Khan v. Global Tellink Corporation, US, Complaint, Failure to Protect Consumers Information, 2024
Download original document:

Document text

Document text
This text is machine-read, and may contain errors. Check the original document to verify accuracy.
212-3012 UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION COMMISSIONERS: Lina Khan, Chair Rebecca Kelly Slaughter Alvaro M. Bedoya ________________________________________________ In the Matter of Global Tel*Link Corporation, a corporation, also d/b/a GTL, also d/b/a ViaPath Technologies; DOCKET NO. C-4801 Telmate, LLC, a limited liability company, also d/b/a ViaPath Technologies; and TouchPay Holdings, LLC, a limited liability company, also d/b/a GTL Financial Services. ________________________________________________ COMPLAINT The Federal Trade Commission, having reason to believe that Global Tel*Link Corporation, a corporation, doing business as GTL, also doing business as ViaPath Technologies; Telmate, LLC, a limited liability company, also doing business as ViaPath Technologies; and TouchPay Holdings, LLC, a limited liability company, also doing business as GTL Financial Services (collectively, “Respondents”), have violated the provisions of the Federal Trade Commission Act, and it appearing to the Commission that this proceeding is in the public interest, alleges: 1. Respondent Global Tel*Link Corporation, a corporation, also doing business as GTL and as ViaPath Technologies (“GTL”), is an Idaho corporation with its principal office or place of business at 3120 Fairview Park Drive, Suite 300, Falls Church, Virginia, 22042. 2. Respondent Telmate, LLC, also doing business as ViaPath Technologies, (“Telmate”) is a Delaware limited liability company with its principal office or place of business at 3120 Fairview Park Drive, Suite 300, Falls Church, Virginia, 22042. Telmate is a wholly owned subsidiary of GTL. 3. Respondent TouchPay Holdings, LLC, also doing business as GTL Financial Services, (“TouchPay”) is a Texas limited liability company with its principal office or place of business at 10005 Technology Boulevard West, Suite 130, Dallas, Texas, 75220. 4. Respondents offer various products and services to jails, prisons, and detention facilities, to individual consumers incarcerated in these facilities, and to family, friends and other contacts of incarcerated consumers. 5. These products and services include communications services for incarcerated individuals to correspond with their non-incarcerated contacts, and payment services to provide incarcerated individuals with access to funds. Through these services, Respondents collect a significant amount of sensitive information from incarcerated individuals and their contacts, such as their names, addresses, passport numbers, driver’s license numbers, Social Security numbers, and financial account information. 6. Respondents have made numerous promises to protect the sensitive personally identifiable information that they collect in connection with offering their products and services. However, as alleged below, Respondents failed to employ reasonable data security safeguards to protect this information. This failure resulted in a security incident that exposed hundreds of thousands of consumers’ information. Respondents then failed to provide timely notice to affected consumers so that they could take steps to protect themselves from identity theft. In addition, Respondents also made multiple misleading representations about the data security incident. Respondents’ data security failures constitute deceptive and unfair practices in violation of Section 5(a) of the FTC Act. 7. Respondents have operated as a common enterprise while engaging in the unlawful acts and practices alleged below. Respondents have conducted the business practices described below through an interrelated network of companies that have, among other things, common ownership and control, common officers and managers, shared office locations, shared resources, and unified advertising. Because Respondents have operated as a common enterprise, each of them is jointly and severally liable for the acts and practices alleged below. 8. The acts and practices of Respondents alleged in this complaint have been in or affecting commerce, as “commerce” is defined in Section 4 of the Federal Trade Commission Act. Respondents’ Business Practices 9. Respondents contract with state Departments of Corrections, the Federal Bureau of Prisons, county and city jails, immigration detention facilities, and juvenile detention facilities (collectively, “Facilities”) to provide certain products and services to those Facilities, individuals incarcerated therein, and incarcerated individuals’ outside contacts. Respondents have contracted with public and private Facilities located in all 50 states, the District of Columbia, and Puerto Rico. 10. Individual users of Respondents’ products and services include people who are incarcerated in the Facilities. In marketing materials, Respondents have touted that more than 1.9 million incarcerated people, constituting “more than 85% of the U.S. inmate population,” use GTL’s services. These individuals include both people who have been convicted of crimes and are incarcerated in prisons and people, such as those held in jails in pre-trial detention, who have not been convicted of any crime. Additionally, in 2020, Respondents’ services were used by 2 over 13 million consumers who were not incarcerated (e.g., family and friends of incarcerated people). GTL’s annual net revenue is over $600 million. 11. The precise products and services provided, and the costs of those products and services for individual consumers, vary by Facility. If a Facility chooses to engage Respondents’ services, Respondents often require by contract that they be the sole providers of those products and services within that given Facility. Therefore, incarcerated consumers and their outside contacts frequently do not have the option of choosing an alternative provider. 12. Incarcerated consumers access Respondents’ products and services using tablets and kiosks that are provided by Respondents and are available within Facilities. Consumers who are not incarcerated can access Respondents’ services through Respondents’ websites and mobile applications, including www.getttingout.com and the GettingOut mobile applications (collectively, “GettingOut”) and web.connectnetwork.com and the ConnectNetwork mobile applications (collectively, “ConnectNetwork”). 13. Once a consumer has created an account on GettingOut or ConnectNetwork, the consumer can use the same account to access products and services available through either brand. For example, consumers who have registered with GettingOut can use GettingOut or ConnectNetwork to communicate with incarcerated individuals using voice calls, video calls, or written messages similar to text messages or e-mail. They can also use GettingOut or ConnectNetwork to make financial deposits to an incarcerated person’s inmate trust account, allowing the incarcerated individual to use the funds for various purposes including purchasing items from Facility commissaries, posting bail, and paying fees or fines. 14. Respondents charge incarcerated consumers and their non-incarcerated contacts to use these services. These charges vary based on the services used and are established in Respondents’ contracts with Facilities. For example, to use their communications services, Respondents have charged consumers rates such as $0.18-0.25 per minute to make a voice call, $0.25 per minute to make a video call, $1.00 to leave a voicemail message, $0.25 to send a written message, and $0.25-0.50 for each photo or video attachment to a written message. To use their payments services to make a deposit, Respondents have in many instances charged consumers between $2.95 and $11.50 plus 3.5% of the deposit amount. 15. To create an account to use Respondents’ services, incarcerated consumers and their contacts are required to provide Respondents with certain personal information, including, in many cases, their names, addresses, government identification numbers such as passport numbers or driver’s license numbers, Social Security numbers, and financial account information. 16. Using the significant volume of information Respondents collect from incarcerated individuals and their contacts, Respondents also offer products and services that allow Facilities to surveil and investigate incarcerated consumers and their non-incarcerated contacts. 3 Data Security Promises 17. Respondents have made and continue to make various representations regarding their information security capabilities and practices. For example, Respondents market themselves to Facilities as an organization that is “security-focused from the inside out,” and that their “attention is focused on…security,” specifically “preventing data breaches and hacks.” 18. Since 2017, Respondents have disseminated a YouTube video highlighting the importance of data security in Respondents’ industry. The video features GTL executives making the following statements: a. “GTL is different in data security from our competition” and data security is “the cornerstone of what we do.” b. Data security is important for Respondents’ business because incarcerated users use Respondents’ services to “shar[e] confidential information,” including information related to commissary services, medical services, and phone services. c. “A facility that’s looking for a secure environment…should be asking those questions: have you had a breach? And if you’ve had one, what have you done to correct it?” 19. In seeking new or continued business from current and potential Facility customers, Respondents regularly respond to those Facilities’ Requests for Proposals (“RFPs”). In numerous instances, as part of the RFP process, Facilities have requested information about Respondents’ data security practices. 20. Since May 2017, as part of their RFP responses to Facilities seeking information about Respondents’ data security practices, Respondents have disseminated or caused to be disseminated a marketing document entitled “Information Security Framework.” This document states: “At GTL, we take information security and data protection very seriously. That’s why we’ve gone to exceptional lengths to safeguard each customer’s data and private information that is generated through the course of their relationship with us. Our security architecture provides our customers the reassurance that their data won’t fall into the wrong hands.” 21. The “Information Security Framework” document goes on to make the following statements regarding Respondents’ use of specific data security safeguards: a. “[C]ontrols are in place to limit access only from specific IP addresses. This means that access to customer data will be denied if a request is from an unknown IP address.” b. “[M]ultiple layers of 128-bit encryption and perimeter firewall protection prevent unauthorized access from the Internet.” 4 c. “A robust centralized log monitoring solution provides alerts to the GTL Information Security Department based on predefined and internally developed alarm rules. This application is monitored to detect other anomalies that might indicate inappropriate use of GTL assets….GTL uses industry accepted log monitoring so[ft]ware to perform file integrity monitoring and to provide real time monitoring of application, security, and system event logs. Using this log monitoring so[ft]ware, the GTL Information Security Department monitors log events 24/7 and investigates all alerts.” d. “[A]ny changes to firewall hardware or so[ft]ware or security rules are approved by GTL’s Information Security Department, follow all change control policies and procedures, and are properly documented.” e. “Intrusion Prevention Systems are deployed to alert the GTL Information Security Department to potential attacks and automatically block such attacks. Many companies choose to rely on an Intrusion Detection System that simply alerts of potential attacks, but GTL’s systems automatically block suspected malicious traffic.” 22. Since May 2017, in response to RFPs from potential Facility customers, Respondents have also disseminated or caused to be disseminated a marketing document entitled “Solution Integration.” This document states: “Our integrated solutions also help enhance data and technology security. We follow security best practices, the latest encryption methodologies, and proper protocols to ensure our system offers the most robust data and wireless security in the market. Our technologies leverage multiple layers of firewalls, SSL, and best-in-industry security standards to ensure all data transmitted through our systems are secure.” 23. Respondents have also made security representations to individual consumers. Since at least January 2020, Respondents have disseminated privacy policies on their public-facing websites, including on the GettingOut website. These privacy policies have made and continue to make the following representation: “We seek to use industry standard physical, technical and administrative security measures designed to protect your personally identifiable information. However, no data transmission or storage system can be guaranteed to be 100% secure. If you have reason to believe that your interaction with us is no longer secure (for example, if you feel that the security of any account you might have with us has been compromised), please immediately notify us in accordance with the ‘Contact Us’ section above.” The Test Environment and Respondents’ Data Security Practices 24. In operating and providing some of their products and services, Respondents rely on search and storage software (“Search Software”). In 2019, Respondents initiated a process to transition to a newer version of the Search Software. 25. The engineers working to plan and execute the Search Software update included employees of a third-party vendor (the “Vendor”) with which Respondents contract to provide software development and other services. Respondents’ employees supervised the day-to-day 5 activities of engineers working on the Search Software update, including those employed by the Vendor. 26. In or about August 2020, Respondents copied a large volume of production data (i.e., real data from and about users of Respondents’ products and services) into an Amazon Web Services (“AWS”) cloud storage environment (the “Test Environment”) for the purpose of testing the new Search Software version. 27. As discussed in further detail in Paragraph 31, the data copied to the Test Environment included personally identifiable information pertaining to numerous incarcerated, nonincarcerated, and Facility users of Respondents’ products and services, including communications services used by incarcerated consumers and their contacts and monitoring services used by Facilities. 28. Though the Test Environment contained personally identifiable information, Respondents failed to provide reasonable security for that information. Among other things: a. Respondents did not take any steps to encrypt or otherwise obfuscate the data that they transferred to the Test Environment, but rather stored consumers’ sensitive, personally identifiable information in clear, readable text; b. Respondents did not use automated monitoring software on the Test Environment, including free AWS features that would have generated alerts if the security settings of the Test Environment were changed; c. Respondents did not employ a perimeter firewall to protect the Test Environment; d. Respondents did not employ a log monitoring solution that provided alerts to the GTL Information Security Department to protect the Test Environment; e. Respondents did not employ an Intrusion Prevention System to protect the Test Environment; f. Though the Vendor had access to highly sensitive personally identifiable information held within Respondents’ systems, including the Test Environment, Respondents took no steps to vet or assess the Vendor’s data security practices; g. Respondents also did not provide, or require the Vendor to provide, the Vendor’s engineers with secure development training or with other data security training appropriate to their job duties; and h. Respondents did not take reasonable steps to inventory or track consumers’ personally identifiable information, including tracking which consumers’ personally identifiable information was transferred and the categories of personally identifiable information that they transferred to the Test Environment. 6 The Incident 29. On or about August 11, 2020, a technician employed by the Vendor changed the security settings of the Test Environment. As a result of this change, from at least August 11, 2020 to August 13, 2020, the Test Environment was left accessible via the internet without password protection or other access controls to prevent unauthorized persons from accessing and exfiltrating data from the Environment (“Incident”). 30. Approximately 649,500 unique individuals’ personally identifiable information was contained within the Test Environment at the time of the Incident. 31. This personally identifiable information included individuals’ full names; dates of birth; phone numbers; usernames or email addresses in combination with passwords; home addresses; driver’s license numbers; passport numbers; location information; information about individuals’ race, religion, and whether they are transgender; approximately 80,000 grievances submitted by incarcerated consumers to Facilities; and the content, dates and times, senders, and recipients of approximately 75,000 written messages that incarcerated and non-incarcerated users had exchanged using Respondents’ services. In numerous instances, the written messages contained payment card numbers, financial account information, and Social Security numbers. 