Biometric Authentication Technology Law & Landmines
Understand the law, opportunities, risks, compliance measures and best practices
- Product Number: 2230189P01
-
CLE Credits, earn up to:
1 substantive credits, 0 ethics credits CLE Credit Note -
Add to Favorites List
Your Selection:
-
Product Description
Product Description
Beyond the iris scans of science fiction and spy movies, the real world often relies on fingerprint and face authentication on smartphones and voice verification by smart speakers and in brokerage calls. In daily life, generative artificial intelligence (AI) transformed “selfies” to beautified “shallow fakes” and culturally idealized avatars, which are recycled to train dynamically updated AI models or extended in “deepfakes” to defraud the public. Facial authentication/recognition technology facilitates the identification of individuals in mobs or victims of war but is also vulnerable to bias and misuse.
Massachusetts protected against identity theft by providing security for “biometric indicators” in 2007 with G.L. c. 93I; it also regulated law enforcement use of facial recognition with the 2021 enactment of G.L. c. 6, § 220. Laws and regulations in other states and countries that recognize the sensitivity of biometric data—such as the Illinois Biometric Information Protection Act which provides a private right of action— apply to many data collectors and processors with which regional individuals and businesses routinely interact.
Join us for an online briefing on the law, risks, and opportunities of biometric authentication.
-
Agenda
Agenda & Materials
-
12:00pm - 12:05pm
Welcome and Introduction
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
12:05pm - 12:10pm
What Is Biometric Authentication?
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
12:10pm - 12:15pm
What Are the Dangers of Collection and Use of Biometric Information?
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
12:15pm - 12:40pm
History and State of Regulation of Collection of Biometric Information
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
12:40pm - 12:45pm
Biometric Authentication Technology Law & Landmines: Best Practices for Compliance and Avoidance of Risk—Direct or Indirect
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
12:45pm - 12:50pm
Biometric Authentication Technology Law & Landmines: Understanding and Vindicating the Rights of the Aggrieved
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
12:50pm - 12:55pm
Biometric Authentication Technology Law & Landmines: Issues in the Nascent “web3” (“Distributed” Technology or “Crypto”) and “Metaverse”
on demand video Add to CartStephen Y. Chow, Esq., Stephen Y. Chow, PC , Boston
-
- Faculty