The Illinois General Assembly enacted the Illinois Biometric Information Privacy Act (BIPA) in 2008. The act was one of the first data privacy laws to safeguard biometric data. However, the law went largely unnoticed until 2015, when several high-profile, class-action lawsuits occurred between large corporations and Illinois residents (Pezen v. Facebook, Norgberg v. Shutterfly, Rosenbach v. Six Flags).
BIPA allows the Illinois legislature to protect the sensitive data of its residents in many ways. The act restricts the sale of biometric data and requires companies that collect sensitive data, store biometric identifiers, or employ biometric technology to follow several privacy procedures.
Learn how UpGuard can help you track compliance with its vendor questionnaire software.
BIPA applies to any company or private entity that conducts business in Illinois, collects biometric data from state residents, or makes decisions involving processing biometric data.
Two other states, Texas and Washington, also passed laws in the early 2000s aimed solely at protecting biometric data. Several states, including California’s CCPA (California Consumer Privacy Act) and Virginia’s VCDP (Virginia Consumer Data Protection Act), have passed comprehensive privacy laws that provide regulations limiting the storage, collection, and sale of biometric data.
In 2022, seven states (California, Kentucky, Maine, Maryland, Massachusetts, Missouri, and New York) attempted to pass privacy laws that resembled BIPA. Each of these seven biometric privacy laws failed to pass.
Biometrics are unique data types that contain physical or behavioral identifiers and are biologically linked to a specific individual. Unlike other forms of sensitive information, individuals cannot edit their biometric data after it is compromised. These unique characteristics make protecting biometric data a critical endeavor.
Identity theft and other forms of misuse become increasingly likely when a person’s biometric identifiers are exposed.
BIPA defines biometric data as any biometric identifier used to identify an individual.
.png)
This definition includes but is not limited to the following:
It’s also important to note that BIPA excludes many types of information from its definition of biometric data, such as:
By granting resident consumers several rights, BIPA allows individuals to take control of their biometric data. Under BIPA, Illinois residents possess the right to know:
The Illinois law also grants residents the right to provide consent and requires all entities that collect data to obtain permission before participating in collecting, storing, or processing biometric data.
While BIPA applies to most organizations that conduct business in Illinois, the law does outline a few exemptions. The law does not apply to:
Businesses subject to BIPA must comply with several data protection policies to safeguard consumers' biometric data.
BIPA requires businesses to follow the following regulations:
Illinois enforces BIPA through a private right of action. In other words, individuals disturbed by a BIPA violation have the right to pursue legal action through the Illinois Supreme Court. Individuals also have the right to pursue a supplemental BIPA claim in a federal court after the case moves through the state and district court circuit.
Under the private right of action statute, affected individuals may recover the following from any violating entity:
Note: All BIPA claims are subject to a five-year limited period (Tims v. Black Horse Carriers). This statute of limitations includes negligent violations and reckless violations of BIPA.
Since its enactment, BIPA has been the subject of many class-action lawsuits. These lawsuits have revealed several important insights, such as how entities are held accountable for violations, the liability of third-party processors, and the limit of individual rights granted by the law.
Overview: After a jury found the BSNF Railway Company guilty of violating BIPA a staggering 45,600 times (one per individual affected), the organization argued that the violations resulted from negligence committed by a third-party vendor.
Court Ruling: The court disagreed with the defendant and ruled that entities could be held vicariously liable for any BIPA violation committed by a third-party vendor. This ruling confirmed that organizations cannot escape violation penalties by shifting blame to a third-party contractor.
Overview: Plaintiff alleged that White Castle did not receive her consent to share her fingerprint information with a third-party data processor. The plaintiff also argued that White Castle committed a new violation every time it required the employee to scan her fingerprint. White Castle argued that violations of BIPA occur once when the data is initially collected, making the plaintiff’s claims untimely under the state law’s statute of limitations.
Court Ruling: Organizations are subject to a new violation each and every time it collects or processes a consumer’s biometric data without prior consumer consent.
Texas was the first state in the United States to pass a biometric privacy law. The state’s Capture of Use of Biometric Information (CUPI) has received less attention than BIPA. However, the Texas v. Meta Platforms, Inc. lawsuit recently turned the law into the spotlight.
CUPI and BIPA are different in many ways:
Organizations that utilize biometric technology or gather biometric information from Illinois residents must comply with BIPA. To ensure compliance, regulated organizations should create a compliance assessment process that examines all its procedures for collecting or processing biometric data.
A proper BIPA compliance checklist should at least include the following:
UpGuard Vendor Risk empowers organizations to ensure BIPA compliance across their entire supply chain. By using Vendor Risk, your organization will have access to flexible security questionnaires, powerful vendor assessment tools, and seamless remediation workflows that allow it to safeguard consumer data 24/7.
UpGuard's Vendor Risk Management tool will also allow your organization to:
Organizations that collect and store biometric data can also utilize UpGuard Breach Risk to manage their external attack surface. This comprehensive cybersecurity tool enables organizations to monitor security risks, identify vulnerabilities, and make informed decisions regarding risk remediation based on real-time notifications.