(March 24, 2000) I. A Continuum of Security Options 1. Sliding Scale Security Standards - Require commercial websites that collect personal information to adhere to a sliding scale of security standards and managerial procedures in protecting individuals' personal data. This scale could specify the categories of personal data that must be protected at particular levels of security and could specify security based upon the known risks of various information systems. In the alternative or as part of the standard, there could be minimum security standards for particular types of data. The sliding scale could be developed by the FTC or another government agency and incorporate a process for receiving input from the affected businesses, the public, and other interested parties. 2. "Appropriate Under the Circumstances"/"Standard of Care" - Require all commercial Websites holding personal information to adopt security procedures (including managerial procedures) that are "appropriate under the circumstances." "Appropriateness" would be defined through reliance on a case-by-case adjudication to provide context-specific determinations. This standard would operate in a manner similar to that governing medical malpractice for physicians: as the state of the art evolves and changes, so does the appropriate standard of care. An administrative law judge of the FTC or another agency or a court of competent jurisdiction could adjudicate the initial challenge. 3. Rely on Industry Specific Security Standards - All commercial websites that collect personal information could be required to adhere to security standards adopted by a particular industry or class of website. There are three quite different options for how the standards are developed:
4. Maintain a Security Program - Require all commercial Websites that collect personal information to develop and maintain (but not necessarily post) a security program for protecting customers' personal data. This option could take one of two forms:
5. Rely on Existing Remedies - Before requiring any particular security steps, wait to see whether existing negligence law, state attorneys general, and the pressure of the market induce Websites that collect personal information to generate their own security standards. It is worth noting that the insurance industry has started to insure risks associated with Internet security. The emergence of network security insurance may force companies to seriously address security issues, as the presence or absence of adequate security will be taken account in the underwriting process utilized to determine rates for premium. II. Consumer Notice and Education Certain options were considered but viewed as inappropriate by themselves. Because these options may nonetheless have value in combination with other options, they are discussed in this section. 1. Post a Security Notice - A security notice is only useful if it allows consumers to compare security among sites in an understandable way. Since it is difficult to convey any useful information in a short statement dealing with such a complex subject as the nuts and bolts of online security, most such notices would be confusing and convey little to the average consumer. While notice statements could be useful in conjunction with one of the other options (alerting consumers to the presence of a security plan, compliance with a seal program, or a regularly updated security audit), they are ineffective standing alone. There is not necessarily any meaningful correlation between the presence or absence of a security notice statement and the true quality of a website's actual security. 2. Consumer Education - Sponsor education campaigns to alert consumers to security issues, including how to assess the security of a commercial site and what steps to take to protect their own security. This option could be implemented by itself, but we concluded that it is better combined with other options. Regardless of what security solutions the FTC decides to recommend, it would be extremely valuable for the FTC or particular industry associations to sponsor consumer education campaigns aimed at educating Internet users as to what to look for in evaluating a website's security. In addition, no system is secure against the negligence of users, so consumers must be educated to take steps on their own to protect the security of their personal data. III. Enforcement Options 1. Government Enforcement Program - The FTC or another agency could enforce compliance with standards using its current enforcement power or using newly expanded authority. The enforcement could establish civil or criminal fines, or both and other equitable remedies. 2. Create Express Private Cause of Action - Congress could establish a private right of action enabling consumers to recoup damages (actual, statutory, or liquidated) when a company fails to abide by the security standard established through one of the options set out in Section I. In the alternative, Congress could establish a private right of action enabling consumers to recoup damages where they suffer harm due to an entity's failure to abide by the security standard established through one of the options set out in Section I. The creation of private rights of action would help create strong incentives for entities to adopt and implement reasonable security practices and ensure compensation for individuals harmed as a result of inadequate security of data. Important issues would need to be addressed in such legislation, including the availability of compensatory, liquidated, or punitive damages, the elements of any such cause of action, and specific parties covered by the statute. However, on its own it is unclear whether private rights of action are the most effective method of policing privacy. Individuals who have suffered an invasion of their privacy may be reluctant to use litigation, a very public process. Absent a requirement that businesses notify affected individuals when a violation of security standards has occurred, it is difficult for individuals to identify when a business fails to meet their obligations; therefore, under enforcement is a distinct possibility if this is the only enforcement option. 3. Third-Party Audit or Other Assurance Requirements - Rely on independent auditors to ensure compliance with standards. This structure could require security standards to be verified by an external body and could require public disclosure of the findings. 4. Rely on Existing Enforcement Options - Many of the options include the publication of the website's security procedures or its adherence to particular standards. Such postings are subject to traditional FTC enforcement if the statements are false. It is also of course possible for consumers to bring their own actions for fraud, false statements, or underlying negligence in the handling of the data. IV. Additional Policy Issues/Options 1. Big vs. Small Business Concerns - We considered the relative impact of many of these options on smaller, start-up companies or newcomers to the online environment. We were reluctant to recommend a special treatment for such Websites, in part because any risk assessment automatically takes into account the size of the company (or, more appropriately, the size of a website's potential exposure to security breaches). In many cases (but not all) a smaller Website or less well-established company will have fewer customers, less data to secure, and less need for heavy security. A smaller site may also have an easier time monitoring its exposure manually and informally. The cost may also generally be lower to secure less data. 2. Competition Law Approvals - Several of the above options depend on or would be advanced by inter-industry cooperation and consultation on appropriate and feasible security standards. When industry agrees on standards with real bite, however, the industry members who feel that bite tend to call their antitrust lawyers. It is vital that the FTC or the Department of Justice make assurances to industry members that cooperation in the development or enforcement of security standards and procedures will not result in antitrust liability. 3. Internal Security - Most of the publicly expressed concerns about the security of personal data have to do with outside "hackers" who clearly lack authority to review personal data - or anything else behind the commercial site's firewall. But many threats to computer security come from insiders. So presumably good security means internal managerial and technical processes and policies to deal with the insider threat. Regulation of inside threats, however, is an extremely ticklish undertaking. Whether an employee is authorized to see certain data will depend on many circumstances that often cannot be reduced to rules. When addressing these insider threats, the FTC should either avoid regulating inside conduct at all or else ensure that any regulations are flexible enough to deal only with actual threats rather than innocent (albeit not formally "authorized") access to data. 4. Integrity - Some concepts of security - and some legal definitions - call for "integrity" of data. Data is typically defined as having integrity if it has not been "corrupted either maliciously or accidentally" Computer Security Basics (O'Reilly & Associates, Inc., 1991) or has not been "subject to unauthorized or unexpected changes" Issue Update on Information Security and Privacy in Network Environments (Office of Technology Assessment, 1995, US GPO). These definitions, issued in the context of computer security rather than legal enforcement, pose special problems when translated into a legal mandate. If integrity is read narrowly, as a legal matter it would focus on whether a website has some form of protection against malicious corruption of its data. If the definition is read broadly, it could lead to liability for data entry errors or other accidental distortions to the private personal information it maintains. For this reason, integrity as a legal standard needs to be defined with great care. There would be little controversy over an integrity requirement that was narrowly focused on preventing deliberate corruption of data by hackers or others. It would be a far more controversial step to read the requirement for integrity as imposing liability on all websites that contain recordkeeping errors or sloppy database practices. 5. Additional Measures - There are other ways in which government could improve the security of personal data without imposing regulatory solutions. Some would argue that, before the government criticizes the private sector, it should demonstrate its own capability in the area of privacy protection., Government could establish standards for its own use with the hope that those standards will be adopted in the private sector, it could also establish audits or prizes to police and reward individual agencies and to show industry how best practices can be implemented. Draft Pros and Cons I. Continuum of Security Options 1. Sliding Scale Security Standards - Require commercial Websites that collect personal information to adhere to a sliding scale of security standards and managerial procedures in protecting individuals' personal data. This scale could specify the categories of personal data that must be protected at particular levels of security and could specify security based upon the known risks of various information systems. In the alternative or as part of the standard, there could be minimum security standards for particular types of data. The sliding scale could be developed by the FTC or another government agency and incorporate a process for receiving input from the affected businesses, the public, and other interested parties. Proponents would argue:
Opponents would argue:
2. "Appropriate Under the Circumstances"/"Standard of Care" - Require all commercial Websites holding personal information to adopt security procedures (including managerial procedures) that are "appropriate under the circumstances." "Appropriateness" would be defined through reliance on a case-by-case adjudication to provide context-specific determinations. This standard would operate in a manner similar to that governing medical malpractice for physicians: as the state of the art evolves and changes, so does the appropriate standard of care. An administrative law judge of the FTC or another agency or a court of competent jurisdiction could adjudicate the initial challenge. Proponents would argue:
Opponents would argue:
3. Rely on Industry Specific Security Standards - All commercial Websites that collect personal information could be required to adhere to security standards adopted by a particular industry or class of Website. There are three quite different options for how the standards are developed:
Proponents would argue:
Opponents would argue:
4. Maintain a Security Program - Require all commercial Websites that collect personal information to develop and maintain (but not necessarily post) a security program for protecting customers' personal data. This option could take one of two forms:
Proponents would argue:
Opponents would argue:
5. Rely on Existing Remedies - Before requiring any particular security steps, wait to see whether existing negligence law, state attorneys general, and the pressure of the market induce Websites that collect personal information to generate their own security standards. It is worth noting that the insurance industry has started to insure risks associated with Internet security. The emergence of network security insurance may force companies to seriously address security issues, as the presence or absence of adequate security will be taken account in the underwriting process utilized to determine rates for premium. Proponents would argue:
Opponents would argue:
|