Facebook To Pay $650m For Facial Recognition Lawsuit

A Californian federal judge has approved a $650 million settlement of a class-action privacy lawsuit against Facebook because of alleged use of facial recognition technology without peoples permission and said that this “class action is a landmark result.”. This was approved by the US district judge James Donato of the Northern District of California, who said it is "a major win for consumers in the hotly contested area of digital privacy".

As part of the settlement, Facebook will pay three named plaintiffs  $5,000 each while over 1.6 million will receive $345 or more.

 The class-action lawsuit against Facebook was filed in 2015 and accused the firm of violating an Illinois privacy law by creating a photo-tagging feature that used scans of users' faces without their explicit permission. The lawsuit accused the social media giant of failing to get consent before using facial-recognition technology to scan photos uploaded by users to create and store faces digitally. The case eventually wound up as a class-action lawsuit in California and "... will put at least $345 into the hands of every class member interested in being compensated," Judge Donato wrote in his decision..

The California Biometric Information Privacy Act allows consumers to sue companies that didn’t get permission before harvesting data such as faces and fingerprints without consent. 

In a statement, Facebook said that it was "pleased to have reached a settlement" in the case. The company added that it will now move past the matter, which will be "in the best interest" of its users and shareholders. Facebook has since changed its photo-tagging system. 

Facebook's photo-tagging feature enabled users to tag their friends in their newly-uploaded picture, while the Tag Suggestions tool offered suggestions about who the individual might be. Recently there was also a High Court action filed against Facebook in London, accusing the firm of having failed to prevent third parties from accessing and using data of about a million users in England and Wales.

 State of California:      CNet:         Guardian:       Computing:      Manila Standard:   

You Might Also Read: 

Facial Recognition: A Three Billion Image Database:

 

 

« China’s Digital Silk Road
Cyber Security Supplier Directory - Are You Listed? »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Gilbert + Tobin

Gilbert + Tobin

Gilbert + Tobin is an Australian corporate law firm serving clients throughout Australia, and around the world, on a broad range of legal issues including cyber security.

Centro de Gestion de Incidentes Informaticos (CGII)

Centro de Gestion de Incidentes Informaticos (CGII)

CGII is the Computer Incident Management Center of the State of Bolivia.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Infosec Train

Infosec Train

Infosec Train provide professional training, certifications & professional services related to all spheres of Information Technology and Cyber Security.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.