AG-673

Biometric Template Protection Governance

Biometrics, Emotion & Identity Analytics ~31 min read AGS v2.1 · April 2026
EU AI Act GDPR NIST ISO 42001

2. Summary

Biometric Template Protection Governance requires that AI agent systems handling biometric data implement rigorous controls over the storage, linkage, transmission, and exposure of biometric templates to prevent irreversible identity compromise. Unlike passwords or tokens, biometric identifiers — fingerprints, facial geometry, iris patterns, voiceprints, vein structures — are permanently bound to the individual and cannot be rotated, revoked, or reissued after compromise. A leaked password triggers a reset; a leaked fingerprint template triggers a lifelong vulnerability. This dimension mandates that conforming systems protect biometric templates through irreversibility-aware architecture: cryptographic transformation that prevents raw template recovery, storage isolation that prevents cross-context linkage, retention controls that enforce disposal obligations, and breach response mechanisms calibrated to the permanent nature of biometric compromise. The governance requirements address both the technical protections applied to templates at rest and in transit, and the organisational controls that prevent template accumulation, unauthorised linkage, and indefinite retention that transforms a biometric database into an escalating liability.

3. Example

Scenario A — Template Database Breach with Plaintext Storage: A national retail chain deploys AI-powered kiosks with facial recognition for loyalty programme identification. The system captures facial geometry templates from 3.2 million customers and stores them in a centralised database alongside loyalty identifiers, purchase histories, and email addresses. The templates are stored as raw mathematical representations — 128-dimensional floating-point vectors — without cryptographic transformation, because the engineering team prioritised matching speed over template protection. In month 14 of operation, an attacker exploits a SQL injection vulnerability in the loyalty programme's web portal, which shares a database cluster with the biometric template store. The attacker exfiltrates the full template database: 3.2 million facial geometry vectors linked to customer identities. Unlike the simultaneously compromised email addresses and loyalty points (which are reset within 48 hours), the facial geometry templates cannot be revoked. Every affected customer's face is now permanently compromised as an authentication factor across any system that uses facial recognition. Within six months, security researchers demonstrate that the stolen templates can be used to generate synthetic face images that defeat facial recognition systems at three major financial institutions. The retailer faces a class-action lawsuit under the Illinois Biometric Information Privacy Act (BIPA), resulting in a $228 million settlement — $5,000 per individual for reckless handling under BIPA's statutory damages provision. The remediation cost for the password and email compromise was $1.4 million; the remediation cost for the biometric compromise is unquantifiable because the biometric data cannot be remediated.

What went wrong: Templates were stored as raw mathematical vectors without cryptographic transformation, making them directly usable after exfiltration. The template database was co-located with the web-facing loyalty system, violating storage isolation principles. No architecture review assessed whether template storage met the irreversibility requirement — the permanent, non-revocable nature of biometric data. The system treated biometric templates with the same storage practices applied to passwords and email addresses, failing to account for the qualitative difference in compromise severity. Consequence: $228 million BIPA settlement, permanent identity compromise for 3.2 million individuals, reputational destruction, and ongoing litigation from financial institutions whose facial recognition systems were subsequently defeated using the stolen templates.

Scenario B — Cross-Context Template Linkage Enabling Surveillance: A municipal transit authority deploys an AI agent with palm-vein scanning for contactless fare payment at 340 stations. A separate city department deploys an AI agent with palm-vein scanning for identity verification at public benefits offices. Both systems use the same biometric modality and the same vendor SDK, producing mathematically compatible templates. Neither system's privacy impact assessment considers cross-context linkage risk. After a city council directive to "improve fraud detection across municipal services," a data analyst discovers that templates from the transit system can be matched against templates from the benefits system using a simple cosine similarity function. Without any formal authorisation process, the analyst links 42,000 transit usage records to benefits recipients, creating a comprehensive movement-tracking dataset for a vulnerable population. A civil liberties organisation obtains the linked dataset through a freedom-of-information request and publishes a report demonstrating that the city has built a de facto surveillance system targeting benefits recipients. The resulting lawsuit, public outcry, and federal investigation cost the city $47 million in legal fees, settlements, and system remediation, and both biometric programmes are permanently discontinued.

What went wrong: Templates from two independent systems were mathematically compatible, enabling cross-context linkage that neither system's design anticipated or authorised. No template transformation was applied that would make templates from one context unlinkable to templates from another. No access control prevented cross-system template comparison. The absence of context-specific template isolation turned two independent convenience systems into a combined surveillance infrastructure. Consequence: $47 million in costs, termination of both programmes, federal civil rights investigation, and erosion of public trust in municipal biometric systems.

Scenario C — BIPA Retention Violation Through Indefinite Template Storage: An employer deploys an AI-powered timekeeping system that uses fingerprint scanning for employee clock-in and clock-out. Over seven years, the system accumulates fingerprint templates for 14,600 current and former employees. The system has no template deletion mechanism — templates are retained indefinitely, including for employees who left the company years ago. The employer's written biometric data retention policy, drafted to comply with BIPA, states that templates will be destroyed within one year of the individual's last interaction with the system or within three years of collection, whichever comes first. But no automated enforcement mechanism implements this policy: it exists as a document, not as a system constraint. A BIPA class action is filed on behalf of 8,200 former employees whose templates were retained beyond the policy's stated retention period. The court finds that the employer wilfully violated BIPA Section 15(a) — the requirement to establish and comply with a retention schedule — because the employer had a written policy but made no effort to implement it. The statutory damages of $5,000 per violation for wilful non-compliance yield a potential liability of $41 million. The employer settles for $18.5 million. The per-employee cost of implementing automated template deletion would have been $0.23.

What went wrong: The retention policy existed on paper but was never implemented as a system control. No automated mechanism enforced template deletion when the retention period expired. The system accumulated templates indefinitely, creating both a legal liability and a security risk — an ever-growing database of biometric data for individuals with no continuing relationship with the organisation. The gap between documented policy and actual system behaviour is the defining characteristic of a BIPA retention violation. Consequence: $18.5 million settlement, ongoing compliance monitoring, and mandatory system redesign — all preventable with an automated deletion mechanism costing less than $3,400 for the entire employee population.

4. Requirement Statement

Scope: This dimension applies to every AI agent system that generates, receives, stores, processes, transmits, or matches biometric templates — mathematical representations derived from physiological or behavioural biometric characteristics including but not limited to: facial geometry, fingerprint minutiae, iris texture, retinal patterns, voiceprints, palm-vein maps, gait signatures, keystroke dynamics, and any other biometric modality from which a template can be extracted. The scope covers templates at every lifecycle stage: initial capture and enrolment, storage at rest, transmission between system components, matching and comparison operations, archival, and deletion. The scope extends to all environments where templates exist — cloud infrastructure, on-premises servers, edge devices, mobile applications, and embedded systems in robotic or CPS platforms. The scope includes both one-to-one verification templates (comparing a live sample against an enrolled template) and one-to-many identification templates (searching a live sample against a gallery). The scope applies regardless of whether the agent directly performs biometric processing or delegates to a third-party biometric SDK, API, or service — the deploying organisation retains governance accountability for template protection.

4.1. A conforming system MUST apply a cryptographic or irreversible transformation to all biometric templates before persistent storage, such that the stored representation cannot be reversed to recover the original biometric template or a biometric sample sufficient to spoof another system. Acceptable transformations include but are not limited to: cancellable biometrics, biometric salting, fuzzy vault schemes, secure sketch constructions, homomorphic encryption of templates, and any transformation that is demonstrably one-way under current cryptanalytic capabilities.

4.2. A conforming system MUST store biometric templates in a dedicated, logically or physically isolated data store that is not co-located with, or directly accessible from, general-purpose application databases, web-facing services, or systems whose compromise would expose the template store as a secondary target.

4.3. A conforming system MUST encrypt biometric templates at rest using an encryption algorithm and key length that meets or exceeds the requirements of AG-042 (Encryption & Cryptographic Control), with encryption keys managed separately from the template store and rotatable without requiring re-enrolment of biometric subjects.

4.4. A conforming system MUST encrypt biometric templates in transit between any system components — including between capture devices and processing servers, between processing servers and template stores, and between any services that transmit templates — using transport-layer encryption that meets or exceeds the requirements of AG-042.

4.5. A conforming system MUST enforce a documented retention schedule for biometric templates that specifies the maximum retention period, the triggering event for deletion (termination of the purpose for which the template was collected, end of the individual's relationship with the organisation, or expiration of a defined calendar period, whichever occurs first), and the deletion method. The retention schedule MUST be implemented as an automated system control, not merely documented as a policy.

