+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Biometric Authentication Technology Law & Landmines

  • Training

  • 1 Hour
  • Massachusetts Continuing Legal Education, Inc. (MCLE)
  • ID: 5866384
Beyond the iris scans of science fiction and spy movies, the real world often relies on fingerprint and face authentication on smartphones and voice verification by smart speakers and in brokerage calls. In daily life, generative artificial intelligence (AI) transformed “selfies” to beautified “shallow fakes” and culturally idealized avatars, which are recycled to train dynamically updated AI models or extended in “deepfakes” to defraud the public. Facial authentication/recognition technology facilitates the identification of individuals in mobs or victims of war but is also vulnerable to bias and misuse.

Massachusetts protected against identity theft by providing security for “biometric indicators” in 2007 with G.L. c. 93I; it also regulated law enforcement use of facial recognition with the 2021 enactment of G.L. c. 6, § 220. Laws and regulations in other states and countries that recognize the sensitivity of biometric data-such as the Illinois Biometric Information Protection Act which provides a private right of action- apply to many data collectors and processors with which regional individuals and businesses routinely interact.

Join for an online briefing on the law, risks, and opportunities of biometric authentication.

Course Content

12:00pm - 12:05pm
Welcome and Introduction
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston

12:05pm - 12:10pm
What Is Biometric Authentication?
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston

12:10pm - 12:15pm
What Are the Dangers of Collection and Use of Biometric Information?
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston

12:15pm - 12:40pm
History and State of Regulation of Collection of Biometric Information
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston

12:40pm - 12:45pm
Biometric Authentication Technology Law & Landmines: Best Practices for Compliance and Avoidance of Risk - Direct or Indirect
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston

12:45pm - 12:50pm
Biometric Authentication Technology Law & Landmines: Understanding and Vindicating the Rights of the Aggrieved
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston

12:50pm - 12:55pm
Biometric Authentication Technology Law & Landmines: Issues in the Nascent “web3” (“Distributed” Technology or “Crypto”) and “Metaverse”
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston

Please Note
This webcast is delivered completely online, underscoring their convenience and appeal.
There are no published print materials. All written materials are available electronically only.
They are posted 24 hours prior to the program and can be accessed, downloaded, or printed from your computer.

Speakers

Faculty
Stephen Y. Chow, Esq.,
Stephen Y. Chow, PC, Boston