Biometrics in the Workplace. The Promise and Peril of It s Use

Size: px
Start display at page:

Download "Biometrics in the Workplace. The Promise and Peril of It s Use"

Transcription

1 Biometrics in the Workplace The Promise and Peril of It s Use

2 Panelists John Alvin Henderson Administrative Judge EEOC - Baltimore Sunita Bali Perkins Coie, San Francisco, CA Anthony Zaller Zaller Law Group, El Segundo, CA

3 Overview What are Biometrics? Title VII and Biometrics Religious Accommodations Biometrics and Medical Records (ADAAA claims) Biometrics State Privacy Laws Illinois California Texas

4 Biometrics Defined Generally defined as the measurement or analysis of unique physical or behavioral characteristics (such as fingerprints and voice patterns) especially as a means of verifying personal identity.

5

6 Examples of Biometrics Fingerprint/palm biometrics: Apple Iphone Government PIV cards Palm reader Facial recognition software Apple Iphone Iris recognition software TSA precheck

7 Utility of using Biometrics in the Workplace Assures that the actual employee is present at the worksite (no timecard fraud) Site security (lessens chance of unauthorized access to work site) Concerns often prompted by: Costs of policing employees through other means Concerns about safety through unauthorized access/former employees Intellectual property theft/corporate espionage Insurance/other liability risks of not using biometrics

8 Biometrics and Title VII Title VII religious accommodation EEOC v. Consol Energy, Inc. - Case from West Virginia involving a coal miner, working for Consol Energy. The charging party, Beverly Butcher, was a general laborer for the coal company for 35 years. Company decided to use a new biometric device to make sure that the people who were at the facility were their employees, and that they were showing up to work when they said they were. The biometric device was a hand scanner workers checking in or out at the end of the day would scan his or her right hand through the scanner the shape of the hand was linked to the worker s unique personal number.

9 EEOC v. Consol Energy Mark of the Beast Butcher was an evangelical Christian and an ordained minister; he believed that the requirement that employees scan their hands in to clock in and out signified the mark of the beast, a reference to a passage from the Book of Revelations, in which the antichrist marked his followers with a sign indicating that they were allied with him. And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. (Revelations, 13:16-17) Several cases previous to this, but not litigated with the EEOC, related to bar codes containing the mark of the beast, and religious objections related to that.

10 EEOC v. Consol Energy Biometrics and Title VII Butcher complains to his supervisors that he does not want to sign in using the device. He writes a letter seeking an exemption from the biometrics policy. Supervisors review the letter, and decide that Butcher s interpretation of the bible is wrong, so they deny him the accommodation. Also, there are other employees who, due to hand injuries, cannot sign in using their hands. They are granted an exemption and can enter their employee identification number on a keypad. Butcher resigns in protest, and ultimately goes to the EEOC. EEOC files lawsuit on Butcher s behalf receives a verdict of $600,000. Consol appealed to the Fourth Circuit the court again found for the EEOC, stating that the question of whether Butcher s beliefs were valid is immaterial. They were sincerely held, and the employer had a reasonable accommodation which was readily available and which would not create an undue hardship.

11 Confidential Requirements - Biometrics and the ADAAA/GINA ADAAA requires that, with regard to any medical records maintained by the employer, that they be collected and maintained in separate forms and in separate medical files and [are] treated as a confidential medical record. 42 U.S.C. Section 12112(d)(3). Exceptions for supervisors reviewing the medical records related to work restrictions and accommodations, first aid personnel, and the government. ADA also requires that confidential medical information not be disclosed except under limited circumstances. GINA also requires that any employer or union in possession of an employee s genetic information treat the information as a confidential medical record of the employee; that the information be maintained on separate forms and in separate medical files, and that the information not be disclosed to third parties except under certain narrow circumstances. 42 U.S.C. Section 206.

12 Confidential Requirements - Biometrics and the ADAAA/GINA Biometric data can be considered confidential medical information AND genetic information, within the ambit of the ADAAA and GINA. Employers who do not segregate the data and control its dissemination may be at increased risk of litigation.

13 Biometrics and State Privacy Laws Washington, Illinois, and Texas all have statutes regulating companies use of biometric data. Illinois has received a significant amount of attention because it s statute provides for a private right of actions for violations of its biometrics law (BIPA), whereas Texas and Washington state do not. Key features of Illinois BIPA (enacted in 2008) Requires company to obtain informed consent prior to data collection Permits a limited right of disclosure Mandates for data protection and destruction Prohibits profiling based on biometrics Negligent violations 1k, intentional, 5k Private right of action

14 Illinois BIPA What does informed consent mean? Statute requires that collecting entity obtain consent before it may collect, capture, purchase, receive through trade, or otherwise obtain biometric information. Notification must be in writing Must describe the biometric information being collected or stored Must describe the length of time that the information will be collected or stored Must obtain a written authorization prior to collecting info

15 BIPA - Informed Consent in Texas and Washington Washington requires notice and consent in certain circumstances related to biometric markers requirement that the company first: Provide notice; Obtain consent; or Create a mechanism to prevent the subsequent use of a biometric identifier for a commercial purpose Statute directs that notice and consent requirement is context-dependent Texas BIPA states that notice must be given through a procedure reasonably designed to be readily available to affected individuals.

16 What is a Biometric Marker in the Context of BIPAs? In Washington: Data generated by automatic measurements of an individual s biological characteristics, such as fingerprints, voiceprints, eye, retinas, irises, or other unique biological patterns or characteristics that is used to identify a specific individual. Excludes: physical or digital photographs Video or audio recordings or data generated from those recordings Data used for health care treatment, payment, or operations under HIPPA Illinois and Texas are similar in their definitions, however they expressly include a scan of hand or face geometry

17 Illinois BIPA Definition and Exclusions Defines a biometric marker as retinas or iris scan, fingerprint, voiceprint, or scan of hand or face geometry Excludes: Writing samples Written signatures Photographs Human biological samples used for valid scientific tests or screenings Demographic data Tattoo descriptions Physical descriptions (height, weight, eye color, etc.) Information gathered from a patient in a health care setting

18 BIPAs and Disclosure of Biometric Markers All three states prohibit the disclosure or dissemination of biometric identifiers, except in certain specific instances. If the individual has consented If disclosure required under other laws If in response to court process If the transaction is necessary to complete a financial transaction which the person has authorized

19 Biometric Marker Data Destruction Illinois: Businesses must destroy biometric information when the initial purposes of collecting or obtaining such identifiers or information has been satisfied or within 3 years of the individuals' last interaction with the private entity, whichever occurs first. Washington: Biometrics should not be kept any longer than is reasonably necessary Texas: Data must be destroyed within a reasonable time, but no later than the first anniversary of the date the purpose for collecting the identifier expires.

20 Illinois BIPA and Private Litigation Employers sued for using biometric markers (fingerprints) for time clocks and for failing to properly segregate the records: Roundy s, InterContinental Hotels Group, Zayo Group Take-Two Interactive Shutterfly and L.A. Tan Facial Recognition Software Facebook, Google, Apple,

Emerging Biometric Data Risks

Emerging Biometric Data Risks Emerging Biometric Data Risks January 24, 2018 Paul Karlsgodt Melinda McLellan Melissa Siebert Speakers Paul Karlsgodt Partner Denver pkarlsgodt@bakerlaw.com 303.764.4013 Melinda L. McLellan Partner New

More information

Expert Q&A on Biometrics in the Workplace: Recent Developments and Trends

Expert Q&A on Biometrics in the Workplace: Recent Developments and Trends Resource ID: w-012-5864 Expert Q&A on Biometrics in the Workplace: Recent Developments and Trends PRACTICAL LAW LABOR & EMPLOYMENT Search the Resource ID numbers in blue on Westlaw for more. An Expert

More information

Biometric Information Privacy Act Litigation Explosion

Biometric Information Privacy Act Litigation Explosion PRIVACY LAW INSLER Understanding the Biometric Information Privacy Act Litigation Explosion BY CHARLES N. INSLER The Biometric Information Privacy Act has made Illinois a national litigation hotbed, spawning

More information

Biometrics: New Laws and Potential Litigation Implications

Biometrics: New Laws and Potential Litigation Implications COMPLIANCE & ETHICS FORUM FOR LIFE INSURERS Biometrics: New Laws and Potential Litigation Implications 2018 CEFLI Annual Conference Denver, Colorado September 10-12, 2018 Biometrics: New Laws and Potential

More information

LEGISLATION. The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT"

LEGISLATION. The BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT LEGISLATION The "BIOMETRIC AND SOCIAL SECURITY NUMBER RELIGIOUS EXEMPTION ACT" SECTION 1. NEW LAW A new section of law to be codified in the (Appropriate Statutes of State, hereafter Statutes ), unless

More information

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16

PRIVACY IMPLICATIONS OF BIOMETRIC DATA. Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G /20/16 PRIVACY IMPLICATIONS OF BIOMETRIC DATA Kevin Nevias CISSP, CEH, CHFI, CISA, CISM, CRISC, CGEIT, CCNA, G2700 09/20/16 What are the benefits of using Biometric Authentication? ATM Example: Fraud Prevention

More information

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit.

PRESENTATION TITLE. Lorem ipsum dolor sit amet, consectetur adipiscing elit. PRESENTATION TITLE Lorem ipsum dolor sit amet, consectetur adipiscing elit. WHAT S THE PLAN? What are Biometrics? Biometrics in Airports Laws & Regulations Privacy & Accuracy Technical Bias 2 3 OUR GOOD

More information

Case: 1:16-cv Document #: 1 Filed: 03/04/16 Page 1 of 16 PageID #:1 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS

Case: 1:16-cv Document #: 1 Filed: 03/04/16 Page 1 of 16 PageID #:1 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS Case: 1:16-cv-02870 Document #: 1 Filed: 03/04/16 Page 1 of 16 PageID #:1 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS JOSEPH WEISS, individually and on behalf of all others similarly situated,

More information

International Biometrics & Identification Association

International Biometrics & Identification Association International Biometrics & Identification Association 1 Biometrics and Policy Presented by Walter Hamilton, Chairman & President The International Biometrics & Identification Association whamilton@idtp.com

More information

2017 IL App (2d) No Opinion filed December 21, 2017 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT

2017 IL App (2d) No Opinion filed December 21, 2017 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT No. 2-17-0317 Opinion filed December 21, 2017 IN THE APPELLATE COURT OF ILLINOIS SECOND DISTRICT STACY ROSENBACH, as Mother and Next ) Appeal from the Circuit Court Friend of Alexander Rosenbach and on

More information

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL

THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL PRIOR PRINTER'S NO. PRINTER'S NO. THE GENERAL ASSEMBLY OF PENNSYLVANIA HOUSE BILL No. 1 Session of 01 INTRODUCED BY ELLIS, IRVIN, RABB, MILNE, PICKETT, BAKER, DAVIS, QUIGLEY, BOBACK, CHARLTON, O'NEILL,

More information

Data Breach Charts. November 2017

Data Breach Charts. November 2017 Data Breach Charts November 2017 DATA BREACH CHARTS The following standard definitions of Personal Information and Breach of Security (based on the definition commonly used by most states) are used for

More information

THE KEYLESS SOCIETY. Reading Practice

THE KEYLESS SOCIETY. Reading Practice Reading Practice A THE KEYLESS SOCIETY Students who want to enter the University of Montreal's Athletic Complex need more than just a conventional ID card - their identities must be authenticated by an

More information

Case: 1:17-cv Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1

Case: 1:17-cv Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1 Case: 1:17-cv-06052 Document #: 1 Filed: 08/18/17 Page 1 of 13 PageID #:1 IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS, EASTERN DIVISION BENITO VALLADARES, individually and

More information

SUMMARY INTRODUCTION. xiii

SUMMARY INTRODUCTION. xiii SUMMARY INTRODUCTION The U.S. Army has a growing need to control access to its systems in times of both war and peace. In wartime, the Army s dependence on information as a tactical and strategic asset

More information

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means:

4/2/14. Who are you?? Introduction. Person Identification. How are people identified? People are identified by three basic means: Introduction Who are you?? Biometrics CSE 190-B00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

State Data Breach Laws

State Data Breach Laws State Data Breach Laws 1 Alaska Personal information means a combination of (A) an individual s name;... and (B) one or more of the following information elements: (i) the individual s social security

More information

FOIA Exemptions 6 & 7C Personal Privacy Exemptions

FOIA Exemptions 6 & 7C Personal Privacy Exemptions FOIA Exemptions 6 & 7C Personal Privacy Exemptions Chicago, Illinois September 4, 2014 FOIA Exemptions 6 & 7(C) Personal privacy interests are protected by 2 provisions of the FOIA Each exemption covers

More information

Checklist for Conforming Laws Related to Remote Online Notarization ( RON )

Checklist for Conforming Laws Related to Remote Online Notarization ( RON ) Checklist for Conforming Laws Related to Remote Online Notarization ( RON ) PURPOSE The purpose of this checklist is to assist state land title associations, state mortgage bankers associations, and other

More information

I. FACIAL RECOGNITION TECHNOLOGY: THE ABILITY TO PERSONALLY IDENTIFY SOMEONE FROM A PHOTOGRAPH

I. FACIAL RECOGNITION TECHNOLOGY: THE ABILITY TO PERSONALLY IDENTIFY SOMEONE FROM A PHOTOGRAPH BIOMETRIC PRIVACY LITIGATION: IS UNIQUE PERSONALLY IDENTIFYING INFORMATION OBTAINED FROM A PHOTOGRAPH BIOMETRIC INFORMATION? By Natasha Kohne and Kamran Salour 1 I. FACIAL RECOGNITION TECHNOLOGY: THE ABILITY

More information

Using the New York State Freedom of Information Law

Using the New York State Freedom of Information Law Using the New York State Freedom of Information Law What part of government is covered by FOIL? What information can be obtained under FOIL? o Agency Records o Legislative Records Agency Records Access

More information

WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT

WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT General Administration Policy #1300 - Manual WASHINGTON COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT Manual #1300 Adopted by the Washington County Board of Commissioners

More information

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution Policy Framework for the Regional Biometric Data Exchange Solution Part 8 : Template Privacy Notices and Consent Form REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 7 Template privacy notices and

More information

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data

Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Hong Kong General Chamber of Commerce Roundtable Luncheon 13 April 2016 Collection and Use of Biometric Data Stephen Kai-yi Wong Privacy Commissioner for Personal Data, Hong Kong Biometric Applications

More information

Case 3:15-cv JD Document 294 Filed 02/26/18 Page 1 of 10 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA

Case 3:15-cv JD Document 294 Filed 02/26/18 Page 1 of 10 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA Case :-cv-0-jd Document Filed 0// Page of UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA NIMESH PATEL, et al., Plaintiffs, v. FACEBOOK INC., Defendant. Case No. :-cv-0-jd ORDER RE RENEWED

More information

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified?

1/10/12. Introduction. Who are you?? Person Identification. Identification Problems. How are people identified? Introduction Who are you?? Biometrics CSE 190-C00 Lecture 1 How are people identified? People are identified by three basic means: Something they have (identity document or token) Something they know (password,

More information

Recommended Practice 1701 l

Recommended Practice 1701 l Recommended Practice 1701 l Background: The International Traveler Scheme aims to bring registered travelers schemes together under one overall program. The purpose of an International Traveler Scheme

More information

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council The National Crime Prevention and Privacy Compact Council (Compact Council) is

More information

MEEKER COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT

MEEKER COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT MEEKER COUNTY GUIDELINES AND PROCEDURES FOR MINNESOTA GOVERNMENT DATA PRACTICES ACT Adopted by the Meeker County Board of Commissioners November 2010 Implemented: November 2010 MINNESOTA GOVERNMENT DATA

More information

Policy Framework for the Regional Biometric Data Exchange Solution

Policy Framework for the Regional Biometric Data Exchange Solution Policy Framework for the Regional Biometric Data Exchange Solution Part 10 : Privacy Impact Assessment: Regional Biometric Data Exchange Solution REGIONAL SUPPORT OFFICE THE BALI PROCESS 1 Attachment 9

More information

FOIA Exemptions 6 & 7C Personal Privacy Exemptions

FOIA Exemptions 6 & 7C Personal Privacy Exemptions FOIA Exemptions 6 & 7C Personal Privacy Exemptions Denver, Colorado June 17-18, 2015 Instructor Fred Sadler Consultant, FOI & Privacy Statutes Former FOI & Privacy Officer, FDA/HHS, Retired FOIA Exemptions

More information

Frequently Asked Questions for Participating Members and Organizations

Frequently Asked Questions for Participating Members and Organizations Frequently Asked Questions for Participating Members and Organizations Version 3.0.0 SWAC is a trademark of Secure Worker Access Consortium, LLC. 2010 Secure Worker Access Consortium LLC Page 2 of 9 Ref:

More information

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A. IDEMIA Identity & Security N.A. Providing identity assurance to secure & simplify lives IDEMIA IDENTITY & SECURITY N.A. 3 Only you can assert your identity Identity is unique it s who we are, where we

More information

Biometrics & Accessibility

Biometrics & Accessibility Biometrics & Accessibility Rawlson O'Neil King Lead Researcher, Biometrics Research Group, Inc. Contributing Editor, BiometricUpdate.com rawlson@biometricupdate.com Biometrics Research Group, Inc. Biometrics

More information

Case: 1:16-cv Document #: 1-1 Filed: 03/04/16 Page 1 of 1 PageID #:17 CIVIL COVER SHEET

Case: 1:16-cv Document #: 1-1 Filed: 03/04/16 Page 1 of 1 PageID #:17 CIVIL COVER SHEET JS 44 (Rev. 3/13) Case: 1:16-cv-02870 Document #: 1-1 Filed: 03/04/16 Page 1 of 1 PageID #:17 CIVIL COVER SHEET The JS 44 civil cover sheet and the information contained herein neither replace nor supplement

More information

The Privacy Act. Disclaimers. Paul Klingenberg 6/14/2017 PRIVACY ACT AND SYSTEMS OF RECORDS 1

The Privacy Act. Disclaimers. Paul Klingenberg 6/14/2017 PRIVACY ACT AND SYSTEMS OF RECORDS 1 Session 15 Federal Workers Compensation Conference 2017 June 28, 2017 Ashkea Herron McAllister United States Department of Labor Disclaimers This is NOT a comprehensive Privacy Act presentation it is specific

More information

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY Presented By: Cristian Morosan - University of Houston CRISTIAN MOROSAN ASSISTANT PROFESSOR CONRAD N. HILTON COLLEGE UNIVERSITY OF HOUSTON

More information

The problems with a paper based voting

The problems with a paper based voting The problems with a paper based voting system A White Paper by Thomas Bronack Problem Overview In today s society where electronic technology is growing at an ever increasing rate, it is hard to understand

More information

CHAPTER 15 PAWN SHOPS

CHAPTER 15 PAWN SHOPS CHAPTER 15 PAWN SHOPS SECTION: 3-15-1 Purpose 3-15-2 Definitions 3-15-3 License Required 3-15-4 Application Required 3-15-5 License Fees 3-15-6 Bond Required 3-15-7 Persons Ineligible for License 3-15-8

More information

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems. Aboutthe Tutorial This tutorial provides introductory knowledge on Biometrics. From this tutorial, you would get sufficient information about the basics of biometrics and different biometric modalities

More information

FOIP Bulletin. Definitions. In this issue Introduction 1 1 Definitions. Number 14 June 2003

FOIP Bulletin. Definitions. In this issue Introduction 1 1 Definitions. Number 14 June 2003 FOIP Bulletin Number 14 June 2003 FOIP Amendment Act, 2003 Introduction On November 28, 2001, the Legislative Assembly of Alberta appointed an all-party Select Special Committee to review the Freedom of

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Instructor: Michael Fischer Lecture by Ewa Syta Lecture 23 April 11, 2012 CPSC 467b, Lecture 23 1/39 Biometrics Security and Privacy of Biometric Authentication

More information

SECOND REGULAR SESSION [P E R F E C T E D] SENATE BILL NO TH GENERAL ASSEMBLY INTRODUCED BY SENATOR MUNZLINGER.

SECOND REGULAR SESSION [P E R F E C T E D] SENATE BILL NO TH GENERAL ASSEMBLY INTRODUCED BY SENATOR MUNZLINGER. SECOND REGULAR SESSION [P E R F E C T E D] SENATE BILL NO. 656 98TH GENERAL ASSEMBLY INTRODUCED BY SENATOR MUNZLINGER. Pre-filed December 1, 2015, and ordered printed. Read 2nd time January 7, 2016, and

More information

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008

UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 UTAH IDENTITY THEFT RANKING BY STATE: Rank 31, 57.8 Complaints Per 100,000 Population, 1529 Complaints (2007) Updated December 30, 2008 Current Laws: A person is guilty of identity fraud when that person:

More information

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011]

[To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the , 2011] [To be published in THE GAZETTE OF INDIA, EXTRAORDINARY, Part II, Section 3, Sub-section (i) of dated the ----------, 2011] Government of India MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department

More information

Rivera et al v. Google, Inc. Doc. 60

Rivera et al v. Google, Inc. Doc. 60 Rivera et al v. Google, Inc. Doc. 60 UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION LINDABETH RIVERA and JOSEPH WEISS, on ) behalf of themselves and all others similarly

More information

Biometrics from a legal perspective dr. Ronald Leenes

Biometrics from a legal perspective dr. Ronald Leenes Biometrics from a legal perspective dr. Ronald Leenes TILT - Tilburg Institute for Law, Technology, and Society outline introduction biometrics, use legal aspects privacy/data protection biometrics as

More information

I. PARTIES AUTHORITIES

I. PARTIES AUTHORITIES Page 1 of 8 MEMORANDUM OF UNDERSTANDING BETWEEN AIRPORT OPERATOR OR AIRCRAFT OPERATOR AND TRANSPORTATION SECURITY ADMINISTRATION FOR PARTICIPATION IN THE TSA AVIATION RAP BACK PROGRAM I. PARTIES The Airport

More information

EasyChat TERMS OF USE AGREEMENT

EasyChat TERMS OF USE AGREEMENT EasyChat TERMS OF USE AGREEMENT This TERMS OF USE AGREEMENT ( Agreement ) is an agreement between you and Viasat, Inc., with its principal place of business at 6155 El Camino Real, Carlsbad, California,

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE BILL 1403 RATIFIED BILL

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE BILL 1403 RATIFIED BILL GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2009 HOUSE BILL 1403 RATIFIED BILL AN ACT TO REQUIRE THAT A DNA SAMPLE BE TAKEN FROM ANY PERSON ARRESTED FOR COMMITTING CERTAIN OFFENSES, AND TO AMEND THE STATUTES

More information

EXEMPT (Reprinted with amendments adopted on June 5, 2017) FOURTH REPRINT A.B Referred to Committee on Judiciary

EXEMPT (Reprinted with amendments adopted on June 5, 2017) FOURTH REPRINT A.B Referred to Committee on Judiciary EXEMPT (Reprinted with amendments adopted on June, 0) FOURTH REPRINT A.B. ASSEMBLY BILL NO. COMMITTEE ON JUDICIARY MARCH, 0 Referred to Committee on Judiciary SUMMARY Makes various changes relating to

More information

CASELLE, INC. Software as a Service Agreement

CASELLE, INC. Software as a Service Agreement CASELLE, INC. Software as a Service Agreement Caselle, Inc. City of The Dalles 1656 S East Bay Blvd 313 Court St. Suite 100 The Dalles, OR 97058 Provo, UT 84606 TERMS OF SERVICE These Terms of Service

More information

Canadian Anti-Doping Program Privacy and Personal Information Policy. processed by the CCES in the course of administrating and implementing the CADP.

Canadian Anti-Doping Program Privacy and Personal Information Policy. processed by the CCES in the course of administrating and implementing the CADP. Version December 18, 2017 Canadian Anti-Doping Program Privacy and Personal Information Policy Jurisdiction and Application 1. The Canadian Centre for Ethics in Sport (CCES) is responsible for administering

More information

NEXUS. Member s Guide. BSF5095 (E) Rev.14

NEXUS. Member s Guide. BSF5095 (E) Rev.14 NEXUS Member s Guide BSF5095 (E) Rev.14 Her Majesty the Queen in Right of Canada, represented by the Minister of Public Safety and Emergency Preparedness, 2014 Catalogue No. PS38-41/2014E-PDF ISBN 978-0-660-02132-4

More information

To schedule an Application Processing Appointment

To schedule an Application Processing Appointment REDMOND MUNICIPAL AIRPORT (RDM) Secured & Sterile Area ID Application THIS PAGE FOR APPLICANT TO KEEP Identification badges issued by Redmond Municipal Airport (RDM) are, and remain, property of the Airport.

