Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

   Ranked #1 Think Tank in U.S. by Global Go To Think Tank Index

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Photo: Adobe Stock
Blog Post - Technology Policy Blog
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

Some Observations about Enforcement Standards from 2,000 Pages of FTC Documents

August 31, 2015

By Philip Reitinger

Earlier this year I filed a FOIA case against the FTC for its failure to produce any documents in response to my request for the standards it uses in deciding whether to open an unfair trade practice investigation, or bring an unfair trade practice legal action, regarding cybersecurity under section 5 of the Federal Trade Commission Act.  On Christmas Eve last year, the FTC denied my request, saying, “We have located responsive records, all of which are exempt from the FOIA’s disclosure requirements[.]”  The FTC produced no documents, not even in redacted form.  After I filed an administrative appeal, which was denied, I filed suit in order to better inform the public about what standards are used by the FTC when deciding whether to bring a case.  On July 21, 2015, in the course of the litigation, the FTC produced over 2,000 pages of documents, consisting almost exclusively of presentations, testimony, and other public communications.  Here are some observations from these documents.  You can find a more detailed analysis, with citations, here.

You can also listen to an interview I did with Federal News Radio about my experience here:
 

Phil Reitinger: Request sheds light on FOIA process

 

Under FTC “standards,” there is reason to believe that the FTC could bring an action against a company in the case of any significant breach.  To be an “unfair trade practice,” the practice must be “unfair.”  The FTC has consistently stuck by its definition of what is “unfair,” a definition drawn from statute.  Whether this definition limits FTC action in the case of an actual breach is open to question.  Two of the factors – substantial and unavoidable harm to consumers – will likely be met in any significant breach.  The other factor is whether the harm is outweighed by countervailing benefits, but it may be the rare case where an after-the-fact analysis does not disclose a cost-effective step that could have been taken to prevent the breach, given the after-the-fact knowledge of how the breach occurred.  In one candid set of speaker notes on a presentation, the FTC appears to admit this. 

The FTC has consistently said it uses the standard of “reasonableness” in determining if a company has taken sufficient steps to protect personal information.  The documents describe how the FTC determines reasonableness, which has varied a bit over time, at least at the margins, but kept the same substance: a company’s data security measures must be reasonable and appropriate in light of the sensitivity and volume of consumer information it holds, the size and complexity of its business, and the cost of available tools to improve security and reduce vulnerabilities.  Of course, to borrow the words of Chevy Chase, reasonableness is both a floor wax and a dessert topping, usable to punish mistakes in many unrelated fact patterns, and the subjects of FTC investigations confirm this.  Nevertheless, there is one overarching recommendation that is clear across these materials: have an information security program/enterprise security program based on risk. 

Turning from the definition of reasonableness, the FTC also offers reams of advice for preventing a problem through good security.  Until recently, the FTC commonly provided advice on prevention using the rubric of its “Protecting Personal Information: A Guide for Business,” first published in 2007 and updated in 2011.  This document offers recommendations under five principles – principles that appear at many places in the produced documents: 1) Take stock; 2) Scale down; 3) Lock it; 4) Pitch it; and 5) Plan ahead.  However, by 2014, in one exposition these recommendations had morphed, in two ways.  “Take stock” had evolved from a recommendation to have a personal information inventory or data map to a recommendation to conduct a personal information risk assessment, with the need to also look at vulnerabilities in systems handling personal information.  And “Pitch it” disappeared, replaced with “Train employees to handle personal information properly.”  Software developers and cloud providers take note – make sure you have a Security Development Lifecycle (SDL) and a vulnerability reporting portal and process, because, for example, the FTC recommends testing and review of software, and taking user feedback on vulnerabilities.

