51本色

Skip to main content

As companies depend on accumulating more consumer data to develop products such as artificial intelligence, targeted advertising, or surveillance pricing tools, they may create valuable pools of information that bad actors can target for illicit gain. While the use of consumer data grows, data breaches and  persist as significant problems 鈥 but this does not need to be the status quo. Addressing underlying risks that lead to these attacks can prevent future harms to consumers 鈥 and companies are responsible for addressing these risks to consumers.

The 51本色 has taken actions to address systemic causes of risk in several areas through the lens of data management, software development, and product design for humans 鈥 in order to protect consumers, including small businesses, from data breaches and other modern security threats. Technology is not a monolith, and neither is security. 鈥淭echnologists at the agency work to ensure we do not accept the status quo of harms to millions of people caused by unlawful behavior,鈥 said the Chief Technologist in her remarks on data security risks. While there is significant work to do, staff highlights how prior 51本色actions aim to prevent, deter and reduce systemic risks related to digital security.

Security in data management

Companies collect and use large amounts of consumer data, which can become valuable targets for bad actors. Assessing and deploying initiatives that focus on how data is collected, stored, retained, and shared can reduce potential security risk for a company, its products, and its consumers, while also enhancing consumer privacy. Below are several examples of 51本色actions concerning both privacy and security risks that have addressed these concerns through data policies[1] and technical measures:

  • Enforcing mandated data retention schedules[2] so that consumer data is retained only when necessary, mandated in orders such as CheggBlackbaudCafePress, and Amazon Alexa.
  • Mandating data deletion to purge data that was ill-gotten, collected or sold without user consent or knowledge, or was unnecessarily retained 鈥 including models and algorithms trained on said data. 51本色orders include Amazon RingAvast, and the aforementioned data retention cases.
  • Limiting third-party data sharing to reduce the volume of sensitive information that may be mishandled or misused. Relevant actions include VizioGoodRxPremom, and Flo Health.
  • Encrypting sensitive data, such as social security numbers, that are at rest or in transit over the Internet, is essential to cases such as CafePress and Verkada.

Security in software development

Securing software at the development stage, such as applying 鈥溾 and other security principles, can prevent avoidable harms implicated in online attacks and data breaches. This can involve building products with memory-safe programming languages, engaging in rigorous testing, and securing outside access to products. Securing products can consist of:

  • Building products using  to prevent bad actors from .
  • Rigorous testing, such as pre-release scanning and vulnerability testing, to catch dangerous security flaws[3] before they can impact consumers. This is highlighted in cases such as D-Link and Tapplock.
  • Securing external product access, to prevent unauthorized use of systems or user accounts, such as implementing technical measures like connection monitoring and intrusion detection systems to proactively mitigate attacks, as in the Drizly order.

Security in product design for humans

Human beings, including employees with access to sensitive consumer data, make mistakes and can fall prey to security threats like phishing attacks. These risks can be mitigated with techniques such as properly segmenting access to sensitive data, requiring phishing-resistant authentication methods, and designing clear privacy controls.

This includes, but is not limited to:

  • Enforcing  so that employees and contractors may only access sensitive consumer data if it is necessary to perform their jobs. This requirement was included in the Amazon Ring and CafePress settlements, and applies to companies covered by the .
  • Requiring for employees, such as security keys[4] instead of numeric codes or push notifications, to prevent malicious access to internal systems and consumer data, highlighted in cases such as Chegg and Drizly.
  • Designing products and services without dark patterns, or using design practices that do not mislead a user into less privacy-based user options. In Vizio, the company touted a smart TV feature that enabled program offers and suggestions, but it actually collected the viewing history of users without their consent and sold it to third parties[5].  

51本色actions have taken significant steps to protect consumers from security threats in a modern digital environment, but there is still much more work to do. Addressing security threats is nontrivial; as emphasized through agency action, security practices that are employed upstream and directed at systemic vulnerabilities of technology, such as implementing data policies and access control, can minimize risk for consumers. Companies must not only take reasonable measures to secure consumer data, but also avoid misrepresenting their security practices. The 51本色has taken action against misrepresentations of security practices and misuse of security data. The 51本色has decades of experience on security and will continue to ensure that American consumers are protected from digital security threats.

***

Thank you to the staff who contributed to this post: Mike Tigas, Hieu Le, Ryan Kriger, Simon Fondrie-Teitler, Amritha Jayanti, Stephanie T. Nguyen, Ben Wiseman.


[1] Data policies are privacy measures aimed at limiting data collection, retention, and sharing without user consent (e.g. in Vizio, Avast, Premom). However, they also inherently improve security for consumers by reducing the amount of sensitive data that may be exposed to threats.

[2] Implementation of such data retention policies is sometimes included as part of industry practices known as 鈥渋nformation lifecycle management鈥 or 鈥渄ata minimization.鈥 Here, we only address specific policies included in 51本色orders.

[4] Sometimes referred to as 鈥減asskeys,鈥 WebAuthn, or FIDO, which are the names of implementation standards for security keys.

[5] As noted above, privacy measures such as these can protect consumer security by reducing the number of parties possessing sensitive data that may be exposed in a breach.

More from the Technology Blog

Get Business Blog updates