The Federal Trade Commission continues to remain laser-focused on protecting consumers’ privacy and security online, offline and in the mobile environment. To date, the FTC has obtained more than 60 privacy settlements and brought over 50 data security cases (two of which are currently in litigation). At least 20 of these cases involved children’s personal information; 11 involved the collection of precise geolocation information; eight involved mobile applications or mobile devices; three were against online or mobile platforms; and one involved the Internet of things. These enforcement examples represent one or more business practices that the FTC views as unfair and/or deceptive pursuant to Section 5 of the FTC Act.
While nearly any company that financially benefits from the use of consumer personal data is a potential FTC target, to understand what particular practices the FTC views as unlawful can be challenging. Indeed, for those who do not regularly practice in this area, closely reviewing the more than 100 privacy and security FTC enforcement cases and related business guidance (as well as a vast body of the broader scope of FTC consumer protection law) is not realistic. To help navigate that task, this article summarizes 15 do’s and don’ts to consider when implementing privacy and data security practices based on past FTC enforcement.
Privacy Do’s and Don’ts
1. DO Build in Privacy Protections From the Beginning.
Build in consumer privacy protections—privacy by design—in the beginning and at each key stage of a product’s development. A cursory “legal” review just before a product launch is not likely to be effective in identifying and resolving problematic data practices.
Rather, the emphasis should be on proactively incorporating a privacy analysis as to each product, service or platform that is capable of collecting, accessing, storing or transmitting personal or individual device information. Such analysis often includes (a) assessing whether there are legitimate business reasons for collecting each type of personal or device information; (b) understanding all the ways the information will be used; (c) ensuring reasonable limits on the collection and retention of such data; (d) implementing reasonable procedures to promote data accuracy and integrity; and (e) employing appropriate security and access restrictions. In an initial investigation into a company’s practices, the FTC will often look to see whether, and to what extent, a company applied this type of analysis from the beginning.
2. DO Understand What Information Will Be Collected From or About the User.
Companies should understand precisely what information will be collected actively and passively from and about the user and classify what information gathered is personal (and of that bucket, what information should be treated as highly sensitive, such as children’s information, health information, financial account information, Social Security numbers and precise geolocation information). It also is useful to proactively audit the proposed data flow to confirm whether any additional individual data are being collected unintentionally.
In analyzing what information is being collected, it helps to cast a broad net and include data that are obviously individually identifiable, as well as data that might seem anonymous but which the FTC views as personal, such as: (1) a persistent identifier, such as a customer number held in a cookie, a static Internet Protocol (IP) address, a mobile device ID or a processor serial number; (2) precise geolocation data of an individual or mobile device, including GPS-based, Wi-Fi-based or cell-based location information; and (3) an authentication credential, such as a user name or password.
3. DO Clearly and Accurately Communicate Data Practices With Consumers.
At a minimum, companies should clearly and accurately describe their data collection, use, disclosure and protection measures in a prominent, plain language privacy policy that is readily accessible prior to the consumer’s purchase or download of the product or service. Companies should also assess what other materials—from advertising, press releases, user manuals, etc.—describe data practices, and confirm that the representations are accurate (as well as whether there are any material omissions about the data practices, which should be conveyed to provide an accurate understanding of the data use by the consumer). The only way to ensure that privacy practices are described accurately is to know what information the company (or those acting on its behalf) actually collects, and how it is used, shared and protected.
4. DON’T Forget to Update Your Representations Along the Way to Match Your Privacy Practices.
Companies should confirm that all representations made about a product and how personal information is handled and secured (whether in the privacy policy or in other materials) remain consistent, even as business practices evolve. This is especially important when there is an update that (intentionally or unintentionally) causes more or new types of information to be collected from or about the user, or when the company has new and materially different ways in which it is using or disclosing such information.
Business practices singled out by the FTC for failing to do this include: (a) automatically collecting users’ mobile address books, without providing notice to users or obtaining consent;
5. DO Provide Users With User-Friendly Choice Options.
The FTC believes that companies should offer clear and concise choice mechanisms that are easy to use and are delivered at a time and in a context that are relevant to the consumer’s decision about whether to allow the data collection or use.
6. DON’T Disregard a Consumer’s Choice to Limit Data Collection.
If a website, app, product, service or platform provides consumers with the option to limit or prohibit the collection of personal information, ensure that the consumer’s choice is honored. For instance, the FTC settled allegations that the developer of the “Brightest Flashlight Free” app deceived consumers by presenting them with an option to not share their information, even though the information was shared automatically, effectively rendering the option meaningless.
