Print
Category: News

Washington, DC - Savvy business people are on the lookout for ways to minimize their companies’ risk of a data breach. Many businesses consult the FTC’s complaints and orders, each of which includes a detailed description of the conduct alleged to have violated the FTC Act. Perhaps it was a broken promise about the care the company said it would take when handling consumers’ sensitive data. In other cases, it might be a pattern of failures which, when taken together, led to the theft and misuse of customers’ confidential information.

But that isn’t the only way to learn about our approach to data security. FTC press releases, business guidance publications, videos, speeches, workshops, reports, more than 150 security-centric Business Blog posts, and other communications offer practical advice on how the FTC Act applies to data security. One particularly practical source of information is Start with Security, our nuts-and-bolts brochure that distills the lessons learned from FTC cases down to 10 manageable fundamentals applicable to companies of any size.

Businesses have asked us to keep the guidance coming, which is why we’re announcing a new initiative, Stick with Security. For the next few months, we’ll publish a Business Blog post every Friday focusing on each of the 10 Start with Security principles. This time, we’ll use a series of hypotheticals to take a deeper dive into steps companies can take to safeguard sensitive data in their possession. We’ll offer easy-to-apply tips to help your company not just start with security, but stick with security to bolster your defenses.

Where are we getting our Stick with Security examples? First, from the FTC’s 60+ complaints and orders, including new settlements and litigated cases announced since Start with Security was published.

Another important source of our Stick with Security examples are the experiences of businesses from across the country. We’ve listened to the day-to-day challenges you face in protecting sensitive information and have learned from the practical approaches you’re taking to address data security challenges.

In addition, there are lessons to learn from investigations that staff closed with no further action. While we don’t disclose the identities of the targets of those matters unless there has been a public closing letter, we think there is more we can do to explain for other companies the general principles that informed our thinking when we decided to close those investigations.

A preliminary question we often get from businesses is if there are recurring themes that run through the investigations that are ultimately closed without law enforcement. One thing we’ve noticed is that those companies’ practices often lined up with the common-sense security fundamentals in Start with Security. For example, the companies typically had effective procedures in place to train their staff, keep sensitive information secure, address vulnerabilities, and respond quickly to new threats.

Here are some other themes that emerge that offer insights into why investigations into breaches you may have heard about didn’t necessarily result in FTC law enforcement: