FTC: Anatomy of a Data Security/Privacy Investigation and the Future of Privacy John Jay College of Criminal Justice Center for Cybercrime Studies November.

Slides:



Advertisements
Similar presentations
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Regulations What do you need to know?.
Substantiation of Health Claims in Advertising: Probiotics Richard L. Cleland Division of Advertising Practices Federal Trade Commission.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Protecting Personal Information Guidance for Business.
Privacy: Accountability and Enforceability Jamie Yoo April 11, 2006 CPSC 457: Sensitive Information in a Wired World.
Hong Kong Privacy Code on Human Resource Management
Insights on the Legal Landscape for Data Privacy in Higher Education Rodney Petersen, J.D. Government Relations Officer and Security Task Force Coordinator.
FERPA 2008 New regulations enact updates from over a decade of interpretations.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
Per Anders Eriksson
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
LAW SEMINARS INTERNATIONAL New Developments in Internet Marketing & Selling November 13 & 14, 2006 San Francisco, California Moderator : Maureen A. Young.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Tiffany George Attorney, Division of Privacy & Identity Protection Federal Trade Commission COMPLYING WITH THE RED FLAGS RULE & ADDRESS DISCREPANCY RULE.
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
HIPAA PRIVACY AND SECURITY AWARENESS.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Notes for Discussion on a Privacy Practice © Joe Cleetus.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Privacy in computing Material/text on the slides from Chapter 10 Textbook: Pfleeger.
IBT - Electronic Commerce Privacy Concerns Victor H. Bouganim WCL, American University.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
The Internet of Things and Consumer Protection
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Student Financial Assistance. Session 55-2 Session 55 Internet Privacy Laws.
Mass Media Law 18 th Edition Don Pember Clay Calvert Chapter 15 Regulation of Advertising McGraw-Hill/Irwin © 2013 McGraw-Hill Companies. All Rights Reserved.
1 PARCC Data Privacy & Security Policy December 2013.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Privacy and Data Breach Issues Kirk Herath, VP, Chief Privacy Officer, Nationwide & Dino Tsibouris, Founding Principal, Tsibouris & Associates.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Data protection—training materials [Name and details of speaker]
BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission,
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
Law Firm Data Security: What In-house Counsel Need to Know
Chapter 10 Cyberlaw, Social Media, and Privacy
Security Standard: “reasonable security”
Privacy principles Individual written policies
Chapter 3: IRS and FTC Data Security Rules
Protecting Personal Information Guidance for Business.
Red Flags Rule An Introduction County College of Morris
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Identity Theft Prevention Program Training
Paul T. Smith, Esq. Partner, Davis Wright Tremaine LLP
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Enforcement and Policy Challenges in Health Information Privacy
Legal Issues in Podcasting: What Broadcasters Need to Know
HIPAA Privacy and Security Update - 5 Years After Implementation
Move this to online module slides 11-56
Presentation transcript:

FTC: Anatomy of a Data Security/Privacy Investigation and the Future of Privacy John Jay College of Criminal Justice Center for Cybercrime Studies November 10, 2011 Kristin Krause Cohen, Staff Attorney Division of Privacy and Identity Protection Federal Trade Commission

Disclaimer The views expressed in this presentation are mine and are not necessarily those of the Commission or any individual Commissioner.

Meet the Federal Trade Commission Nation’s only general jurisdiction consumer protection agency ~1,100 lawyers and staff members in Washington and 7 regional offices Federal jurisdiction in the areas of antitrust and consumer protection Three bureaus: Competition Economics Consumer Protection

Agenda for Today How the FTC’s Data Security Program Has Evolved The FTC Privacy Report Recent Privacy Enforcement Actions New Areas

Legal Standards Relevant laws governing data security and privacy: Fair Credit Reporting Act (FCRA) – Disposal Rule Federal Trade Commission Act (FTC Act) Other federal laws (HIPAA, DPPA, FERPA) State laws

Anatomy of a FTC Investigation Finding cases Pre-search Civil Investigative Demand or access letter Analyzing the facts Litigation or consent negotiation (or closing letter) Compliance and monitoring

Perspective FTC data security enforcement has become more granular From the enforcement actions are specific lessons for businesses to learn, including those in the health industry FTC’s definition of what is unfair or unreasonable will help to inform evaluation of privacy and security practices in other contexts.

Four Points that Guide the FTC’s Information Security Enforcement Information security is an ongoing process. A company’s security procedures must be reasonable and appropriate in light of the circumstances. A breach does not necessarily show that a company failed to have reasonable security measures – there is no such thing as perfect security. A company’s practices may be unreasonable and subject to FTC enforcement even without a known security breach.

