Long-running Clearview AI class action biometric privacy case settles


Facial recognition technology company Clearview AI has reached a settlement with plaintiffs in a class-action privacy lawsuit after a long court battle, according to a court docket entry filed November 30. The terms of the settlement are not yet public.

The docket entry from an Illinois federal court noted that the parties to the case have “settled the matter in principle.” Plaintiffs in the case alleged that Clearview, which scrapes images of faces from across the web, violated Illinois’ Biometric Information Privacy Act (BIPA), which is the toughest such law in the country.

The plaintiffs’ lawyers will now work on the motion for approval of settlement, with the next hearing on the matter scheduled for January 23, the docket entry said.

Consumers behind the suit said Clearview AI violated BIPA because it failed to get their consent before using billions of online images to support its facial recognition technology.

Clearview AI did not reply to a request for comment.

BIPA mandates that companies obtain subjects’ permission prior to using facial recognition and other technologies to identify individuals.

The ACLU and Clearview separately settled a sweeping lawsuit last May, with the civil liberties group compelling Clearview to adhere to new rules forcing the company to comply with BIPA. The settlement restricts Clearview’s sales of its trove of faceprints across the United States.

“Among the provisions in the binding settlement, which will become final when approved by the court, Clearview is permanently banned, nationwide, from making its faceprint database available to most businesses and other private entities,” the ACLU said in a news release at the time. “The company will also cease selling access to its database to any entity in Illinois, including state and local police, for five years.”

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.


Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

More evidence of Russian intelligence exploiting old Outlook flaw

Next Post

Two-day water outage in remote Irish region caused by pro-Iran hackers

Related Posts

Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks

The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched security flaw impacting Apache RocketMQ to co-opt susceptible servers and expand its scale. "Muhstik is a well-known threat targeting IoT devices and Linux-based servers, notorious for its ability to infect devices and utilize them for cryptocurrency mining and launching Distributed Denial
Read More