{"id":8081,"date":"2020-10-07T12:00:26","date_gmt":"2020-10-07T12:00:26","guid":{"rendered":"http:\/\/ncjolt.org\/?p=8081"},"modified":"2020-10-06T04:58:28","modified_gmt":"2020-10-06T04:58:28","slug":"facial-recognition-technology-now-allows-you-to-pay-with-your-face-but-should-you","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/facial-recognition-technology-now-allows-you-to-pay-with-your-face-but-should-you\/","title":{"rendered":"Facial Recognition Technology Now Allows you to Pay with Your Face\u2014But Should you?"},"content":{"rendered":"\n<p>Facial recognition payments\u2014a pandemic fad or the future of contactless payments?\u00a0 Gone are the days of handling germ-ridden cash and touching unsanitary credit card machines\u2014now, payment can be as easy, and quick, as a selfie. The California company <a href=\"https:\/\/www.popid.com\/\">PopID<\/a> has introduced a new contactless payment concept\u2014<a href=\"https:\/\/www.latimes.com\/business\/technology\/story\/2020-08-14\/facial-recognition-payment-technology\">facial recognition<\/a>. To participate, users sign up for a Pop Pay Account with a <a href=\"https:\/\/www.popid.com\/#howitworks\">selfie<\/a>, and add money or <a href=\"https:\/\/www.popid.com\/#howitworks\">save payment information<\/a> to their account. To make a purchase from a participating location, they can <a href=\"https:\/\/www.popid.com\/#howitworks\">alert the cashier<\/a> and look into the PopID <a href=\"https:\/\/www.latimes.com\/business\/technology\/story\/2020-08-14\/facial-recognition-payment-technology\">tablet<\/a> to process the transaction. But, despite the ease, and obvious draw to a more sanitary way to pay, facial recognition technology should raise some serious red flags for consumers, and prompt them to think twice before putting themselves, or their biometric data, in a vulnerable position.\u00a0 <\/p>\n\n\n\n<p>Facial recognition is a type of biometric technology which measures <a href=\"https:\/\/us.norton.com\/internetsecurity-iot-biometrics-how-do-they-work-are-they-safe.html\">physical characteristics<\/a>\u2014here, specific <a href=\"https:\/\/www.thalesgroup.com\/en\/markets\/digital-identity-and-security\/government\/biometrics\/facial-recognition\">\u201cfacial details\u201d<\/a>\u2014to identify individuals or confirm identity. The unauthorized use of facial recognition data, its potential for misuse, and its documented inaccuracies have created significant concerns. <a href=\"https:\/\/www.latimes.com\/business\/technology\/story\/2020-08-14\/facial-recognition-payment-technology\">Companies<\/a> and <a href=\"https:\/\/www.cnn.com\/2019\/07\/17\/tech\/cities-ban-facial-recognition\/index.html\">city agencies<\/a> alike are beginning to acknowledge these flaws, and take steps to ensure this technology isn\u2019t abused or misused on their watch. For example, the City of Portland <a href=\"https:\/\/techcrunch.com\/2020\/09\/09\/facial-recognition-ban-portland-oregon\/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAABRcf0IXzu5eUWbgFrs5AWIOyymDbBfNWNAIgovZ7wn5kOuesEWlX5QP6_Y0fDPFSF2K3bqu98Q_ttL8-VnpfERYWJJdTsAPHlVDkccBVEf0ap4aZJsNLwxlI6tdqgrmGMbKnlRunAAUnP0doKNO5D6d1cx6YfPDXhJODiOnsb7X\">recently<\/a> implemented a ban on facial recognition technology, not only by city agencies, but also <a href=\"https:\/\/www.portlandmaps.com\/bps\/mapapp\/proposals\/#\/private-facial\">private entities.<\/a> Although <a href=\"https:\/\/www.latimes.com\/business\/technology\/story\/2020-08-14\/facial-recognition-payment-technology\">other cities<\/a> have enacted similar ordinances, Portland\u2019s is the first to constrict the private use of facial recognition technology.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>Not only could biometric data be <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/facial-recognition-clearview-ai\/\">hacked<\/a>, but it can also be gathered without users permission and used without their approval.<\/p><\/blockquote>\n\n\n\n<p>The truth is, there is good cause for concern. Not only could biometric data be <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/facial-recognition-clearview-ai\/\">hacked<\/a>, but it can also be gathered without users permission and used without their approval. For example, Clearview AI recently made <a href=\"https:\/\/www.nytimes.com\/2020\/01\/18\/technology\/clearview-privacy-facial-recognition.html\">headlines<\/a> when it came to light that they collected images of users from public platforms, such as Facebook, and have been allowing law enforcement agencies to access their data. In addition to the vast privacy concerns, there is also doubts about the accuracy of this technology. <a href=\"http:\/\/proceedings.mlr.press\/v81\/buolamwini18a\/buolamwini18a.pdf\">Studies<\/a> have found that facial recognition technology misidentifies people of color, women, and older adults, at an alarming rate.<\/p>\n\n\n\n<p>While federal laws governing the use of facial recognition technology are virtually <a href=\"https:\/\/www.nextgov.com\/ideas\/2020\/07\/facial-recognition-here-we-have-no-laws\/166711\/\">nonexistent<\/a>, despite the fact that police agencies have been using this type of technology for the past couple of <a href=\"https:\/\/www.nytimes.com\/2020\/01\/12\/technology\/facial-recognition-police.html\">decades<\/a>, bills are beginning to be introduced in Congress which would establish at least some red tape in this area. For example, the <a href=\"https:\/\/www.congress.gov\/bill\/116th-congress\/senate-bill\/4084\/text?q=%7B%22search%22%3A%5B%22Facial+REcognition%22%5D%7D&amp;r=8&amp;s=1\">Facial Recognition and Biometric Technology Moratorium Act<\/a> of 2020, which was introduced to the Senate in June, seeks to limit not only the federal use of facial recognition technology, but also to prohibit federal agencies from obtaining this information from third parties. The <a href=\"https:\/\/www.congress.gov\/bill\/116th-congress\/senate-bill\/4084\/text?q=%7B%22search%22%3A%5B%22Facial+REcognition%22%5D%7D&amp;r=8&amp;s=1\">legislation<\/a> also pushes states to adhere to these regulations by making certain federal funding conditional on compliance with certain guidelines.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-rounded\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" src=\"https:\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2020\/10\/Flack.png\" alt=\"\" class=\"wp-image-8082\" width=\"383\" height=\"230\" \/><\/figure><\/div>\n\n\n\n<p>With these concerns in mind, PopID is taking steps to ease consumers apprehensions. First, the company claims that images of users, which are stored in the<a href=\"https:\/\/www.popid.com\/#howitworks\"> PopID cloud<\/a>, are never used to identify someone without their <a href=\"https:\/\/www.popid.com\/#howitworks\">consent<\/a>; customers must <a href=\"https:\/\/www.popid.com\/#howitworks\">acknowledge<\/a> every time they want to use this technology. And, the company claims it won\u2019t be sharing any data with third parties\u2014including the police\u2014unless, they are compelled to do so by a <a href=\"https:\/\/www.latimes.com\/business\/technology\/story\/2020-08-14\/facial-recognition-payment-technology\">\u00a0court order<\/a>. Additionally, the company follows the most stringent facial recognition technology legislation, the <a href=\"https:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=3004&amp;ChapterID=57\">Illinois Biometric Privacy Act (BIPA)<\/a>. BIPA was implemented to address some of the privacy concerns surrounding technology that uses <a href=\"https:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=3004&amp;ChapterID=57\">biometric identifiers<\/a>, including facial recognition. This strict legislation <a href=\"https:\/\/www.skadden.com\/insights\/publications\/2019\/01\/illinois-supreme-court\">requires<\/a> written consent from users before obtaining any biometric data, and allows citizens to sue companies for <a href=\"https:\/\/www.nytimes.com\/2020\/01\/29\/technology\/facebook-privacy-lawsuit-earnings.html\">violations<\/a>.<\/p>\n\n\n\n<p>Despite the steps PopID takes to protect consumers, they should still be wary and consider important questions to protect themselves and their biometric data. For example, how secure is the PopID cloud? How long is biometric data store in the cloud? When, if ever, is it deleted? What happens to your biometric data after you delete your PopID account? And under what circumstances would data be provided to third parties, like the police? <strong>Sanitary or not\u2014should this technology be trusted?<\/strong> Moving forward, consumers should continue to exercise caution and keep in mind that while the legislation regulating this technology is scarce, the concerns surrounding it are plentiful. As <a href=\"https:\/\/www.ilga.gov\/legislation\/ilcs\/ilcs3.asp?ActID=3004&amp;ChapterID=57\">BIPA<\/a> points out, a social security number can be altered if stolen \u2013 biometric data cannot.<\/p>\n\n\n\n<p>Marissa Flack<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facial recognition payments\u2014a pandemic fad or the future of contactless payments?\u00a0 Gone are the days of handling germ-ridden cash and touching unsanitary credit card machines\u2014now, payment can be as easy, and quick, as a selfie. The California company PopID has introduced a new contactless payment concept\u2014facial recognition. To participate, users sign up for a Pop <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/facial-recognition-technology-now-allows-you-to-pay-with-your-face-but-should-you\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":8082,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8081"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=8081"}],"version-history":[{"count":2,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8081\/revisions"}],"predecessor-version":[{"id":8084,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/8081\/revisions\/8084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/8082"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=8081"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=8081"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=8081"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}