Written Consent Requirements
A practical guide to written consent requirements for privacy law practitioners.
What This Lesson Covers
Written Consent Requirements is a key topic within BIPA (Illinois) Deep Dive. In this lesson you will learn the underlying privacy law doctrine, the controlling statutory and regulatory authorities, how to apply the rules to real fact patterns, and the open questions practitioners are actively litigating. By the end you will be able to engage with written consent requirements in real privacy work with confidence.
This lesson belongs to the Biometric Privacy category of the Data Privacy Law track. Privacy law is one of the most active and most fragmented practice areas globally. Understanding the doctrinal foundations is what lets you reason about novel issues across jurisdictions, not just memorize current rules.
Why It Matters
Master BIPA in operational depth. Learn the Cothron v White Castle decision, statutory damages math, 'biometric identifier/information' definitions, written consent requirements, and major settlements.
The reason written consent requirements deserves dedicated attention is that the gap between practitioners who understand the doctrinal foundations and those who only know surface-level rules is widening as new privacy laws roll out worldwide every quarter. Compliance officers, privacy counsel, and engineers who can reason from first principles will be far ahead of those who can only cite current statutes. This material gives you the framework to keep pace as privacy law evolves.
How It Works in Practice
Below is a practical privacy compliance framework for written consent requirements. Read through it once, then think about how you would apply it to a real client matter or product decision.
# BIPA core provisions and damages math
BIPA_KEY_PROVISIONS = {
"Section_15a_Retention_Schedule": "Develop written policy for retention/destruction; destroy within 3 years",
"Section_15b_Informed_Consent_BEFORE_collection": [
"Inform subject in writing that biometric data is collected/stored",
"Inform of specific purpose and length of term collected/stored",
"Receive a written release",
],
"Section_15c_No_Sale": "Cannot sell, lease, trade, or profit from biometric data",
"Section_15d_Disclosure_Restrictions": "Cannot disclose without consent",
"Section_15e_Reasonable_Care": "Use reasonable care to safeguard biometric data",
}
DAMAGES = {
"negligent_violation": "$1,000 per violation OR actual damages, whichever greater",
"intentional_or_reckless": "$5,000 per violation OR actual damages, whichever greater",
"attorneys_fees": "Reasonable attorneys' fees and costs",
"injunctive_relief": "Available",
}
COTHRON_V_WHITE_CASTLE_2023 = {
"holding": (
"Each scan/transmission is a separate violation under Section 15(b) and (d). "
"NOT just first scan."
),
"implication": "Aggregated damages can be billions for high-frequency biometric use",
"current_status": "IL legislature passed amendment in 2024 reducing per-scan to per-person",
}
DAMAGES_MATH_EXAMPLE = """
Pre-Cothron interpretation (per person):
100,000 employees * $1,000/violation = $100 million
Cothron interpretation (per scan, pre-2024 amendment):
100,000 employees * 5 scans/day * 365 days * 5 years * $1,000/violation
= $912 BILLION
2024 amendment likely caps recovery at per-person level."""
Step-by-Step Analytical Approach
- Identify scope and applicability — Privacy laws have specific scope triggers (territorial, sectoral, threshold-based). Confirm whether the law applies before mapping obligations.
- Map data flows and roles — Document what personal data is collected, where it flows, who processes it, and what role each actor plays (controller, processor, joint controller, third party).
- Determine lawful basis or exemption — Each processing activity needs a legal basis. Document the basis, the necessity analysis, and any DPIA required.
- Operationalize the obligations — Privacy laws impose concrete duties: notice, consent, data subject rights handling, breach notification, retention, transfers. Build them into the SDLC.
- Build audit-ready evidence — Privacy regulators expect evidence of compliance. Maintain ROPA, DPIAs, training records, breach logs, DSR responses, and policy versions.
When This Topic Applies (and When It Does Not)
Written Consent Requirements applies when:
- You handle personal data subject to the relevant statute or regulation
- The territorial, sectoral, or threshold scope of the law captures your activities
- The remedies or rights at stake are recognized by the relevant regime
- You need to demonstrate compliance to regulators, customers, or in litigation
It does not apply when:
- You truly do not handle personal data subject to the law (verify carefully)
- A different privacy law better fits the facts
- The data falls within a recognized exemption (research, journalism, employment in some regimes)
- You are purely processing anonymized data outside the regime's scope
Practitioner Checklist
- Have you identified every privacy law that applies to this data flow?
- Is the lawful basis for each processing activity documented and defensible?
- Are data subject rights handled within the required timelines?
- Are international transfers backed by an appropriate transfer mechanism?
- Is your breach notification process tested and runbook-ready?
- Have you documented the analysis with citations for future reference?
Disclaimer
This educational content is provided for general informational purposes only. It does not constitute legal advice, does not create an attorney-client relationship, and should not be relied on for any specific legal matter. Privacy law varies by jurisdiction and changes rapidly. Consult qualified privacy counsel licensed in your jurisdiction for advice on your specific situation.
Next Steps
The other lessons in BIPA (Illinois) Deep Dive build directly on this one. Once you are comfortable with written consent requirements, the natural next step is to combine it with the patterns in the surrounding lessons — that is where doctrinal mastery turns into practitioner competence. Privacy law is most useful as a system, not as isolated rules.
Lilly Tech Systems