4.6. A conforming system MUST execute verified deletion of biometric templates when the retention period expires or when a data subject exercises a deletion right, such that the template is irrecoverable from primary storage, backup storage, replica storage, and any cache or intermediate store. Deletion verification MUST be logged with a timestamp and a confirmation that all copies have been destroyed.

4.7. A conforming system MUST apply context-specific template transformation or domain separation such that a biometric template generated for one application context cannot be used to match against templates in a different application context, preventing cross-context linkage even if both template stores are compromised.

4.8. A conforming system MUST maintain an auditable inventory of all locations where biometric templates are stored, including primary databases, backup systems, disaster recovery replicas, edge device caches, and any third-party systems to which templates have been transmitted. The inventory MUST be reviewed and validated at least quarterly.

4.9. A conforming system MUST implement access controls that restrict template access to the minimum set of system components and personnel required for the authorised biometric function, with all access events logged, and with no human operator able to export, copy, or bulk-extract raw or transformed templates without a documented, pre-approved authorisation from the data protection function.

4.10. A conforming system MUST maintain a biometric breach response plan that is specific to biometric template compromise — distinct from the organisation's general data breach response plan — and that addresses the irreversible nature of biometric compromise, including notification to affected individuals that their biometric identifier is permanently compromised, guidance on implications for other systems using the same biometric modality, and a remediation pathway such as re-enrolment with a different transformation key or migration to an alternative biometric modality.

4.11. A conforming system SHOULD implement template protection schemes that support renewability — the ability to revoke a compromised transformed template and generate a new transformed template from the same biometric source using a different transformation key, without requiring the individual to change their biometric characteristic (which is impossible).

4.12. A conforming system SHOULD perform periodic cryptographic assessment of the template transformation scheme to verify that advances in cryptanalysis, computational capability, or AI-based inversion attacks have not degraded the irreversibility guarantee below the required threshold.

4.13. A conforming system MAY implement decentralised template storage architectures — such as on-device template storage where the template never leaves the individual's personal device — to eliminate centralised template databases and the associated breach risk.

5. Rationale

Biometric templates occupy a unique position in the data protection landscape because they embody an irresolvable tension: they are simultaneously the most reliable form of individual identification and the most dangerous form of data to store. A biometric template is mathematically derived from a physical characteristic that the individual cannot change. Unlike every other authentication credential — passwords, PINs, tokens, certificates, cryptographic keys — a biometric identifier is permanently bound to the individual's body. This permanence creates the fundamental governance challenge: the consequence of compromise is not a temporary inconvenience requiring credential rotation, but a permanent identity vulnerability that persists for the individual's lifetime.

The severity of biometric template compromise is qualitatively different from other data breaches. When a password database is breached, the affected users change their passwords and the vulnerability is resolved. When a biometric template database is breached, the affected individuals cannot change their fingerprints, facial geometry, or iris patterns. The compromised templates can be replayed against any system that accepts the same biometric modality, and no remediation can undo the exposure. This asymmetry — easy to compromise, impossible to remediate — demands a governance posture that treats biometric templates as irreplaceable critical assets, not as ordinary authentication data.

The legal landscape reinforces this technical reality. The Illinois Biometric Information Privacy Act (BIPA) — the most consequential biometric privacy statute in the United States — imposes strict requirements on biometric data collection, storage, and retention, with statutory damages of $1,000 per negligent violation and $5,000 per wilful violation. BIPA litigation has produced some of the largest privacy settlements in history: Facebook's $650 million settlement (2021), Google's $100 million settlement (2022), and numerous employer class actions exceeding $10 million for timekeeping fingerprint systems. The EU General Data Protection Regulation classifies biometric data processed for identification purposes as a special category under Article 9, requiring explicit consent and heightened protection measures. The GDPR's data minimisation principle (Article 5(1)(c)) and storage limitation principle (Article 5(1)(e)) directly mandate the retention controls specified in this dimension. Brazil's LGPD, South Korea's PIPA, and India's DPDP Act similarly classify biometric data for enhanced protection.

Cross-context linkage represents a particularly insidious threat. When biometric templates from independent systems are mathematically compatible — because they use the same modality, the same vendor SDK, or the same feature extraction algorithm — the templates can be matched across contexts to build comprehensive profiles that neither system individually authorised. A fingerprint template enrolled for gym access can be matched against a fingerprint template enrolled for a government identity programme, linking the individual's fitness habits to their government records. This cross-context linkage potential transforms every biometric system into a node in a potential surveillance network. Context-specific template transformation — applying different, irreversible transformations to templates in different contexts — breaks the mathematical linkability and confines each template to its authorised purpose.

