Public Workshop Examining Information Security for Financial Institutions and Information Related to Changes to the Safeguards Rule, 13082-13086 [2020-04610]

Download as PDF 13082 Federal Register / Vol. 85, No. 45 / Friday, March 6, 2020 / Proposed Rules which is incorporated by reference in 14 CFR 71.1. The Class E airspace designations listed in this document will be published subsequently in the Order. FAA Order 7400.11, Airspace Designations and Reporting Points, is published yearly and effective on September 15. Regulatory Notices and Analyses The FAA has determined that this regulation only involves an established body of technical regulations for which frequent and routine amendments are necessary to keep them operationally current, is non-controversial and unlikely to result in adverse or negative comments. It, therefore: (1) Is not a ‘‘significant regulatory action’’ under Executive Order 12866; (2) is not a ‘‘significant rule’’ under DOT Regulatory Policies and Procedures (44 FR 11034; February 26, 1979); and (3) does not warrant preparation of a regulatory evaluation as the anticipated impact is so minimal. Since this is a routine matter that will only affect air traffic procedures and air navigation, it is certified that this rule, when promulgated, would not have a significant economic impact on a substantial number of small entities under the criteria of the Regulatory Flexibility Act. Environmental Review This proposal will be subject to an environmental analysis in accordance with FAA Order 1050.1F, ‘‘Environmental Impacts: Policies and Procedures’’ prior to any FAA final regulatory action. lotter on DSKBCFDHB2PROD with PROPOSALS Authority: 49 U.S.C. 106(f), 106(g), 40103, 40113, 40120; E.O. 10854, 24 FR 9565, 3 CFR, 1959–1963 Comp., p. 389. 18:04 Mar 05, 2020 Jkt 250001 * * ANM MT E2 Dillon, MT [Amended] Dillon Airport, MT (Lat. 45°15′19″ N, long. 112°33′09″ W) That airspace extending upward from the surface within a 5.2-mile radius of the airport, and within 2.4 miles each side of the 026° bearing from the airport, extending from the 5.2-mile radius to 6.8 miles northeast of the Dillon Airport. Paragraph 6005 Class E Airspace Areas Extending Upward From 700 Feet or More Above the Surface of the Earth. * * * * * ANM MT E5 Dillon, MT [Amended] Dillon Airport, MT (Lat. 45°15′19″ N, long. 112°33′09″ W) That airspace extending upward from 700 feet above the surface within a 5.2-mile radius of the airport, and within 3 miles each side of the 205° bearing from the airport, extending from the 5.2-mile radius to 9.9 miles southwest of the airport, and that airspace within 8 miles west and 4 miles east of the 005° bearing from the airport, extending from the 5.2-mile radius to 16 miles north of the airport; and that airspace extending upward from 1,200 feet above the surface within a 8-mile radius of the Dillon Airport. FEDERAL TRADE COMMISSION Public Workshop Examining Information Security for Financial Institutions and Information Related to Changes to the Safeguards Rule 1. The authority citation for 14 CFR part 71 continues to read as follows: VerDate Sep<11>2014 * 16 CFR Part 314 ■ [Amended] * BILLING CODE 4910–13–P PART 71—DESIGNATION OF CLASS A, B, C, D, AND E AIRSPACE AREAS; AIR TRAFFIC SERVICE ROUTES; AND REPORTING POINTS 2. The incorporation by reference in 14 CFR 71.1 of FAA Order 7400.11D, Airspace Designations and Reporting Points, dated August 8, 2019, and * [FR Doc. 2020–04409 Filed 3–5–20; 8:45 am] The Proposed Amendment Accordingly, pursuant to the authority delegated to me, the Federal Aviation Administration proposes to amend 14 CFR part 71 as follows: ■ Paragraph 6002 Class E Airspace Areas Designated as Surface Areas. Issued in Seattle, Washington, on February 26, 2020. Shawn M. Kozica, Group Manager, Operations Support Group, Western Service Center. List of Subjects in 14 CFR Part 71 Airspace, Incorporation by reference, Navigation (air). § 71.1 effective September 15, 2019, is amended as follows: Federal Trade Commission. Public workshop and request for public comment. AGENCY: ACTION: The Federal Trade Commission (‘‘FTC’’ or ‘‘Commission’’) is holding a public workshop relating to its April 4, 2019, Notice of Proposed Rulemaking (‘‘NPRM’’) announcing proposed changes to the Commission’s Safeguards Rule. The workshop will explore information concerning the cost of information security for financial institutions, the availability of information security services for smaller financial institutions, and other issues SUMMARY: PO 00000 Frm 00007 Fmt 4702 Sfmt 4702 raised in comments received in response to the NPRM. DATES: The public workshop will be held on May 13, 2020, from 9:00 a.m. until 4:30 p.m., at the Constitution Center Conference Center, located at 400 7th Street SW, Washington, DC. Requests to participate as a panelist must be received by March 13, 2020. Any written comments related to agenda topics or the issues discussed by the panelists at the workshop must be received by June 12, 2020. ADDRESSES: Interested parties may file a comment or a request to participate as a panelist online or on paper, by following the instructions in the Filing Comments and Requests to Participate as a Panelist part of the SUPPLEMENTARY INFORMATION section below. Write ‘‘Safeguards Rule, 16 CFR part 314, Project No. P145407,’’ on your comment and file your comment online at https:// www.regulations.gov by following the instructions on the web-based form. If you prefer to file your comment on paper, mail your comment to the following address: Federal Trade Commission, Office of the Secretary, 600 Pennsylvania Avenue NW, Suite CC–5610 (Annex B), Washington, DC 20580, or deliver your comment to the following address: Federal Trade Commission, Office of the Secretary, Constitution Center, 400 7th Street SW, 5th Floor, Suite 5610 (Annex B), Washington, DC 20024. FOR FURTHER INFORMATION CONTACT: David Lincicum (202–326–2773), Division of Privacy and Identity Protection, Bureau of Consumer Protection, Federal Trade Commission, 600 Pennsylvania Avenue NW, Washington, DC 20580. SUPPLEMENTARY INFORMATION: I. Introduction In 1999,1 Congress enacted the Gramm Leach Bliley Act (‘‘GLB’’ or ‘‘GLBA’’). The GLBA provides a framework for regulating the privacy and data security practices of a broad range of financial institutions. Among other things, the GLBA requires financial institutions to implement security safeguards for customer information. Pursuant to the GLBA, the Commission promulgated the Safeguards Rule in 2002. The Safeguards Rule became effective on May 23, 2003. The Safeguards Rule requires a financial institution to develop, implement, and maintain a comprehensive information security program that consists of the 1 Public E:\FR\FM\06MRP1.SGM Law 106–102, 113 Stat. 1338 (1999). 06MRP1 lotter on DSKBCFDHB2PROD with PROPOSALS Federal Register / Vol. 85, No. 45 / Friday, March 6, 2020 / Proposed Rules administrative, technical, and physical safeguards the financial institution uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle customer information.2 The information security program must be written in one or more readily accessible parts.3 The safeguards set forth in the program must be appropriate to the size and complexity of the financial institution, the nature and scope of its activities, and the sensitivity of any customer information at issue.4 The safeguards must also be reasonably designed to ensure the security and confidentiality of customer information, protect against any anticipated threats or hazards to the security or integrity of the information, and protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer.5 In order to develop, implement, and maintain its information security program, a financial institution must identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of such information, including in the areas of: (1) Employee training and management; (2) information systems, including network and software design, as well as information processing, storage, transmission, and disposal; and (3) detecting, preventing, and responding to attacks, intrusions, or other systems failures.6 The financial institution must then design and implement safeguards to control the risks identified through the risk assessment, and must regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.7 The financial institution is also required to evaluate and adjust its information security program in light of the results of this testing and monitoring, as well as any material changes in its operations or business arrangements, or any other circumstances that it knows or has reason to know may have a material impact on its information security program.8 The financial institution must also designate an employee or 2 16 CFR 314.2(c). CFR 314.3(a). 4 16 CFR 314.3(a), (b). 5 16 CFR 314.3(a), (b). 6 16 CFR 314.4(b). 7 16 CFR 314.4(c). 8 16 CFR 314.4(e). 