Recent FTC Settlements Highlight Risks of Flawed Information Security Practices and Related Representations

Jul 22, 2019

Reading Time : 5 min

In April 2019, when the Commission announced its case against ClixSense, it noted its intention to strengthen its orders in data security cases. (FTC Statement, FTC Matter Nos. 1723002 & 1723003 (Apr. 24, 2019).) In particular, its intentions, where appropriate, are to incorporate into its data security orders new requirements (e.g., a senior officer must provide annual certifications of compliance to the FTC) and to expand existing requirements (e.g., third-party assessors must examine a company’s entire data security program and provide specific evidence for findings). The ClixSense and D-Link settlements are examples of this more stringent approach in practice.

The ClixSense Complaint

ClixSense is an online rewards website. The Commission brought charges against James V. Grago, Jr. as ClixSense’s sole owner.

ClixSense collects individuals’ personal information at the time they sign up for its rewards website. In 2016, ClixSense reported a data breach that affected the data of some 6.6 million consumers. The data of at least 2.7 million consumers was apparently sold online as a result.

In the aftermath of the breach, the Commission filed a complaint against ClixSense and its owner Grago for alleged violations of Section 5 of the FTC Act, including: (1) deceptive practices in the form of misrepresentations about encryption, (2) deceptive practices in the form of misrepresentations about using the latest security techniques, and (3) unfair practices in the form of failure to employ reasonable security practices. (ClixSense Compl.)

The Commission claimed that ClixSense did not employ reasonable security given that it: failed to limit access between computers on its network, as well as between ClixSense’s computers and the Internet; let employees store plain text user credentials in personal email accounts on ClixSense’s laptops; failed to change default login credentials for third-party company network resources; and maintained consumers’ personal information in plain text on networks and devices. The Commission alleged that these failures could have been fixed with basic measures and that, by failing to do so, ClixSense facilitated hackers’ access to consumers’ data.

To settle these claims, Grago agreed not to misrepresent the extent to which any company he controls protects the personal information it collects. He also agreed that if any company he controls collects or maintains personal information he will implement a comprehensive information security program, obtain biennial assessments of that program by an independent third party for 20 years, is prohibited from making misrepresentations to the third party performing the assessment, and will annually certify its compliance with the Commission.

The D-Link Complaint

D-Link is a hardware manufacturer that develops and markets smart home devices including routers and IP cameras. Due to the company’s alleged security failures, thousands of its routers and cameras were vulnerable to a range of attacks. Attackers utilized those vulnerabilities to access consumers’ home and office networks and sensitive personal information. At the same, D-Link promoted its products as “easy to secure” and as having “the best possible encryption.”

The Commission brought an enforcement action against D-Link in January 2017, after the vulnerabilities came to light. (D-Link Compl.) The Commission claimed that D-Link violated Section 5 of the FTC Act by engaging in: (1) unfair acts or practices through its failure to take reasonable steps to secure the software for its products; (2) deceptive acts through its misrepresentations in its security policies concerning the reasonableness of its actual data security practices; (3) deceptive acts through its misrepresentations in its promotional materials about the security of its routers and its IP cameras; and (4) deceptive acts through its misrepresentations in its routers’ and IP cameras’ user interface concerning their security.

The Commission’s complaint alleged that D-Link’s protection of its routers and cameras was unreasonable because it: failed to address easily preventable flaws such as saving device passwords and other sensitive data in plain text; improperly handled the security key used by the manufacturer to sign software, resulting in the key’s public exposure for a six-month period; and inappropriately stored users’ mobile app login credentials in plain text on users’ mobile devices. According to the Commission, many of these vulnerabilities could have been mitigated using free software or basic protocols to restrict and oversee access to sensitive information.

To settle these claims, D-Link agreed to implement a comprehensive software security program, including specific measures to protect its routers and IP camera devices. It also agreed to biennial assessments by a third-party for a 10-year period following an initial assessment. The third-party assessor must keep all documents it relies on for its assessment for five years and to provide them to the Commission upon request. In another sign of the Commission’s more serious approach, the third party assessor is also required to identify specific evidence for its findings. The Commission is empowered to approve the third-party assessor D-Link selects.

In an interesting development, the Commission provided D-Link the option of meeting its requirement of adopting a comprehensive security program by ensuring its program complies with the secure product development standard set by the International Electrotechnical Commission (IEC). The third-party assessor D-Link selects would have to certify D-Link’s compliance with the IEC standard. D-Link cannot take advantage of this option if it provides any misleading or false information during its assessments or audits.

Moving Forward – Expect Enhanced Oversight in Data Security Cases

The oversight terms in the ClixSense and D-Link settlements confirm the Commission’s willingness to utilize new and expanded requirements in its data security orders. Companies should anticipate that in future data security cases the Commission may advocate for terms such as: (1) Commission approval of third-party assessors; (2) more expansive assessments by third-party assessors to include review of companies’ revised security programs, assessment of the programs’ implementation and identification of any gaps or weaknesses;1 (3) prohibitions against companies misrepresenting any material fact to third-party assessors; (4) requirement that a senior officer certify the company’s compliance to the Commission; or (5) requirement that the company notify the Commission of any unauthorized access to consumers’ personal information. The best way to defend against these terms is to take steps now to ensure your information security program adequately meets your needs and avoid making any misrepresentation of your security procedures or program.


1 In the past, third-party assessors were required only to identify specific safeguards employed by the company, explain the utility of the safeguards in protecting users’ personal data and certify that the safeguards operate with sufficient effectiveness.

Share This Insight

Previous Entries

Data Dive

March 3, 2025

On January 16, 2025, the Federal Trade Commission (FTC) issued a Final Rule updating the Children’s Online Privacy Protection (COPPA) Rule, significantly expanding compliance obligations for online services that collect, use, or disclose personal information from children under 13.1 The amendments impose new restrictions on targeted advertising, add data security requirements, refine parental consent mechanisms, and introduce additional compliance measures.

...

Read More

Data Dive

February 21, 2025

On January 8, 2025, the DOJ published a final rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

January 22, 2025

On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts, including Executive Order 14028, this directive seeks to bolster cybersecurity across federal systems, supply chains and critical infrastructure from adversarial nations, particularly from the People’s Republic of China (PRC).

...

Read More

Data Dive

January 10, 2025

UPDATE: The California Privacy Protection Agency (CPPA) has extended the deadline for submitting public comments from January 14 to February 19, 2025, in response to the recent California wildfires. This extension aims to afford stakeholders additional time to provide comprehensive and detailed feedback, considering the significant challenges posed by the wildfires.

...

Read More

Data Dive

November 25, 2024

Treasury has issued a Final Rule to implement President Biden’s 2023 EO targeting U.S. investments in Chinese companies engaged in certain activities related to semiconductors, quantum computing or AI.

...

Read More

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

© 2025 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.