No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Data Privacy

Are Your BYOD Policies Fifth Amendment-Ready? The Growing Tension Between Biometrics & Individual Rights

Series of conflicting rulings suggest topic is ripe for Supreme Court review

by Luke Cass, Chukwukpee Nzegwu and Joe Whitley
March 11, 2025
in Data Privacy
phone biometric unlock

As digital security evolves, the constitutional implications of accessing locked devices continue to divide federal courts. Luke Cass, Chukwukpee Nzegwu and Joe D. Whitley of Womble Bond Dickinson analyze the contrasting interpretations between the Ninth and DC circuits regarding compelled biometrics, highlighting how these contradictory rulings create urgent challenges for corporate compliance programs balancing investigative needs against employees’ constitutional protections.

Chief Justice Roberts observed in 2014 that modern cell phones are “such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy.” Since then, cell phones and other digital devices remain ubiquitous as new technologies evolve to ensure data security and privacy. 

Digital devices use biometric prompts like Touch ID (fingerprint recognition), Face ID (facial recognition) or Optic ID (iris recognition) to authenticate a user’s identity while others employ patterns or PIN numbers to unlock devices, make purchases and access sensitive data.

These technologies pose challenges for law enforcement when seizing or compelling the disclosure of this data. In the past year, two circuit courts have reached conflicting decisions and district courts have issued diverse holdings on this issue. 

Fifth Amendment concerns in the context of compelled disclosure of biometrics seems clearly a subject ripe for Supreme Court review. 

Compelled biometrics are a significant issue for ephemeral communications in the context of corporate investigations. Companies do not have a Fifth Amendment privilege, but employees do, and the lines of when ephemeral communications are business records or personal communications blur depending on context and circumstances. In light of BYOD policies, compliance programs should strike a balance between individual rights and data security. 

Fifth Amendment & the act of production doctrine

The Fifth Amendment provides that “[n]o person … shall be compelled in any criminal case to be a witness against himself.” The privilege against self-incrimination extends not only “to answers that would in themselves support a conviction under a federal criminal statute but likewise embraces those which would furnish a link in the chain of evidence needed to prosecute … [an individual] for a federal crime.” To assert the privilege against self-incrimination, a witness must show that information is: (1) compelled; (2) incriminating; and (3) testimonial. A statement is considered “testimonial” when an accused’s “communication must itself, explicitly or implicitly, relate a factual assertion or disclose information.” The government may not compel a witness “to use the contents of his own mind” to communicate something factual since this is equivalent to testimony and barred by the Fifth Amendment.

Certain communications or acts are not considered testimonial even when incriminating. For example, “a suspect may be compelled to furnish a blood sample; to provide a handwriting exemplar, or a voice exemplar; to stand in a lineup; and to wear particular clothing.”

The act-of-production doctrine recognizes that although “the Fifth Amendment does not independently proscribe the compelled production of every sort of incriminating evidence,” it does apply “when the accused is compelled to make a testimonial communication that is incriminating.” The Supreme Court has held that the “act of producing evidence in response to a subpoena … has communicative aspects of its own, wholly aside from the contents of the papers produced.” The Supreme Court has observed that the “more difficult issues are whether the tacit averments of the [individual] are both ‘testimonial’ and ‘incriminating’ for purposes of applying the Fifth Amendment. These questions perhaps do not lend themselves to categorical answers; their resolution may instead depend on the facts and circumstances of particular cases …” 

Compelled disclosure of biometric data is one such “difficult” issue that focuses heavily on the act-of-production doctrine.

worker using thumbprint machine at door
Data Privacy

Data Privacy Laws Protect Consumers, But They Can Apply to Your Employees, Too

by Ashley Orler and Sarah Rugnetta
August 6, 2024

States increasingly enacting laws covering employee data

Read moreDetails

The conflict among the Ninth & DC circuits

Last year in United States v. Payne, the defendant argued that the officers violated his Fifth Amendment right against self-incrimination when they compelled him to unlock his phone with his fingerprint. During a traffic stop, the defendant, Jeremy Payne, a California parolee, was arrested and compelled to unlock his phone for officers. 

During legal proceedings, the officers conceded that Payne satisfied the first two prongs for Fifth Amendment protection, that the use of his fingerprint was compelled and incriminating, but they disagreed it was testimonial. 

The Ninth Circuit explained that a testimonial communication requires some factual assertion or disclosure of information to trigger the privilege, but here, Payne said nothing after his fingerprint was used to unlock his phone. Thus, the Ninth Circuit found the use of Payne’s fingerprint required no cognitive exertion and was more like compelled physical acts, such as submitting to fingerprinting or having blood drawn — all the types of physical trait cases in which courts have held certain physical acts as non-testimonial, unafforded Fifth Amendment protection. Accordingly, the Ninth Circuit affirmed the district court’s ruling and denied Payne’s motion to suppress information obtained from his phone at the time of his arrest.

Several district courts reached the same conclusion as Payne. Namely, that an officer compelling an arrestee to unlock their phone with biometrics is non-testimonial although compelled and despite providing access to incriminating information.

The issue resurfaced again this past January, in United States v. Brown, where the DC Circuit reached an opposite conclusion. Peter Schwartz, a Jan. 6 defendant, argued that FBI officers violated his Fifth Amendment rights when the arresting agent found a black phone in Schwartz’s bedroom and compelled him to unlock it via his fingerprint. As in Payne, Schwartz moved to suppress the evidence obtained from his phone and all the parties agreed that the unlocking of the phone via fingerprint was compelled and incriminating, but the parties disagreed whether the act of unlocking the phone itself was testimonial.

The DC Circuit held that unlocking a phone with biometrics was distinctively different than submitting to a blood draw or handwriting test. The court interestingly highlights a commonsense point — most people who use biometrics to unlock their phone usually set only one or two of their 10 possible fingerprints as “passwords.” The court noted that among the physical trait cases, which are context-dependent, some physical responses like the heart beating faster or sweating during a compelled lie detector test are testimonial. 

In reviewing the denial of Schwartz’s motion to suppress, the court reasoned that compelling Schwartz to open his phone with his fingerprint reflected his thoughts and knowledge on: “how to open the phone,” “[his] control over access to this phone” and “the print of this specific finger is the password to this phone.” The court thus found Schwartz’s Fifth Amendment rights were violated.

Like the Ninth Circuit, the DC Circuit also reviewed act-of-production cases, but the courts diverged on whether using a fingerprint to unlock a phone reflected extensive cognitive thought. The DC Circuit reasoned that when the FBI agent compelled Schwartz to unlock the phone with his fingerprint, Schwartz demonstrated not only his ownership and control over the phone but also his ownership of the data accessible within it. The Ninth Circuit saw no cognitive exertion in that very same compelled physical act.

Future forecast

Several district courts reached the same holding as the DC Circuit, which when juxtaposed against those that have agreed with Payne, reflects a dramatically unsettled area of law.   

Several years earlier, in In re Grand Jury Subpoena Duces Tecum Dated Mar. 25, 2011, the accused was with a subpoena duces tecum requiring him to produce the unencrypted contents located on the hard drives of his laptop computer and five external hard drives. 

In responding to the show-cause order, Doe informed the court that he invoked his Fifth Amendment privilege against self-incrimination and refused to comply with the subpoena before the grand jury. The government, in turn, sought an order of immunity limited to “the use [of Doe’s] act of production of the unencrypted contents” of the hard drives. That is, Doe’s immunity would not extend to the government’s derivative use of contents of the drives as evidence against him in a criminal prosecution. 

The court accepted the US attorney’s position on the scope of the immunity to give Doe and granted the requested order. The order “convey[ed] immunity for the act of production of the unencrypted drives, but [did] not convey immunity regarding the United States’ [derivative] use” of the decrypted contents of the drives. Doe persisted and the court found him in civil contempt. The 11th Circuit reversed because Doe’s act of production would have testimonial aspects to it and the government’s offer of act-of-production immunity clearly could not provide the requisite protection because it would allow the government to use evidence derived from the immunized testimony. Doe could not be compelled to decrypt the drives.

