETY. Reading Practice
Reading Practice A THE KEYLESS SOCIETY Students who want to enter the University of Montreal's Athletic Complex need more than just a conventional ID card - their identities must be authenticated by an
More informationCase: 1:17-cv Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1
Case: 1:17-cv-06052 Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION BENITO VALLADARES, individually and
More informationSUMMARY INTRODUCTION. xiii
SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset
More information4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:
Introduction Who are you?? Biometrics CSE 190-B00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,
More informationState Data Breach Laws
State Data Breach Laws 1 Alaska Personal information means a combination of (A) an individual s name;... and (B) one or more of the following information elements: (i) the individual s social security
More informationFOIA Exemptions 6 & 7C Personal Privacy Exemptions
FOIA Exemptions 6 & 7C Personal Privacy Exemptions Chicago, Illinois September 4, 2014 FOIA Exemptions 6 & 7(C) Personal privacy interests are protected by 2 provisions of the FOIA Each exemption covers
More informationChecklist for Conforming Laws Related to Remote Online Notarization ( RON )
Checklist for Conforming Laws Related to Remote Online Notarization ( RON ) PURPOSE The purpose of this checklist is to assist state land title associations, state mortgage bankers associations, and other
More informationI. FACIAL RECOGNITION TECHNOLOGY: THE ABILITY TO PERSONALLY IDENTIFY SOMEONE FROM A PHOTOGRAPH
BIOMETRIC PRIVACY LITIGATION: IS UNIQUE PERSONALLY IDENTIFYING INFORMATION OBTAINED FROM A PHOTOGRAPH BIOMETRIC INFORMATION? By Natasha Kohne and Kamran Salour 1 I. FACIAL RECOGNITION TECHNOLOGY: THE ABILITY
More informationUsing the New York State Freedom of Information Law
Using the New York State Freedom of Information Law What part of government is covered by FOIL? What information can be obtained under FOIL? o Agency Records o Legislative Records Agency Records Access
More informationWASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT
General Administration Policy #1300 - Manual WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT Manual #1300 Adopted by the Washington County Board of Commissioners
More informationPolicy Framework for the Regional Biometric Data Exchange Solution
Policy Framework for the Regional Biometric Data Exchange Solution Part 8 : Template Privacy Notices and Consent Form REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 7 Template privacy notices and
More informationHong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data
Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications
More informationCase 3:15-cv JD Document 294 Filed 02/26/18 Page 1 of 10 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA
Case :-cv-0-jd Document Filed 0// Page of UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA NIMESH PATEL, et al., Plaintiffs, v. FACEBOOK INC., Defendant. Case No. :-cv-0-jd ORDER RE RENEWED
More information1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?
Introduction Who are you?? Biometrics CSE 190-C00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,
More informationRecommended Practice 1701 l
Recommended Practice 1701 l Background: The International Traveler Scheme aims to bring registered travelers schemes together under one overall program. The purpose of an International Traveler Scheme
More informationfor fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council
for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council The National Crime Prevention and Privacy Compact Council (Compact Council) is
More informationMEEKER COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT
MEEKER COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT Adopted by the Meeker County Board of Commissioners November 2010 Implemented: November 2010 MINNESOTA GOVERNMENT DATA
More informationPolicy Framework for the Regional Biometric Data Exchange Solution
Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9
More informationFOIA Exemptions 6 & 7C Personal Privacy Exemptions
FOIA Exemptions 6 & 7C Personal Privacy Exemptions Denver, Colorado June 17-18, 2015 Instructor Fred Sadler Consultant, FOI & Privacy Statutes Former FOI & Privacy Officer, FDA/HHS, Retired FOIA Exemptions
More informationFrequently Asked Questions for Participating Members and Organizations
Frequently Asked Questions for Participating Members and Organizations Version 3.0.0 SWAC is a trademark of Secure Worker Access Consortium, LLC. 2010 Secure Worker Access Consortium LLC Page 2 of 9 Ref:
More informationIDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.
IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we
More informationBiometrics & Accessibility
Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics
More informationCase: 1:16-cv Document #: 1-1 Filed: 03/04/16 Page 1 of 1 PageID #:17 CIVIL COVER SHEET
JS 44 (Rev. 3/13) Case: 1:16-cv-02870 Document #: 1-1 Filed: 03/04/16 Page 1 of 1 PageID #:17 CIVIL COVER SHEET The JS 44 civil cover sheet and the information contained herein neither replace nor supplement
More informationThe Privacy Act. Disclaimers. Paul Klingenberg 6/14/2017 PRIVACY ACT AND SYSTEMS OF RECORDS 1
Session 15 Federal Workers Compensation Conference 2017 June 28, 2017 Ashkea Herron McAllister United States Department of Labor Disclaimers This is NOT a comprehensive Privacy Act presentation it is specific
More informationLATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston
LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY Presented By: Cristian Morosan - University of Houston CRISTIAN MOROSAN ASSISTANT PROFESSOR CONRAD N. HILTON COLLEGE UNIVERSITY OF HOUSTON
More informationThe problems with a paper based voting
The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand
More informationCHAPTER 15 PAWN SHOPS
CHAPTER 15 PAWN SHOPS SECTION: 3-15-1 Purpose 3-15-2 Definitions 3-15-3 License Required 3-15-4 Application Required 3-15-5 License Fees 3-15-6 Bond Required 3-15-7 Persons Ineligible for License 3-15-8
More informationThis tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.
Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities
More informationFOIP Bulletin. Definitions. In this issue Introduction 1 1 Definitions. Number 14 June 2003
FOIP Bulletin Number 14 June 2003 FOIP Amendment Act, 2003 Introduction On November 28, 2001, the Legislative Assembly of Alberta appointed an all-party Select Special Committee to review the Freedom of
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication
More informationSECOND REGULAR SESSION [P E R F E C T E D] SENATE BILL NO TH GENERAL ASSEMBLY INTRODUCED BY SENATOR MUNZLINGER.
SECOND REGULAR SESSION [P E R F E C T E D] SENATE BILL NO. 656 98TH GENERAL ASSEMBLY INTRODUCED BY SENATOR MUNZLINGER. Pre-filed December 1, 2015, and ordered printed. Read 2nd time January 7, 2016, and
More informationUTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008
UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 Current Laws: A person is guilty of identity fraud when that person:
More information[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]
[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the ----------, 2011] Government of India MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department
More informationRivera et al v. Google, Inc. Doc. 60
Rivera et al v. Google, Inc. Doc. 60 UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION LINDABETH RIVERA and JOSEPH WEISS, on ) behalf of themselves and all others similarly
More informationBiometrics from a legal perspective dr. Ronald Leenes
Biometrics from a legal perspective dr. Ronald Leenes TILT - Tilburg Institute for Law, Technology, and Society outline introduction biometrics, use legal aspects privacy/data protection biometrics as
More informationI. PARTIES AUTHORITIES
Page 1 of 8 MEMORANDUM OF UNDERSTANDING BETWEEN AIRPORT OPERATOR OR AIRCRAFT OPERATOR AND TRANSPORTATION SECURITY ADMINISTRATION FOR PARTICIPATION IN THE TSA AVIATION RAP BACK PROGRAM I. PARTIES The Airport
More informationEasyChat TERMS OF USE AGREEMENT
EasyChat TERMS OF USE AGREEMENT This TERMS OF USE AGREEMENT ( Agreement ) is an agreement between you and Viasat, Inc., with its principal place of business at 6155 El Camino Real, Carlsbad, California,
More informationGENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE BILL 1403 RATIFIED BILL
GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE BILL 1403 RATIFIED BILL AN ACT TO REQUIRE THAT A DNA SAMPLE BE TAKEN FROM ANY PERSON ARRESTED FOR COMMITTING CERTAIN OFFENSES, AND TO AMEND THE STATUTES
More informationEXEMPT (Reprinted with amendments adopted on June 5, 2017) FOURTH REPRINT A.B Referred to Committee on Judiciary
EXEMPT (Reprinted with amendments adopted on June, 0) FOURTH REPRINT A.B. ASSEMBLY BILL NO. COMMITTEE ON JUDICIARY MARCH, 0 Referred to Committee on Judiciary SUMMARY Makes various changes relating to
More informationCASELLE, INC. Software as a Service Agreement
CASELLE, INC. Software as a Service Agreement Caselle, Inc. City of The Dalles 1656 S East Bay Blvd 313 Court St. Suite 100 The Dalles, OR 97058 Provo, UT 84606 TERMS OF SERVICE These Terms of Service
More informationCanadian Anti-Doping Program Privacy and Personal Information Policy. processed by the CCES in the course of administrating and implementing the CADP.
