Facial Recognition Database Facing Potential Legal Action For Using Photos, Many of Children, Without Permission

Facial Recognition Database Facing Potential Legal Action For Using Photos, Many of Children, Without Permission

The massive MegaFace dataset may have violated the Illinois Biometric Information Privacy Act, a 2008 law that protects residents from using facial scans without their permission.

A facial recognition database holding more than 4 million photos of nearly 700,000 people is undergoing new scrutiny for its use of photos from Flickr without the express permission of users. 

A New York Times report explores the relationship between the progress of surveillance technology and the availability of huge databases of facial photos on the web, including MegaFace. 

MegaFace was developed by computer science professors at the University of Washington and consisted of downloaded versions of photos from the Yahoo Flickr Creative Commons 100 Million Dataset. The project was part of an effort to make it easier for smaller companies and researchers to further their development of facial recognition technology, among other goals. 

The Yahoo database did not distribute users’ photos directly. Rather, links to the photos were shared so that if a user deleted the posts or made them private, researchers would no longer have access to them. 

But MegaFace made the photo sets downloadable, making it easier for companies to download the data and use it for research purposes. The Flickr dataset was ideal because it had many photos of children, which facial recognition systems typically have a difficult time identifying accurately. 

The University of Washington went on to host the “MegaFace Challenge” in 2015 and 2016, asking companies working on facial recognition to use the data to test the accuracy of their systems. More than 100 organizations and companies participated, the Times reported, including Google, SenseTime and NtechLab. All companies were asked to agree to use it only for “noncommercial research and educational purposes,” and some businesses said they deleted the dataset after the challenge. 

Now, many of the people who posted photos of their children to the site say they were unaware that their children’s faces had been used to develop facial recognition technology. The data set was not anonymized, meaning that the Times was able to find people who had posted the photos through the links provided by Yahoo. 

“The reason I went to Flickr originally was that you could set the license to be noncommercial,” Nick Alt, an entrepreneur in Los Angeles, told the Times after finding out that photos he had taken of children were in the database. “Absolutely would I not have let my photos be used for machine-learning projects. I feel like such a schmuck for posting that picture. But I did it 13 years ago, before privacy was a thing.”

Most people included in the database were not legally required to grant permission to use their photos because they were licensed under Creative Commons. But residents of Illinois are protected under the Biometric Information Privacy Act, a 2008 law that imposes fines for using someone’s fingerprints or face scans without consent. 

The use of Illinois Flickr users’ photos could lead to legal implications if residents decide to pursue lawsuits. Photos themselves are not covered by the law, but scans of the photos should be, according to Faye Jones, a law professor at the University of Illinois. 

“Using that in an algorithmic contest when you haven’t notified people is a violation of the law,” Jones said, adding that people who had their faceprints used without permission have the right to sue and earn $1,000 per use. That fine could go up to $5,000 if the use was “reckless.” 

The combined liability could add up to more than a billion dollars, the Times reported. 

“The law’s been on the books in Illinois since 2008 but was basically ignored for a decade,” Jeffrey Widman, an attorney in Chicago, told the Times. “I guarantee you that in 2014 or 2015, this potential liability wasn’t on anyone’s radar. But the technology has now caught up with the law.”

 

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Cybersecurity Awareness Month: Top Five Action Items to Elevate Your Data Security Posture Management and Secure Your Data

    October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX
  • People Say the Funniest Things

    People Say the Funniest Things

    By all accounts, GSX version 2023 was completely successful. Apparently, there were plenty of mix-ups with the airlines and getting aircraft from the East Coast into Big D. I am all ears when I am in a gathering of people. You never know when a nugget of information might flip out. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3