Showing posts with label FTC. Show all posts
Showing posts with label FTC. Show all posts

Monday, April 7, 2014

Court Rules in Favor of FTC, Wyndham Must Face Suit Over Data Breach

Today, a ruling was issued in FTC v. Wyndham Worldwide Corp. The court denied Wyndham's motion to dismiss, rejecting its argument that the Federal Trade Commission does not have authority under Section 5 of the FTC Act to regulate data security practices across all industries.

The U.S. District Court for the District of New Jersey declined to carve out a data-security exception to the FTC's broad regulatory authority under Section 5. It also refused to require the FTC to promulgate data security regulations before bringing "unfairness" claims against companies based on their data security practices, noting that previous enforcement actions "'constitute a body of experience and informed judgment to which courts and litigants may properly resort for guidance.'"

U.S. District Judge Esther Salas made clear that "this decision does not give the FTC a blank check to sustain a lawsuit against every business that has been hacked." However, the ruling disposes of the only viable challenge to the FTC's authority to regulate data security practices.

FTC Chairwoman Edith Ramirez issued a statement on the ruling via Twitter: I wrote about the Wyndham litigation in a previous post. I look forward to further analyzing Judge Salas' ruling in a future post.

Wednesday, April 2, 2014

Undeterred by Challenges to its Authority, FTC Settles Data Security Actions with Credit Karma and Fandango

The Federal Trade Commission (FTC) has settled two more enforcement actions with companies that failed to adequately safeguard consumers’ personal information, despite challenges to its authority to regulate data security practices.

Credit Karma and Fandango Settle FTC Charges

Last week, the FTC announced that credit monitoring service Credit Karma and movie ticket outlet Fandango entered into settlement agreements that will require the companies to submit to 20 years of independent security audits, improve security measures, and refrain from misrepresenting their security and privacy processes. The FTC had charged both companies with violating Section 5 of the FTC Act (Section 5), which prohibits “unfair or deceptive acts or practices in or affecting commerce.” The agency alleged that Fandango and Credit Karma had engaged in unfair business practices by failing to properly implement Secure Sockets Layer (SSL) encryption on their mobile apps, thus leaving users’ payment information and other sensitive data vulnerable to “man-in-the-middle” attacks. The FTC also alleged that Fandango and Credit Karma had misrepresented the security of their apps, thereby deceiving customers.

Since 2002, the FTC has brought and settled more than 50 similar data security enforcement actions against companies including Twitter, Rite Aid, and Petco. The FTC claims that it has broad authority under Section 5 to investigate and censure the data security missteps of companies across all industries, even though there is currently no overarching federal law mandating minimum data security standards.

Until recently, the FTC’s authority to regulate data security practices under Section 5 had gone largely uncontested. But in a highly-anticipated decision, a New Jersey federal court may provide guidance as to the extent of this authority.

FTC v. Wyndham Poses the First Serious Challenge to FTC Authority Over Data Security

In June 2012, the FTC filed a complaint against global hospitality company Wyndham Worldwide Corporation in federal district court, alleging that Wyndham “failed to provide reasonable and appropriate security” measures on their computer networks, which led to a series of large-scale breaches of personal information and more than $10.6 million in fraudulent charges to customers’ accounts.

Specifically, the FTC charged that Wyndham engaged in deceptive business practices in violation of Section 5 by misrepresenting in its privacy policies and elsewhere the security measures it employed to prevent the unauthorized access of customer data. The agency further alleged that Wyndham’s failure to maintain reasonable data security constituted an unfair business practice, also in violation of Section 5.

Wyndham responded by filing a motion to dismiss both the deception and the unfairness claims in the FTC’s complaint. Wyndham asserted, inter alia, that the FTC “has neither the expertise nor the statutory authority to establish data security standards for the private sector” under the “unfairness” prong of Section 5. Wyndham pointed out that the FTC has publicly acknowledged that it “lacks authority to require firms to adopt information practice policies,” and that it has repeatedly asked Congress to grant it broad, cross-industry authority to do so. Instead, Congress has enacted industry-specific legislation – such as the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA), and the Fair Credit Reporting Act (FCRA) – none of which authorized the FTC to bring an action against Wyndham.

In its reply, the FTC argued that Congress deliberately delegated broad authority to the FTC under Section 5 to “permit the FTC to protect consumers from unanticipated, unenumerated threats.” The FTC cited a range of uses of its Section 5 authority that were upheld by the courts, including the regulation of online check drafting and delivery, telephone billing practices, sales of telephone records, and sales of unsafe farm equipment.

In November 2013, Judge Esther Salas of the U.S. District Court for the District Court of New Jersey heard lengthy oral arguments on Wyndham’s motion to dismiss. Counsel for Wyndham argued that a lack of clear statutory authority for the FTC to regulate data security, coupled with the August 2013 release of a draft cybersecurity framework by the National Institute of Standards and Technology, demonstrated that Congress did not intend for the FTC to take the lead on data security enforcement.

At the conclusion of oral arguments, Judge Salas seemed poised to rule in favor of the FTC, denying a motion by Wyndham to stay discovery until she ruled on its motion to dismiss. In January, however, Judge Salas agreed to delay her ruling and allow supplemental briefing after an FTC Commissioner commented on the vagueness in the “unfairness” prong of the FTC’s Section 5 authority during congressional testimony.

A ruling is expected in the coming weeks. If Judge Salas rules in favor of Wyndham, she could seriously undermine the FTC’s authority over data security practices going forward. If she denies Wyndham’s motion to dismiss, the decision could pave the way for increased data security enforcement by the FTC.

After an Unsuccessful Challenge to FTC’s Authority, LabMD to Shut Down

Following Wyndham’s lead, another company challenged the FTC’s authority to regulate data security in an enforcement action brought by the FTC in August 2013. The FTC charged LabMD, a clinical health testing company, with violating Section 5 after the sensitive personal information of 9,300 people was exposed via a public file-sharing network, leading some to have their identities stolen.

In November 2013, LabMD filed a motion to dismiss, arguing that the FTC does not have authority to regulate data security practices with respect to patient health data under the “unfairness” prong of Section 5. LabMD claimed that because it provided cancer diagnoses to the patients of its physician-customers, that its information practices are regulated under HIPAA, which it had not been accused of violating. In its response, the FTC argued that it shares concurrent authority with the Department of Health and Human Services over health information security. Once again, the FTC maintained that Section 5 gives it broad authority over “unfair” data security practices.

In January, the FTC issued an order denying LabMD’s motion to dismiss. It concluded that Congress delegated broad authority to the FTC to regulate “unfair acts or practices,” including those of HIPAA-covered entities. The FTC reiterated its argument in Wyndham that federal courts had upheld its Section 5 authority in a wide variety of contexts. 

Just days after the FTC’s order, LabMD announced that it would shut down, citing the “debilitating effects” of the FTC’s four-year investigation of the company and calling it an “abuse of power.”

LabMD has twice requested federal court review of the FTC’s actions, but the cases were subsequently dismissed and withdrawn. It is not clear whether the company will seek further review.

Thus, the Wyndham litigation presents the only viable challenge to the FTC’s data security enforcement efforts at this time.

Data Security is a Top FTC Priority

Though questions about the FTC’s authority to regulate data security practices remain, the FTC has made data security a “top priority” and shows no signs of slowing its enforcement efforts in this area. Accordingly, federal regulatory action is a very real threat to companies across all industries that fail to implement reasonable data security measures.

Friday, October 5, 2012

FTC decision puts spy software manufacturers on notice

The Federal Trade Commission recently settled with several companies regarding software that allowed the companies to spy on the computer's users by capturing screenshots, logging keystrokes, and taking pictures through the computer's webcam. The software was used by rent-to-own companies to track buyers when they became delinquent on payments. In addition to the rent-to-own companies, the FTC complaint also included the software manufacturer, Designware.

The software, PC Rental Agent, was installed on an estimated 420,000 computers in the United States, Canada, and Australia and marketed exclusively to businesses who rent computer equipment. The manufacturer recommended that companies notify customers of the software, but it was not required, and users could not detect the software's presence on their own.

In their complaint, the FTC argued that the software's "collection and disclosure to third parties of private and confidential information about consumers, including both those who rented the computer and
those who are merely using it, causes or is likely to cause substantial harm to consumers." As the manufacturer provided the means for the rental companies to engage in "unfair acts or practices," they had violated the FTC Act. It is the mission of the FTC "[t]o prevent business practices that are anticompetitive, deceptive, or unfair to consumers."

The settlement between Designware and the FTC prohibits the company from continuing to license or sell the software. This order is what one of this blog's readers calls the "biggest unfairness decision in the history of the FTC" because it extends beyond a direct business practice but also to the licensing of software the FTC deems "unfair."

Software manufacturers have been creating similar spying software for a long time, and this decision is likely to have put them on notice that the FTC's tolerance for the genre is soon to end. Of course, the FTC's authority would only extend to a business that is using the software to track consumers; thus, consumer or business-to-employee use would not be under their authority. However, the creation of software that is sold to a business in order to track a consumer could bring the creator under the wrath of the FTC.

Designware, which did not admit fault in the settlement, has filed for bankruptcy. The filing lists the Florida and California AG's offices as creditors, suggesting those offices may be considering further legal action.

Related Links:
Agreement
Complaint
News Release

Wednesday, September 26, 2012

FTC settles with rent-to-own retailers over tracking buyers' locations and collecting keystrokes

Several retailers settled yesterday with the Federal Trade Commission on allegations of "capturing screenshots of confidential and personal information, logging their computer keystrokes, and in some cases taking webcam pictures of people in their homes." The companies allowed buyers to rent-to-own the computers, and the software may have collected information on as many as 420,000 customers.

The software installed on the computers allowed a store to remotely disable the computer if it was stolen or if payments were not properly made. It also allowed location tracking, webcam activation, and collected a large amount of data including usernames, passwords, and SSNs.

The settlement forbids the companies to continue to use such software. They are allowed to continue location tracking but only with consent and notice.

The FTC's complaint is available here.

Thanks to Professor Chris Hoofnagle for the link.

Tuesday, November 29, 2011

Facebook, FTC settle on privacy concerns

An agreement was reached today between Facebook and the Federal Trade Commission (FTC) regarding concerns about Facebook users' privacy. The settlement requires Facebook to develop a comprehensive privacy program and have outside audits conducted for the next 20 years.

The FTC complaint alleged that Facebook shared users' personal information with third parties and advertisers without their knowledge or consent, changed privacy policies without informing users, continued sharing data after users deactivated or deleted their accounts, and did not properly verify the security of apps.

Facebook will now be required to get users' permission before making changes to the way it shares information. They are also required to prevent access to a user's data no more than 30 days after their account is deleted. Violations of the agreement results in a fine of $16,000 per violation per day.

Many have criticized the deal. Noting that Facebook has "two former members of the Federal Trade Commission on payroll," Gawker declared, "This settlement makes a mockery of the idea of holding corporations accountable for their actions."

CEO Mark Zuckerberg addressed the settlement in a blog post. Facebook currently has over 800 million users.

Wednesday, November 16, 2011

FTC settles with website violating COPPA

The Federal Trade Commission recently settled a case with www.skidekids.com, a website promoted as a "Facebook and Myspace for kids," after the website illegally collected information from thousands of children in violation of the Children's Online Privacy Protection Act (COPPA), 15 U.S.C. § 6501. Skid-e-kids targets children ages 7-14 and seeks to create a Facebook-type environment that is child-friendly.

The settlement requires the company to destroy all data collected in violation of COPPA and pay a fine of $100,000 (with all but $1,000 suspended under the terms of the settlement), among other agreements.

COPPA forbids websites from collecting personal information from children under the age of 13 without the consent of a parent. Websites have struggled to comply with the law as children often falsify information on websites that do not allow users under that age (such as Facebook). Skid-e-kids now requires parents to register first using their Facebook account which will then let them register their children on the site and monitor their child's activity.

RELATED NEWS: The FTC recently proposed rule changes for COPPA and is seeking comments through the end of the month.