Version December 18, 2017 Canadian Anti-Doping Program Privacy and Personal Information Policy Jurisdiction and Application 1. The Canadian Centre for Ethics in Sport (CCES) is responsible for administering
More informationNEXUS. Member s Guide. BSF5095 (E) Rev.14
NEXUS Member s Guide BSF5095 (E) Rev.14 Her Majesty the Queen in Right of Canada, represented by the Minister of Public Safety and Emergency Preparedness, 2014 Catalogue No. PS38-41/2014E-PDF ISBN 978-0-660-02132-4
More informationTo schedule an Application Processing Appointment
REDMOND MUNICIPAL AIRPORT (RDM) Secured & Sterile Area ID Application THIS PAGE FOR APPLICANT TO KEEP Identification badges issued by Redmond Municipal Airport (RDM) are, and remain, property of the Airport.
More informationFrequently Asked Questions for Participating Members and Organizations
Frequently Asked Questions for Participating Members and Organizations Version 3.0.6 SWAC is a trademark of Secure Worker Access Consortium, LLC. Table of Contents ABOUT SWAC... What is SWAC?... 3 What
More informationBiometrics Technology for Human Recognition
Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system
More informationArizona 2. DRAFT Verified Voting Foundation March 12, 2007 Page 1 of 9
Escrow of Voting System Software As part of an ongoing effort to evaluate transparency in our elections, Verified Voting recently began researching which states require escrow of voting system software
More informationTERMS OF USE Last Modified: May/23/2018
TERMS OF USE Last Modified: May/23/2018 Welcome to www.angaza.com, a website of Angaza Design Inc. ( Company, we, or us ). This page explains the terms by which you may use our website (the Site ). By
More informationSTATE DATA SECURITY BREACH NOTIFICATION LAWS
STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific
More informationSTATE DATA SECURITY BREACH NOTIFICATION LAWS
STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific
More informationBILL, Explanatory. (These notes form no part of the Bill but are intended only to indicate its general purport)
THE EXCHEQUER AND AUDIT (AMENDMENT) BILL, 2011 Explanatory Note (These notes form no part of the Bill but are intended only to indicate its general purport) This Bill seeks to amend the Exchequer and Audit
More informationResearch Article. ISSN (Print)
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
More informationSecurity Video Surveillance Policy
Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety
More informationTHE LAW ON PROTECTION OF UNDISCLOSED INFORMATION
THE LAW ON PROTECTION OF UNDISCLOSED INFORMATION ( Official Gazette of Republic of Montenegro No. 16/07 and Official Gazette of Montenegro No 73/08) (consolidated text) I. GENERAL PROVISIONS Article 1
More informationHEALTH INFORMATION ACT
Province of Alberta HEALTH INFORMATION ACT Revised Statutes of Alberta 2000 Current as of June 13, 2016 Office Consolidation Published by Alberta Queen s Printer Alberta Queen s Printer Suite 700, Park
More informationDATA PROTECTION (JERSEY) LAW 2018
Data Protection (Jersey) Law 2018 Arrangement DATA PROTECTION (JERSEY) LAW 2018 Arrangement Article PART 1 7 INTRODUCTORY 7 1 Interpretation... 7 2 Personal data and data subject... 12 3 Pseudonymization...
More informationAIRPORT SECURITY IDENTIFICATION BADGE APPLICATION
AIRPORT SECURITY IDENTIFICATION BADGE APPLICATION PRINT all information in the box below before returning this form to the Airport Operations Control Center. NAME (LAST, FIRST, MIDDLE) G ALIAS(ES) SOCIAL
More informationIllinois Freedom of Information Act
The Illinois Freedom of Information Act (FOIA) is designed to ensure that the public has access to information about their government and its decision-making process. As a government body, NTRA, Inc. has
More informationTERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016
TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016 THIS IS NOT INTENDED TO BE MEDICAL SERVICES. IF YOU HAVE A MEDICAL EMERGENCY, GO TO THE EMERGENCY
More informationMUST BE PRINTED IN COLOR
MUST BE PRINTED IN COLOR LAREDO INTERNATIONAL AIRPORT ACCESS MEDIA APPLICATION INSTRUCTIONS STEP 1-- STEP 2-- STEP 3-- STEP 5-- FILL OUT THE ACCESS MEDIA APPLICATION ENTIRELY. MAKE SURE TO USE BLUE INK.
More informationHIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS
HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into by and between the Trustees of the University of Pennsylvania as owner and operator of the University
More informationOVERVIEW OF EEOC CHARGE PROCESSING
OVERVIEW OF EEOC CHARGE PROCESSING CHARGE FILING AND NOTIFICATION OF RESPONDENTS A person who believes that he or she has been discriminated against in employment because of race, color, sex, national
More information25101 PROCEDURE VIDEO IDENTIFICATION
Version 4.3 Last updated 03/10/2017 Review date 03/10/2018 Equality Impact Assessment High Owning department Custody 1. About this Procedure 1.1. This Procedure provides instruction to Hampshire Constabulary
More informationIN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION ) ) ) ) ) ) ) ) ) MEMORANDUM OPINION AND ORDER
IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION ALEJANDRO MONROY, on behalf of himself and all others similarly situated, Plaintiffs, v. SHUTTERFLY, INC., Defendant.
More informationDefendant(s). / ORDER REGARDING RULE EXAMINATION 1 Pursuant to Florida Rule of Civil Procedure ( Examination of Persons ),
IN THE CIRCUIT OF THE FIFTEENTH JUDICIAL CIRCUIT IN AND FOR PALM BEACH, COUNTY, FLORIDA CIRCUIT CIVIL DIVISION AA CASE NO.: vs. Plaintiff(s), Defendant(s). / ORDER REGARDING RULE 1.360 EXAMINATION 1 Pursuant
More informationNC General Statutes - Chapter 36F 1
Chapter 36F. Revised Uniform Fiduciary Access to Digital Assets Act. 36F-1. Short title. This Chapter may be cited as the Revised Uniform Fiduciary Access to Digital Assets Act. (2016-53, s. 1.) 36F-2.
More informationIN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF WEST VIRGINIA
IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF WEST VIRGINIA U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION, Plaintiff, v. Civil Action No. 1:13CV215 (STAMP) CONSOL ENERGY, INC. and CONSOLIDATION
More information1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements
Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How
More informationWEBSITE USER AGREEMENT
WEBSITE USER AGREEMENT The ProductWalk.com website ( Website ) is an online information website provided on behalf of The Home Depot ("THD") by Hartmann Project Team LLC ("HPT"), the Show Manager of The
More informationSCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC
1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 20036-3465 WWW.SCHWARTZANDBALLEN.COM TELEPHONE FACSIMILE (202) 776-0700 (202) 776-0720 To Our Clients and Friends Re: State Security Breach Laws M E M O R A
More informationELECTRONIC TRANSACTIONS ACT
Province of Alberta Statutes of Alberta, Current as of June 1, 2013 Office Consolidation Published by Alberta Queen s Printer Alberta Queen s Printer Suite 700, Park Plaza 10611-98 Avenue Edmonton, AB
More informationKane County Local Rule
Article 2A: Administration of the Court E-filing 2A.01 DESIGNATION OF ELECTRONIC FILING CASE TYPES (a) This Court hereby authorizes all civil cases with the exception of WI (Wills), and sealed and impounded
More informationBIOMETRICS - WHY NOW?
BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services
More informationGENERAL AVIATION ACCESS APPLICATION
GENERAL AVIATION ACCESS APPLICATION Updated November 2018 DRIVERS LICENSE COMPANY: No L NM M FOR OFFICIAL USE ONLY Accounting Form Received & Reviewed Received/ Reviewed Application Appropriate Forms of
More informationCase Study. MegaMatcher Accelerator
MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,
More informationIdentity Documents Act
Issuer: Riigikogu Type: act In force from: 01.09.2013 In force until: 30.04.2014 Translation published: 04.11.2013 Amended by the following acts Passed 15.02.1999 RT I 1999, 25, 365 Entry into force 01.01.2000
More informationAeroScout App End User License Agreement
AeroScout App End User License Agreement PLEASE READ THE FOLLOWING CAREFULLY BEFORE DOWNLOADING AND/OR USING THE APP. By clicking the "accept" or ok button, or installing and/or using the AeroScout mobile
More informationIntroduction-cont Pattern classification
How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something
More informationInterstate Commission for Adult Offender Supervision
Interstate Commission for Adult Offender Supervision Privacy Policy Interstate Compact Offender Tracking System Version 3.0 Approved 04/23/2009 Revised on 4/18/2017 1.0 Statement of Purpose The goal of
More informationTerms of Service. Last Updated: April 11, 2018
Terms of Service Last Updated: April 11, 2018 PLEASE READ THESE TERMS OF SERVICE CAREFULLY, INCLUDING THE MANDATORY ARBITRATION PROVISION IN THE SECTION TITLED "DISPUTE RESOLUTION BY BINDING ARBITRATION,"
More informationCHAPTER 337. (Senate Bill 211)
CHAPTER 337 (Senate Bill 211) AN ACT concerning Public Safety Statewide DNA Data Base System Crimes of Violence, and Burglary, and Breaking and Entering a Motor Vehicle Sample Collections on Arrest Charge
More informationWhy Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology
Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or
More informationPRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.
Page 1 of 10 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. MEGT will fulfil its obligations under the Privacy Amendment (Enhancing
More informationMassachusetts Executive Office of Public Safety and Security. Statewide Applicant Fingerprint Identification Services (SAFIS) Program
Massachusetts Executive Office of Public Safety and Security Statewide Applicant Fingerprint Identification Services (SAFIS) Program Registration Guide Massachusetts Department of Children and Families
More informationAttorneys for Plaintiff GUILLERMO ROBLES UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA-WESTERN DIVISION
Case :-cv-0-sjo-ffm Document Filed 0/0/ Page of Page ID #: 0 Joseph R. Manning, Jr., Esq. (State Bar No. ) Caitlin J. Scott, Esq. (State Bar No. 0) MANNING LAW, APC MacArthur Blvd., Suite 0 Newport Beach,
More informationTemplate Commission pursuant to Section 11 BDSG
Template Commission pursuant to Section 11 BDSG Agreement between... - (the Principal ) - and... - (the Agent ) - 1. Subject-matter and duration of the commission Subject-matter of the commission: The
More informationA Legal Overview of the Data Protection Act By: Mrs D. Madhub Data Protection Commissioner
A Legal Overview of the Data Protection Act 2017 By: Mrs D. Madhub Data Protection Commissioner 06.02.2018 Overview The Data Protection Act 2017 Aim of the Act Major changes brought in the new Act Key
More informationPublic Records Request
Public Records Request Scope: CITYWIDE Policy Contact Emilie Costan Citywide Records Manager Office of the City Clerk (916) 808-5908 ecostan@cityofsacramento.org Table of Contents Policy Definitions Public
More informationSTATE DATA SECURITY BREACH NOTIFICATION LAWS
STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific
More information