Businesses of all sizes and sectors may be subject to unlawful data processing claims. According to the International Association of Privacy Professionals, lawsuits focusing on whether businesses lawfully collect and use personal data have been steadily increasing. These claims can cause significant financial and reputational damage to companies.

As businesses analyze the risks associated with personal data collection, they must be familiar with an evolving regulatory landscape and take steps to address their exposures. This article provides more information on what wrongful data collection is and areas of concern. It also provides tips for businesses to mitigate the risks associated with wrongful data collection.

What is Wrongful Data Collection

What constitutes wrongful, or unlawful, data collection varies by jurisdiction. While there currently isn’t an overarching national consumer data privacy law in the United States, several states have enacted legislation that affords individuals those protections. Aspects of U.S. laws also apply to certain sectors (e.g., the Health Insurance Portability and Accountability Act, or HIPAA, applies to health care) and individuals (e.g., children receive data protection through the Children’s Online Privacy Protection Act). Additionally, different laws are in place internationally. This range of legislation can make it difficult for businesses to understand the various rules that are in effect.

Even though it may be complicated, businesses have the duty to comply with applicable data privacy laws. For example, depending on the jurisdiction, there may be regulations that dictate how or if an organization may collect, use and share personal data. There may also be requirements for the business to inform consumers that data is being collected and to allow the consumer to opt out of that collection. Failure to adhere to relevant laws may be considered wrongful and businesses maybe subject to fines and potential litigation.

Areas of Concern

Certain aspects of personal data collection are areas of concern. Examples of areas laws may regulate include:

  • Biometric data—Collection of data regarding unique physical characteristics (e.g., fingerprints, faces, voice patterns) has been regulated by some jurisdictions. For example, Illinois has enacted the Biometric Privacy Act, which forbids businesses from collecting biometric data unless the business has informed the individual about the data being collected, provided information on how long it will be stored and received written consent.
  • Pixel tracking—The use of pixel technology to track how individuals use websites to target advertisements may be subject to regulations. For example, under the European Union’s General Data Protection Regulation, pixel tracking technology may only be used if an individual consents, while the California Privacy Rights Act (CPRA) requires users to be notified of the implementation of pixels and how they will be processed.

Additionally, the United States Video Privacy Protection Act (1988), originally enacted to prevent the disclosure of personal information obtained from renting videos, has seen a modern application in lawsuits involving data collected through pixel tracking. Furthermore, HIPAA can be used to safeguard patients’ confidential health data that may be exposed to third parties utilizing pixels.

  • Genetic information—Data that is compiled from the analysis of a person’s biological sample and involves genetic material (e.g., DNA, genes, chromosomes) may also be subject to regulations. For example, the Genetic Information Privacy Act in California provides its residents with rights and protections over their data when they use direct-to-consumer genetic testing companies.
  • Precise geolocation—There may be legal obligations regarding collecting and processing data that is used to locate a consumer within a specific area. For example, the CPRA requires individuals to receive notice and the right to limit the use and disclosure of that precise geolocation information.

Risk Mitigation strategies

It is essential for businesses to implement risk management strategies to reduce the likelihood of lawsuits, reputational damage, and regulatory fines and penalties stemming from wrongful data collection claims. Examples of techniques to consider include:

  • Weigh the benefits and drawbacks of data collection and determine if alternative marketing strategies that do not require data collection exist.
  • Provide notice and obtain consent before collecting, processing, using, sharing or selling personal data.
  • Allow individuals to opt out of having their personal data collected.
  • Limit personal data collection to only what is necessary.
  • Monitor regulations as they are quickly evolving.
  • Conduct audits of data collection practices to ensure they conform to applicable regulations.
  • Provide education to employees on proper technology use and applicable legislation.
  • Review insurance coverage with a licensed professional to determine if coverage is available for wrongful data collection claims.

Claims of wrongful data collection are rising, and businesses should take steps to mitigate their exposure to this risk. For more information and risk management guidance, contact INSURICA today.

Additional Resources

Managing Cybersecurity During a Merger or Acquisition

10 Cyber Security Resolutions

9 Controls to Know this National Cybersecurity Month

Creating a Cybersecurity Culture

Working Remotely From Public Spaces

This is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. ©2023 Zywave, Inc. All rights reserved

About the Author

INSURICA
INSURICA

Share This Story

Stay Updated

Subscribe to the INSURICA blog and receive the latest news direct to your inbox.

Related Blogs

Five Strategies for Reducing Workers’ Compensation Costs

May 29th, 2025|Blog, Risk Management, Trending|

When a company experiences significant increases in workers’ compensation costs, it usually triggers internal activities aimed at reducing insurance costs and spending. The key to spending fewer dollars is more than just stopping a few accidents; it is having a sound safety program designed to continuously improve. This is where a safety program that, at a minimum, is compliant with the Occupational Safety and Health Administration (OSHA) standards can yield significant savings for by reducing injuries and illnesses, saving workers’ compensation dollars.

Hidden Risks of Summer School: Operational Safety Strategies Schools Can’t Ignore

May 21st, 2025|Blog, Education|

Summer school risk management is essential to ensuring student and staff safety during the warm months. Many districts overlook the unique challenges tied to summer school risk management. Often, summer sessions operate in secondary campuses, under temporary staffing, and with reduced oversight—making them vulnerable. Proactive planning is essential to keep students and staff safe in environments that may not be designed for extended year-round use.

Navigating Cybersecurity Challenges in the Construction Industry

May 19th, 2025|Blog, Construction, Trending|

The construction industry is continuously moving toward digitization, adopting advanced technology such as artificial intelligence, the Internet of Things (IoT) and Building Information Modeling software. These innovations help to automate tasks, reduce waste and improve efficiency, productivity and safety.

Go to Top