More information

Frequently Asked Questions for Participating Members and Organizations

Frequently Asked Questions for Participating Members and Organizations Frequently Asked Questions for Participating Members and Organizations Version 3.0.6 SWAC is a trademark of Secure Worker Access Consortium, LLC. Table of Contents ABOUT SWAC... What is SWAC?... 3 What

More information

Biometrics Technology for Human Recognition

Biometrics Technology for Human Recognition Biometrics Technology for Human Recognition Anil K. Jain Michigan State University http://biometrics.cse.msu.edu October 15, 2012 Foreigners Arriving at Incheon G20 Seoul Summit 2010 Face recognition system

More information

Arizona 2. DRAFT Verified Voting Foundation March 12, 2007 Page 1 of 9

Arizona 2. DRAFT Verified Voting Foundation March 12, 2007 Page 1 of 9 Escrow of Voting System Software As part of an ongoing effort to evaluate transparency in our elections, Verified Voting recently began researching which states require escrow of voting system software

More information

TERMS OF USE Last Modified: May/23/2018

TERMS OF USE Last Modified: May/23/2018 TERMS OF USE Last Modified: May/23/2018 Welcome to www.angaza.com, a website of Angaza Design Inc. ( Company, we, or us ). This page explains the terms by which you may use our website (the Site ). By

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information

BILL, Explanatory. (These notes form no part of the Bill but are intended only to indicate its general purport)

BILL, Explanatory. (These notes form no part of the Bill but are intended only to indicate its general purport) THE EXCHEQUER AND AUDIT (AMENDMENT) BILL, 2011 Explanatory Note (These notes form no part of the Bill but are intended only to indicate its general purport) This Bill seeks to amend the Exchequer and Audit

More information

Research Article. ISSN (Print)

Research Article. ISSN (Print) Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(1A):37-41 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)

More information

Security Video Surveillance Policy

Security Video Surveillance Policy Security Video Surveillance Policy Policy Statement The Municipality of Central Elgin (the Municipality) recognizes the need to balance an individual s right to privacy and the need to ensure the safety

More information

THE LAW ON PROTECTION OF UNDISCLOSED INFORMATION

THE LAW ON PROTECTION OF UNDISCLOSED INFORMATION THE LAW ON PROTECTION OF UNDISCLOSED INFORMATION ( Official Gazette of Republic of Montenegro No. 16/07 and Official Gazette of Montenegro No 73/08) (consolidated text) I. GENERAL PROVISIONS Article 1

More information

HEALTH INFORMATION ACT

HEALTH INFORMATION ACT Province of Alberta HEALTH INFORMATION ACT Revised Statutes of Alberta 2000 Current as of June 13, 2016 Office Consolidation Published by Alberta Queen s Printer Alberta Queen s Printer Suite 700, Park

More information

DATA PROTECTION (JERSEY) LAW 2018

DATA PROTECTION (JERSEY) LAW 2018 Data Protection (Jersey) Law 2018 Arrangement DATA PROTECTION (JERSEY) LAW 2018 Arrangement Article PART 1 7 INTRODUCTORY 7 1 Interpretation... 7 2 Personal data and data subject... 12 3 Pseudonymization...

More information

AIRPORT SECURITY IDENTIFICATION BADGE APPLICATION

AIRPORT SECURITY IDENTIFICATION BADGE APPLICATION AIRPORT SECURITY IDENTIFICATION BADGE APPLICATION PRINT all information in the box below before returning this form to the Airport Operations Control Center. NAME (LAST, FIRST, MIDDLE) G ALIAS(ES) SOCIAL

More information

Illinois Freedom of Information Act

Illinois Freedom of Information Act The Illinois Freedom of Information Act (FOIA) is designed to ensure that the public has access to information about their government and its decision-making process. As a government body, NTRA, Inc. has

More information

TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016

TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016 TERMS OF SERVICE FOR SUPPORT NETWORK COMMUNITY HEART AND STROKE REGISTRY SITE Last Updated: December 2016 THIS IS NOT INTENDED TO BE MEDICAL SERVICES. IF YOU HAVE A MEDICAL EMERGENCY, GO TO THE EMERGENCY

More information

MUST BE PRINTED IN COLOR

MUST BE PRINTED IN COLOR MUST BE PRINTED IN COLOR LAREDO INTERNATIONAL AIRPORT ACCESS MEDIA APPLICATION INSTRUCTIONS STEP 1-- STEP 2-- STEP 3-- STEP 5-- FILL OUT THE ACCESS MEDIA APPLICATION ENTIRELY. MAKE SURE TO USE BLUE INK.

More information

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS

HIPAA BUSINESS ASSOCIATE AGREEMENT. ( BUSINESS ASSOCIATE ) and is effective as of ( Effective Date ). RECITALS HIPAA BUSINESS ASSOCIATE AGREEMENT This HIPAA Business Associate Agreement ( Agreement ) is entered into by and between the Trustees of the University of Pennsylvania as owner and operator of the University

More information

OVERVIEW OF EEOC CHARGE PROCESSING

OVERVIEW OF EEOC CHARGE PROCESSING OVERVIEW OF EEOC CHARGE PROCESSING CHARGE FILING AND NOTIFICATION OF RESPONDENTS A person who believes that he or she has been discriminated against in employment because of race, color, sex, national

More information

25101 PROCEDURE VIDEO IDENTIFICATION

25101 PROCEDURE VIDEO IDENTIFICATION Version 4.3 Last updated 03/10/2017 Review date 03/10/2018 Equality Impact Assessment High Owning department Custody 1. About this Procedure 1.1. This Procedure provides instruction to Hampshire Constabulary

More information

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION ) ) ) ) ) ) ) ) ) MEMORANDUM OPINION AND ORDER

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION ) ) ) ) ) ) ) ) ) MEMORANDUM OPINION AND ORDER IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION ALEJANDRO MONROY, on behalf of himself and all others similarly situated, Plaintiffs, v. SHUTTERFLY, INC., Defendant.

More information

Defendant(s). / ORDER REGARDING RULE EXAMINATION 1 Pursuant to Florida Rule of Civil Procedure ( Examination of Persons ),

Defendant(s). / ORDER REGARDING RULE EXAMINATION 1 Pursuant to Florida Rule of Civil Procedure ( Examination of Persons ), IN THE CIRCUIT OF THE FIFTEENTH JUDICIAL CIRCUIT IN AND FOR PALM BEACH, COUNTY, FLORIDA CIRCUIT CIVIL DIVISION AA CASE NO.: vs. Plaintiff(s), Defendant(s). / ORDER REGARDING RULE 1.360 EXAMINATION 1 Pursuant

More information

NC General Statutes - Chapter 36F 1

NC General Statutes - Chapter 36F 1 Chapter 36F. Revised Uniform Fiduciary Access to Digital Assets Act. 36F-1. Short title. This Chapter may be cited as the Revised Uniform Fiduciary Access to Digital Assets Act. (2016-53, s. 1.) 36F-2.

More information

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF WEST VIRGINIA

IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF WEST VIRGINIA IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF WEST VIRGINIA U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION, Plaintiff, v. Civil Action No. 1:13CV215 (STAMP) CONSOL ENERGY, INC. and CONSOLIDATION

More information

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements

1/12/12. Introduction-cont Pattern classification. Behavioral vs Physical Traits. Announcements Announcements Introduction-cont Pattern classification Biometrics CSE 190 Lecture 2 Sign up for the course. Web page is up: http://www.cs.ucsd.edu/classes/wi12/ cse190-c/ HW0 posted. Intro to Matlab How

More information

WEBSITE USER AGREEMENT

WEBSITE USER AGREEMENT WEBSITE USER AGREEMENT The ProductWalk.com website ( Website ) is an online information website provided on behalf of The Home Depot ("THD") by Hartmann Project Team LLC ("HPT"), the Show Manager of The

More information

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC

SCHWARTZ & BALLEN LLP 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 1990 M STREET, N.W. SUITE 500 WASHINGTON, DC 20036-3465 WWW.SCHWARTZANDBALLEN.COM TELEPHONE FACSIMILE (202) 776-0700 (202) 776-0720 To Our Clients and Friends Re: State Security Breach Laws M E M O R A

More information

ELECTRONIC TRANSACTIONS ACT

ELECTRONIC TRANSACTIONS ACT Province of Alberta Statutes of Alberta, Current as of June 1, 2013 Office Consolidation Published by Alberta Queen s Printer Alberta Queen s Printer Suite 700, Park Plaza 10611-98 Avenue Edmonton, AB

More information

Kane County Local Rule

Kane County Local Rule Article 2A: Administration of the Court E-filing 2A.01 DESIGNATION OF ELECTRONIC FILING CASE TYPES (a) This Court hereby authorizes all civil cases with the exception of WI (Wills), and sealed and impounded

More information

BIOMETRICS - WHY NOW?

BIOMETRICS - WHY NOW? BIOMETRICS - WHY NOW? How big a part will biometric technologies play in our lives as they are adopted more widely in the future? The need to confirm ones Identity, in order to access facilities and services

More information

GENERAL AVIATION ACCESS APPLICATION

GENERAL AVIATION ACCESS APPLICATION GENERAL AVIATION ACCESS APPLICATION Updated November 2018 DRIVERS LICENSE COMPANY: No L NM M FOR OFFICIAL USE ONLY Accounting Form Received & Reviewed Received/ Reviewed Application Appropriate Forms of

More information

Case Study. MegaMatcher Accelerator

Case Study. MegaMatcher Accelerator MegaMatcher Accelerator Case Study Venezuela s New Biometric Voter Registration System Based on MegaMatcher biometric technology, the new system enrolls registered voters and verifies identity during local,

More information

Identity Documents Act

Identity Documents Act Issuer: Riigikogu Type: act In force from: 01.09.2013 In force until: 30.04.2014 Translation published: 04.11.2013 Amended by the following acts Passed 15.02.1999 RT I 1999, 25, 365 Entry into force 01.01.2000

More information

AeroScout App End User License Agreement

AeroScout App End User License Agreement AeroScout App End User License Agreement PLEASE READ THE FOLLOWING CAREFULLY BEFORE DOWNLOADING AND/OR USING THE APP. By clicking the "accept" or ok button, or installing and/or using the AeroScout mobile

More information

Introduction-cont Pattern classification

Introduction-cont Pattern classification How are people identified? Introduction-cont Pattern classification Biometrics CSE 190-a Lecture 2 People are identified by three basic means: Something they have (identity document or token) Something

More information

Interstate Commission for Adult Offender Supervision

Interstate Commission for Adult Offender Supervision Interstate Commission for Adult Offender Supervision Privacy Policy Interstate Compact Offender Tracking System Version 3.0 Approved 04/23/2009 Revised on 4/18/2017 1.0 Statement of Purpose The goal of

More information

Terms of Service. Last Updated: April 11, 2018

Terms of Service. Last Updated: April 11, 2018 Terms of Service Last Updated: April 11, 2018 PLEASE READ THESE TERMS OF SERVICE CAREFULLY, INCLUDING THE MANDATORY ARBITRATION PROVISION IN THE SECTION TITLED "DISPUTE RESOLUTION BY BINDING ARBITRATION,"

More information

CHAPTER 337. (Senate Bill 211)

CHAPTER 337. (Senate Bill 211) CHAPTER 337 (Senate Bill 211) AN ACT concerning Public Safety Statewide DNA Data Base System Crimes of Violence, and Burglary, and Breaking and Entering a Motor Vehicle Sample Collections on Arrest Charge

More information

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology Biometric Technologies: Security and Privacy Dr. Rigoberto Chinchilla School of Technology Why Biometrics? Reliable authorization and authentication are becoming necessary for many everyday actions (or

More information

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way.

PRIVACY POLICY. 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. Page 1 of 10 1. OVERVIEW MEGT is committed to protecting privacy and will manage personal information in an open and transparent way. MEGT will fulfil its obligations under the Privacy Amendment (Enhancing

More information

Massachusetts Executive Office of Public Safety and Security. Statewide Applicant Fingerprint Identification Services (SAFIS) Program

Massachusetts Executive Office of Public Safety and Security. Statewide Applicant Fingerprint Identification Services (SAFIS) Program Massachusetts Executive Office of Public Safety and Security Statewide Applicant Fingerprint Identification Services (SAFIS) Program Registration Guide Massachusetts Department of Children and Families

More information

Attorneys for Plaintiff GUILLERMO ROBLES UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA-WESTERN DIVISION

Attorneys for Plaintiff GUILLERMO ROBLES UNITED STATES DISTRICT COURT CENTRAL DISTRICT OF CALIFORNIA-WESTERN DIVISION Case :-cv-0-sjo-ffm Document Filed 0/0/ Page of Page ID #: 0 Joseph R. Manning, Jr., Esq. (State Bar No. ) Caitlin J. Scott, Esq. (State Bar No. 0) MANNING LAW, APC MacArthur Blvd., Suite 0 Newport Beach,

More information

Template Commission pursuant to Section 11 BDSG

Template Commission pursuant to Section 11 BDSG Template Commission pursuant to Section 11 BDSG Agreement between... - (the Principal ) - and... - (the Agent ) - 1. Subject-matter and duration of the commission Subject-matter of the commission: The

More information

A Legal Overview of the Data Protection Act By: Mrs D. Madhub Data Protection Commissioner

A Legal Overview of the Data Protection Act By: Mrs D. Madhub Data Protection Commissioner A Legal Overview of the Data Protection Act 2017 By: Mrs D. Madhub Data Protection Commissioner 06.02.2018 Overview The Data Protection Act 2017 Aim of the Act Major changes brought in the new Act Key

More information

Public Records Request

Public Records Request Public Records Request Scope: CITYWIDE Policy Contact Emilie Costan Citywide Records Manager Office of the City Clerk (916) 808-5908 ecostan@cityofsacramento.org Table of Contents Policy Definitions Public

More information

STATE DATA SECURITY BREACH NOTIFICATION LAWS

STATE DATA SECURITY BREACH NOTIFICATION LAWS STATE DATA SECURITY BREACH NOTIFICATION LAWS Please note: This chart is for informational purposes only and does not constitute legal advice or opinions regarding any specific facts relating to specific

More information