The Early Years The FTC’s early privacy and data security enforcement is characterized by targeting companies that engaged in practices contrary to their published privacy policies

The Early Years Geocities (1999) (first Internet privacy case) and Gateway (2004) The FTC alleged the companies used personal information in a manner contrary to promises made to consumers. Order required Geocities to notify members and allow their information to be deleted and prohibited Gateway from sharing personal information obtained under their original privacy policy without express consent.

False Representations About Data Security and FTC Enforcement

Common Vulnerabilities: Petco Petco (2005) FTC alleged that Petco falsely represented that personal information it obtained from consumers was maintained in an encrypted format Petco’s website and web application were vulnerable to commonly known or reasonably foreseeable attacks Order against Petco prohibited misrepresentations and required it to implement a comprehensive information security plan and obtain independent assessments of the plan

FTC use of “unfairness” prong of Section 5 Duty to protect data implied in requirement not to engage in unfair practices

Multiple Risks: BJ’s FTC alleged BJ’s engaged in an unfair practice by “failing to employ reasonable and appropriate security measures to protect personal information....”

Multiple Risks: BJ’s Specifically, FTC alleged BJ’s did not employ reasonable and appropriate measures to secure personal information. Among other things, it: did not encrypt information while in transit or when stored stored information in files that could be accessed using a commonly known default user ID and password did not use readily available security measures to limit access to its networks through wireless access points on the networks did not employ sufficient measures to detect unauthorized access or conduct security investigations stored information for up to 30 days when it no longer had a business need to keep the information

Peer-to-Peer Application Warning Letters Notified almost 100 organizations that files containing PII shared from their computer networks to P2P networks FTC simultaneously released business education on risks associated with P2P Dartmouth study found thousands of documents with sensitive patient information on P2P networks

Social Networking: Twitter Twitter (2010) FTC alleged Twitter failed to require strong administrative passwords, secure storage of administrative passwords, periodic password changes, suspend accounts after repeated login failures Consumers’ non-public tweets were revealed and unauthorized tweets sent from accounts

Employee Data: Ceridian/Lookout Services Ceridian/Lookout Services (2011) FTC alleged companies failed to use reasonable and appropriate security to protect the personal information of its clients’ employees Ceridian is a payroll processor and Lookout Services provided employers assistance with complying with immigration laws

Privacy Roundtables Three public roundtables to explore privacy in light of new technologies, including social media Significant public participation 200 participants reflecting range of perspectives Transcripts and comments on FTC’s website

Roundtable Themes Increased collection and use of consumer data Lack of understanding and informed consent Consumers are interested in privacy Benefits of data collection and use Decreasing relevance of PII/non-PII distinction

Privacy Report – Proposed Framework Companies Should “Bake in” Privacy  Employ reasonable safeguards to protect data  Limit collection and length of retention  Procedures to promote data accuracy  Implement internal privacy programs Simplified Privacy Choices  Carve out commonly accepted business practices – fraud prevention, fulfillment  All other practices should have simple choice at relevant time and context Improve Transparency  Improving and standardizing privacy disclosures to compare across businesses  Tiered access to consumer data that companies maintain  Consumer education

Behavioral Advertising Industry has made some progress in developing and implementing tools to allow consumers to control the collection and use of their online browsing data. Privacy report included a recommendation to implement a universal choice mechanism for behavioral tracking, including behavioral advertising.

Do Not Track – 5 Issues to Consider Any system should be implemented universally, so consumers do not have to opt out as they go from site to site The choice mechanism should be easy to find, easy to understand, and easy to use Any choices offered should be persistent and should not be deleted Any system should be effective and enforceable Any system should let consumers opt out of being tracked through any means and not permit technical loopholes

Recent FTC Privacy Enforcement Google Buzz FTC alleged Google did not adequately disclose to gmail users that signing up for Buzz meant the identity of their frequent correspondents would be made public, OR that they would be enrolled in some features of Buzz even if they chose not to sign up. First FTC Settlement to require a company to adopt a comprehensive privacy program.

Recent FTC Privacy Enforcement Chitika Online advertising company tracked consumers’ online activities even after they chose to opt out of online tracking Unbeknownst to consumers, the opt-out cookie only lasted for 10 days FTC alleged that Chitika’s claims about its opt-out mechanism were deceptive ScanScout Online behavioral advertising company deceptively claimed to users they could opt out of receiving targeted ads by changing their browser settings In truth, company used flash cookies for tracking that browser settings could not block Order requires company to adopt user-friendly mechanism that allows consumers to opt out of being tracked

Implications of new technologies Cloud computing Mobile

Questions? More information available at: Kristin Krause Cohen Federal Trade Commission