3 16 VerDate Sep<11>2014 18:04 Mar 05, 2020 Jkt 250001 employees to coordinate the information security program.9 Finally, the Safeguards Rule requires financial institutions to take reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for customer information and require those service providers by contract to implement and maintain such safeguards.10 On August 29, 2016, the Commission solicited comments on the Safeguards Rule as part of its periodic review of its rules and guides.11 The Commission sought comment on a number of general issues, including the economic impact and benefits of the Rule; possible conflicts between the Rule and state, local, or other federal laws or regulations; and the effect on the Rule of any technological, economic, or other industry changes. The Commission received 28 comments from individuals and entities representing a wide range of viewpoints.12 Most commenters agreed that there is a continuing need for the Rule and that it benefits consumers and competition.13 After reviewing the comments, the Commission published a Notice of Proposed Rulemaking (‘‘NPRM’’) proposing to amend the Rule to include more detailed requirements for the development and establishment of the information security program required under the Rule, including requirements for encrypting financial information, the use of multifactor authentication, a written incident response plan, and the creation of periodic reports for the financial institution’s board of directors.14 In addition, the Commission proposed amendments to the definition of ‘‘financial institution’’ and the addition of examples previously contained in the Privacy Rule to clarify the Safeguards Rule.15 The Commission sought public comment on these proposed amendments as well as requesting information about the cost, 9 16 CFR 314.4(a). CFR 314.4(d). 11 Safeguards Rule, Request for Comment, 81 FR 61632 (Sept. 7, 2016). 12 The comments are posted at: https:// www.ftc.gov/policy/public-comments/initiative-674. The Commission has assigned each comment a number appearing after the name of the commenter and the date of submission. This notice cites comments using the last name of the individual submitter or the name of the organization, followed by the number assigned by the Commission. 13 See, e.g., Mortgage Bankers Association (Comment #39); National Automobile Dealers Association (Comment #40); Data & Marketing Association (Comment #38); Electronic Transactions Association (Comment #24); State Privacy & Security Coalition (Comment #26). 14 84 FR 13158 (April 4, 2019). 15 Id. 10 16 PO 00000 Frm 00008 Fmt 4702 Sfmt 4702 13083 benefits and options for information security for financial institutions, particularly smaller institutions. The Commission received 48 comments.16 Thirteen comments from consumer groups, individuals, academic institutions, and government groups generally supported the addition of more detailed requirements as proposed. Twenty-four comments from industry groups and individuals generally opposed the addition, on the grounds that they would impose unwarranted costs on financial institutions. II. Issues for Discussion at the Workshop As part of the Safeguards Rule rulemaking, the FTC has decided to seek additional information about the costs and benefits of the proposed rule changes and the ability of financial institutions to comply with them. The workshop will seek information, empirical data, and testimony from security professionals who have worked with financial services companies, and will cover such topics as: (1) Price models for specific elements of information security programs; (2) Industry standards for security in various industries; (3) How risks of cybersecurity events change based on the size of the financial institutions; (4) Availability of third party information security services aimed at different sized institutions; (5) Different methods of achieving continuous monitoring of information security systems; (6) Costs and optimal frequency of penetration and vulnerability testing and the factors that affect that determination; (7) Best uses for security logs and audit trails; (8) The advantages and disadvantages of having a single person responsible for the information security program; (9) How different corporate governance structures can affect performance of information security programs; (10) Costs of encryption and multifactor authentication, and possible alternatives to these technologies (11) Whether SMS is an appropriate factor for multifactor authentication; (12) The optimal balance between documentation and implementation of security measures. A more detailed agenda will be published at a later date, in advance of the scheduled workshop. 16 The comments are posted at https:// www.regulations.gov/document?D=FTC-2019-00190011. E:\FR\FM\06MRP1.SGM 06MRP1 13084 Federal Register / Vol. 85, No. 45 / Friday, March 6, 2020 / Proposed Rules III. Public Participation Information A. Workshop Attendance The workshop is free and open to the public, and will be held at the Constitution Center, 400 7th Street SW, Washington, DC. It will be webcast live on the FTC’s website. For admittance to the Constitution Center, all attendees must show valid government-issued photo identification, such as a driver’s license. Please arrive early enough to allow adequate time for this process. This event may be photographed, videotaped, webcast, or otherwise recorded. By participating in this event, you are agreeing that your image—and anything you say or submit—may be posted indefinitely at www.ftc.gov or on one of the Commission’s publicly available social media sites. B. Requests To Participate as a Panelist The workshop will be organized into panels, which will address the designated topics. Panelists will be selected by FTC staff. Other attendees will have an opportunity to comment and ask questions. The Commission will place a transcript of the proceeding on the public record. Requests to participate as a panelist must be received on or before March 13, 2020, as explained Section IV below. Persons selected as panelists will be notified on or before March 27, 2020. Disclosing funding sources promotes transparency, ensures objectivity, and maintains the public’s trust. If chosen, prospective panelists will be required to disclose the source of any support they received in connection with participation at the workshop. This information will be included in the published panelist bios as part of the workshop record. lotter on DSKBCFDHB2PROD with PROPOSALS C. Electronic and Paper Comments The submission of comments is not required for participation in the workshop. If a person wishes to submit paper or electronic comments related to the agenda topics or the issues discussed by the panelists at the workshop, such comments should be filed as prescribed in Section IV, and must be received on or before June 12, 2020. IV. Filing Comments and Requests To Participate as a Panelist You can file a comment, or request to participate as a panelist, online or on paper. For the Commission to consider your comment, we must receive it on or before June 12, 2020. For the Commission to consider your request to participate as a panelist, we must receive it by March 13, 2020. Write ‘‘Safeguards Rule, 16 CFR 314, VerDate Sep<11>2014 18:04 Mar 05, 2020 Jkt 250001 Comment, Project No. P145407’’ and your comment and ‘‘Safeguards Rule, 16 CFR 314, Request to Participate, Project No. P145407’’ on your request to participate. Your comment—including your name and your state—will be placed on the public record of this proceeding, including to the extent practicable, on the publicly available website, https://www.regulations.gov. Postal mail addressed to the Commission is subject to delay due to heightened security screening. As a result, we encourage you to submit your comments online, or to send them to the Commission by courier or overnight service. To make sure that the Commission considers your online comment, you must file it at https:// www.regulations.gov. Because your comment will be placed on a publicly accessible website, https:// www.regulations.gov, you are solely responsible for making sure that your comment does not include any sensitive or confidential information. In particular, your comment should not include any sensitive personal information, such as your or anyone else’s Social Security number; date of birth; driver’s license number or other state identification number, or foreign country equivalent; passport number, financial account number, or credit or debit card number. You are also solely responsible for making sure your comment does not include any sensitive health information, such as medical records or other individually identifiable health information. In addition, your comment should not include any ‘‘trade secret or any commercial or financial information which . . . is privileged or confidential’’—as provided by Section 6(f) of the FTC Act, 15 U.S.C. 46(f), and FTC Rule 4.10(a)(2), 16 CFR 4.10(a)(2)— including in particular competitively sensitive information such as costs, sales statistics, inventories, formulas, patterns, devices, manufacturing processes, or customer names. Comments containing material for which confidential treatment is requested must be filed in paper form, must be clearly labeled ‘‘Confidential,’’ and must comply with FTC Rule 4.9(c). In particular, the written request for confidential treatment that accompanies the comment must include the factual and legal basis for the request, and must identify the specific portions of the comments to be withheld from the public record.17 Your comment will be kept confidential only if the FTC General Counsel grants your request in accordance with the law and the public 17 See PO 00000 16 CFR 4.9(c). Frm 00009 Fmt 4702 Sfmt 4702 interest. Once your comment has been posted on the https:// www.regulations.gov website, we cannot redact or remove your comment from the FTC website, unless you submit a confidentiality request that meets the requirements for such treatment under FTC Rule 4.9(c), and the General Counsel grants that request. Requests to participate as a panelist at the workshop should be submitted electronically to safeguardsworkshop2020@ftc.gov, or, if mailed, should be submitted in the manner detailed below. Parties are asked to include in their requests a brief statement setting forth their expertise in or knowledge of the issues on which the workshop will focus as well as their contact information, including a telephone number and email address (if available), to enable the FTC to notify them if they are selected. If you file your comment or request on paper, write ‘‘Safeguards Rule, 16 CFR part 314, Comment, Project No. P145407’’ on your comment and on the envelope and ‘‘Safeguards Rule, 16 CFR part 314, Request to Participate, Project No. P145407,’’ on your request and on the envelope, and mail your comment to the following address: Federal Trade Commission, Office of the Secretary, 600 Pennsylvania Avenue NW, Suite CC–5610 (Annex F), Washington, DC 20580, or deliver your comment to the following address: Federal Trade Commission, Office of the Secretary, Constitution Center, 400 7th Street SW, 5th Floor, Suite 5610 (Annex F). If possible, submit your paper comment or request to the Commission by courier or overnight service. Visit the Commission website at https://www.ftc.gov to read this Notice and the news release describing it. The FTC Act and other laws that the Commission administers permit the collection of public comments to consider and use in this proceeding as appropriate. The Commission will consider all timely and responsive public comments that it receives on or before June 12, 2020. The Commission will consider all timely requests to participate as a panelist in the workshop that it receives by March 13, 2020. For information on the Commission’s privacy policy, including routine uses permitted by the Privacy Act, see https://www.ftc.gov/site-information/ privacy-policy. V. Communications by Outside Parties to Commissioners or Their Advisors Written communications and summaries or transcripts of oral communications respecting the merits of this proceeding, from any outside E:\FR\FM\06MRP1.SGM 06MRP1 Federal Register / Vol. 85, No. 45 / Friday, March 6, 2020 / Proposed Rules party to any Commissioner or Commissioner’s advisor, will be placed on the public record.18 By direction of the Commission. April J. Tabor, Acting Secretary. Concurring Statement of Commissioners Christine S. Wilson and Noah Joshua Phillips Today the Commission announced a public workshop relating to its April 4, 2019 notice of proposed rulemaking (‘‘NPRM’’) recommending changes to the Commission’s Safeguards Rule. Although we dissented from the issuance of the NPRM, we concur with the decision to hold this workshop. Our dissent from the issuance of the NPRM 1 was based in part on the fact that the FTC lacked an adequate evidentiary basis for the proposed rule’s requirements, so we applaud the FTC’s willingness to seek additional information, empirical data, and testimony from stakeholders and experts to inform the agency’s analysis of potential changes to the Safeguards Rule. Our dissent expressed several concerns that subsequently were echoed in comments submitted to the FTC during the NPRM process: • First, we were concerned that the proposed revisions are overly prescriptive. We are wary of trading flexibility for a costly one-size-fits-all approach that would divert company resources away from risk management initiatives specifically tailored to each entity’s unique data collection, usage, and storage practices.2 Our wariness was exacerbated by the fact that the proposal would apply remedies imposed in specific data security enforcement actions—generally outside the context of the Safeguards Rule and only to the firms named in those actions—to financial information generally, without a basis to conclude that the Safeguards Rule is not adequate 16 CFR 1.26(b)(5). Statement of Commissioner Noah Joshua Phillips and Commissioner Christine S. Wilson, Regulatory Review of Safeguards Rule (Mar. 5, 2019), https://www.ftc.gov/system/files/ documents/public_statements/1466705/reg_review_ of_safeguards_rule_cmr_phillips_wilson_ dissent.pdf. 2 Comments express similar concerns that the proposal is overly prescriptive and creates costs that may not significantly reduce data security risks or increase consumer benefits. See Comments submitted by Office of Advocacy, U.S. Small Business Administration, National Automobile Dealers Association, Mortgage Bankers Association, Global Privacy Alliance, Software Information & Industry Association, and U.S. Chamber of Commerce. NPRM Comments are posted at https:// www.regulations.gov/document?D=FTC-2019-00190011. or that covered firms systematically have worse data security than those not covered, such that additional regulation beyond the current Rule would be warranted. • Second, we were concerned that this new and prescriptive approach would impose significant incremental costs without materially reducing data security risks or significantly increasing consumer benefits.3 The submission from NADA, by way of example, highlights the incremental costs imposed by the proposed revisions: NADA estimates that it would cost the average car dealership one-time, upfront costs of $293,975, with $276,925 in additional costs each year.4 These incremental costs will be particularly burdensome for new entrants and smaller companies, which may ultimately hinder competition with larger and better-established rivals. • Third, we were concerned that the suggested Rule revisions substituted the Commission’s judgment for a private firm’s governance decisions.5 • Fourth, we were concerned that the Rule was premature because the proposed regulations are substantially based on relatively new New York State Department of Financial Services regulations that have not been markettested for feasibility and efficacy.6 The workshop will enable the FTC to obtain additional information about the costs and benefits of the proposed rule changes and the ability of companies that fall within the Rule’s scope to comply with the proposed changes. We continue to encourage stakeholders, including experts in security for financial services companies, to comment and provide evidence for this workshop. We are particularly interested in hearing from those who are knowledgeable about security for small businesses. In light of the significant proposed changes to the Safeguards Rule, and the concerns expressed by many commenters thus far, we view this 18 See lotter on DSKBCFDHB2PROD with PROPOSALS 1 Dissenting VerDate Sep<11>2014 18:04 Mar 05, 2020 Jkt 250001 3 See Comment from the National Independent Automobile Dealers Association (noting the considerable costs imposed on financial institutions from the proposed revisions and the need for the FTC to demonstrate a clear link between its proposal and reductions in data security risks and increases in consumer benefits). 4 Comment from the National Automobile Dealers Association (NADA), 42. 5 This sentiment is reflected in the comment from the Software Information & Industry Association. 6 Comments express similar concerns that the FTC’s proposed regulations rely on untested frameworks and recommend allowing time to assess the impacts of the model legislation. See Comments from the Office of Advocacy, US Small Business Administration, CTIA, National Automobile Dealers Association, and Consumer Data Industry Association (CDIA). PO 00000 Frm 00010 Fmt 4702 Sfmt 4702 13085 additional solicitation of input from stakeholders as vital. Statement of Commissioner Rohit Chopra Joined by Commissioner Rebecca Kelly Slaughter Summary • Corporate America’s surveillance of our personal data is not just about privacy. Foreign actors are stealing and stockpiling this data, which threatens our national security. • Companies like Equifax, with their unquenchable thirst for data and their shoddy security practices, are not victims. We must act to curtail the collection, abuse, and misuse of data. • Rather than ‘‘hold our breath and wait’’ for Congress, the FTC should use the legal authority it has today to protect our citizens, our economy, and our country. A few weeks ago, U.S. Attorney General William Barr announced criminal indictments against four members of the Chinese People’s Liberation Army for conspiring to hack Equifax’s computer systems. The Attorney General noted that China has a ‘‘voracious appetite for the personal data of Americans’’ and linked China with several other high-profile hacks of personal data held by large U.S. corporations, including the intrusions into one of America’s largest hotel chains, Marriott, and one of America’s largest health insurers, Anthem.1 The threat posed by China’s hacks goes far beyond identity theft. As explained by Attorney General Barr, ‘‘these thefts can feed China’s development of artificial intelligence tools as well as the creation of intelligence targeting packages.’’ 2 Safeguarding personal data is undoubtedly a national security issue. In spite of these risks, lax security practices continue to expose our data. According to an alert by the Department of Homeland Security, 85 percent of targeted attacks are preventable.3 For example, it is hard to call Equifax a victim. Their shoddy approach to security was practically an invitation for the Chinese People’s Liberation Army to raid Americans’ data. Equifax received critical alerts on the need to patch 1 William P. Barr, U.S. Attorney General, Attorney General William P. Barr Announces Indictment of Four Members of China’s Military for Hacking into Equifax, Remarks as Prepared for Delivery, (Feb. 10, 2020), https://www.justice.gov/opa/speech/ attorney-general-william-p-barr-announcesindictment-four-members-china-s-military 2 Id. 3 Press Release, Department of Homeland Security, Alert (TA15–119A) Top 30 Targeted High Risk Vulnerabilities, (Sept. 29, 2016), https:// www.us-cert.gov/ncas/alerts/TA15-119A. E:\FR\FM\06MRP1.SGM 06MRP1 13086 Federal Register / Vol. 85, No. 45 / Friday, March 6, 2020 / Proposed Rules lotter on DSKBCFDHB2PROD with PROPOSALS software systems, but failed to do so. Equifax even stored sensitive usernames and passwords in plain text.4 The costs of maintaining the status quo approach are significant and mounting. According to industry analysis, the majority of small businesses currently ‘‘do not have a cyberattack prevention plan,’’ 5 yet nearly half of them have experienced at least one breach within the last year.6 Data breaches can be particularly perilous for small businesses and new entrants, with one survey finding that 66 percent could face temporary or permanent closure if their systems are compromised.7 The process of putting into place clear rules requiring corporations to prevent abuse and misuse personal data is long overdue. As the agency responsible for data protection across most of the economy, the Federal Trade Commission plays a central role. While the effort to update the Safeguards Rule is a start, its reach will be limited to certain nonbank financial institutions like Equifax, and violations don’t even come with any civil penalties. Given the ongoing harms to individuals and our country, we should use every tool in our toolbox to address data security issues. The Commission has urged Congress to act, but I agree with Commissioner Rebecca Kelly Slaughter, who has argued that ‘‘we cannot simply hold our breath and wait.’’ 8 There are many ways that we can curtail the collection, misuse, and abuse of personal data, including launching a rulemaking that broadly applies to companies across sectors so 4 Fed. Trade Comm’n v. Equifax, Case 1:19-mi99999-UNA, U.S. District Court for the Northern District of Georgia, Atlanta Division, Complaint for Permanent Injunction and Other Relief at 7–8 (July 22, 2019), https://www.ftc.gov/system/files/ documents/cases/172_3203_equifax_complaint_722-19.pdf. 5 Craig Lurey, Cyber Mindset Exposed: Keeper Unveils its 2019 SMB Cyberthreat Study, Keeper Security, (July 24, 2019), https:// www.keepersecurity.com/blog/2019/07/24/cybermindset-exposed-keeper-unveils-its-2019-smbcyberthreat-study/. 6 Hiscox Cyber Readiness Report 2019, Hiscox Ltd., (Apr. 23, 2019), https:// www.keepersecurity.com/blog/2019/07/24/cybermindset-exposed-keeper-unveils-its-2019-smbcyberthreat-study/. 7 Press Release, VIPRE Announces Launch of VIPRE Endpoint Security—Cloud Edition, Business Wire, (Oct. 2, 2017), https://www.businesswire.com/ news/home/20171002005176/en. 8 Last year, Commissioner Slaughter described how the FTC could use its existing authority to initiate a data protection rulemaking. See Rebecca Kelly Slaughter, Commissioner, Fed. Trade Comm’n, Remarks at the Silicon Flatirons Conference at the University of Colorado Law School: The Near Future of U.S. Privacy Law, (September 6, 2019), https://www.ftc.gov/system/ files/documents/public_statements/1543396/ slaughter_silicon_flatirons_remarks_9-6-19.pdf. VerDate Sep<11>2014 18:04 Mar 05, 2020 Jkt 250001 there are meaningful sanctions for violators. We have this authority today. Commissioners Wilson and Phillips argue that we must consider the impact of data security on competition. I agree. Data security must also be top of mind in our competition enforcement work across sectors of the economy. We should be reviewing how mergers can lead to a race to the bottom on data security. We need to rigorously scrutinize data deals. Companies are being bought and sold based on the data they have and the data they can continue to collect. Acquired data is being merged into larger databases and used in ways that people may not have authorized when they signed up for the service or initially provided their information. We need to continue to take a close look at what promises were made in exchange for data access and whether those promises were upheld when the data was sold. We also need to examine how companies are integrating different security systems, whether strong security standards are being maintained, and whether sensitive data is being handled appropriately. Finally, we need to consider whether there are limits to the amount of data one company can collect and compile, the types of data one company can combine, and the ways in which data can be used and monetized. The scale and scope of data collection that large companies are engaging in has made them—and us—sitting ducks for malicious actors. Since these companies are more fixated on monetizing that data than securing it, their mass surveillance has become a national security threat. Our adversaries know that these large firms have essentially done the dirty work of collecting intelligence on our citizens, and lax security standards make it easy to steal. Ultimately, we need to fix the market structures and incentives that drive firms to harvest and traffic in our private information, so that complacent companies are punished when they don’t care about our security needs or expectations. The extraordinary step of criminal indictments of members of the Chinese People’s Liberation Army announced by the Attorney General is yet another wake-up call. Until we take serious steps to curb corporate surveillance, the risks to our citizens and country will only grow as bad actors continue to steal and stockpile our data. The FTC will need to act decisively to protect families, businesses, and our country from these unquantifiable harms. [FR Doc. 2020–04610 Filed 3–5–20; 8:45 am] BILLING CODE 6750–01–P PO 00000 Frm 00011 Fmt 4702 Sfmt 4702 DEPARTMENT OF LABOR Employment and Training Administration 20 CFR Parts 641, 655, 656, 658, 667, 683, and 702 Office of the Secretary of Labor 29 CFR Parts 2, 7, 8, 10, 13, 18, 24, 29, 38, and 96 Office of Labor-Management Standards 29 CFR Parts 417 and 471 Wage and Hour Division 29 CFR Parts 501 and 580 Occupational Health and Safety Administration 29 CFR Parts 1978 Through 1988 Office of Federal Contract Compliance Programs 41 CFR Parts 50–203 and 60–30 RIN 1290–AA39 Discretionary Review by the Secretary Office of the Secretary, DOL. Notice of proposed rulemaking. AGENCY: ACTION: The Department of Labor is issuing this Notice of Proposed Rulemaking to seek public comments on a proposal to establish a system of discretionary secretarial review over cases pending before or decided by the Board of Alien Labor Certification Appeals and to make technical changes to Departmental regulations governing the timing and finality of decisions of the Administrative Review Board and the Board of Alien Labor Certification Appeals to ensure consistency with the new discretionary review processes proposed in this rule and established in Secretary’s Order 01–2020. DATES: The Department invites interested persons to submit comments on the proposed rules. To ensure consideration, comments must be in writing and must be submitted (transmitted, postmarked, or delivered) by April 6, 2020. ADDRESSES: You may send comments, identified by Regulatory Identification Number (RIN) 1290–AA39, by either one of the following methods: • Federal e-Rulemaking Portal: https:// www.regulations.gov. Follow the website instructions for submitting SUMMARY: E:\FR\FM\06MRP1.SGM 06MRP1

Agencies

[Federal Register Volume 85, Number 45 (Friday, March 6, 2020)]
[Proposed Rules]
[Pages 13082-13086]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-04610]


=======================================================================
-----------------------------------------------------------------------

FEDERAL TRADE COMMISSION

16 CFR Part 314


Public Workshop Examining Information Security for Financial 
Institutions and Information Related to Changes to the Safeguards Rule

AGENCY: Federal Trade Commission.

ACTION: Public workshop and request for public comment.

-----------------------------------------------------------------------

SUMMARY: The Federal Trade Commission (``FTC'' or ``Commission'') is 
holding a public workshop relating to its April 4, 2019, Notice of 
Proposed Rulemaking (``NPRM'') announcing proposed changes to the 
Commission's Safeguards Rule. The workshop will explore information 
concerning the cost of information security for financial institutions, 
the availability of information security services for smaller financial 
institutions, and other issues raised in comments received in response 
to the NPRM.

DATES: The public workshop will be held on May 13, 2020, from 9:00 a.m. 
until 4:30 p.m., at the Constitution Center Conference Center, located 
at 400 7th Street SW, Washington, DC. Requests to participate as a 
panelist must be received by March 13, 2020. Any written comments 
related to agenda topics or the issues discussed by the panelists at 
the workshop must be received by June 12, 2020.

ADDRESSES: Interested parties may file a comment or a request to 
participate as a panelist online or on paper, by following the 
instructions in the Filing Comments and Requests to Participate as a 
Panelist part of the SUPPLEMENTARY INFORMATION section below. Write 
``Safeguards Rule, 16 CFR part 314, Project No. P145407,'' on your 
comment and file your comment online at https://www.regulations.gov by 
following the instructions on the web-based form. If you prefer to file 
your comment on paper, mail your comment to the following address: 
Federal Trade Commission, Office of the Secretary, 600 Pennsylvania 
Avenue NW, Suite CC-5610 (Annex B), Washington, DC 20580, or deliver 
your comment to the following address: Federal Trade Commission, Office 
of the Secretary, Constitution Center, 400 7th Street SW, 5th Floor, 
Suite 5610 (Annex B), Washington, DC 20024.

FOR FURTHER INFORMATION CONTACT: David Lincicum (202-326-2773), 
Division of Privacy and Identity Protection, Bureau of Consumer 
Protection, Federal Trade Commission, 600 Pennsylvania Avenue NW, 
Washington, DC 20580.

SUPPLEMENTARY INFORMATION:

I. Introduction

    In 1999,\1\ Congress enacted the Gramm Leach Bliley Act (``GLB'' or 
``GLBA''). The GLBA provides a framework for regulating the privacy and 
data security practices of a broad range of financial institutions. 
Among other things, the GLBA requires financial institutions to 
implement security safeguards for customer information. Pursuant to the 
GLBA, the Commission promulgated the Safeguards Rule in 2002. The 
Safeguards Rule became effective on May 23, 2003.
---------------------------------------------------------------------------

    \1\ Public Law 106-102, 113 Stat. 1338 (1999).
---------------------------------------------------------------------------

    The Safeguards Rule requires a financial institution to develop, 
implement, and maintain a comprehensive information security program 
that consists of the

[[Page 13083]]

administrative, technical, and physical safeguards the financial 
institution uses to access, collect, distribute, process, protect, 
store, use, transmit, dispose of, or otherwise handle customer 
information.\2\ The information security program must be written in one 
or more readily accessible parts.\3\ The safeguards set forth in the 
program must be appropriate to the size and complexity of the financial 
institution, the nature and scope of its activities, and the 
sensitivity of any customer information at issue.\4\ The safeguards 
must also be reasonably designed to ensure the security and 
confidentiality of customer information, protect against any 
anticipated threats or hazards to the security or integrity of the 
information, and protect against unauthorized access to or use of such 
information that could result in substantial harm or inconvenience to 
any customer.\5\
---------------------------------------------------------------------------

    \2\ 16 CFR 314.2(c).
    \3\ 16 CFR 314.3(a).
    \4\ 16 CFR 314.3(a), (b).
    \5\ 16 CFR 314.3(a), (b).
---------------------------------------------------------------------------

    In order to develop, implement, and maintain its information 
security program, a financial institution must identify reasonably 
foreseeable internal and external risks to the security, 
confidentiality, and integrity of customer information that could 
result in the unauthorized disclosure, misuse, alteration, destruction, 
or other compromise of such information, including in the areas of: (1) 
Employee training and management; (2) information systems, including 
network and software design, as well as information processing, 
storage, transmission, and disposal; and (3) detecting, preventing, and 
responding to attacks, intrusions, or other systems failures.\6\ The 
financial institution must then design and implement safeguards to 
control the risks identified through the risk assessment, and must 
regularly test or otherwise monitor the effectiveness of the 
safeguards' key controls, systems, and procedures.\7\ The financial 
institution is also required to evaluate and adjust its information 
security program in light of the results of this testing and 
monitoring, as well as any material changes in its operations or 
business arrangements, or any other circumstances that it knows or has 
reason to know may have a material impact on its information security 
program.\8\ The financial institution must also designate an employee 
or employees to coordinate the information security program.\9\
---------------------------------------------------------------------------

    \6\ 16 CFR 314.4(b).
    \7\ 16 CFR 314.4(c).
    \8\ 16 CFR 314.4(e).
    \9\ 16 CFR 314.4(a).
---------------------------------------------------------------------------

    Finally, the Safeguards Rule requires financial institutions to 
take reasonable steps to select and retain service providers that are 
capable of maintaining appropriate safeguards for customer information 
and require those service providers by contract to implement and 
maintain such safeguards.\10\
---------------------------------------------------------------------------

    \10\ 16 CFR 314.4(d).
---------------------------------------------------------------------------