Also of interest is how and when the FTC chooses to exercise its authority.  The reasons are much what you would expect, including press reports.  One interesting note is that the FTC has represented it doesn’t have the resources to investigate a single consumer complaint, but that congressional inquiries can trigger an investigation (as can consumer or business “complaints,” probably more than one).  In addition, the FTC likes to make an example of companies, seeking to bring cases where there is likely to be a large risk of injury to consumers or that may affect what consumers buy (hitting companies in the pocket), because “such enforcement actions typically have ripple effects through the entire industry by sending a clear message” about non-compliance with the law as the FTC defines it.  

I will close with what was not produced.  The FTC has not yet produced any documents from its investigative files – that is a subject of continuing discussion in my FOIA case – and the FTC recently said that it could not even represent that its search was complete for non-investigative documents.  So the above is at best a partial report.  In addition, the FTC withheld as a deliberative document (and as law-enforcement privileged) a single, three-page document.  The document was called “Data Security investigation considerations,” which sounds like it might include the standards and criteria that would be useful to the public, but the document was withheld by the FTC, in part because it might “inaccurately reflect the views of the Agency[.]”  The FTC also asserted that providing this document – although a draft that does not reflect the views of the FTC – “might increase the risk that a person or business will violate the law by engaging in a particular types of unfair or deceptive data security practices that the FTC is less likely to investigate.” 

To summarize, so far the FTC has identified only one document that may provide more details about enforcement decisions than the general “standards” it uses.  It has not produced that document, both because it may be inaccurate and because if it is accurate, knowing what standards the FTC uses might enable people to comply and avoid an investigation.  That is, the FTC intends vagueness in order to obtain in terrorem effects.  Of particular interest, the subject of the transmittal email for this “deliberative” document was “my vague piece.”  Given that the FTC has been accused of having no standards or vague standards, the irony is palpable.

I would like to thank Steptoe and Johnson, and its lawyers Stewart Baker, Kaitlin Cassel, John Casciano, and Michael Baratz for representing me in the litigation with the FTC, and for obtaining the documents that I used to write this analysis.

Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

More from this blog

Blog Post
The Evolving Role of Artificial Intelligence and Machine Learning in US Politics
In Technology Policy Blog
December 21, 2020
Blog Post
No One is Immune: The Spread of Q-anon Through Social Media and the Pandemic
In Technology Policy Blog
December 17, 2020
Blog Post
Assessing the Impact of U.S.-China Technology Competition and Decoupling: Focusing on 5G
In Technology Policy Blog
December 16, 2020
Blog Post
Covid-19 and the Trajectory of US Venture Capital and Technology Innovation
In Technology Policy Blog
December 3, 2020
Blog Post
Managing U.S.-China Technology Competition and Decoupling
In Technology Policy Blog
November 24, 2020
Blog Post
Applications of Synthetic Aperture Radar Satellites to Environmental Monitoring
In Technology Policy Blog
November 9, 2020
Blog Post
The Goldilocks Porridge Problem with Section 230
By Zhanna Malekos Smith
In Technology Policy Blog
November 3, 2020
Blog Post
Notes from a CSIS Virtual Event: Innovation in the Intelligence Community
In Technology Policy Blog
October 20, 2020

Related Content

On Demand Event
Online Event: Is China Gaining on America as the Leading Standards-Setter for New Technologies and Products?
May 28, 2020
On Demand Event
China's Power: Up for Debate
December 4, 2019
Book
Faith in the Balance
October 28, 2019
Report
Ties that Bind: Family, Tribe, Nation, and the Rise of Arab Individualism
By Jon B. Alterman
December 2, 2019
Report
Getting to Less — Exploring the Press for Less in America’s Defense Commitments
February 6, 2020
Report
Women and Statecraft History: A Compilation of Personal Essays by Women Historians
By Seth Center, Emma Bates
December 1, 2020
On Demand Event
Online Event: Public Private Partnerships: The Foundation for America’s approach to Standards-setting
July 16, 2020
Report
On the Rise: Europe’s Competition Policy Challenges to Technology Companies
By Kati Suominen
October 26, 2020
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2020. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions