Now that LabMD won and the FTC lost, it could change the course of acceptable evidence in data breach lawsuits. Credit: Thinkstock Cancer-screening laboratory LabMD won its case against the FTC. LabMD was accused of two data breaches, one in 2012 and one in 2008, when a company spreadsheet that contained sensitive personal information of 9,000 consumers was found on a peer-to-peer network. Seven years of litigation later, FTC Chief Administrative Law Judge Chappell’s issued an initial ruling (pdf) dismissing the FTC’s complaint against LabMD since the FTC had failed to prove that LabMD’s “alleged failure to employ ‘reasonable and appropriate’ data security ‘caused, or is likely to cause, substantial injury to consumers’.”Judge Chappell added that because the FTC’s evidence “fails to prove” LabMD’s “alleged unreasonable data security” caused, or is likely to cause, “substantial consumer injury,” LabMD’s “alleged unreasonable data security cannot properly be declared an unfair act or practice in violation of Section 5(a) of the FTC Act.”This is big deal; since 2000, the FTC has maintained it has authority under the unfair business practices provisions in section 5 of the FTC Act to go after companies that have data breaches if the company did not use what the FTC regards as adequate data protection practices. It could change the course of acceptable evidence in data breach lawsuits.The FTC was using “evidence” it obtained from P2P security firm Tiversa. Tiversa had originally taken the spreadsheet of 9,000 consumers it “found” on a LimeWire P2P network to LabMD in 2008, but LabMD refused to pay for Tiversa’s “incident response” services. So Tiversa turned the file over to the FTC. Back in May, when Richard Wallace, a former Tiversa employee, turned whistleblower, he testified that Tiversa embellished data breach information and then extorted clients to pay for its “incident response” services. Since reporting on that, I’ve received numerous – somewhat relentless – messages from Tiversa. Among those, for example, were the complaint counsel’s post trial brief from August (pdf), discrediting Wallace’s testimony and bashing the “reasonableness” of LabMD’s “data security practices.”In 2013, Tiversa co-founder and CEO Robert Boback sued LabMD CEO Michael Daugherty to stop the publication of Daugherty’s tell-all book The Devil Inside the Beltway. Judge Chappell did mention Boback in his initial ruling (pdf). In fact, seven different times the ruling mentions Boback’s “discredited” deposition testimony from 2013. One reference stated that “this evidence is unreliable, not credible, and outweighed by credible contrary testimony from Mr. Wallace.” That doesn’t mean it won’t be revisited if and most probably when the FTC appeals the Initial Decision to the full Commission. Back in 2014, when a U.S. House of Representatives committee investigated the FTC’s use of information from Tiversa, Rep. Darrell Issa prepared a report, titled “Tiversa Inc: White Knight or Hi-Tech Protection Racket.” The report stated that Tiversa had “routinely provided falsified information to federal government agencies,” adding “Instead of acting as the ‘white knight’ the company purports to be, Tiversa often acted unethically and sometimes unlawfully after downloading documents unintentionally exposed on peer-to-peer networks.”It could be that using evidence and testimony from Tiversa hurt (pdf) the FTC’s case against LabMD. To stop the potential new flood of emails from Tiversa, it should be noted that Tiversa has maintained it did nothing wrong, that Wallace was an angry ex-employee, etc.Nevertheless, the now-defunct LabMD won this round, and it could definitely cause ripples by stopping the FTC from pursuing cases when a breach “could have” possibly caused harm to consumers.A footnote in Chappell’s ruling added:Evidence that anyone ‘could’ have accessed the 1718 File during the limited period that the 1718 File was made available for sharing carries little probative weight, especially since the evidence fails to show that anyone other than Tiversa, Professor Johnson, and the FTC actually viewed the 1718 File; or that any consumer listed in the 1718 File, in the seven years since the exposure of the 1718 File, has actually suffered any harm as a result of the availability of the 1718 File.Lexology pointed out, “The words ‘speculation’ and ‘speculative’ appear 17 times in the decision. Judge Chappell found the FTC failed to “prove identity theft-related harms,” failed to “prove subjective or emotional harm, finding also that the latter, even if proven, would not constitute ‘substantial injury.’ He also found failure to show substantial injury in the theory that an insecure network is at risk of a data breach.”LabMD CEO Daugherty commented on the fact that “regulators do not work in the fields they are regulating. This creates a ‘they don’t know what they don’t know’ culture which Daugherty described as a ‘Petri dish for corruption.’ Unfortunately this case demonstrates that there is no good answer of what’s good enough when it comes to securing private information. The government is not going to tell organizations what they have to do to comply with regulations – it creates a ‘secret law’ and companies are left guessing what to do.” Regarding the impact of the decision and a possible appeal, The Nation Law Review wrote, “The outcome of the LabMD proceedings also could be affected by the outcome of the Spokeo case currently pending before the Supreme Court. Although Spokeo is not directly controlling, the case does present an opportunity for the Court to provide guidance on the type of injury required to support consumer protection causes of action more broadly.”Correction: This article was corrected to clarify a suggestion that Richard Wallace testified that Tiversa “hacked” LabMD. In fact, Wallace testified to having found LabMD data on a P2P network. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe