SUBBiometric Data Privacy FAQ: BIPA, CCPA & Compliance Guide (2026)
Biometric data - including fingerprints, facial geometry, iris scans, and voiceprints - is among the most sensitive categories of personal information because, unlike passwords or credit card numbers, biometric identifiers cannot be changed if compromised. This FAQ covers the growing patchwork of biometric privacy laws, from the groundbreaking Illinois Biometric Information Privacy Act (BIPA) to CCPA biometric protections, facial recognition bans, employer collection rules, and practical compliance strategies for businesses operating in 2026.
Biometric data encompasses biological or behavioral characteristics that can be used to identify individuals. Different privacy laws define biometric data with varying scope, but the core concept covers physical traits that are unique to each person and largely permanent.
Key legal definitions include:
The critical distinction in biometric data is that, unlike passwords, social security numbers, or credit card numbers, biometric identifiers are inherently tied to the individual and cannot be changed if compromised. Once a fingerprint database is breached, the affected individuals cannot simply get new fingerprints. This permanence is why biometric data receives heightened legal protection compared to other categories of personal information.
The Illinois Biometric Information Privacy Act (BIPA), codified at 740 ILCS 14, is the most significant and frequently litigated biometric privacy law in the United States. Enacted in 2008, BIPA was the first state law to regulate the collection, use, and storage of biometric data by private entities, and it remains the gold standard due to its private right of action and substantial statutory damages.
BIPA imposes the following requirements on private entities that collect biometric data:
What makes BIPA uniquely powerful is its private right of action (Section 20): any aggrieved person may recover $1,000 per negligent violation or $5,000 per intentional or reckless violation, plus attorneys' fees and costs. In Rosenbach v. Six Flags Entertainment Corp. (2019), the Illinois Supreme Court held that a plaintiff does not need to allege actual injury beyond the statutory violation itself - the mere failure to obtain consent before collecting biometric data is sufficient to bring a claim. This has fueled a massive wave of class action litigation, with settlements regularly reaching tens of millions of dollars.
The California Consumer Privacy Act (CCPA), as amended by the California Privacy Rights Act (CPRA), provides significant protections for biometric information. Under the CCPA framework, biometric information is classified as "sensitive personal information," which triggers heightened obligations for businesses that collect or process it.
Key CCPA protections for biometric data include:
Unlike Illinois BIPA, the CCPA does not provide a broad private right of action for biometric data violations. Private lawsuits under the CCPA are limited to data breach scenarios involving unencrypted or unredacted personal information (Section 1798.150). Enforcement of other CCPA provisions, including biometric data protections, falls to the California Privacy Protection Agency (CPPA) and the California Attorney General, who can impose administrative fines of up to $7,500 per intentional violation. Businesses that process biometric data should conduct regular cybersecurity audits and risk assessments as required by CPRA regulations.
Facial recognition technology is one of the most heavily scrutinized applications of biometric data processing, drawing attention from lawmakers, regulators, and civil liberties organizations. The regulatory landscape is evolving rapidly at the local, state, federal, and international levels.
City and Local Bans:
State-Level Regulation:
International Regulation:
Consent requirements for biometric data collection vary significantly across jurisdictions, but the trend is clearly toward requiring affirmative, informed consent before any biometric data is collected or processed. Understanding these requirements is essential for compliance.
Illinois BIPA (most stringent):
Texas CUBI:
California CCPA/CPRA:
EU GDPR:
Best practice for multi-jurisdictional compliance: implement Illinois BIPA-level consent requirements across all jurisdictions, as this satisfies the most stringent standard and provides protection against the evolving legal landscape.
Clearview AI became the most prominent biometric privacy controversy by building a facial recognition database of over three billion images scraped from social media platforms, news sites, and other publicly available internet sources without the knowledge or consent of the individuals depicted. The company sold access to this database primarily to law enforcement agencies but also to private companies, enabling identification of individuals from photographs.
Key enforcement actions and legal proceedings against Clearview AI:
The Clearview AI cases have significant implications: they established that publicly available photos are still subject to biometric privacy laws, that scraping public images to build facial recognition databases requires consent under BIPA and GDPR, and that enforcement of biometric privacy laws has real teeth. Companies developing AI or machine learning systems that process facial images should review their data collection practices carefully in light of these precedents.
Employers are among the most frequent collectors of biometric data, using fingerprint scanners for time-and-attendance tracking, facial recognition for building access control, and voice recognition for secure authentication. However, this collection is subject to biometric privacy laws that impose significant compliance obligations.
Illinois BIPA and Employment:
Other State Requirements:
Best practices for employers: provide written notice explaining what biometric data is collected and why, obtain signed written consent before enrollment in biometric systems, maintain a written biometric data retention and destruction policy, store biometric data with encryption and access controls, conduct data protection impact assessments, and consider whether alternative non-biometric solutions (badge systems, PIN codes) can serve the same purpose with less legal risk.
A biometric data breach carries uniquely severe and permanent consequences that distinguish it from breaches involving other types of personal data. When passwords are compromised, users can change them. When credit card numbers are stolen, banks can issue new cards. But when fingerprints, facial geometry, or iris scans are compromised, the affected individuals cannot change their biological characteristics - the harm persists for life.
Legal consequences of a biometric data breach:
Security measures for biometric data:
Building a comprehensive biometric data compliance program is essential for any organization that collects, stores, or processes biometric identifiers. Given the patchwork of state and international laws, a compliance program should be designed to meet the most stringent applicable requirements while remaining practical to implement.
Core compliance program elements:
The landscape of state biometric privacy laws continues to evolve rapidly. As of 2026, the regulatory approaches vary significantly in scope, enforcement mechanisms, and specific requirements:
Dedicated Biometric Privacy Laws:
Comprehensive Privacy Laws Covering Biometric Data:
Local Ordinances:
CTA_Complete biometric data privacy guide for 2026: Understand Illinois BIPA (740 ILCS 14), CCPA biometric protections, facial recognition regulations, consent requirements, employer obligations, and state-by-state compliance requirements.
Create Documents