    On August 29, 2016, the Commission solicited comments on the 
Safeguards Rule as part of its periodic review of its rules and 
guides.\11\ The Commission sought comment on a number of general 
issues, including the economic impact and benefits of the Rule; 
possible conflicts between the Rule and state, local, or other federal 
laws or regulations; and the effect on the Rule of any technological, 
economic, or other industry changes. The Commission received 28 
comments from individuals and entities representing a wide range of 
viewpoints.\12\ Most commenters agreed that there is a continuing need 
for the Rule and that it benefits consumers and competition.\13\
---------------------------------------------------------------------------

    \11\ Safeguards Rule, Request for Comment, 81 FR 61632 (Sept. 7, 
2016).
    \12\ The comments are posted at: https://www.ftc.gov/policy/public-comments/initiative-674. The Commission has assigned each 
comment a number appearing after the name of the commenter and the 
date of submission. This notice cites comments using the last name 
of the individual submitter or the name of the organization, 
followed by the number assigned by the Commission.
    \13\ See, e.g., Mortgage Bankers Association (Comment #39); 
National Automobile Dealers Association (Comment #40); Data & 
Marketing Association (Comment #38); Electronic Transactions 
Association (Comment #24); State Privacy & Security Coalition 
(Comment #26).
---------------------------------------------------------------------------

    After reviewing the comments, the Commission published a Notice of 
Proposed Rulemaking (``NPRM'') proposing to amend the Rule to include 
more detailed requirements for the development and establishment of the 
information security program required under the Rule, including 
requirements for encrypting financial information, the use of 
multifactor authentication, a written incident response plan, and the 
creation of periodic reports for the financial institution's board of 
directors.\14\ In addition, the Commission proposed amendments to the 
definition of ``financial institution'' and the addition of examples 
previously contained in the Privacy Rule to clarify the Safeguards 
Rule.\15\ The Commission sought public comment on these proposed 
amendments as well as requesting information about the cost, benefits 
and options for information security for financial institutions, 
particularly smaller institutions. The Commission received 48 
comments.\16\ Thirteen comments from consumer groups, individuals, 
academic institutions, and government groups generally supported the 
addition of more detailed requirements as proposed. Twenty-four 
comments from industry groups and individuals generally opposed the 
addition, on the grounds that they would impose unwarranted costs on 
financial institutions.
---------------------------------------------------------------------------

    \14\ 84 FR 13158 (April 4, 2019).
    \15\ Id.
    \16\ The comments are posted at https://www.regulations.gov/document?D=FTC-2019-0019-0011.
---------------------------------------------------------------------------

II. Issues for Discussion at the Workshop

    As part of the Safeguards Rule rulemaking, the FTC has decided to 
seek additional information about the costs and benefits of the 
proposed rule changes and the ability of financial institutions to 
comply with them. The workshop will seek information, empirical data, 
and testimony from security professionals who have worked with 
financial services companies, and will cover such topics as:
    (1) Price models for specific elements of information security 
programs;
    (2) Industry standards for security in various industries;
    (3) How risks of cybersecurity events change based on the size of 
the financial institutions;
    (4) Availability of third party information security services aimed 
at different sized institutions;
    (5) Different methods of achieving continuous monitoring of 
information security systems;
    (6) Costs and optimal frequency of penetration and vulnerability 
testing and the factors that affect that determination;
    (7) Best uses for security logs and audit trails;
    (8) The advantages and disadvantages of having a single person 
responsible for the information security program;
    (9) How different corporate governance structures can affect 
performance of information security programs;
    (10) Costs of encryption and multifactor authentication, and 
possible alternatives to these technologies
    (11) Whether SMS is an appropriate factor for multifactor 
authentication;
    (12) The optimal balance between documentation and implementation 
of security measures.
    A more detailed agenda will be published at a later date, in 
advance of the scheduled workshop.

[[Page 13084]]

III. Public Participation Information

A. Workshop Attendance

    The workshop is free and open to the public, and will be held at 
the Constitution Center, 400 7th Street SW, Washington, DC. It will be 
webcast live on the FTC's website. For admittance to the Constitution 
Center, all attendees must show valid government-issued photo 
identification, such as a driver's license. Please arrive early enough 
to allow adequate time for this process.
    This event may be photographed, videotaped, webcast, or otherwise 
recorded. By participating in this event, you are agreeing that your 
image--and anything you say or submit--may be posted indefinitely at 
www.ftc.gov or on one of the Commission's publicly available social 
media sites.

B. Requests To Participate as a Panelist

    The workshop will be organized into panels, which will address the 
designated topics. Panelists will be selected by FTC staff. Other 
attendees will have an opportunity to comment and ask questions. The 
Commission will place a transcript of the proceeding on the public 
record. Requests to participate as a panelist must be received on or 
before March 13, 2020, as explained Section IV below. Persons selected 
as panelists will be notified on or before March 27, 2020. Disclosing 
funding sources promotes transparency, ensures objectivity, and 
maintains the public's trust. If chosen, prospective panelists will be 
required to disclose the source of any support they received in 
connection with participation at the workshop. This information will be 
included in the published panelist bios as part of the workshop record.

C. Electronic and Paper Comments

    The submission of comments is not required for participation in the 
workshop. If a person wishes to submit paper or electronic comments 
related to the agenda topics or the issues discussed by the panelists 
at the workshop, such comments should be filed as prescribed in Section 
IV, and must be received on or before June 12, 2020.

IV. Filing Comments and Requests To Participate as a Panelist

    You can file a comment, or request to participate as a panelist, 
online or on paper. For the Commission to consider your comment, we 
must receive it on or before June 12, 2020. For the Commission to 
consider your request to participate as a panelist, we must receive it 
by March 13, 2020. Write ``Safeguards Rule, 16 CFR 314, Comment, 
Project No. P145407'' and your comment and ``Safeguards Rule, 16 CFR 
314, Request to Participate, Project No. P145407'' on your request to 
participate. Your comment--including your name and your state--will be 
placed on the public record of this proceeding, including to the extent 
practicable, on the publicly available website, https://www.regulations.gov.
    Postal mail addressed to the Commission is subject to delay due to 
heightened security screening. As a result, we encourage you to submit 
your comments online, or to send them to the Commission by courier or 
overnight service. To make sure that the Commission considers your 
online comment, you must file it at https://www.regulations.gov.
    Because your comment will be placed on a publicly accessible 
website, https://www.regulations.gov, you are solely responsible for 
making sure that your comment does not include any sensitive or 
confidential information. In particular, your comment should not 
include any sensitive personal information, such as your or anyone 
else's Social Security number; date of birth; driver's license number 
or other state identification number, or foreign country equivalent; 
passport number, financial account number, or credit or debit card 
number. You are also solely responsible for making sure your comment 
does not include any sensitive health information, such as medical 
records or other individually identifiable health information. In 
addition, your comment should not include any ``trade secret or any 
commercial or financial information which . . . is privileged or 
confidential''--as provided by Section 6(f) of the FTC Act, 15 U.S.C. 
46(f), and FTC Rule 4.10(a)(2), 16 CFR 4.10(a)(2)-- including in 
particular competitively sensitive information such as costs, sales 
statistics, inventories, formulas, patterns, devices, manufacturing 
processes, or customer names.
    Comments containing material for which confidential treatment is 
requested must be filed in paper form, must be clearly labeled 
``Confidential,'' and must comply with FTC Rule 4.9(c). In particular, 
the written request for confidential treatment that accompanies the 
comment must include the factual and legal basis for the request, and 
must identify the specific portions of the comments to be withheld from 
the public record.\17\ Your comment will be kept confidential only if 
the FTC General Counsel grants your request in accordance with the law 
and the public interest. Once your comment has been posted on the 
https://www.regulations.gov website, we cannot redact or remove your 
comment from the FTC website, unless you submit a confidentiality 
request that meets the requirements for such treatment under FTC Rule 
4.9(c), and the General Counsel grants that request.
---------------------------------------------------------------------------

