FaceSign
Security

Compliance & Regulatory

GDPR, CCPA, BIPA, SOC 2, ISO 27001, and PSD3 regulatory alignment for FaceSign deployments.

FaceSign is designed to operate within strict regulatory frameworks. This page covers how FaceSign aligns with GDPR, CCPA, BIPA, SOC 2, ISO 27001, and PSD3, and what documentation is available for your compliance team.

GDPR

FaceSign operates as a data processor under the General Data Protection Regulation. Your organization is the data controller.

GDPR requirementHow FaceSign addresses it
Lawful basisProcessing is based on your lawful basis as controller (typically legitimate interest or consent). FaceSign does not independently determine the lawful basis.
Data Processing Agreement (DPA)Available on request. The DPA covers the scope of processing, data categories, retention, sub-processors, and breach notification obligations.
Data Protection Impact Assessment (DPIA)FaceSign provides DPIA support materials, including a description of processing operations, risk analysis, and safeguards. Your DPO uses these to complete your organization's DPIA.
Data subject rightsFaceSign supports access, deletion, restriction, and portability requests. See Biometric Data Handling for details.
International transfersFaceSign processing infrastructure is located in the EU and US. Where transfers occur outside the EEA, they are covered by Standard Contractual Clauses (SCCs) included in the DPA.
Breach notificationFaceSign notifies controllers within 72 hours of becoming aware of a personal data breach, as required by Article 33.
Data minimizationRaw biometric data is processed in memory and discarded. Only tokenized fingerprints and session metadata are retained. See Security Architecture.

CCPA

FaceSign operates as a service provider under the California Consumer Privacy Act and CPRA amendments.

CCPA requirementHow FaceSign addresses it
Service provider agreementFaceSign processes personal information only on your behalf and for the business purpose specified in the agreement.
No sale of dataFaceSign does not sell personal information. Biometric data is used only for the verification session you initiated.
Right to knowFaceSign supports disclosure of what personal information is collected and how it is used, on request from the controller.
Right to deleteFaceSign deletes biometric data within 30 days of a valid deletion request. See Biometric Data Handling.
Sensitive personal informationBiometric data is classified as sensitive PI under CCPA/CPRA. FaceSign's use is limited to the purpose of identity verification.

BIPA

The Illinois Biometric Information Privacy Act imposes specific requirements on the collection, storage, and use of biometric identifiers.

BIPA requirementHow FaceSign addresses it
Written consentBIPA requires informed written consent before collecting biometric identifiers. As data controller, you are responsible for obtaining this consent before initiating a FaceSign session.
Retention and destructionFaceSign applies automatic retention limits: 12-month inactivity purge and 3-year maximum retention. See Biometric Data Handling for details.
Prohibition on saleFaceSign does not sell, lease, trade, or otherwise profit from biometric identifiers or information.
Storage and protectionBiometric fingerprints are stored as one-way tokenized hashes with AES-256 encryption at rest and TLS 1.3 in transit.
Private right of actionBIPA provides individuals a private right of action for violations. Your compliance team should ensure consent mechanisms and data handling practices meet BIPA requirements before deploying in Illinois.

SOC 2 Type II

FaceSign is pursuing SOC 2 Type II certification.

AspectStatus
Audit scopeSecurity, Availability, Confidentiality
Current statusIn progress
Expected completionContact security@facesign.ai for the latest timeline
Controls in placeEncryption at rest (AES-256) and in transit (TLS 1.3), HSM key management, role-based access control, audit logging, vulnerability scanning

ISO 27001

FaceSign is built to ISO 27001 security standards following secure-by-design and privacy-by-design principles.

AspectDetails
Information security managementFormal ISMS covering risk assessment, access control, incident management, and business continuity
Secure developmentSecurity reviews integrated into the development lifecycle
Encryption standardsAES-256 at rest, TLS 1.3 in transit, HSM-managed key material
Access controlRole-based access with principle of least privilege

PSD3 Strong Customer Authentication

The revised Payment Services Directive (PSD3) introduces stricter requirements for Strong Customer Authentication (SCA) and shifts liability for coached transfer fraud to payment service providers.

PSD3 requirementHow FaceSign addresses it
Strong Customer AuthenticationFaceSign provides multi-factor verification: inherence (biometric), plus optional knowledge or possession factors (conversation, email OTP, SMS OTP).
Coached transfer liabilityPSD3 makes providers liable when customers are coached into authorizing fraudulent payments. FaceSign's coercion detection provides an auditable signal of whether the user was acting under duress at authorization time.
Dynamic linkingVerification sessions can include transaction-specific details (amount, recipient) that are confirmed by the user during the conversational node.
Audit trailEvery session produces a timestamped record including risk scores, transcript, and coercion analysis -- evidence for regulatory review and dispute resolution.

Coercion detection as a PSD3 compliance tool

Under PSD3, a payment provider that processes a coached transfer may be liable for the loss. Traditional SCA (OTP + password) cannot detect coaching. FaceSign's coercion detection creates an auditable record that the user was -- or was not -- acting freely at the moment of authorization.

This gives providers:

  • Evidence of due diligence -- The provider took steps beyond standard SCA to verify the user's state of mind
  • A decision point -- High coercion risk scores can trigger manual review or transaction hold before funds are released
  • Regulatory documentation -- Timestamped, structured data suitable for regulator requests

Available documentation

DocumentHow to obtain
Data Processing Agreement (DPA)developers@facesign.ai
DPIA support materialsprivacy@facesign.ai
SOC 2 Type II reportsecurity@facesign.ai (when available)
Security whitepaperdevelopers@facesign.ai
Sub-processor listIncluded in the DPA

Next steps

On this page