The retention dimension of biometric template governance addresses a pattern repeatedly demonstrated in BIPA litigation: organisations that collect biometric data, implement no automated deletion mechanism, and accumulate templates indefinitely — including for individuals who have long since ceased any relationship with the organisation. The retention violation is typically discovered years after it began, by which time the accumulated liability is enormous. Automated retention enforcement is not merely a governance best practice; it is a legal necessity in jurisdictions with biometric privacy statutes, and a risk management imperative everywhere else.

Template protection technology has matured to the point where the failure to implement it is a governance choice, not a technical constraint. Cancellable biometric schemes, fuzzy vault constructions, secure sketch methods, and homomorphic encryption of templates all provide mechanisms to store biometric data in a form that cannot be reversed to recover the original template. These schemes impose computational overhead — typically 10-30% additional processing time for matching operations — but this overhead is negligible compared to the liability exposure of storing raw templates. The argument that template protection degrades matching performance is no longer tenable given the state of the art; organisations that store raw templates are making a cost-convenience tradeoff that regulatory and litigation environments no longer tolerate.

6. Implementation Guidance

Biometric Template Protection Governance requires a defence-in-depth architecture that addresses template security at every lifecycle stage — from initial capture through enrolment, storage, matching, and eventual deletion. The core design principle is that no single point of compromise should expose raw biometric templates, and no template should persist beyond its authorised purpose and retention period.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Retail and Customer-Facing. Customer-facing biometric systems — loyalty identification, age verification, checkout authentication — face the highest BIPA exposure because they collect biometric data from the general public at scale. Template protection is not optional in BIPA jurisdictions; it is a statutory requirement. Retail organisations should default to on-device template storage (where the template never leaves the customer's personal device) to eliminate centralised template databases entirely. Where centralised storage is operationally necessary, the full template vault architecture is required.

Public Sector and Rights-Sensitive. Government biometric systems — identity verification for benefits, border control, law enforcement databases — face heightened scrutiny because of the power asymmetry between the state and the individual. Cross-context linkage between government biometric systems is particularly dangerous because it can enable population-scale surveillance without legislative authorisation. Public sector deployments must implement strict context-specific domain separation and must not share templates across departmental boundaries without explicit legal authority and data protection impact assessment.

Safety-Critical and CPS. Biometric authentication in safety-critical systems — nuclear facility access, industrial control system operator verification, aviation crew authentication — must balance template protection with authentication reliability. Safety-critical environments should implement multi-modal biometric systems (combining two or more modalities) to maintain authentication reliability even if one modality's template protection scheme introduces matching degradation. Template stores for safety-critical access must be protected against both external compromise and insider manipulation (an attacker who can modify templates could grant themselves access to restricted areas).

Embodied, Edge, and Robotic. Robotic and edge-deployed agents that perform biometric recognition — warehouse robots identifying workers, delivery drones verifying recipients, autonomous vehicles authenticating passengers — face unique constraints: limited computational resources for template transformation, intermittent network connectivity that may prevent real-time access to centralised template stores, and physical vulnerability to device theft or tampering. Edge deployments should implement hardware-backed secure enclaves for template storage and matching, with remote attestation to verify enclave integrity. Templates cached on edge devices for offline operation must be encrypted with device-specific keys and must be subject to aggressive retention limits (hours, not months).

Maturity Model

Basic Implementation — The organisation has applied irreversible transformation to all biometric templates before persistent storage. Templates are stored in an isolated, encrypted data store. A documented retention schedule exists and is implemented as an automated system control. Template access is restricted to authorised system components. A biometric breach response plan exists. This level meets the minimum mandatory requirements.

Intermediate Implementation — All basic capabilities plus: context-specific domain keys prevent cross-context template linkage. A maintained inventory of all template storage locations is reconciled quarterly. Deletion verification confirms irrecoverability across all storage tiers. Cryptographic assessment of the template transformation scheme is conducted annually. The template vault exposes only a narrow matching API with no bulk export capability.

Advanced Implementation — All intermediate capabilities plus: templates are generated and matched within hardware-backed secure enclaves, and raw biometric data never exists outside the enclave boundary. On-device or decentralised template storage eliminates centralised template databases. Template protection schemes support renewability — compromised templates can be revoked and re-generated without biometric re-enrolment. Independent penetration testing of the template vault is conducted annually, including template inversion attacks. The organisation can demonstrate through empirical testing that compromised transformed templates cannot be used to recover the original biometric sample or to authenticate against systems using a different transformation key.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Template Irreversibility Verification (Requirement 4.1)

Test 8.2: Storage Isolation Verification (Requirement 4.2)

Test 8.3: Encryption at Rest Verification (Requirement 4.3)

Test 8.4: Encryption in Transit Verification (Requirement 4.4)

Test 8.5: Automated Retention Enforcement Verification (Requirement 4.5)

Test 8.6: Verified Deletion Completeness (Requirement 4.6)

Test 8.7: Cross-Context Linkage Prevention (Requirement 4.7)

Test 8.8: Template Inventory Completeness (Requirement 4.8)

Test 8.9: Access Control and Export Prevention (Requirement 4.9)

Test 8.10: Biometric Breach Response Plan Validation (Requirement 4.10)

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
Illinois BIPASection 15(a) (Retention and Destruction), Section 15(c) (Sale/Disclosure), Section 15(e) (Storage/Transmission)Direct requirement
EU GDPRArticle 9 (Special Categories), Article 5(1)(c)(e)(f) (Data Minimisation, Storage Limitation, Integrity/Confidentiality)Direct requirement
EU AI ActArticle 10 (Data Governance), Article 14 (Human Oversight)Supports compliance
NIST AI RMFGOVERN 1.5 (Risk Management Processes), MAP 3.5, MANAGE 2.2Supports compliance
ISO/IEC 24745Biometric Template Protection (full standard)Direct requirement
ISO 42001Annex A.8 (Data for AI Systems), Clause 6.1.2 (AI Risk Assessment)Supports compliance
CCPA/CPRASection 1798.140(b) (Biometric Information Definition), Section 1798.100 (Right to Delete)Direct requirement
Texas CUBIBusiness and Commerce Code 503.001 (Capture or Use of Biometric Identifier)Direct requirement

Illinois BIPA — Section 15

BIPA Section 15(a) requires private entities in possession of biometric identifiers or biometric information to develop a written policy, made available to the public, establishing a retention schedule and guidelines for permanently destroying biometric data when the initial purpose for collection has been satisfied or within three years of the individual's last interaction with the entity, whichever occurs first. AG-673's Requirement 4.5 (automated retention enforcement) and Requirement 4.6 (verified deletion) directly operationalise this obligation. BIPA's statutory damages — $1,000 per negligent violation, $5,000 per wilful violation, with no cap on aggregate damages — mean that retention violations affecting thousands of individuals produce eight- and nine-figure liability exposure. The critical BIPA compliance insight is that a written policy alone is insufficient; Section 15(a) requires that the policy be followed. A documented retention schedule with no automated enforcement mechanism is evidence of wilful non-compliance, not compliance.

EU GDPR — Article 9 and Article 5

GDPR Article 9 classifies biometric data processed for the purpose of uniquely identifying a natural person as a special category of personal data, requiring explicit consent under Article 9(2)(a) or another lawful basis under Article 9(2). Article 5(1)(f) — the integrity and confidentiality principle — requires that personal data is processed in a manner ensuring appropriate security, including protection against unauthorised processing and accidental loss. For biometric templates, "appropriate security" demands the irreversible transformation and storage isolation specified by AG-673, because the irreversible nature of biometric data means that a breach produces permanent harm that cannot be remediated by the standard GDPR breach response (notification, access restriction, and monitoring). Article 5(1)(e) — the storage limitation principle — requires that biometric data is kept for no longer than necessary. AG-673's automated retention enforcement with verified deletion operationalises this principle. The GDPR's accountability principle (Article 5(2)) requires the organisation to demonstrate compliance, which maps to the evidence requirements in Section 7.

ISO/IEC 24745 — Biometric Template Protection

ISO/IEC 24745 is the international standard specifically addressing biometric template protection. It defines requirements for irreversibility (the transformed template cannot be used to recover the original biometric sample), renewability (a compromised template can be replaced with a new template derived from the same biometric source), and unlinkability (templates generated from the same biometric source for different applications cannot be linked). AG-673's Requirements 4.1 (irreversible transformation), 4.7 (cross-context linkage prevention), and 4.11 (renewability) are directly derived from ISO/IEC 24745's framework. Organisations implementing AG-673 should reference ISO/IEC 24745 for detailed technical guidance on template protection scheme selection, security analysis methodology, and performance evaluation.

CCPA/CPRA — Biometric Information

The California Consumer Privacy Act, as amended by the California Privacy Rights Act, includes biometric information in the definition of personal information (Section 1798.140(b)) and sensitive personal information (Section 1798.140(ae)). Consumers have the right to request deletion of their personal information (Section 1798.100), including biometric data. AG-673's Requirement 4.6 (verified deletion upon data subject request) operationalises this right. The CPRA's requirement for businesses to implement reasonable security measures for sensitive personal information (Section 1798.100(e)) maps to AG-673's template protection, encryption, and isolation requirements.

Texas CUBI — Capture or Use of Biometric Identifier

Texas Business and Commerce Code Chapter 503 prohibits the capture of a biometric identifier for a commercial purpose unless the individual is informed and consents. Section 503.001(c) requires that biometric identifiers are destroyed within a reasonable time, not exceeding the first anniversary of the date the purpose for collection expires. AG-673's retention and deletion requirements directly operationalise CUBI's destruction obligation. While CUBI initially lacked a private right of action, the Texas Data Privacy and Security Act and subsequent amendments have expanded enforcement mechanisms, making template retention violations increasingly consequential.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusPopulation-scale — affects every individual whose biometric template is compromised, with irreversible lifetime consequences

Consequence chain: A biometric template protection failure begins at the storage layer — raw templates stored without irreversible transformation, templates co-located with general application databases, or retention mechanisms that fail to delete expired templates. The failure is invisible during normal operations because the biometric system functions correctly regardless of whether templates are properly protected. The failure materialises through one of three channels. First, external breach: an attacker compromises the application infrastructure and reaches the template store, exfiltrating raw or insufficiently protected templates. Because the templates are not irreversibly transformed, they are directly usable for impersonation against any system that accepts the same biometric modality. The affected individuals' biometric identifiers are permanently compromised — they cannot change their fingerprints, faces, or irises. Second, cross-context linkage: mathematically compatible templates from separate systems are matched, creating unauthorised profiles that violate purpose limitation and may constitute surveillance. The affected individuals are unaware that their participation in one biometric system has exposed their activities in another. Third, retention accumulation: templates persist beyond their authorised retention period, growing the liability surface with each passing month. Former employees, former customers, and individuals who withdrew consent have their biometric data retained indefinitely, creating both a legal liability under BIPA, GDPR, and equivalent statutes, and a security risk — a larger database is a more attractive target and produces greater harm when breached. The downstream consequences are characteristically severe and irreversible. BIPA litigation has produced settlements exceeding $100 million for template storage violations. GDPR enforcement for biometric data mishandling carries fines up to 4% of global annual turnover. Beyond financial penalties, the reputational damage of a biometric breach is uniquely persistent because the affected individuals can never fully remediate the compromise — every subsequent use of the compromised biometric modality carries residual risk. The consequence chain extends to third-party systems: a biometric template breached from one organisation can be used to attack authentication systems at other organisations that use the same modality, creating cascading liability and eroding trust in biometric authentication as a category.

Cross-references: AG-036 (Data Retention & Disposal) provides the general retention governance framework; AG-673 specifies the biometric-specific retention requirements that account for the irreversible nature of biometric data. AG-042 (Encryption & Cryptographic Control) defines encryption standards; AG-673 requires those standards be applied to biometric templates with additional template-specific protections (irreversible transformation) beyond standard encryption. AG-669 (Biometric Purpose Limitation) governs what purposes biometric data may be used for; AG-673 governs how the templates supporting those purposes are protected. AG-674 (Cross-Context Biometric Reuse) addresses the policy dimension of cross-context usage; AG-673 addresses the technical dimension through context-specific domain separation. AG-677 (Consent and Notice for Biometrics) governs the legal basis for biometric data collection; AG-673 governs the technical protection of the data collected under that legal basis. AG-678 (Biometric Redress) provides remediation pathways for individuals; AG-673's renewability and breach response requirements provide the technical foundation for that redress.

Cite this protocol
AgentGoverning. (2026). AG-673: Biometric Template Protection Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-673