    \17\ See 16 CFR 4.9(c).
---------------------------------------------------------------------------

    Requests to participate as a panelist at the workshop should be 
submitted electronically to [email protected], or, if 
mailed, should be submitted in the manner detailed below. Parties are 
asked to include in their requests a brief statement setting forth 
their expertise in or knowledge of the issues on which the workshop 
will focus as well as their contact information, including a telephone 
number and email address (if available), to enable the FTC to notify 
them if they are selected.
    If you file your comment or request on paper, write ``Safeguards 
Rule, 16 CFR part 314, Comment, Project No. P145407'' on your comment 
and on the envelope and ``Safeguards Rule, 16 CFR part 314, Request to 
Participate, Project No. P145407,'' on your request and on the 
envelope, and mail your comment to the following address: Federal Trade 
Commission, Office of the Secretary, 600 Pennsylvania Avenue NW, Suite 
CC-5610 (Annex F), Washington, DC 20580, or deliver your comment to the 
following address: Federal Trade Commission, Office of the Secretary, 
Constitution Center, 400 7th Street SW, 5th Floor, Suite 5610 (Annex 
F). If possible, submit your paper comment or request to the Commission 
by courier or overnight service.
    Visit the Commission website at https://www.ftc.gov to read this 
Notice and the news release describing it. The FTC Act and other laws 
that the Commission administers permit the collection of public 
comments to consider and use in this proceeding as appropriate. The 
Commission will consider all timely and responsive public comments that 
it receives on or before June 12, 2020. The Commission will consider 
all timely requests to participate as a panelist in the workshop that 
it receives by March 13, 2020. For information on the Commission's 
privacy policy, including routine uses permitted by the Privacy Act, 
see https://www.ftc.gov/site-information/privacy-policy.

V. Communications by Outside Parties to Commissioners or Their Advisors

    Written communications and summaries or transcripts of oral 
communications respecting the merits of this proceeding, from any 
outside

[[Page 13085]]

party to any Commissioner or Commissioner's advisor, will be placed on 
the public record.\18\
---------------------------------------------------------------------------

    \18\ See 16 CFR 1.26(b)(5).

    By direction of the Commission.
April J. Tabor,
Acting Secretary.

Concurring Statement of Commissioners Christine S. Wilson and Noah 
Joshua Phillips

    Today the Commission announced a public workshop relating to its 
April 4, 2019 notice of proposed rulemaking (``NPRM'') recommending 
changes to the Commission's Safeguards Rule. Although we dissented from 
the issuance of the NPRM, we concur with the decision to hold this 
workshop. Our dissent from the issuance of the NPRM \1\ was based in 
part on the fact that the FTC lacked an adequate evidentiary basis for 
the proposed rule's requirements, so we applaud the FTC's willingness 
to seek additional information, empirical data, and testimony from 
stakeholders and experts to inform the agency's analysis of potential 
changes to the Safeguards Rule.
---------------------------------------------------------------------------

    \1\ Dissenting Statement of Commissioner Noah Joshua Phillips 
and Commissioner Christine S. Wilson, Regulatory Review of 
Safeguards Rule (Mar. 5, 2019), https://www.ftc.gov/system/files/documents/public_statements/1466705/reg_review_of_safeguards_rule_cmr_phillips_wilson_dissent.pdf.
---------------------------------------------------------------------------

    Our dissent expressed several concerns that subsequently were 
echoed in comments submitted to the FTC during the NPRM process:
     First, we were concerned that the proposed revisions are 
overly prescriptive. We are wary of trading flexibility for a costly 
one-size-fits-all approach that would divert company resources away 
from risk management initiatives specifically tailored to each entity's 
unique data collection, usage, and storage practices.\2\ Our wariness 
was exacerbated by the fact that the proposal would apply remedies 
imposed in specific data security enforcement actions--generally 
outside the context of the Safeguards Rule and only to the firms named 
in those actions--to financial information generally, without a basis 
to conclude that the Safeguards Rule is not adequate or that covered 
firms systematically have worse data security than those not covered, 
such that additional regulation beyond the current Rule would be 
warranted.
---------------------------------------------------------------------------

    \2\ Comments express similar concerns that the proposal is 
overly prescriptive and creates costs that may not significantly 
reduce data security risks or increase consumer benefits. See 
Comments submitted by Office of Advocacy, U.S. Small Business 
Administration, National Automobile Dealers Association, Mortgage 
Bankers Association, Global Privacy Alliance, Software Information & 
Industry Association, and U.S. Chamber of Commerce. NPRM Comments 
are posted at https://www.regulations.gov/document?D=FTC-2019-0019-0011.
---------------------------------------------------------------------------

     Second, we were concerned that this new and prescriptive 
approach would impose significant incremental costs without materially 
reducing data security risks or significantly increasing consumer 
benefits.\3\ The submission from NADA, by way of example, highlights 
the incremental costs imposed by the proposed revisions: NADA estimates 
that it would cost the average car dealership one-time, up-front costs 
of $293,975, with $276,925 in additional costs each year.\4\ These 
incremental costs will be particularly burdensome for new entrants and 
smaller companies, which may ultimately hinder competition with larger 
and better-established rivals.
---------------------------------------------------------------------------

    \3\ See Comment from the National Independent Automobile Dealers 
Association (noting the considerable costs imposed on financial 
institutions from the proposed revisions and the need for the FTC to 
demonstrate a clear link between its proposal and reductions in data 
security risks and increases in consumer benefits).
    \4\ Comment from the National Automobile Dealers Association 
(NADA), 42.
---------------------------------------------------------------------------

     Third, we were concerned that the suggested Rule revisions 
substituted the Commission's judgment for a private firm's governance 
decisions.\5\
---------------------------------------------------------------------------

    \5\ This sentiment is reflected in the comment from the Software 
Information & Industry Association.
---------------------------------------------------------------------------

     Fourth, we were concerned that the Rule was premature 
because the proposed regulations are substantially based on relatively 
new New York State Department of Financial Services regulations that 
have not been market-tested for feasibility and efficacy.\6\
---------------------------------------------------------------------------

    \6\ Comments express similar concerns that the FTC's proposed 
regulations rely on untested frameworks and recommend allowing time 
to assess the impacts of the model legislation. See Comments from 
the Office of Advocacy, US Small Business Administration, CTIA, 
National Automobile Dealers Association, and Consumer Data Industry 
Association (CDIA).
---------------------------------------------------------------------------

    The workshop will enable the FTC to obtain additional information 
about the costs and benefits of the proposed rule changes and the 
ability of companies that fall within the Rule's scope to comply with 
the proposed changes. We continue to encourage stakeholders, including 
experts in security for financial services companies, to comment and 
provide evidence for this workshop. We are particularly interested in 
hearing from those who are knowledgeable about security for small 
businesses. In light of the significant proposed changes to the 
Safeguards Rule, and the concerns expressed by many commenters thus 
far, we view this additional solicitation of input from stakeholders as 
vital.

