Federal Trade Commission.
Public workshop and request for public comment.
The Federal Trade Commission (“FTC” or “Commission”) is holding a public workshop relating to its April 4, 2019, Notice of Proposed Rulemaking (“NPRM”) announcing proposed changes to the Commission's Safeguards Rule. The workshop will explore information concerning the cost of information security for financial institutions, the availability of information security services for smaller financial institutions, and other issues raised in comments received in response to the NPRM.
The public workshop will be held on May 13, 2020, from 9:00 a.m. until 4:30 p.m., at the Constitution Center Conference Center, located at 400 7th Street SW, Washington, DC. Requests to participate as a panelist must be received by March 13, 2020. Any written comments related to agenda topics or the issues discussed by the panelists at the workshop must be received by June 12, 2020.
Interested parties may file a comment or a request to participate as a panelist online or on paper, by following the instructions in the Filing Comments and Requests to Participate as a Panelist part of the SUPPLEMENTARY INFORMATION section below. Write “Safeguards Rule, 16 CFR part 314, Project No. P145407,” on your comment and file your comment online at https://www.regulations.gov by following the instructions on the web-based form. If you prefer to file your comment on paper, mail your comment to the following address: Federal Trade Commission, Office of the Secretary, 600 Pennsylvania Avenue NW, Suite CC-5610 (Annex B), Washington, DC 20580, or deliver your comment to the following address: Federal Trade Commission, Office of the Secretary, Constitution Center, 400 7th Street SW, 5th Floor, Suite 5610 (Annex B), Washington, DC 20024.
Start Further Info
FOR FURTHER INFORMATION CONTACT:
David Lincicum (202-326-2773), Division of Privacy and Identity Protection, Bureau of Consumer Protection, Federal Trade Commission, 600 Pennsylvania Avenue NW, Washington, DC 20580.
End Further Info
Start Supplemental Information
Congress enacted the Gramm Leach Bliley Act (“GLB” or “GLBA”). The GLBA provides a framework for regulating the privacy and data security practices of a broad range of financial institutions. Among other things, the GLBA requires financial institutions to implement security safeguards for customer information. Pursuant to the GLBA, the Commission promulgated the Safeguards Rule in 2002. The Safeguards Rule became effective on May 23, 2003.
The Safeguards Rule requires a financial institution to develop, implement, and maintain a comprehensive information security program that consists of the Start Printed Page 13083administrative, technical, and physical safeguards the financial institution uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle customer information.
The information security program must be written in one or more readily accessible parts.
The safeguards set forth in the program must be appropriate to the size and complexity of the financial institution, the nature and scope of its activities, and the sensitivity of any customer information at issue.
The safeguards must also be reasonably designed to ensure the security and confidentiality of customer information, protect against any anticipated threats or hazards to the security or integrity of the information, and protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer.
In order to develop, implement, and maintain its information security program, a financial institution must identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction, or other compromise of such information, including in the areas of: (1) Employee training and management; (2) information systems, including network and software design, as well as information processing, storage, transmission, and disposal; and (3) detecting, preventing, and responding to attacks, intrusions, or other systems failures.
The financial institution must then design and implement safeguards to control the risks identified through the risk assessment, and must regularly test or otherwise monitor the effectiveness of the safeguards' key controls, systems, and procedures.
The financial institution is also required to evaluate and adjust its information security program in light of the results of this testing and monitoring, as well as any material changes in its operations or business arrangements, or any other circumstances that it knows or has reason to know may have a material impact on its information security program.
The financial institution must also designate an employee or employees to coordinate the information security program.
Finally, the Safeguards Rule requires financial institutions to take reasonable steps to select and retain service providers that are capable of maintaining appropriate safeguards for customer information and require those service providers by contract to implement and maintain such safeguards.
On August 29, 2016, the Commission solicited comments on the Safeguards Rule as part of its periodic review of its rules and guides.
The Commission sought comment on a number of general issues, including the economic impact and benefits of the Rule; possible conflicts between the Rule and state, local, or other federal laws or regulations; and the effect on the Rule of any technological, economic, or other industry changes. The Commission received 28 comments from individuals and entities representing a wide range of viewpoints.
Most commenters agreed that there is a continuing need for the Rule and that it benefits consumers and competition.
After reviewing the comments, the Commission published a Notice of Proposed Rulemaking (“NPRM”) proposing to amend the Rule to include more detailed requirements for the development and establishment of the information security program required under the Rule, including requirements for encrypting financial information, the use of multifactor authentication, a written incident response plan, and the creation of periodic reports for the financial institution's board of directors.
In addition, the Commission proposed amendments to the definition of “financial institution” and the addition of examples previously contained in the Privacy Rule to clarify the Safeguards Rule.
The Commission sought public comment on these proposed amendments as well as requesting information about the cost, benefits and options for information security for financial institutions, particularly smaller institutions. The Commission received 48 comments.
Thirteen comments from consumer groups, individuals, academic institutions, and government groups generally supported the addition of more detailed requirements as proposed. Twenty-four comments from industry groups and individuals generally opposed the addition, on the grounds that they would impose unwarranted costs on financial institutions.
II. Issues for Discussion at the Workshop
As part of the Safeguards Rule rulemaking, the FTC has decided to seek additional information about the costs and benefits of the proposed rule changes and the ability of financial institutions to comply with them. The workshop will seek information, empirical data, and testimony from security professionals who have worked with financial services companies, and will cover such topics as:
(1) Price models for specific elements of information security programs;
(2) Industry standards for security in various industries;
(3) How risks of cybersecurity events change based on the size of the financial institutions;
(4) Availability of third party information security services aimed at different sized institutions;
(5) Different methods of achieving continuous monitoring of information security systems;
(6) Costs and optimal frequency of penetration and vulnerability testing and the factors that affect that determination;
(7) Best uses for security logs and audit trails;
(8) The advantages and disadvantages of having a single person responsible for the information security program;
(9) How different corporate governance structures can affect performance of information security programs;
(10) Costs of encryption and multifactor authentication, and possible alternatives to these technologies
(11) Whether SMS is an appropriate factor for multifactor authentication;
(12) The optimal balance between documentation and implementation of security measures.
A more detailed agenda will be published at a later date, in advance of the scheduled workshop.Start Printed Page 13084
III. Public Participation Information
A. Workshop Attendance
The workshop is free and open to the public, and will be held at the Constitution Center, 400 7th Street SW, Washington, DC. It will be webcast live on the FTC's website. For admittance to the Constitution Center, all attendees must show valid government-issued photo identification, such as a driver's license. Please arrive early enough to allow adequate time for this process.
This event may be photographed, videotaped, webcast, or otherwise recorded. By participating in this event, you are agreeing that your image—and anything you say or submit—may be posted indefinitely at www.ftc.gov or on one of the Commission's publicly available social media sites.
B. Requests To Participate as a Panelist
The workshop will be organized into panels, which will address the designated topics. Panelists will be selected by FTC staff. Other attendees will have an opportunity to comment and ask questions. The Commission will place a transcript of the proceeding on the public record. Requests to participate as a panelist must be received on or before March 13, 2020, as explained Section IV below. Persons selected as panelists will be notified on or before March 27, 2020. Disclosing funding sources promotes transparency, ensures objectivity, and maintains the public's trust. If chosen, prospective panelists will be required to disclose the source of any support they received in connection with participation at the workshop. This information will be included in the published panelist bios as part of the workshop record.
C. Electronic and Paper Comments
The submission of comments is not required for participation in the workshop. If a person wishes to submit paper or electronic comments related to the agenda topics or the issues discussed by the panelists at the workshop, such comments should be filed as prescribed in Section IV, and must be received on or before June 12, 2020.
IV. Filing Comments and Requests To Participate as a Panelist
You can file a comment, or request to participate as a panelist, online or on paper. For the Commission to consider your comment, we must receive it on or before June 12, 2020. For the Commission to consider your request to participate as a panelist, we must receive it by March 13, 2020. Write “Safeguards Rule, 16 CFR 314, Comment, Project No. P145407” and your comment and “Safeguards Rule, 16 CFR 314, Request to Participate, Project No. P145407” on your request to participate. Your comment—including your name and your state—will be placed on the public record of this proceeding, including to the extent practicable, on the publicly available website, https://www.regulations.gov.
Postal mail addressed to the Commission is subject to delay due to heightened security screening. As a result, we encourage you to submit your comments online, or to send them to the Commission by courier or overnight service. To make sure that the Commission considers your online comment, you must file it at https://www.regulations.gov.
Because your comment will be placed on a publicly accessible website, https://www.regulations.gov, you are solely responsible for making sure that your comment does not include any sensitive or confidential information. In particular, your comment should not include any sensitive personal information, such as your or anyone else's Social Security number; date of birth; driver's license number or other state identification number, or foreign country equivalent; passport number, financial account number, or credit or debit card number. You are also solely responsible for making sure your comment does not include any sensitive health information, such as medical records or other individually identifiable health information. In addition, your comment should not include any “trade secret or any commercial or financial information which . . . is privileged or confidential”—as provided by Section 6(f) of the FTC Act, 15 U.S.C. 46(f), and FTC Rule 4.10(a)(2), 16 CFR 4.10(a)(2)— including in particular competitively sensitive information such as costs, sales statistics, inventories, formulas, patterns, devices, manufacturing processes, or customer names.
Comments containing material for which confidential treatment is requested must be filed in paper form, must be clearly labeled “Confidential,” and must comply with FTC Rule 4.9(c). In particular, the written request for confidential treatment that accompanies the comment must include the factual and legal basis for the request, and must identify the specific portions of the comments to be withheld from the public record.
Your comment will be kept confidential only if the FTC General Counsel grants your request in accordance with the law and the public interest. Once your comment has been posted on the https://www.regulations.gov website, we cannot redact or remove your comment from the FTC website, unless you submit a confidentiality request that meets the requirements for such treatment under FTC Rule 4.9(c), and the General Counsel grants that request.
Requests to participate as a panelist at the workshop should be submitted electronically to email@example.com, or, if mailed, should be submitted in the manner detailed below. Parties are asked to include in their requests a brief statement setting forth their expertise in or knowledge of the issues on which the workshop will focus as well as their contact information, including a telephone number and email address (if available), to enable the FTC to notify them if they are selected.
If you file your comment or request on paper, write “Safeguards Rule, 16 CFR part 314, Comment, Project No. P145407” on your comment and on the envelope and “Safeguards Rule, 16 CFR part 314, Request to Participate, Project No. P145407,” on your request and on the envelope, and mail your comment to the following address: Federal Trade Commission, Office of the Secretary, 600 Pennsylvania Avenue NW, Suite CC-5610 (Annex F), Washington, DC 20580, or deliver your comment to the following address: Federal Trade Commission, Office of the Secretary, Constitution Center, 400 7th Street SW, 5th Floor, Suite 5610 (Annex F). If possible, submit your paper comment or request to the Commission by courier or overnight service.
V. Communications by Outside Parties to Commissioners or Their Advisors
Written communications and summaries or transcripts of oral communications respecting the merits of this proceeding, from any outside Start Printed Page 13085party to any Commissioner or Commissioner's advisor, will be placed on the public record.
By direction of the Commission.
April J. Tabor,
Concurring Statement of Commissioners Christine S. Wilson and Noah Joshua Phillips
Today the Commission announced a public workshop relating to its April 4, 2019 notice of proposed rulemaking (“NPRM”) recommending changes to the Commission's Safeguards Rule. Although we dissented from the issuance of the NPRM, we concur with the decision to hold this workshop. Our dissent from the issuance of the NPRM 
was based in part on the fact that the FTC lacked an adequate evidentiary basis for the proposed rule's requirements, so we applaud the FTC's willingness to seek additional information, empirical data, and testimony from stakeholders and experts to inform the agency's analysis of potential changes to the Safeguards Rule.
Our dissent expressed several concerns that subsequently were echoed in comments submitted to the FTC during the NPRM process:
- First, we were concerned that the proposed revisions are overly prescriptive. We are wary of trading flexibility for a costly one-size-fits-all approach that would divert company resources away from risk management initiatives specifically tailored to each entity's unique data collection, usage, and storage practices.
Our wariness was exacerbated by the fact that the proposal would apply remedies imposed in specific data security enforcement actions—generally outside the context of the Safeguards Rule and only to the firms named in those actions—to financial information generally, without a basis to conclude that the Safeguards Rule is not adequate or that covered firms systematically have worse data security than those not covered, such that additional regulation beyond the current Rule would be warranted.
- Second, we were concerned that this new and prescriptive approach would impose significant incremental costs without materially reducing data security risks or significantly increasing consumer benefits.
The submission from NADA, by way of example, highlights the incremental costs imposed by the proposed revisions: NADA estimates that it would cost the average car dealership one-time, up-front costs of $293,975, with $276,925 in additional costs each year.
These incremental costs will be particularly burdensome for new entrants and smaller companies, which may ultimately hinder competition with larger and better-established rivals.
- Third, we were concerned that the suggested Rule revisions substituted the Commission's judgment for a private firm's governance decisions.
- Fourth, we were concerned that the Rule was premature because the proposed regulations are substantially based on relatively new New York State Department of Financial Services regulations that have not been market-tested for feasibility and efficacy.
The workshop will enable the FTC to obtain additional information about the costs and benefits of the proposed rule changes and the ability of companies that fall within the Rule's scope to comply with the proposed changes. We continue to encourage stakeholders, including experts in security for financial services companies, to comment and provide evidence for this workshop. We are particularly interested in hearing from those who are knowledgeable about security for small businesses. In light of the significant proposed changes to the Safeguards Rule, and the concerns expressed by many commenters thus far, we view this additional solicitation of input from stakeholders as vital.
Statement of Commissioner Rohit Chopra Joined by Commissioner Rebecca Kelly Slaughter
- Corporate America's surveillance of our personal data is not just about privacy. Foreign actors are stealing and stockpiling this data, which threatens our national security.
- Companies like Equifax, with their unquenchable thirst for data and their shoddy security practices, are not victims. We must act to curtail the collection, abuse, and misuse of data.
- Rather than “hold our breath and wait” for Congress, the FTC should use the legal authority it has today to protect our citizens, our economy, and our country.
A few weeks ago, U.S. Attorney General William Barr announced criminal indictments against four members of the Chinese People's Liberation Army for conspiring to hack Equifax's computer systems. The Attorney General noted that China has a “voracious appetite for the personal data of Americans” and linked China with several other high-profile hacks of personal data held by large U.S. corporations, including the intrusions into one of America's largest hotel chains, Marriott, and one of America's largest health insurers, Anthem.
The threat posed by China's hacks goes far beyond identity theft. As explained by Attorney General Barr, “these thefts can feed China's development of artificial intelligence tools as well as the creation of intelligence targeting packages.” 
Safeguarding personal data is undoubtedly a national security issue.
In spite of these risks, lax security practices continue to expose our data. According to an alert by the Department of Homeland Security, 85 percent of targeted attacks are preventable.
For example, it is hard to call Equifax a victim. Their shoddy approach to security was practically an invitation for the Chinese People's Liberation Army to raid Americans' data. Equifax received critical alerts on the need to patch Start Printed Page 13086software systems, but failed to do so. Equifax even stored sensitive usernames and passwords in plain text.
The costs of maintaining the status quo approach are significant and mounting. According to industry analysis, the majority of small businesses currently “do not have a cyberattack prevention plan,” 
yet nearly half of them have experienced at least one breach within the last year.
Data breaches can be particularly perilous for small businesses and new entrants, with one survey finding that 66 percent could face temporary or permanent closure if their systems are compromised.
The process of putting into place clear rules requiring corporations to prevent abuse and misuse personal data is long overdue. As the agency responsible for data protection across most of the economy, the Federal Trade Commission plays a central role.
While the effort to update the Safeguards Rule is a start, its reach will be limited to certain nonbank financial institutions like Equifax, and violations don't even come with any civil penalties. Given the ongoing harms to individuals and our country, we should use every tool in our toolbox to address data security issues. The Commission has urged Congress to act, but I agree with Commissioner Rebecca Kelly Slaughter, who has argued that “we cannot simply hold our breath and wait.” 
There are many ways that we can curtail the collection, misuse, and abuse of personal data, including launching a rulemaking that broadly applies to companies across sectors so there are meaningful sanctions for violators. We have this authority today.
Commissioners Wilson and Phillips argue that we must consider the impact of data security on competition. I agree. Data security must also be top of mind in our competition enforcement work across sectors of the economy. We should be reviewing how mergers can lead to a race to the bottom on data security. We need to rigorously scrutinize data deals. Companies are being bought and sold based on the data they have and the data they can continue to collect. Acquired data is being merged into larger databases and used in ways that people may not have authorized when they signed up for the service or initially provided their information.
We need to continue to take a close look at what promises were made in exchange for data access and whether those promises were upheld when the data was sold. We also need to examine how companies are integrating different security systems, whether strong security standards are being maintained, and whether sensitive data is being handled appropriately.
Finally, we need to consider whether there are limits to the amount of data one company can collect and compile, the types of data one company can combine, and the ways in which data can be used and monetized. The scale and scope of data collection that large companies are engaging in has made them—and us—sitting ducks for malicious actors. Since these companies are more fixated on monetizing that data than securing it, their mass surveillance has become a national security threat. Our adversaries know that these large firms have essentially done the dirty work of collecting intelligence on our citizens, and lax security standards make it easy to steal. Ultimately, we need to fix the market structures and incentives that drive firms to harvest and traffic in our private information, so that complacent companies are punished when they don't care about our security needs or expectations.
The extraordinary step of criminal indictments of members of the Chinese People's Liberation Army announced by the Attorney General is yet another wake-up call. Until we take serious steps to curb corporate surveillance, the risks to our citizens and country will only grow as bad actors continue to steal and stockpile our data. The FTC will need to act decisively to protect families, businesses, and our country from these unquantifiable harms.
End Supplemental Information
[FR Doc. 2020-04610 Filed 3-5-20; 8:45 am]
BILLING CODE 6750-01-P