{"id":4963,"date":"2017-02-09T16:22:46","date_gmt":"2017-02-09T20:22:46","guid":{"rendered":"http:\/\/ncjolt.org\/?p=4963"},"modified":"2020-06-04T20:52:56","modified_gmt":"2020-06-04T20:52:56","slug":"biometrics-privacy-facebook","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/biometrics-privacy-facebook\/","title":{"rendered":"Biometrics, Privacy, and Facebook: Who is Tagging Who?"},"content":{"rendered":"<p>Beth is a twenty-five-year old who lives and works in New York City. She, like many of her peers, keeps in touch with her old friends and classmates via Facebook, one of the most well-known online social media and social networking services. After her birthday party, Beth logs on to Facebook to post pictures to memorialize the grand event. She uploads three photos of herself and a collection of her friends, and is prompted by Facebook to \u201ctag\u201d her friends, linking their profile to the pictures. When Beth goes to tag her friends in the photo, she finds that Facebook has already done it for her- Facebook gives her a suggestion for each face it identifies in the photo and asks \u201cIs this (friend\u2019s name)?\u201d To Beth- and many other Facebook users- this technology might seem innovative and keen.<\/p>\n<blockquote><p>However, this feature&#8211; called &#8216;Tag Suggestions&#8217; &#8212; is just one of the many instances of biometric technology being used, with or without our knowledge of its presence, in our daily lives.<\/p><\/blockquote>\n<p>&nbsp;<br \/>\nWhile Facebook\u2019s use of biometrics seems to serve the primary purpose of taking the leg-work out of tagging friends in photos, biometrics are used for much more than that. Biometrics first rapidly made their way into the mainstream as a means to help <a href=\"http:\/\/www.planetbiometrics.com\/creo_files\/upload\/article-files\/WP_BiometricServices_1015.pdf\">prevent identity theft and fraud<\/a>. There are two main categories of biological measurements: <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometrics\">physiological characteristics<\/a>, which includes the shape or composition of the human body (such as fingerprints, DNA, facial measurements, vein patterns, retina or ear features); and <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/biometrics\">behavioral characteristics,<\/a> related to the pattern of the behavior of a person (such as typing rhythm, gait, gestures, and even voice).\u00a0 The industry has now rocketed into the mainstream, with the biometrics market expected to be <a href=\"http:\/\/www.marketsandmarkets.com\/Market-Reports\/next-generation-biometric-technologies-market-697.html.\">worth $32.7 billion by 2022<\/a>. With new technology comes new legal problems, and some states have already attempted to combat rising concerns with biometrics through legislation. The most pertinent example is the <a href=\"http:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=3004&amp;ChapterID=57\">Illinois Biometric Information Privacy Act<\/a> (commonly known as BIPA), which was passed in 2008 in an effort to control how companies collect and use biometric identifiers. The law bans companies from collecting and storing a person&#8217;s unique biometric data without first obtaining permission and notifying the user. \u00a0Under BIPA, a prevailing plaintiff can recover actual or liquidated damages, as well as attorney\u2019s fees and costs\u2014providing some insight into the potential motivations behind a landmark upcoming biometrics privacy case: <a href=\"https:\/\/cdn2.vox-cdn.com\/uploads\/chorus_asset\/file\/6555873\/facebook-biometric-dismiss.0.pdf\">In re Facebook Information Privacy Litigation<\/a>.<br \/>\nThree plaintiffs filed a complaint against Facebook, alleging that its use of biometric technology in its \u201cTag Suggestions\u201d feature was done without their consent and therefore was a violation of BIPA. Facebook initially moved to dismiss the plaintiffs\u2019 claim, stating that the plaintiffs agreed to Facebook\u2019s choice-of-law provision (California) when they agreed to Facebook\u2019s user agreement, rendering BIPA meaningless. The district court denied Facebook\u2019s motion to dismiss, finding that while the user agreement was enforceable, California choice-of-law would not be enforced as it is contrary to Illinois\u2019 fundamental policy. The district court found that \u201cthe plain language of BIPA indisputably evinces a fundamental privacy policy of Illinois,\u201d and further that, if California\u2019s laws were applied to this case, the Illinois policy of protecting its citizens&#8217; privacy interests in their biometric data, especially in the context of dealing with \u201cmajor national corporations\u201d like Facebook, would be written out of existence, because California has neither legislatively recognized a right to privacy in personal biometric information nor has it afforded any type of private right of action for a violation of that right. While the case is still pending, this case adds flame to the fiery debate regarding biometric information and personal privacy.<br \/>\nAs gleamed from <em>in re Facebook<\/em>, there are two contradictory debates circling the technology of biometrics as a method for gathering and storing personal facial information: first, the position that data is being collected without first obtaining an individual\u2019s consent, thereby violating their rights to privacy; and second, the argument that BIPA unconstitutional prohibits interstate commerce by prohibiting businesses such as Facebook from using data it collects in states such as Illinois. Facebook takes the latter position: the social media giant said in its November 2016 answer to the plaintiffs\u2019 amended class complaint filed in the U.S. District Court for the Northern District of California that the <a href=\"https:\/\/www.bloomberglaw.com\/search\/results\/c535042d9ee0c5b087bf9faaff9eb88b\/document\/X5JQN0HO000000?search32=bM8ouYvXvt3OOWbYEvzFWg==lWCKTHXWo2rnZ--xfGZoNeR2aYk8-QScXZFa5X0YhmB4omFSEmXMDy02RXVMgPfv6Q3uks0FIwRG5EH_rDtUYQ==\">Illinois BIPA is unconstitutional<\/a> as applied because it violates a well-established constitutional protection under the Commerce Clause&#8230; This constitutional protection limits a state&#8217;s ability to pass legislation that would improperly burden or discriminate against interstate commerce. <a href=\"https:\/\/www.bloomberglaw.com\/document\/X1Q6NPBNJ3O2?fmt=pdf\">Facebook said<\/a> that not allowing it to use biometric analysis software to scan photographs posted by users from Illinois restricts its use of data used in commerce.<br \/>\nBoth Facebook and the plaintiffs of this case seem to have prima facie persuading arguments- so who is correct? With regards to the potential for dissemination of personal information collected through biometric technology, consumers certainly have justification for concern. However, businesses also have a compelling interest in keeping up with new and updated technologies, in order to remain competitive and profitable. With the rise of biometrics not indicating any sign of halting, it will be interesting to see how the complexities of traditional privacy law and modern technology interact.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beth is a twenty-five-year old who lives and works in New York City. She, like many of her peers, keeps in touch with her old friends and classmates via Facebook, one of the most well-known online social media and social networking services. After her birthday party, Beth logs on to Facebook to post pictures to <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/biometrics-privacy-facebook\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":4967,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4963"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=4963"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4963\/revisions"}],"predecessor-version":[{"id":7117,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/4963\/revisions\/7117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/4967"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=4963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=4963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=4963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}