FTC warns nearly 100 firms of P2P data leaks
Other companies investigated for possible violations of data privacy laws over similar leaks
Computerworld - In what appears to be a warning shot, the Federal Trade Commission has sent out letters to about 100 companies, informing them about sensitive and confidential data from their networks being found on publicly available peer-to-peer networks.
The letters stem from an FTC investigation during which the agency discovered numerous examples of health-related information, financial records, driver's license and Social Security numbers, and other data leaked on P2P networks, according to a statement released today.
The letters urged the companies to review their security practices and warned them that their failure to prevent such information from being shared on P2P networks may be in violation of laws enforced by the FTC.
"The Commission has brought a number of cases against companies that allegedly failed to implement reasonable and appropriate security measures to protect sensitive personal information," the letter noted. It went on to remind each of the recipients that it is their responsibility to control the use of P2P software on their networks and on those of their third-party service providers.
In addition to the letters, the FTC has also opened private investigations of an unspecified number of other companies over inadvertent data leaks involving sensitive customer and employee data.
Alain Sheer, an attorney with the FTC's Bureau of Consumer Protection, said that as part of the investigations, the FTC will collect information from each company to see if they may have violated data privacy laws. Generally, such investigations are the first step toward a formal compliant being lodged against a company by the FTC, Sheer told Computerworld today.
Sheer emphasized that with the P2P investigations, all that the FTC is doing right now is seeking more information about inadvertent data leaks from some companies. The action does not automatically mean that the FTC is planning on filing a formal complaint against any company, he stressed.
The FTC's actions have been a long time coming and highlight the growing concerns over inadvertent leaks on P2P networks, said Eric Johnson, a professor of operations management at Dartmouth College's Tuck School of Business.
Over the past few years, there have been numerous reported incidents of sensitive data being inadvertently leaked on P2P networks. Some of the leaks have been sensational.
Last year, Tiversa Inc., a vendor of P2P network-monitoring services, announced that it had found details on safe-house locations for the first family, along with presidential motorcade routes and other sensitive data, on a P2P network.
- 3 privacy violations you shouldn't worry about
- U.S. commercial drone industry struggles to take off
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts