Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

FTC Cracks Down on Unauthorized Disclosure of Health Information for Advertising: A Roundup of Recent Enforcement Actions

Contributors

Omer Imran Malik

Data Privacy Legal Manager, Securiti

FIP, CIPT, CIPM, CIPP/US

Adeel Hasan

Sr. Data Privacy Analyst at Securiti

CIPM, CIPP/Canada

Listen to the content

Lately, the Federal Trade commission (FTC) has taken an increased interest in protecting the consumers’ digital health information by cracking down on companies deploying unfair and deceptive practices to share user health data with third parties for marketing. Through its recent enforcement actions, the FTC has highlighted the need for companies working in the digital health space to prioritize the protection of consumer data privacy.

What is the FTC?

The FTC is an independent federal agency of the US government responsible for promoting consumer protection and preventing anticompetitive business practices. The agency investigates and prosecutes companies and individuals that engage in fraudulent or deceptive business practices, including false advertising, deceptive pricing, unauthorized billing, etc.

FTC’s Recent Enforcement Actions

In the past three months, the FTC has brought enforcement actions against two companies dealing with the personal health data of consumers based on their unauthorized use of health information for marketing purposes.

On February 1, 2023, a telehealth and prescription drug discount provider platform became the target of the FTC's first enforcement action under the Health Breach Notification Rule for failing to inform consumers and other individuals of its unauthorized disclosures of consumer personal health information to Facebook, Google, and other companies. As per the proposed federal court order, the company has agreed to pay a $1.5 million civil penalty and will not be allowed to share user health information with applicable third parties for advertising purposes.

The proposed order further prohibits the company from engaging in deceptive marketing practices detailed in the complaint and calls for the company to abide by the Health Breach Notification Rule. The proposed order:

  • prohibits the company from sharing health data for ads;
  • requires users’ affirmative express consent before disclosing user health information with applicable third parties for other purposes;
  • requires the company to direct the third parties to delete consumer’s health data and inform the consumers about the breaches and the FTC’s enforcement action against the company;
  • limits how long the company can retain personal and health information according to a data retention schedule;
  • implement a comprehensive privacy program that includes strong safeguards to protect consumer data.

A month later, on March 2, 2023, the FTC announced another proposed action banning an online counseling service from sharing consumers’ health data, including sensitive information about mental health challenges, for advertising purposes. As per the proposed order, the company is fined $7.8 million, which it must pay to consumers to settle claims for sharing their sensitive data with third parties such as Facebook and Snapchat for advertising despite agreeing to keep such information private.

In addition, the proposed order requires the company to:

  • obtain affirmative express consent before disclosing personal information to certain third parties for any purpose;
  • implement a comprehensive privacy program that includes strong safeguards to protect consumer data;
  • direct third parties to delete the health and other personal data being revealed to them; and
  • how long the company can retain personal and health information according to a data retention schedule.

Following the enforcement actions, the FTC Office on Technology released a new guidance emphasizing the dangers of using pixel technology to track individuals' online activities and collect personal information. The FTC has determined that “companies using tracking pixels that impermissibly disclose an individual’s personal information (which may include health information) to third parties may be violating the FTC Act, the FTC’s Health Breach Notification Rule, the HIPAA Privacy, Security, and Breach Notification Rules, other state or federal statutes involving the disclosure of personal information, and [their] privacy promises to consumers.”

The FTC’s enforcement actions set a strong precedent for the digital healthcare companies and other organizations in control of consumers’ personal health data to safeguard the information and not endeavor to leverage the data in violation of their legal obligations as well as representations being made to the consumers.

The enforcement actions also highlight the FTC’s commitment to go against the corporations that violate their data privacy obligations, lack the data security infrastructure, and deceive customers by utilizing their personal data without obtaining their express consent for purposes other than its initial intended purpose.

Best Practices for Companies Dealing with Health Data

Companies dealing with health data have a legal obligation to protect the privacy and confidentiality of this sensitive information and ensure compliance with relevant laws and regulations, such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) and the FTC’s Health Breach Notification Rule, which requires vendors of personal health records and related entities to notify consumers following a breach involving unsecured information.

Ensuring compliance fundamentally comes down to implementing best practices such as:

Conducting Risk Assessments

Organizations should create a risk management strategy to identify and mitigate any risks to health data's availability, confidentiality, and integrity.

Implementing Appropriate Security Measures

Organizations should implement security measures such as access controls, encryption, and regular data backups to protect health data from unauthorized access or disclosure.

Training Employees

The company's policies and procedures for protecting health data should be made clear to all personnel who handle it. Employees are at the forefront of a business and hence must be aware of standard operating procedures when handling data.

Developing a Breach Response Plan

In the event of a data breach or other security issue involving health data, organizations should have a mechanism in place for handling it, including notifying affected individuals and regulatory authorities as required by law.

Regularly Auditing and Monitoring Compliance

Organizations should routinely review and audit their compliance with regulations and, if necessary, take corrective action to resolve any deficiencies or vulnerabilities.

Ensuring Swift Compliance and Avoiding FTC’s Enforcement Action

Section 5 of the FTC Act prohibits companies from misleading consumers or engaging in unfair practices that harm consumers. Businesses dealing with personal data, including the health information of the consumers, can avoid FTC’s enforcement actions by complying with the applicable laws and regulations as well as adopting the following general guidelines::

Establish Transparency

Publish a Privacy Policy and be transparent with your customers about your business practices, including the collection and use of their data, and make sure your marketing claims are truthful and not misleading. Additionally, create policies to comply with channel-specific requirements such as CAN-SPAM, call center compliance, telemarketing sales rules, and Do Not Call.

Document Compliance

Establish, implement, and monitor compliance programs. Document compliance with applicable laws and rules as appropriate documentation can be helpful in an investigation and litigation.

Monitor Affiliates

Monitor your affiliates and partners to ensure that they comply with FTC guidelines and do not engage in deceptive marketing or fraudulent business practices. Establish policies for compliance for third-party lead generators and affiliate marketers. Implement onboarding scanning procedures, monitor third parties’ activities, and take remedial action when necessary.

Obtain consent from customers before collecting or using their personal data, and provide them with clear options to opt-out if they do not wish to share their data. Companies may use cookie consent pop-ups to inform consumers about the usage of cookies and other tracking technologies on their websites and obtain explicit consent.

Implement Security Measures

Protect the data you collect by implementing appropriate security measures, and notify customers and the regulatory authority immediately if a data breach occurs.

Honor Commitment

Honor the commitment made to customers, including what’s mentioned in the privacy policies, refund policies, and guarantees.

Respond to Complaints

Identify trends in customer complaints, respond promptly and professionally to customer complaints and data subject requests, and take appropriate action to resolve any issues. Liberally refund dissatisfied customers, and make dissatisfied customers satisfied.

Stay Informed

Stay on top of new developments in the law, industry standards, and the FTC’s guidelines and expectations by regularly visiting their website, and ensure that your business practices comply with these evolving changes.

Compliance with the FTC and evolving data privacy laws that regulate business practices is essential to building trust with your customers, avoiding legal issues such as penalties, and ensuring the long-term success of your business. In today’s data-driven age, honoring data obligations necessitates using automation to handle the vast amounts of data being collected, processed, shared, and sold.

How Can Securiti Help?

Securiti, by harnessing the power of automation, enables organizations to leverage its Data Command Center and overcome hyperscale data environment challenges by delivering unified intelligence and controls for data across public clouds, data clouds, and SaaS, which allow organizations to meet security, privacy, governance, and compliance obligations around data.

Securiti’s multiple automation modules, such as privacy policy and notice management, consent management, and third-party consent, enable you to comply with FTC’s rules and evolving data privacy laws and avoid non-compliance penalties.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Latest
View More
Introducing Agent Commander
The promise of AI Agents is staggering— intelligent systems that make decisions, use tools, automate complex workflows act as force multipliers for every knowledge...
Risk Silos: The Biggest AI Problem Boards Aren’t Talking About View More
Risk Silos: The Biggest AI Problem Boards Aren’t Talking About
Boards are tuned in to the AI conversation, but there’s a blind spot many organizations still haven’t named: risk silos. Everyone agrees AI governance...
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
Consent Orchestration for Safe AI View More
Consent Orchestration for Safe AI
Access the whitepaper and learn how to operationalize consent across data and GenAI with a practical framework, enforceable controls, and a 30/60/90-day implementation roadmap.
View More
2026 Privacy Compliance Readiness Checklist
Access the whitepaper to unlock a practical guide to strengthening privacy readiness, featuring key insights, the 2026 privacy compliance checklist, and how to operationalize...
DataAI Security for Retail View More
DataAI Security for Retail
Download the brief and explore how retailers can securely scale Data & AI with Securiti DataAI Command Center and protect sensitive data, manage risk,...
Emerging AI Security Trends For 2026 View More
Emerging AI Security Trends For 2026
Securiti’s latest infographic provides security leaders with a walkthrough of all the emerging AI security trends for 2026 to help them assess and plan...
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New