SlideShare a Scribd company logo
Sensitivity: Confidential
YOUR
FINGERPRINTS,
YOUR IDENTITY,
YOUR PRIVACY
Presented By
PROTECTING YOURSELF IN
THE WORKPLACE
Almost every employee
has a strong expectation
of privacy at work, but
with the increased use of
biometric technology in
the workplace, our right
to privacy is being
threatened.
OUR EXPECTATION OF
PRIVACY AT WORK
Although the use of
biometric privacy is risky
for employees, most states
offer little to no protection.
There is no single federal
law protecting employees
from biometric privacy
risks in the workplace.
MINIMAL
PROTECTIONS
Discrimination: Employers accessing
information about you and using it to
discriminate
Insurance fraud: Insurance companies
accessing information about you and denying
coverage
Civil rights violations: Using your
information to discriminate in violation of
your civil rights
Identity theft: Poor handling of your private
information could result in identity theft
THE RISKS ARE REAL
Illinois and California are
leading the way for employee
biometric privacy protection.
In both of these states, it is
possible to bring claims against
employers.
You could receive compensation
if your biometric privacy rights
have been violated.
LEADING THE WAY
Were you compelled to use fingerprint or other biometric
identification at work?
Did you employer inform you of your rights in this regard?
Did your employer obtain your written consent to use this
technology?
HOW DO YOU KNOW IF YOU HAVE A CLAIM?
FREE WHITE PAPER
If the answer is “no” to any of
these questions, you could
have a claim.
Take some time to learn more
about the issue by reading
our white paper on the topic,
and call our firm to discuss
your rights and options with
an experienced lawyer.
© 2019 Law Offices of Todd M. Friedman, P.C. All rights reserved. Design and editorial services by FindLaw, part of Thomson Reuters.
Share the white paper

More Related Content

Similar to Biometric Privacy In The Workplace - Attorney Todd M. Friedman

Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
Herring Consulting & Financial Group
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
SonalVanjari
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
CBIZ, Inc.
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
aiimnevada
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data Management
ClinosolIndia
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
The Identity Advocate
 
Adrs2
Adrs2Adrs2
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
Donald E. Hester
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Affiliate Summit
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
John Hamilton, DAHC,EHC,CFDAI, CPP, PSPO
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
Adler Law Group
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
Lawley Insurance
 
What is biometric identification.pdf
What is biometric identification.pdfWhat is biometric identification.pdf
What is biometric identification.pdf
Bahaa Abdulhadi
 
Fake ID Michigan.pdf
Fake ID Michigan.pdfFake ID Michigan.pdf
Fake ID Michigan.pdf
jhon A3fakeid
 
fake id code.pdf
fake id code.pdffake id code.pdf
fake id code.pdf
jhon A3fakeid
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
Kevin Nevias
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
Abdah Munirah
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
tomasztopa
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
oldshaman
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
DATAVERSITY
 

Similar to Biometric Privacy In The Workplace - Attorney Todd M. Friedman (20)

Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
Network Security and Privacy Liability  - Four Reasons Why You need This Cove...Network Security and Privacy Liability  - Four Reasons Why You need This Cove...
Network Security and Privacy Liability - Four Reasons Why You need This Cove...
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Data Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data ManagementData Privacy and Security in Clinical Data Management
Data Privacy and Security in Clinical Data Management
 
The Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity TheftThe Right and Wrong Ways to Prevent Identity Theft
The Right and Wrong Ways to Prevent Identity Theft
 
Adrs2
Adrs2Adrs2
Adrs2
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Tech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social DataTech Week Chicago 2012: Law & Social Data
Tech Week Chicago 2012: Law & Social Data
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
What is biometric identification.pdf
What is biometric identification.pdfWhat is biometric identification.pdf
What is biometric identification.pdf
 
Fake ID Michigan.pdf
Fake ID Michigan.pdfFake ID Michigan.pdf
Fake ID Michigan.pdf
 
fake id code.pdf
fake id code.pdffake id code.pdf
fake id code.pdf
 
Privacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin NeviasPrivacy Implications of Biometric Data - Kevin Nevias
Privacy Implications of Biometric Data - Kevin Nevias
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Affirmative Defense Reponse System
Affirmative Defense Reponse SystemAffirmative Defense Reponse System
Affirmative Defense Reponse System
 
DAMA Webinar: The Data Governance of Personal (PII) Data
DAMA Webinar: The Data Governance of  Personal (PII) DataDAMA Webinar: The Data Governance of  Personal (PII) Data
DAMA Webinar: The Data Governance of Personal (PII) Data
 

More from The Law Buzz

Basics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdf
Basics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdfBasics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdf
Basics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdf
The Law Buzz
 
Eminent Domain - What Property Owners Should Know.pdf
Eminent Domain - What Property Owners Should Know.pdfEminent Domain - What Property Owners Should Know.pdf
Eminent Domain - What Property Owners Should Know.pdf
The Law Buzz
 
Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...
Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...
Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...
The Law Buzz
 
Outsourced General Counsel: A Better Way To Do Business
Outsourced General Counsel: A Better Way To Do BusinessOutsourced General Counsel: A Better Way To Do Business
Outsourced General Counsel: A Better Way To Do Business
The Law Buzz
 
Who Is Watching: When Gaps In Supervision And Training Lead To Abuse At School
Who Is Watching: When Gaps In Supervision And Training Lead To Abuse At SchoolWho Is Watching: When Gaps In Supervision And Training Lead To Abuse At School
Who Is Watching: When Gaps In Supervision And Training Lead To Abuse At School
The Law Buzz
 
The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...
The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...
The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...
The Law Buzz
 
What Is The Average Age Of a Mesothelioma Diagnosis?
What Is The Average Age Of a Mesothelioma Diagnosis?What Is The Average Age Of a Mesothelioma Diagnosis?
What Is The Average Age Of a Mesothelioma Diagnosis?
The Law Buzz
 
Ohio birth injuries.pdf
Ohio birth injuries.pdfOhio birth injuries.pdf
Ohio birth injuries.pdf
The Law Buzz
 
Frequently Asked Questions About Mesothelioma
Frequently Asked Questions About MesotheliomaFrequently Asked Questions About Mesothelioma
Frequently Asked Questions About Mesothelioma
The Law Buzz
 
How Do I Prove I Was Exposed To Asbestos?
How Do I Prove I Was Exposed To Asbestos?How Do I Prove I Was Exposed To Asbestos?
How Do I Prove I Was Exposed To Asbestos?
The Law Buzz
 
Do Women Diagnosed With Mesothelioma Survive Longer Than Men?
Do Women Diagnosed With Mesothelioma Survive Longer Than Men?Do Women Diagnosed With Mesothelioma Survive Longer Than Men?
Do Women Diagnosed With Mesothelioma Survive Longer Than Men?
The Law Buzz
 
Tricky Business: Navigating Regulatory Hurdles In The Cannabis Industry
Tricky Business: Navigating Regulatory Hurdles In The Cannabis IndustryTricky Business: Navigating Regulatory Hurdles In The Cannabis Industry
Tricky Business: Navigating Regulatory Hurdles In The Cannabis Industry
The Law Buzz
 
Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...
Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...
Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...
The Law Buzz
 
When Executors and Trustees Go Wrong
When Executors and Trustees Go WrongWhen Executors and Trustees Go Wrong
When Executors and Trustees Go Wrong
The Law Buzz
 
Asbestos & Mesothelioma: The Relentless Killers
Asbestos & Mesothelioma: The Relentless KillersAsbestos & Mesothelioma: The Relentless Killers
Asbestos & Mesothelioma: The Relentless Killers
The Law Buzz
 
Mesothelioma Guide For Families
Mesothelioma Guide For FamiliesMesothelioma Guide For Families
Mesothelioma Guide For Families
The Law Buzz
 
Why You Need A Will
Why You Need A Will Why You Need A Will
Why You Need A Will
The Law Buzz
 