Data Security Do’s and Don’ts
7. DO Implement a Reasonable Security Program and Have Procedures in Place to Respond to a Data Breach.
A data breach—large or small—can often trigger attention from the FTC to investigate a company’s data and security practices. Ideally, before a breach occurs, a company will have implemented a security program that is reasonably designed to (a) address security risks related to the development and management of new and existing products and services for consumers and (b) protect the security, integrity and confidentiality of consumer information.
Once a company discovers that it may have incurred a potential data breach, it should promptly and competently investigate the breach and, once the breach is confirmed, take appropriate steps to send consumer notice (in accordance with state laws) and review and address existing vulnerabilities to prevent a similar recurrence. The FTC has informally closed many of its data security investigations following a showing by the company of reasonable and prudent incident response to the breach and a reasonable security program in place.
8. DON’T Store or Transmit Personal Data Without Ensuring the Data Are Reasonably Secured.
Companies should take reasonable steps to secure personal information stored or transmitted from the website, app, product, service or platform. Although the FTC has not set a specific standard for securing such information, it recognizes that overriding default Secure Sockets Layer (SSL) settings without providing additional layers of protection;
9. DO Test and/or Audit the Program’s Security Before Product Launch.
The FTC has settled with a number of companies over allegations that they failed to employ reasonable and appropriate security in the design, development, testing or maintenance of their website, app, product, service or platform.
10. DON’T Forget to Provide Adequate Training and Proper Oversight.
Companies should provide adequate privacy and security guidance or training for those developing products or services that collect and use personal information and implement reasonable oversight procedures for any third-party service providers that will have similar access and use privileges.
11. DO Confirm Users’ Identities Through a Verification Process, as Necessary.
When a website, app, product, service or platform allows a user to register or sign up, the company should have a reasonable method to verify the identity of the user. This is especially important when users are sharing personal information with one another. For example, the FTC brought an enforcement action against Snapchat Inc. after it failed to verify users’ phone numbers during registration.
When a user of a product, service or platform provides a purchase option, companies should take reasonable measures to verify that the purchase option and associated charge(s) are clearly and accurately presented, that the authorized (adult) user confirms the charge and that there are appropriate safeguards to prevent, detect and respond to potential fraud or unauthorized charges. FTC settlements and litigation specifically highlight the FTC’s concern in this area relating to charges for in-app purchases
General Do’s and Don’ts
In addition to specific privacy and data security considerations, there are other general considerations that companies might consider from the outset.
12. DO Apply Extra Scrutiny When It Comes to Kids.
For any online or mobile destination that is targeted to, or likely to be attractive to and used by, children, developers and marketers should confirm that it complies with the Children’s Online Privacy Protection Act and the FTC’s COPPA Rule.
13. DON’T Avoid Monitoring and Addressing Consumer Complaints.
Companies should have a clearly publicized and effective channel for receiving and addressing complaints about the product and determining whether such complaints may indicate a systemic or design issue that needs to be addressed in the product or service.
14. DO Appreciate That the FTC Will Not Hesitate to Bring a Case Against a Third Party.
The FTC takes the position that a company can be liable for the acts and practices of a third party if the company knew or should have known of the challenged conduct, financially benefited from such conduct and failed to take appropriate or prompt steps to address the concerns. In many of the FTC’s third-party liability cases, the company often overstates the level of oversight or protection it provides over third parties or does not take reasonable steps to confirm that its third-party vendors or business partners can reasonably use and/or protect personal data shared with them.
15. DON’T Forget to Monitor for New Developments at the FTC.
Many of the FTC’s enforcement actions came soon after the agency held workshops or seminars or issued other educational briefings addressing new areas or after issuing staff reports to industry with recommended business guidance. If past is prologue, we can anticipate future enforcement on facial recognition, mobile device tracking, alternative scoring products and/or the use of connected health and fitness devices.
Conclusion
The FTC will continue to make privacy and data security enforcement a priority. As our interconnected world continues to grow, the FTC will closely scrutinize companies’ practices with respect to the collection, use, handling and security of consumers’ personal information. Staying mindful of FTC enforcement actions and the lessons learned from such cases, as well as working closely with experienced privacy/security counsel, can help companies proactively identify and address privacy and data security issues and hopefully avoid appearing on the FTC’s radar.
Learn more about Bloomberg Law or Log In to keep reading:
See Breaking News in Context
Bloomberg Law provides trusted coverage of current events enhanced with legal analysis.
Already a subscriber?
Log in to keep reading or access research tools and resources.