IAPP-GDPR Web Banners-300x250-FINAL

It used to happen once every year or two, but the pace has accelerated noticeably over the past few years: The Federal Trade Commission (FTC) issues a Decision and Order summarizing the terms of a settlement in an enforcement action under Section 5 of the FTC Act. Many of the best and brightest have been there. Google, Facebook, Lexis, Sears, Twitter and Microsoft are just a few of the household names that have reached an agreement with the FTC. Each time, privacy and data protection officers, attorneys in law firms and in-house counsel huddle together to review the terms of the settlement and the facts in the complaint.

A recent survey by Jay Cline, CIPP/US, confirms that, in enforcement of privacy law, the FTC is in a league of its own among privacy regulators worldwide. It has initiated far more enforcement actions, levied greater fines and set forth a more comprehensive enforcement agenda than any other data protection authority. Indeed, with the weighty obligations imposed on Google, Facebook and Myspace, and recent enforcement action against a dozen American companies for alleged violations of the EU-U.S. Safe Harbor arrangement, many would argue that the FTC delivers some of the most robust enforcement of European data protection law. Consequently, the implications of the agency’s decisions are studied carefully and implemented not only in the United States but also in Europe and the rest of the world. And not just by legal counsel. Product teams, engineers, information security officers, marketing professionals and senior management have also begun paying attention.

This is why the IAPP Westin Research Center has undertaken a project to produce an FTC Privacy Casebook—which collates, organizes, indexes, tags and annotates the body of FTC privacy and data security jurisprudence—and make it available for you to search and use. Although all documents are available for download as PDFs on the FTC website, there is currently no easy way to search and organize them and review analysis and headnotes in a centralized spot. The IAPP believes that the FTC Privacy Casebook will be a useful resource for businesses that seek to comply with the law and best data practices but often find themselves groping for guidance and direction.

It’s a big project. However, ahead of the largest ever (yet again) IAPP Global Privacy Summit in Washington, DC, next week, the IAPP Westin Research Center has published a useful preview of the FTC Privacy Casebook, which is scheduled for launch at the end of the year.

Explore the FTC Casebook Preview

  • The Westin Research Center has put together expert analysis and gathered all the relevant documents for 10 top FTC settlements in handy cross-referenced fashion

In this preview, we provide a concise summary, analysis and web access to a selection of 10 top FTC privacy enforcement actions. We intentionally use “10 top” and not “top 10”—if you count the two Google cases separately, we have actually selected 11—since with such a deep and rich body of knowledge, opinions may differ with respect to relative importance. Some cases involve Fortune 50 companies, with data practices impacting hundreds of millions of individuals. Others feature interesting paradigm shifts in FTC enforcement practice or nascent legal theories. Yet others involve large fines.

The black letter law is simple enough. Under Section 5, a trade practice is deceptive if it involves a “material representation, omission or practice that is likely to mislead a consumer acting reasonably in the circumstances, to the consumer’s detriment” (see the FTC Deception Statement). A trade practice is unfair if it “causes or is likely to cause substantial injury to consumers which is not reasonably avoidable by consumers themselves and is not outweighed by countervailing benefits to consumers or competition” (15 U.S.C. § 45(n); also see FTC Unfairness Statement). In addition, the FTC enforces a handful of sector-specific privacy laws, including the COPPA, GLBA, FCRA, TCPA and the Telecommunications Act, as well as the EU-U.S. Safe Harbor.

In practice, however, it is much more complicated. Terms like “reasonable,” “substantial,” “harm,” “avoidable” and “countervailing benefits” are rife with ambiguity and leave room for interpretation. As a professional on the ground, how do you know which practice would be considered unfair? What lessons should you draw from prior FTC enforcement actions? In our view, the best way forward is to study the FTC’s approach by closely scrutinizing its body of enforcement actions. Contracted with a data service provider without exercising due diligence in the hiring process, having appropriate contractual data security measures—such as encryption and user authentication—and reasonable auditing rights? You’ve violated Section 5. Designed a mobile system such that one application that has permission to access sensitive information provides another application that has not been given the same level of permission with access to that information (permission re-delegation)? Unfair trade or practice under the FTC Act. Made a material retroactive change to your privacy policy without consumers’ express opt-in consent? Privacy foul under the Section 5 unfairness strain.

In an article soon to be published in the Columbia Law Review, Daniel Solove and Woodrow Hartzog called this a “common law” of FTC consent decrees. Whether or not FTC jurisprudence constitutes a common law is contentious. Critics have claimed that, as an enforcement agency, the FTC should leave the development of a common law to Article III courts with their adversarial process and rules of binding precedent. They argue that rulemaking is the domain of the legislature or formal rulemaking processes. As Solove and Hartzog note, “Although the FTC has specific rulemaking authority under COPPA and GLBA, for Section 5 enforcement—one of the largest areas of its jurisprudence—the FTC has only Magnuson-Moss rulemaking authority, which is so procedurally burdensome that it is largely ineffective.” In a case currently pending before a U.S. District Court—one of only a small handful of FTC enforcement actions to reach litigation—the Wyndham hotel chain is challenging the FTC’s competence, arguing that it exceeded its bounds.

Other interesting legal questions have come up. For example, could the FTC use its unfairness authority to enforce against a practice that is made illegal by another law, which is subject to the authority of a different regulator; e.g., the Telecommunications Act of 1996? Conversely, if a practice is ostensibly covered by—but not made illegal by another law—could the FTC deem it as such under its Section 5 authority? These are not merely theoretical questions. They have come up and were litigated in another FTC case that reached the courts, FTC v. Accusearch.

We leave these weighty questions for another day. Regardless of their resolution, we are convinced that the agency, which has leveraged its Section 5 authority in privacy for two decades, will continue to take an activist stance on data governance. Thus, we focus on the substantive rules and trends that emerge from its body of law in this area. These include a steady shift away from simply preventing deception in privacy policies to a keen focus on Privacy by Design, structural and architectural choices and sound organizational safeguards. They also reflect emerging theories of privacy harm and of indirect liability. Periodically, they engage certain sectors of the data economy—recently data brokers, social networking services and the Internet of Things. Identifying these rules and trends as they emerge will help foster a culture of compliance while not overly burdening business processes and data innovation.

Editor’s Note: FTC Bureau of Consumer Protection Director Jessica Rich and Hogan Lovells Director of Global Privacy and Information Management Practice and Co-Chair of the Future of Privacy Forum Christopher Wolf will discuss FTC privacy and data security jurisprudence with IAPP Vice President of Research and Education Omer Tene and IAPP Westin Research Fellow Kelsey Finch at the IAPP Global Privacy Summit.

Written By

Omer Tene


If you want to comment on this post, you need to login.


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Advertise in IAPP Publications

Find out how to get your message in front the people you want to reach. Download a media kit now.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Registration Open

New! Intensive two-day GDPR training led by the sharpest minds in the field. It's a can't-miss event.

The Congress Is Cancelled

The IAPP Europe Data Protection Congress 2015 is cancelled. Click through to learn more.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»