Do You Need A Will?
Do You Need A Will?Do You Need A Will?
Do You Need A Will?
The Law Buzz
 
What If You're Partly At Fault For A Car Crash In California?
What If You're Partly At Fault For A Car Crash In California?What If You're Partly At Fault For A Car Crash In California?
What If You're Partly At Fault For A Car Crash In California?
The Law Buzz
 
Putting Together The Pieces: A Guide For Mesothelioma Patients & Families
Putting Together The Pieces: A Guide For Mesothelioma Patients & FamiliesPutting Together The Pieces: A Guide For Mesothelioma Patients & Families
Putting Together The Pieces: A Guide For Mesothelioma Patients & Families
The Law Buzz
 

More from The Law Buzz (20)

Basics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdf
Basics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdfBasics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdf
Basics Of Divorce Appeals In Ohio: What To Know When The Judge Gets It Wrong.pdf
 
Eminent Domain - What Property Owners Should Know.pdf
Eminent Domain - What Property Owners Should Know.pdfEminent Domain - What Property Owners Should Know.pdf
Eminent Domain - What Property Owners Should Know.pdf
 
Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...
Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...
Your Fingerprints, Your Identity, Your Privacy: Protecting Yourself In The Wo...
 
Outsourced General Counsel: A Better Way To Do Business
Outsourced General Counsel: A Better Way To Do BusinessOutsourced General Counsel: A Better Way To Do Business
Outsourced General Counsel: A Better Way To Do Business
 
Who Is Watching: When Gaps In Supervision And Training Lead To Abuse At School
Who Is Watching: When Gaps In Supervision And Training Lead To Abuse At SchoolWho Is Watching: When Gaps In Supervision And Training Lead To Abuse At School
Who Is Watching: When Gaps In Supervision And Training Lead To Abuse At School
 
The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...
The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...
The Real Culprits Behind Truck Accidents (And Why They're Rarely Held Account...
 
What Is The Average Age Of a Mesothelioma Diagnosis?
What Is The Average Age Of a Mesothelioma Diagnosis?What Is The Average Age Of a Mesothelioma Diagnosis?
What Is The Average Age Of a Mesothelioma Diagnosis?
 
Ohio birth injuries.pdf
Ohio birth injuries.pdfOhio birth injuries.pdf
Ohio birth injuries.pdf
 
Frequently Asked Questions About Mesothelioma
Frequently Asked Questions About MesotheliomaFrequently Asked Questions About Mesothelioma
Frequently Asked Questions About Mesothelioma
 
How Do I Prove I Was Exposed To Asbestos?
How Do I Prove I Was Exposed To Asbestos?How Do I Prove I Was Exposed To Asbestos?
How Do I Prove I Was Exposed To Asbestos?
 
Do Women Diagnosed With Mesothelioma Survive Longer Than Men?
Do Women Diagnosed With Mesothelioma Survive Longer Than Men?Do Women Diagnosed With Mesothelioma Survive Longer Than Men?
Do Women Diagnosed With Mesothelioma Survive Longer Than Men?
 
Tricky Business: Navigating Regulatory Hurdles In The Cannabis Industry
Tricky Business: Navigating Regulatory Hurdles In The Cannabis IndustryTricky Business: Navigating Regulatory Hurdles In The Cannabis Industry
Tricky Business: Navigating Regulatory Hurdles In The Cannabis Industry
 
Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...
Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...
Swimming Pool Safety: Layers Of Protection That Every Parent (And Grandparent...
 
When Executors and Trustees Go Wrong
When Executors and Trustees Go WrongWhen Executors and Trustees Go Wrong
When Executors and Trustees Go Wrong
 
Asbestos & Mesothelioma: The Relentless Killers
Asbestos & Mesothelioma: The Relentless KillersAsbestos & Mesothelioma: The Relentless Killers
Asbestos & Mesothelioma: The Relentless Killers
 
Mesothelioma Guide For Families
Mesothelioma Guide For FamiliesMesothelioma Guide For Families
Mesothelioma Guide For Families
 
Why You Need A Will
Why You Need A Will Why You Need A Will
Why You Need A Will
 
Do You Need A Will?
Do You Need A Will?Do You Need A Will?
Do You Need A Will?
 
What If You're Partly At Fault For A Car Crash In California?
What If You're Partly At Fault For A Car Crash In California?What If You're Partly At Fault For A Car Crash In California?
What If You're Partly At Fault For A Car Crash In California?
 
Putting Together The Pieces: A Guide For Mesothelioma Patients & Families
Putting Together The Pieces: A Guide For Mesothelioma Patients & FamiliesPutting Together The Pieces: A Guide For Mesothelioma Patients & Families
Putting Together The Pieces: A Guide For Mesothelioma Patients & Families
 

Recently uploaded

Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
devaki57
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Anti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptxAnti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptx
TarunKumarSingh37
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
ssuser559494
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
RichardTheberge
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
15e6o6u
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
20jcoello
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
15e6o6u
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
MohammadZubair874462
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
sunitasaha5
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 

Recently uploaded (20)

Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Corporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal FrameworkCorporate Governance : Scope and Legal Framework
Corporate Governance : Scope and Legal Framework
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Anti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptxAnti Money Laundering & know client.pptx
Anti Money Laundering & know client.pptx
 
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptxPatenting_Innovations_in_3D_Printing_Prosthetics.pptx
Patenting_Innovations_in_3D_Printing_Prosthetics.pptx
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
Search Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement OfficersSearch Warrants for NH Law Enforcement Officers
Search Warrants for NH Law Enforcement Officers
 
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
快速办理(SCU毕业证书)澳洲南十字星大学毕业证文凭证书一模一样
 
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
fnaf lore.pptx ...................................
fnaf lore.pptx ...................................fnaf lore.pptx ...................................
fnaf lore.pptx ...................................
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
在线办理(UNE毕业证书)新英格兰大学毕业证成绩单一模一样
 
PPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx llPPT-Money Laundering - lecture 5.pptx ll
PPT-Money Laundering - lecture 5.pptx ll
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Business Laws Sunita saha
Business Laws Sunita sahaBusiness Laws Sunita saha
Business Laws Sunita saha
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 

Biometric Privacy In The Workplace - Attorney Todd M. Friedman

  • 1. Sensitivity: Confidential YOUR FINGERPRINTS, YOUR IDENTITY, YOUR PRIVACY Presented By PROTECTING YOURSELF IN THE WORKPLACE
  • 2. Almost every employee has a strong expectation of privacy at work, but with the increased use of biometric technology in the workplace, our right to privacy is being threatened. OUR EXPECTATION OF PRIVACY AT WORK
  • 3. Although the use of biometric privacy is risky for employees, most states offer little to no protection. There is no single federal law protecting employees from biometric privacy risks in the workplace. MINIMAL PROTECTIONS
  • 4. Discrimination: Employers accessing information about you and using it to discriminate Insurance fraud: Insurance companies accessing information about you and denying coverage Civil rights violations: Using your information to discriminate in violation of your civil rights Identity theft: Poor handling of your private information could result in identity theft THE RISKS ARE REAL
  • 5. Illinois and California are leading the way for employee biometric privacy protection. In both of these states, it is possible to bring claims against employers. You could receive compensation if your biometric privacy rights have been violated. LEADING THE WAY
  • 6. Were you compelled to use fingerprint or other biometric identification at work? Did you employer inform you of your rights in this regard? Did your employer obtain your written consent to use this technology? HOW DO YOU KNOW IF YOU HAVE A CLAIM?
  • 7. FREE WHITE PAPER If the answer is “no” to any of these questions, you could have a claim. Take some time to learn more about the issue by reading our white paper on the topic, and call our firm to discuss your rights and options with an experienced lawyer. © 2019 Law Offices of Todd M. Friedman, P.C. All rights reserved. Design and editorial services by FindLaw, part of Thomson Reuters. Share the white paper