The issue may be less complicated with facial or fingerprint recognition, but the 11th Circuit decision provides guidance for when a device can only be accessed if the accused is compelled to disclose a particular pattern or PIN. Such scenarios should accord greater testimonial weight, since the government is compelling what is contained in the accused’s mind, akin to being compelled to provide the combination to a safe with incriminating information in it. 

But what if the accused is compelled to provide a statement to unlock what may be accessed only through voice recognition? The Supreme Court has held that voice exemplars do not violate the Fifth Amendment since they are used “solely to measure the physical properties of the witnesses’ voices, not for the testimonial or communicative content of what was to be said.” However, if a voice exemplar is compelled as entry for access to a device, akin to a password, it is likely that the reasoning in Brown would apply and the compulsion would seem quintessentially and unavoidably testimonial under those circumstances.

For the past five years, federal district courts have wrestled with the implications of agents compelling arrestees to unlock their phones using biometrics. The conflicting rulings by the Ninth Circuit and DC Circuit bring the issues into greater relief where two circuits reached opposite conclusions on similar facts. It surely will lead to additional splits among other courts on the compelled use of biometrics to obtain data. The Supreme Court will likely have occasion to decide these issues when facts and an exercise of ordered liberty demand it.


Tags: BYOD/Bring Your Own Device
Previous Post

What Would Aristotle Do? Virtue Ethics as a Compliance Framework

Next Post

Trump 2.0 Is Already Shaking Up the Sanctions & AML Landscape

Luke Cass, Chukwukpee Nzegwu and Joe Whitley

Luke Cass, Chukwukpee Nzegwu and Joe Whitley

Luke Cass is a partner in the Washington DC office of Womble Bond Dickinson. A former federal prosecutor, Cass defends corporations and individuals in a variety of federal criminal allegations, including healthcare fraud, price-fixing, conspiracy, mail and wire fraud, embezzlement, bank fraud and money laundering.
Chukwukpee Nzegwu is an associate in the business litigation group at Womble Bond Dickinson’s Baltimore office. He focuses his practice on complex commercial litigation; criminal investigations including price-fixing, conspiracy, healthcare fraud and mail and wire fraud; and financial services litigation.
Joe D. Whitley is a partner in the Atlanta and Washington offices of Womble Bond Dickinson and is chair of the firm’s white-collar defense, investigations and regulatory enforcement practice. In addition to his years of private practice experience, Joe has served in several high-level positions with the DOJ and Department of Homeland Security. During the administrations of Ronald Reagan and George H.W. Bush, he served as acting associate attorney general.

Related Posts

remote worker not at desk

The Unseen Risks of Remote Work: Stopping Employee Fraud Before It Starts

by Prakash Santhana
February 3, 2025

From unauthorized data access to BYOD risks, hybrid work demands smarter strategies to combat employee fraud before it escalates

close-up of imessage app on smartphone on red background

Messaging Apps: To Ban or Not to Ban?

by Trevor Wiles and Hugh Bigwood
December 17, 2020

Do we really know what our employees are saying? Hugh Bigwood and Trevor Wiles provide an overview of the rising...

man holding mobile phone against grassy backdrop

Internal Investigations: Managing Mobile Device Data in the Age of COVID

by David Carns
October 7, 2020

An internal investigation can feel like a high-stakes game of needle-in-the-haystack, and current world challenges set that haystack on fire....

illustration of browser update in progress

Patch Procrastination and Compliance: 81% of CIOs and CISOs Defer Critical Software Updates

by Claudia Berth
June 21, 2019

IT security researchers say 81 percent of CIOs and CISOs defer security-relevant critical updates or patches due to concerns about...

Next Post
bills on clothesline money laundering

Trump 2.0 Is Already Shaking Up the Sanctions & AML Landscape

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights