Our website uses cookies so we can analyse our site usage and give you the best experience. Click "Accept" if you’re happy with this, or click "More" for information about cookies on our site, how to opt out, and how to disable cookies altogether.
We respect your Do Not Track preference.
The third part of rule 1 is implementing appropriate privacy safeguards. If a privacy safeguard is reasonable in the circumstances for you to adopt and implement, rule 1 requires you to do so before you start collecting biometric information.
On this page:
Privacy safeguards are measures that reduce privacy risk, increase the transparency and accountability of the biometric system, and increase the control individuals have over their information.
There are some examples of privacy safeguards below, but the list is not exhaustive. You can and should implement privacy safeguards that are not listed if they are relevant to your use of biometrics. You should also continue to assess safeguards throughout your use of biometrics to ensure your safeguards remain effective and appropriate – for example through regular audits, or whenever you make a material change to how your system works.
You need to consider the overall context and privacy risk of your biometric processing. Consider the kind of biometric system you will use, the relationship you have with affected individuals, the consequences if biometric information is lost, misused, inappropriately accessed or disclosed etc., and the likelihood of and consequences from errors in the biometric system.
A safeguard can still be reasonable in the circumstances to implement even if it is difficult, expensive or takes time to implement. You need to factor in the costs of relevant safeguards to your overall planning. But, a wholly disproportionate cost or difficulty to implement could make a safeguard no longer reasonable.
The more severe the consequences for individuals from misuse of their biometric information, or errors in the biometric system, then the more likely it is that a safeguard will be appropriate, even at a high cost or difficulty to implement.
Rule 1 requires you to ensure that the relevant safeguards are adopted or implemented before you collect information. You should continue to assess your safeguards for as long as you are collecting biometric information and make any changes that are necessary to ensure your safeguards are appropriate and effective.
Giving individuals the choice to authorise the biometric processing or use an alternative to biometric processing is an important safeguard to mitigate privacy risk because you give them control and agency over the collection of their personal information. It won’t always be appropriate – for example, in some contexts like fraud prevention, requiring or even offering authorisation may undermine your lawful purpose. However, if it will not undermine your lawful purpose, organisations should consider whether individual authorisation and/or providing an alternative is reasonable in the circumstances, particularly if you have a direct interaction with the individual you are collecting information from.
If you are implementing individual authorisation as a safeguard, you should consider:
You should not make unnecessary obstacles that would prevent individuals choosing the alternative to biometric processing, such as by requiring additional information, unnecessarily delaying access to services, hiding or de-prioritising the alternative option, or penalising the individual for choosing an alternative. You should also consider accessibility for people with disabilities to ensure your alternative does not exclude anyone.
If you are using authorisation as a safeguard, then the authorisation must be explicit. You cannot rely on assumed or implied authorisation – for example, continuing to use a service, or entering a space where biometric information is collected (e.g. a store using a FRT system) would not be sufficient evidence of authorisation. You should also seek fresh authorisation for any material changes in how you collect, use, hold or disclose information.
A fitness gym plans to use FRT for members to access its facilities. Individual authorisation and a non-biometric alternative could be used as a useful safeguard to reduce privacy risk by having a specific entry gate where the FRT would not operate, and individuals could instead use a swipe card.
However, if members were told that if they do not authorise the biometric processing, they can no longer access the gym but still have to pay membership fees for the rest of their contract, then this would not be reasonable implementation of authorisation as a safeguard because the individuals were not given a genuine choice.
A watchlist is where you have a list of specific individuals whose information is enrolled in your biometric system and who you want to identify to take some kind of adverse action against them – for example, removing them from your premises, monitoring their behaviour or imposing a fine on them. If you are using a biometric system to operate a watchlist, there are some key safeguards you should implement to help mitigate the privacy risks.
It is not necessary for you to know the names or any other details of people on your watchlist.
First, when deciding whether to add someone to a watchlist, we expect:
The minimum accuracy match threshold should be carefully considered and appropriate to your circumstances.
In addition, if you are operating a biometric watchlist, in general you should inform an individual on the watchlist of the following matters, (unless doing so is not practical in the circumstances):
You should also delete any biometric information of individuals not on the watchlist as soon as it is determined that they are not a match to an individual on the watchlist. For example, if you are using a FRT system to identify specific individuals, you should immediately delete the biometric information of anyone not on the watchlist.
In some situations, informing individuals about their inclusion on the watchlist will not be appropriate or feasible, for example if you do not have the individual’s contact details, if it is not safe to approach the individual or if informing the individual would undermine the purpose of the biometric watchlist. However, if you can’t notify individuals directly, you should still consider whether you can provide general information about the watchlist e.g. on your website.
The biometric system should be subjected to testing and/or assurance processes before you collect any biometric information. This could involve:
You may be able to rely on the testing done by a provider of the biometric system – particularly if the overall risk of your use of biometrics is low. However, you still need to ensure you have sufficient confidence that the testing was sufficient for your purposes – for example, by seeking evidence of the testing and assessing whether you need to do additional independent testing. Additional testing or assurance may be particularly relevant if you are using FRT, given the lack of existing testing on New Zealand faces.
Your testing process should also help you identify what other safeguards are necessary to have in place to reduce the risk that individuals may suffer real detriment or harm because of errors or false matches or non-matches by the system.
You need to have a plan for how you are going to keep information secure before you collect it, including by considering any security issues with using a third-party provider.
Some security safeguards which will generally be relevant for organisations to implement are:
Read more guidance on Security and Access controls in Poupou Matatapu, or our guidance on rule 5 of the this Code.
Having human oversight of your biometric system is an important safeguard. However, it is not enough to simply have human involvement – it is how people are involved that matters.
The human oversight or monitoring needs to be by individuals who have sufficient training to understand how the system works and what a match by the system means. They also need to have the confidence to overrule the system if there is a mistake. They need to be providing genuine scrutiny, not merely confirming results without proper assessment (e.g. due to “automation bias”, which is the tendency for people to over-rely on automated systems when making human decisions).
Having effective oversight requires agencies to have process in place to:
You should regularly review and audit any biometric system and the safeguards that are in place. This can be done by your organisation, but you should consider whether to use an external party to review and audit the system. Where the overall privacy risk is higher, it will be more appropriate to have external review and audit.
The review and audit could cover the overall performance of the system, security safeguards, staff training, any adverse actions taken, how information has been used and disclosed, performance of third-party vendors, compliance with policies, protocols and procedures etc.
We expect organisations to continue to review and audit throughout the whole life of a biometric system. It will often be appropriate to conduct the reviews and audits at a higher frequency when the system is first being used, and again following any significant changes.
You should have appropriate policies and procedures that govern the use of any biometric system. But it is not enough just to have the policies and procedures in place – they must be fit for purpose and followed by staff. These documents should be regularly reviewed and updated as necessary.
Policies and procedures should address:
The final step of rule 1 is assessing the proportionality of the collection.