32. The Test Environment also contained a database of deposit information, including data fields such as “account_posted_at,” “amount,” “card_owner_name,” “deposit_type,” and “dest_account_id.” 33. Beginning on or about August 12, 2020, there were multiple instances of access to the Test Environment from IP addresses not associated with Respondents. Unidentified individuals accessing the Test Environment from those IP addresses accessed approximately 44,000,000,000 bytes of data stored in the Test Environment. Forensic analysis conducted by or on behalf of Respondents has indicated that there was exfiltration of data from the Test Environment by one or more of these individuals. 34. Respondents learned of the Incident on August 13, 2020, when a security researcher contacted Respondents and stated that he had discovered “an unprotected, publicly available database instance which seems to be part of GTL / Telmate cloud infrastructure and contains non-public information, such as inmates[’] personal details, emails, auth history, messages and much more.” After confirming the researcher’s findings, Respondents reconfigured the Test Environment so that it was no longer accessible from the internet. 35. On September 1, 2020, Respondents received a message from a company that provides identity monitoring services to consumers stating that the company’s engineers “believe[d] they [had] come across sensitive data related to GTL.” Following this communication, Respondents worked with the identity monitoring company to retrieve copies of data that had been released on the “dark web,” i.e., on websites that are used to buy and sell illicitly obtained data for use in connection with fraud, identity theft, and other criminal purposes. Subsequent data analysis suggested that the data provided by the identity monitoring company aligned with data believed to have been impacted in the Incident. 7 36. As early as November 2020, Respondents received multiple complaints from consumers stating that the consumers’ personally identifiable information obtained from Respondents had been located on the dark web. This personally identifiable information included names, addresses, phone numbers, dates of birth, and driver’s license issue states. Some consumer complaints also indicated that consumers had been alerted to fraudulent transactions on their credit cards following the Incident. 37. In part as a result of Respondents’ data security failures, hundreds of thousands of consumers’ personally identifiable information was exposed to the internet, was exfiltrated by unauthorized individuals, and was made available on the dark web. These failures resulted in financial injury to consumers, including because consumers experienced unauthorized payment card activity shortly after learning of the Incident from third-party credit monitoring services. Additionally, the public exposure of consumers’ communications with loved ones and sensitive information contained in grievance forms is, at a minimum, a serious invasion of privacy that may cause them stigma, embarrassment, and/or emotional distress. In some cases, that information, like consumers’ location information and whether individuals identify as transgender, has concerning implications for consumers’ safety. Misrepresentations to Consumers Regarding the Incident and Failure to Notify Consumers 38. On September 4, 2020, Comparitech, a data privacy and security blog, published an article about the Incident. Comparitech’s article contains the following statement, which Respondents had provided to Comparitech on September 3, 2020 via e-mail: Telmate, a GTL subsidiary immediately locked down the server as a precaution upon being made aware of a vulnerability in the data system due to the actions of one of our vendors. This vulnerability was swiftly corrected, the data security team was immediately supplemented with the assistance of third-party consultants and we continue to work closely with law enforcement authorities as we conduct further inquiry into this incident. Based on the current facts of the investigation, no medical data, passwords, or consumer payment information were affected. We continue to speak with and notify necessary parties, including the affected Telmate customers – a small subset of all GTL customers – about the incident and the actions we have taken to safeguard data. The security of the data we keep is of the utmost importance to us, and we are committed to doing everything we can to keep it safe. (Emphasis added.) 39. Respondents’ statement to Comparitech was false or misleading. Among other reasons, the statement was false or misleading as to the severity of the Incident and the risk to individual consumers, because: a. Respondents stated that their investigation to date had not indicated that medical data or payment information was affected, but in fact Respondents knew at least as of August 19, 2020 that some credit card numbers and medical information, including 8 incarcerated consumers’ requests to see medical staff, were included in information affected by the Incident; b. Respondents’ statement failed to disclose additional categories of sensitive personally identifiable information that were affected or potentially affected by the Incident, including addresses, email addresses, Social Security numbers, passport numbers, and driver’s license numbers; and c. Respondents stated that “we continue to speak with and notify necessary parties, including the affected Telmate customers,” but, in fact, Respondents did not contact any affected individuals to notify them of the Incident until May 2021. 40. In or about May 2021, Respondents notified approximately 45,000 individual users that their personally identifiable information had been exposed as a result of the Incident. To date, Respondents have provided no notice to the potentially hundreds of thousands of additional users whose information was contained in the Test Environment at the time of the Incident and therefore may have been exposed. 41. Because Respondents delayed notifying individual users that their personally identifiable information had been or could have been affected by the Incident for approximately nine months, those users did not have an opportunity to take actions to protect themselves from identity theft, such as by implementing a credit freeze. Misrepresentations to Facilities Regarding the Incident 42. Additionally, on multiple occasions since the Incident, in connection with responding to RFPs by prospective Facility customers, Respondents have represented that Respondents have never experienced a data security breach or had not experienced a data security breach within a particular time frame that includes the dates of the Incident. 43. For example, since December 2020, Respondents have stated in their RFP responses to potential Facility customers that “there were no system incidents that resulted in a significant failure in the achievement of one or more of service commitments and system requirements throughout the period April 1, 2020, to September 30, 2020,” where “system requirements” are defined to include that “Logical access to programs, data and computer resources is restricted to authorized and appropriate users, and such users are restricted to performing authorized and appropriate actions.” 44. In other instances, Respondents have submitted RFP responses stating that, e.g., Respondents have never experienced a data security breach or have not experienced a data security breach within the past five years. 9 Count I Unfair Data Security Practices 45. As described in Paragraph 28, Respondents failed to employ reasonable and appropriate measures to protect consumers’ personally identifiable information. 46. This failure caused or was likely to cause substantial injury to consumers that is not outweighed by countervailing benefits to consumers or competition and is not reasonably avoidable by consumers themselves. This practice is an unfair act or practice. Count II Unfair Failure to Notify Affected Consumers of the Incident 47. As described in Paragraphs 38-40, Respondents failed to timely notify affected consumers that their personally identifiable information had been exposed as a result of the Incident. 48. This failure caused or is likely to cause substantial injury to consumers that is not outweighed by countervailing benefits to consumers or competition and is not reasonably avoidable by consumers themselves. This practice is an unfair act or practice. Count III Misrepresentations Regarding Data Security 49. As described in Paragraphs 17-23, in connection with the advertising, promotion, offering for sale, or sale of communications and payment services, Respondents have represented, directly or indirectly, expressly or by implication, that they implemented reasonable and appropriate measures to protect personally identifiable information against unauthorized access. 50. In fact, as described in Paragraph 28, Respondents did not implement reasonable and appropriate measures to protect personally identifiable information in the Test Environment against unauthorized access. Therefore, the representation set forth in Paragraph 49 is false or misleading. Count IV Misrepresentations to Individual Users Regarding the Incident 51. As described in Paragraph 38, in connection with the advertising, promotion, offering for sale, or sale of communications and payment services, Respondents represented, directly or indirectly, expressly or by implication, that they had no reason to believe that consumers’ sensitive personally identifiable information was affected by the Incident. 52. In fact, as described in Paragraph 39, Respondents had reason to believe that consumers’ sensitive personally identifiable information was affected by the Incident. Therefore, the representation set out in Paragraph 51 was false or misleading. 10 Count V Misrepresentations to Individual Users Regarding Notice 53. As described in Paragraph 38, in connection with the advertising, promotion, offering for sale, or sale of communications and payment services, Respondents represented that they would timely notify users whose personally identifiable information had been exposed as a result of the Incident. 54. In fact, as described in Paragraphs 39-41, Respondents failed to provide timely notice to users whose personally identifiable information was exposed because of the incident. Therefore, the representation set out in Paragraph 53 was false or misleading. Count VI Deceptive Representations to Facilities Regarding the Incident 55. As described in Paragraphs 42-44 in connection with the advertising, promotion, offering for sale, or sale of communications and payment services, in multiple instances since the Incident, Respondents have represented to Facilities that they have never experienced a data security breach or that they had not experienced a data security breach within a particular timeframe that includes the dates of the Incident. 56. In fact, as described in Paragraphs 29-37, the representations set out in Paragraph 55 have been false or misleading. Violations of Section 5 57. The acts and practices of Respondents as alleged in this complaint constitute unfair or deceptive acts or practices in or affecting commerce in violation of Section 5(a) of the Federal Trade Commission Act. THEREFORE, the Federal Trade Commission this 23rd day of February, 2024, has issued this Complaint against Respondents. By the Commission. April J. Tabor Secretary SEAL: 11

