Generally, you are required to protect personal information stored on your website's server by implementing reasonable and appropriate data security measures. If you fail regarding this general requirement, you will be subject to claims from website visitors whose information has been compromised.
In addition, the Federal Trade Commission (FTC) continues to aggressively file suits for security violations under Section 5 of the FTC Act which prohibits unfair or deceptive practices.
A good example is the enforcement action brought by the FTC against LifeIsGood.com for failure to implement reasonable and appropriate data security measures. This case is significant because the FTC expects all sites to follow guidelines provided in the settlement of the case.
Lifeisgood.com's Privacy Statement
The FTC Claims
Specifically, the FTC alleged that Life Is Good:
1. unnecessarily risked credit card information by storing it indefinitely in clear, readable text on its network, and by storing credit card security codes;
2. failed to assess adequately the vulnerability of its Web site and corporate computer network to commonly known and reasonably foreseeable attacks, such as SQL injection attacks;
3. failed to implement simple, free or low-cost, and readily available security defenses to SQL and similar attacks;
4. failed to use readily available security measures to monitor and control connections from the network to the Internet; and
5. failed to employ reasonable measures to detect unauthorized access to credit card information. The Settlement
In its settlement with the FTC announced in a press release dated January 17, 2008, Life Is Good agreed to implement the following 5 administrative, technical, and physical safeguards in the future. These 5 safeguards are 5 excellent tips -- delivered straight from the FTC -- that you should also follow:
1. Designate an employee or employees to coordinate the information security program.
2. Identify internal and external risks to the security and confidentiality of personal information and assess the safeguards already in place.
3. Design and implement safeguards to control the risks identified in the risk assessment and monitor their effectiveness.
4. Develop reasonable steps to select and oversee service providers that handle the personal information of customers.
5. Evaluate and adjust its information-security program to reflect the results of monitoring any material changes to the company's operations, or other circumstances that may impact the effectiveness of its security program.
Sometimes form is as important as substance. What I mean is how you do something, and the fact that you documented it at the time you actually did it, is sometimes just as important as the fact that you did it.
The settlement safeguards in the Life Is Good case are a prime example. Simply having what you believe is a good data security program is one thing, but being able to document that you went through the steps outlined by the FTC is another.
The Life Is Good case points the way to what will work for data security. So, it's highly recommended that you set up a filing system that preserves your documentation and indicates you went through these steps, and when you did it. Then set up a tickler to remind you to go through the steps on an annual basis.
We know that there is no data security program that is 100% safe from illegal intrusions. If you have an unfortunate data security breach, it's likely the FTC or a state regulator will come knocking at your door. That's why it's so important for you to be able to produce a file that clearly shows you implemented reasonable and appropriate data security measures in accordance with the FTC guidelines.
The future of your business may depend on it!