Beyond the iris scans of science fiction and spy movies, the real world often relies on fingerprint and face authentication on smartphones and voice verification by smart speakers and in brokerage calls. In daily life, generative artificial intelligence (AI) transformed “selfies” to beautified “shallow fakes” and culturally idealized avatars, which are recycled to train dynamically updated AI models or extended in “deepfakes” to defraud the public. Facial authentication/recognition technology facilitates the identification of individuals in mobs or victims of war but is also vulnerable to bias and misuse.
Massachusetts protected against identity theft by providing security for “biometric indicators” in 2007 with G.L. c. 93I; it also regulated law enforcement use of facial recognition with the 2021 enactment of G.L. c. 6, § 220. Laws and regulations in other states and countries that recognize the sensitivity of biometric data - such as the Illinois Biometric Information Protection Act which provides a private right of action - apply to many data collectors and processors with which regional individuals and businesses routinely interact.
Join us for an online briefing on the law, risks, and opportunities of biometric authentication.
Massachusetts protected against identity theft by providing security for “biometric indicators” in 2007 with G.L. c. 93I; it also regulated law enforcement use of facial recognition with the 2021 enactment of G.L. c. 6, § 220. Laws and regulations in other states and countries that recognize the sensitivity of biometric data - such as the Illinois Biometric Information Protection Act which provides a private right of action - apply to many data collectors and processors with which regional individuals and businesses routinely interact.
Join us for an online briefing on the law, risks, and opportunities of biometric authentication.
Course Content
12:00pm - 12:05pm: Welcome and IntroductionStephen Y. Chow, Esq., Stephen Y. Chow, PC Boston
12:05pm - 12:10pm: What Is Biometric Authentication?
Stephen Y. Chow, Esq., Stephen Y. Chow, PC Boston
12:10pm - 12:15pm: What Are the Dangers of Collection and Use of Biometric Information?
Stephen Y. Chow, Esq., Stephen Y. Chow, PC Boston
12:15pm - 12:40pm: History and State of Regulation of Collection of Biometric Information
Stephen Y. Chow, Esq., Stephen Y. Chow, PC Boston
12:40pm - 12:45pm: Biometric Authentication Technology Law & Landmines: Best Practices for Compliance and Avoidance of Risk - Direct or Indirect
Stephen Y. Chow, Esq., Stephen Y. Chow, PC Boston
12:45pm - 12:50pm: Biometric Authentication Technology Law & Landmines: Understanding and Vindicating the Rights of the Aggrieved
Stephen Y. Chow, Esq., Stephen Y. Chow, PC Boston
12:50pm - 12:55pm: Biometric Authentication Technology Law & Landmines: Issues in the Nascent “web3” (“Distributed” Technology or “Crypto”) and “Metaverse”
Stephen Y. Chow, Esq., Stephen Y. Chow, PC Boston