Medical lab says FTC breach probe forced it to close
LabMD decides to close in the midst of an FTC investigation into a a leak of the persoanl data of some 10,000 people
Computerworld - An Atlanta-based medical laboratory that has been embroiled in a bitter feud with the U.S. Federal Trade Commission over a data breach investigation shut down its operations this week.
In a statement , LabMD CEO Michael Daugherty claimed the FTC's "abuse of power" in pursuing the investigation forced the decision to close the lab.
"The FTC has spent untold taxpayer dollars investigating LabMD, destroying jobs and usurping power over patient information from the U.S. Department of Health and Human Services," Daugherty said.
He accused the FTC of overstepping its authority in going after LabMD and said the agency did not have the Congressional authority to regulate data security practices.
"We are exhausted. When you are a small company you have only that much energy," Daugherty told Computerworld Thursday. Over the past four years, the FTC subpoenaed dozens of LabMD employees, forced its executives fly all over the country for depositions, and subjected the company to numerous requests for information, he said.
In a single day, he said, the federal agency issued 35 subpoenas for 23 simultaneous depositions from executives around the country, he said. "They even wanted depositions with people who left the company several years ago," Daugherty noted.
"It's been an administrative temper tantrum," since 2010 when the FTC first began its investigation, said Daugherty who has published a book describing the episode.
Daugherty's decision to pull the plug on the lab comes just two weeks after an FTC panel rejected a LabMD motion seeking dismissal of the case against, which is now before an FTC administrative panel. About 20 people will lose their jobs when the company winds up operations.
LabMD's battle with the FTC began in 2010 when Tiversa, a provider of peer-to-peer network monitoring services found a 1,719 page billing spreadsheet belonging to the medical lab floating about on a file-sharing network. The LabMD document contained personal information like Social Security Numbers, treatment codes and insurance data on more than 9,000 people.
Tiversa says it discovered the document when conducting research on the inadvertent leakage of sensitive data on P2P networks. The LabMD document was one of thousands of sensitive documents the company found that had leaked on P2P networks during the research effort.
Tiversa's discovery prompted the FTC to launch a broad investigation, asking several companies, including LabMD, whose documents were found on P2P networks, to provide detailed information on data collection, storage and usage practices.
Each of the companies had to provide data on every computer used to collect and store personal information.
Each was also required to provide a "narrative" or a blueprint describing network components in minute detail, down to individual firewalls and routers, and even database tables and field names containing personal data.
The FTC's 12-page Civil Investigative Demand (CID) letter sought details on what each company knew about the leaked data, when they discovered the leaks, why they had allowed P2P software on company systems and what efforts they had taken to inform affected individuals.
In August 2013, after more than two years of discovery, the FTC filed a formal complaint against LabMD alleging that the company had failed to adequately protect sensitive personal data including healthcare information. The complaint alleged that LabMD had exposed data on close to 10,000 consumers in two separate incidents.
Similar administrative action by the FTC have forced numerous companies into costly settlements over the past few years.
- Step Out of the Bull's-Eye Learn about the evolution of targeted attacks, the latest in security intelligence, and strategic steps to keep your business safe.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- What Does it Take to Deliver a Superior Customer Experience? The Two Top-Rated Online Retailers, B&H Photo and Crutchfield Electronics, Share Their Secrets Discuss practical CX tools and service methods such as contact center agents and the use of realtime speech analytics to help contact center... All Cybercrime and Hacking White Papers | Webcasts