Statement of Commissioner Rohit Chopra Joined by Commissioner Rebecca 
Kelly Slaughter

Summary

     Corporate America's surveillance of our personal data is 
not just about privacy. Foreign actors are stealing and stockpiling 
this data, which threatens our national security.
     Companies like Equifax, with their unquenchable thirst for 
data and their shoddy security practices, are not victims. We must act 
to curtail the collection, abuse, and misuse of data.
     Rather than ``hold our breath and wait'' for Congress, the 
FTC should use the legal authority it has today to protect our 
citizens, our economy, and our country.
    A few weeks ago, U.S. Attorney General William Barr announced 
criminal indictments against four members of the Chinese People's 
Liberation Army for conspiring to hack Equifax's computer systems. The 
Attorney General noted that China has a ``voracious appetite for the 
personal data of Americans'' and linked China with several other high-
profile hacks of personal data held by large U.S. corporations, 
including the intrusions into one of America's largest hotel chains, 
Marriott, and one of America's largest health insurers, Anthem.\1\
---------------------------------------------------------------------------

    \1\ William P. Barr, U.S. Attorney General, Attorney General 
William P. Barr Announces Indictment of Four Members of China's 
Military for Hacking into Equifax, Remarks as Prepared for Delivery, 
(Feb. 10, 2020), https://www.justice.gov/opa/speech/attorney-general-william-p-barr-announces-indictment-four-members-china-s-military
---------------------------------------------------------------------------

    The threat posed by China's hacks goes far beyond identity theft. 
As explained by Attorney General Barr, ``these thefts can feed China's 
development of artificial intelligence tools as well as the creation of 
intelligence targeting packages.'' \2\ Safeguarding personal data is 
undoubtedly a national security issue.
---------------------------------------------------------------------------

    \2\ Id.
---------------------------------------------------------------------------

    In spite of these risks, lax security practices continue to expose 
our data. According to an alert by the Department of Homeland Security, 
85 percent of targeted attacks are preventable.\3\ For example, it is 
hard to call Equifax a victim. Their shoddy approach to security was 
practically an invitation for the Chinese People's Liberation Army to 
raid Americans' data. Equifax received critical alerts on the need to 
patch

[[Page 13086]]

software systems, but failed to do so. Equifax even stored sensitive 
usernames and passwords in plain text.\4\
---------------------------------------------------------------------------

    \3\ Press Release, Department of Homeland Security, Alert (TA15-
119A) Top 30 Targeted High Risk Vulnerabilities, (Sept. 29, 2016), 
https://www.us-cert.gov/ncas/alerts/TA15-119A.
    \4\ Fed. Trade Comm'n v. Equifax, Case 1:19-mi-99999-UNA, U.S. 
District Court for the Northern District of Georgia, Atlanta 
Division, Complaint for Permanent Injunction and Other Relief at 7-8 
(July 22, 2019), https://www.ftc.gov/system/files/documents/cases/172_3203_equifax_complaint_7-22-19.pdf.
---------------------------------------------------------------------------

    The costs of maintaining the status quo approach are significant 
and mounting. According to industry analysis, the majority of small 
businesses currently ``do not have a cyberattack prevention plan,'' \5\ 
yet nearly half of them have experienced at least one breach within the 
last year.\6\ Data breaches can be particularly perilous for small 
businesses and new entrants, with one survey finding that 66 percent 
could face temporary or permanent closure if their systems are 
compromised.\7\
---------------------------------------------------------------------------

    \5\ Craig Lurey, Cyber Mindset Exposed: Keeper Unveils its 2019 
SMB Cyberthreat Study, Keeper Security, (July 24, 2019), https://www.keepersecurity.com/blog/2019/07/24/cyber-mindset-exposed-keeper-unveils-its-2019-smb-cyberthreat-study/.
    \6\ Hiscox Cyber Readiness Report 2019, Hiscox Ltd., (Apr. 23, 
2019), https://www.keepersecurity.com/blog/2019/07/24/cyber-mindset-exposed-keeper-unveils-its-2019-smb-cyberthreat-study/.
    \7\ Press Release, VIPRE Announces Launch of VIPRE Endpoint 
Security--Cloud Edition, Business Wire, (Oct. 2, 2017), https://www.businesswire.com/news/home/20171002005176/en.
---------------------------------------------------------------------------

    The process of putting into place clear rules requiring 
corporations to prevent abuse and misuse personal data is long overdue. 
As the agency responsible for data protection across most of the 
economy, the Federal Trade Commission plays a central role.
    While the effort to update the Safeguards Rule is a start, its 
reach will be limited to certain nonbank financial institutions like 
Equifax, and violations don't even come with any civil penalties. Given 
the ongoing harms to individuals and our country, we should use every 
tool in our toolbox to address data security issues. The Commission has 
urged Congress to act, but I agree with Commissioner Rebecca Kelly 
Slaughter, who has argued that ``we cannot simply hold our breath and 
wait.'' \8\ There are many ways that we can curtail the collection, 
misuse, and abuse of personal data, including launching a rulemaking 
that broadly applies to companies across sectors so there are 
meaningful sanctions for violators. We have this authority today.
---------------------------------------------------------------------------

    \8\ Last year, Commissioner Slaughter described how the FTC 
could use its existing authority to initiate a data protection 
rulemaking. See Rebecca Kelly Slaughter, Commissioner, Fed. Trade 
Comm'n, Remarks at the Silicon Flatirons Conference at the 
University of Colorado Law School: The Near Future of U.S. Privacy 
Law, (September 6, 2019), https://www.ftc.gov/system/files/documents/public_statements/1543396/slaughter_silicon_flatirons_remarks_9-6-19.pdf.
---------------------------------------------------------------------------

    Commissioners Wilson and Phillips argue that we must consider the 
impact of data security on competition. I agree. Data security must 
also be top of mind in our competition enforcement work across sectors 
of the economy. We should be reviewing how mergers can lead to a race 
to the bottom on data security. We need to rigorously scrutinize data 
deals. Companies are being bought and sold based on the data they have 
and the data they can continue to collect. Acquired data is being 
merged into larger databases and used in ways that people may not have 
authorized when they signed up for the service or initially provided 
their information.
    We need to continue to take a close look at what promises were made 
in exchange for data access and whether those promises were upheld when 
the data was sold. We also need to examine how companies are 
integrating different security systems, whether strong security 
standards are being maintained, and whether sensitive data is being 
handled appropriately.
    Finally, we need to consider whether there are limits to the amount 
of data one company can collect and compile, the types of data one 
company can combine, and the ways in which data can be used and 
monetized. The scale and scope of data collection that large companies 
are engaging in has made them--and us--sitting ducks for malicious 
actors. Since these companies are more fixated on monetizing that data 
than securing it, their mass surveillance has become a national 
security threat. Our adversaries know that these large firms have 
essentially done the dirty work of collecting intelligence on our 
citizens, and lax security standards make it easy to steal. Ultimately, 
we need to fix the market structures and incentives that drive firms to 
harvest and traffic in our private information, so that complacent 
companies are punished when they don't care about our security needs or 
expectations.
    The extraordinary step of criminal indictments of members of the 
Chinese People's Liberation Army announced by the Attorney General is 
yet another wake-up call. Until we take serious steps to curb corporate 
surveillance, the risks to our citizens and country will only grow as 
bad actors continue to steal and stockpile our data. The FTC will need 
to act decisively to protect families, businesses, and our country from 
these unquantifiable harms.

[FR Doc. 2020-04610 Filed 3-5-20; 8:45 am]
BILLING CODE 6750-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.