Alex is Sprintlaw’s co-founder and principal lawyer. Alex previously worked at a top-tier firm as a lawyer specialising in technology and media contracts, and founded a digital agency which he sold in 2015.
Biometric tools promise speed and security - fingerprint time clocks, facial recognition for building access, voice IDs for support lines and more.
But because biometric data is highly sensitive, UK GDPR treats it differently to ordinary personal data. That means you’ll need a clear legal basis, the right safeguards and strong documentation before you roll anything out.
In this guide, we’ll break down what counts as biometric data under GDPR, when you can use it lawfully, and the practical steps to implement biometric tech safely in your small business.
What Is Biometric Data Under GDPR?
Under UK GDPR, biometric data means personal data resulting from specific technical processing relating to the physical, physiological or behavioural characteristics of a person which allows or confirms unique identification - think facial images used in a facial recognition system, fingerprint templates, iris scans, or voiceprints when they’re processed to identify someone.
Two key points for small businesses:
- Biometric data is personal data if it relates to an identifiable individual. So, is biometric data personal data? Yes - if you can identify a person (directly or indirectly) via that data, it’s personal data.
- When used for the purpose of uniquely identifying a person, biometric data is “special category” data. That triggers additional legal hurdles on top of the standard GDPR rules.
Not all images or recordings are automatically biometric data. A standard CCTV feed without any technical processing to identify people isn’t biometric data. But once you use software to extract and match a unique template (for example, facial recognition), it is.
Because biometric data is special category data, you can only process it if you have both:
- a lawful basis under Article 6 UK GDPR (such as legitimate interests or consent); and
- a separate special category condition under Article 9 UK GDPR and the Data Protection Act 2018 (DPA 2018), such as explicit consent or specific substantial public interest grounds set out in Schedule 1 DPA 2018.
In short: the bar is higher than for ordinary customer or employee information. You’ll need to be able to justify why biometrics are necessary and proportionate for your purpose.
When Can UK Businesses Use Biometric Data Lawfully?
Before collecting a single fingerprint or facial template, decide exactly why you want to use biometrics and whether you can achieve the same aim with a less intrusive option. Regulators expect you to consider alternatives like ID cards, PINs or manual checks.
Here’s how the legal tests typically play out for small businesses:
1) Lawful Basis Under Article 6
- Legitimate interests: Often relied on for access control or fraud prevention, but you must carry out a legitimate interests assessment (LIA). Ask: Is the purpose legitimate? Is biometric processing necessary to achieve it? Do individuals’ rights outweigh your interests?
- Consent: Possible in consumer-facing scenarios (e.g. a voluntary fast-track queue using face verification). In practice, consent must be freely given, specific, informed and unambiguous - and it must be as easy to refuse as to accept.
- Legal obligation or contract: Less common for biometrics unless a law specifically requires it or the processing is strictly necessary to perform a contract with the individual (rare for biometrics).
2) Special Category Condition Under Article 9/DPA 2018
- Explicit consent: A high standard. You’ll need a clear, affirmative statement from the individual and robust records showing they understood and agreed. Pre-ticked boxes or bundled consents won’t cut it.
- Substantial public interest: Only available for specific purposes listed in Schedule 1 DPA 2018 (e.g. crime prevention in particular contexts) and requires an Appropriate Policy Document and extra safeguards. It isn’t a catch‑all for convenience.
Employment settings are especially tricky. Because consent isn’t usually “freely given” where there’s a power imbalance, relying on explicit consent to require staff to clock in with biometrics can be risky. If attendance can be monitored effectively with less intrusive tools, regulators are likely to prefer that approach.
Whichever route you take, document your analysis, complete a DPIA (Data Protection Impact Assessment) and be ready to evidence why biometrics are necessary and proportionate for your specific use case.
Core GDPR Duties If You Process Biometrics
If you decide to proceed, the usual GDPR principles apply - but with added safeguards because biometrics are special category data. Build these into your plan from day one:
Transparency And Notices
Tell people - clearly and up front - what you’re doing and why. Your public-facing and staff notices should cover the purposes, lawful basis, special category condition, retention periods, rights, and who you share data with. For websites or apps, make sure your Privacy Policy is accurate and accessible.
Consider publishing a plain-English summary at the point of collection (e.g. at the entrance or on the device screen) alongside your full Privacy Policy.
Data Minimisation And Purpose Limitation
Collect the minimum you need (e.g. a biometric template rather than a raw image) and use it only for the stated purpose. Don’t repurpose the data for attendance, performance monitoring or marketing unless you have clearly stated this, have a valid legal basis and it passes your DPIA.
Storage Limitation And Deletion
Set strict retention periods. If someone leaves your business or chooses an alternative access method, remove their template promptly. Keep deletion logs so you can evidence compliance.
Security And Access Controls
Use strong technical and organisational measures: encryption of templates at rest and in transit, hardware security modules or secure enclaves where possible, multi-factor admin access, and segregation of duties. Keep biometric data separate from other identifiers and strictly limit who can access it.
Data Protection Impact Assessment (DPIA)
Biometric processing is high-risk, so a DPIA is usually mandatory. Map the data flows, identify risks to individuals (misuse, function creep, discrimination) and set out mitigations.
Vendor Management And Contracts
If a third-party supplier stores or analyses biometric templates, they’re your processor. Put a robust Data Processing Agreement in place covering security, sub-processors, audit rights, assistance with DPIAs and incident response. Carry out due diligence and keep it on file.
Records, Policies And Training
- Maintain Records of Processing Activities (ROPAs) that reflect your biometric workflows.
- Train staff on the proper use of the system and what to do if a device is lost, compromised or malfunctioning.
- Prepare for incidents with a tested Data Breach Response Plan.
Rights Requests
Be ready to respond to subject access, objection and deletion requests within statutory timeframes. Your processes should explain what information you can provide (e.g. metadata, enrolment dates) without compromising system security. If you need a refresher, our guide to handling subject access requests walks through the essentials.
Biometrics At Work: Time Clocks, Access Control And Monitoring
Biometrics can be tempting for staff access control, health-and-safety restricted areas, or reducing “buddy punching”. However, employment is a high‑risk environment for biometrics, so take extra care.
Attendance And Timekeeping
Systems that scan fingerprints or faces to clock in must pass the necessity and proportionality test. If a swipe card achieves the same aim with less intrusion, that’s likely to be preferred. If you’re exploring biometric time clocks, our deep dive on fingerprint clocking explains the legal pitfalls and safer alternatives.
Building Access And Security
Access control may be easier to justify where there’s a clear security need (e.g. server rooms, labs). Keep enrolment voluntary where possible and provide a non-biometric option.
CCTV, Audio And Monitoring
Adding analytics that identify people from camera feeds moves you into biometric territory. Audio recording with surveillance raises separate risks under privacy and investigatory powers regimes - see the issues covered in CCTV with audio. If your aim is workplace compliance rather than identification, consider less intrusive approaches or aggregate analytics that don’t create biometric templates.
Remember that employee monitoring of any kind (internet usage, keystrokes, location) engages UK GDPR and employment law. Transparency, necessity and fairness are key, and the bar is high where monitoring can feel intrusive or punitive.
How To Implement Biometric Tech Safely: Step-By-Step
If you’ve weighed alternatives and still believe biometrics are justified, follow a structured rollout. Here’s a practical, no‑nonsense plan you can run with:
1) Define The Use Case And Success Measures
- Be specific: “reduce tailgating into the workshop” or “cut time fraud by 20%”.
- List non‑biometric alternatives and why they don’t meet the need.
2) Complete A DPIA Early
- Map data flows from enrolment through deletion.
- Assess risks (misidentification, bias, function creep, vendor lock‑in) and document mitigations.
3) Choose Your Lawful Basis And Special Category Condition
- Record your analysis and keep evidence (e.g. LIA, consent records, Appropriate Policy Document if needed).
4) Engage Stakeholders
- Consult staff representatives or your Health & Safety committee where relevant.
- Offer a reasonable alternative (e.g. a card or PIN) and make sure opting out doesn’t penalise the individual.
5) Update Documentation
- Refresh your Privacy Policy, internal privacy notices and security policy.
- Put a Data Processing Agreement in place with your supplier and capture the processing in your ROPA.
6) Configure Security
- Use template-based storage rather than raw images or full voice recordings wherever possible.
- Enable encryption, tamper detection and audit logs; minimise administrator accounts.
7) Pilot And Validate
- Run a limited pilot. Check false accept/false reject rates, demographic performance and usability.
- Stress‑test deletion and fallback processes (what happens when a sensor fails?).
8) Train, Launch And Monitor
- Train staff on enrolment, alternatives, and how to raise concerns.
- Monitor performance, complaints and incidents; schedule a DPIA review after 3–6 months.
9) Prepare For Incidents And Requests
- Have a tested Data Breach Response Plan and clear scripts for handling access, objection and deletion requests.
If you’d like a streamlined bundle of core privacy documents, our GDPR Package can save time and ensure your paperwork aligns with your biometric rollout.
Common Pitfalls And How To Avoid Them
Biometric projects often stumble on the same issues. Avoid these traps from the start:
- Relying on consent where it isn’t freely given: In the workplace, consider whether staff can genuinely say “no” without detriment. If they can’t, consent may not be valid.
- Skipping the DPIA: Regulators expect to see a DPIA for high‑risk processing like biometrics. Treat it as your risk and design playbook, not a tick‑box exercise.
- Function creep: Using biometric data for new purposes without clear notice, a fresh lawful basis and an updated DPIA can quickly land you in hot water.
- Keeping raw images or voice files: If your system can run on templates, do that. Templates typically carry lower risk than storing rich raw media.
- Weak vendor contracts: Without a strong Data Processing Agreement, you may lack control over sub‑processors, locations of storage, and breach response.
- All‑or‑nothing enrolment: Provide a non‑biometric option. Penalising people who opt out can undermine fairness and lawfulness.
- Poor signage and notices: People should understand what you’re doing at the point of collection. Add clear signage, device‑screen messaging and references to your Privacy Policy.
- Missing incident playbooks: If a device is stolen or compromised, you’ll need to act fast. Keep your Data Breach Response Plan close and tested.
- Ignoring equality impacts: Test false rejections across demographics; ensure your system doesn’t disadvantage particular groups.
- No plan for rights requests: Know how you’ll answer access or deletion requests without exposing system security - align with your process for subject access requests.
- Over‑recording with surveillance: If your cameras also capture audio, check the additional rules and risks highlighted in CCTV with audio.
Key Takeaways
- Biometric data used for identification (e.g. fingerprints, facial templates, voiceprints) is “special category” data under UK GDPR - it sits behind a higher legal bar.
- You’ll need both a lawful basis under Article 6 and a special category condition under Article 9/DPA 2018. In workplaces, relying on consent is rarely straightforward.
- A DPIA is essential. Show why biometrics are necessary and proportionate, assess risks, and record mitigations before you deploy.
- Build privacy by design: clear notices, data minimisation, strict retention, strong security and documented vendor controls via a solid Data Processing Agreement.
- Offer a non‑biometric alternative wherever possible and avoid penalising people who opt out.
- Prepare for incidents and rights requests with an up‑to‑date Data Breach Response Plan and procedures for subject access requests.
- Get your paperwork right from day one - your Privacy Policy, DPIA, internal records and supplier contracts should all reflect your biometric rollout.
If you’d like tailored help to assess your use case, run a DPIA or set up the right documents for biometric data under GDPR, our team is here to help. You can reach us at 08081347754 or team@sprintlaw.co.uk for a free, no‑obligations chat.


