Chegg Inc. and the FTC’s Order Against Them Is a Wake-up Call for Data Privacy Strategy

 

The FTC’s order against Chegg is a wake-up call for businesses everywhere and their current data privacy strategy. Chegg Inc. (“Chegg”) has been punished by the Federal Trade Commission (FTC) for its “careless” cybersecurity practices that exposed the sensitive personal information of its customers and employees.

Chegg, according to the FTC’s complaint, stored customer data in plain text on its network. This data includes names, email addresses, Chegg usernames and passwords, shipping addresses, and answers to security questions. Employee information, such as names, Social Security numbers, bank account information, and driver’s license numbers, was also stored in plain text on Chegg’s servers. To top it off, Chegg stands accused of failing to secure its network properly, thus allowing a hacker to access Chegg’s network and steal private information.

According to the FTC, Chegg violated the Gramm-Leach-Bliley Act and the FTC Act by not securing its network and storing sensitive data plainly. As part of the settlement, Chegg will develop a comprehensive information security program and will obtain independent assessments of the program every two years. In addition, Chegg will be subject to FTC oversight for 20 years to come.

The FTC’s order against Chegg is a wake-up call, not only for educational technology companies in the education sector but also for school districts and schools public and private alike. The FTC order against Chegg was because of, as the FTC determined, failure to implement commercially reasonable security measures.

Sai Huda, CEO of CyberCatch, is a globally recognized risk and cybersecurity expert and author of the best-selling book “Next Level Cybersecurity.” He gives MarketScale his thoughts on why companies should pay attention to Chegg’s mistakes, and learn from them to ensure their business’s data stays private, but also, where Chegg went wrong, and how businesses can reform their strategies to meet commercially reasonable security measures.

Sai’s Thoughts:

“Chegg had multiple phishing attacks that were successful. Chegg had other deficiencies that attackers exploited to steal over 40 million students and consumers’ data, which included parents and finally, the FTC said Enough is enough. So the question is, what do commercially reasonable security measures mean when FTC describes them?

It is really complying with a standard such as NIST cybersecurity framework. There are 108 controls, and this is really what educational technology companies minimally must implement and comply with, but also school districts and schools public and private alike should really implement those 108 controls.

These controls are prevention, detection, and response. That is an adequate defense and that will enable schools or even technology companies to be able to make the assertion that it has implemented commercial and reasonable security measures.

Follow us on social media for the latest updates in B2B!

Image

Latest

Women's empowerment
Seizing the Narrative: The Transformative Impact of Storytelling on Women’s Empowerment
April 19, 2024

With gender equality becoming a significant global agenda, the narrative around women’s empowerment is more relevant than ever. Amid rising awareness and shifting societal norms, women are increasingly seeking avenues for self-expression and empowerment. A recent study by the Global Gender Gap Report highlights that while progress is being made, substantial efforts are still […]

Read More
V2G technology
Plug into the Future: Decoding V2G for Utility Applications
April 19, 2024

Brian Rudy from Verizon IoT and Melissa Chan of Fermata Energy explore the cutting-edge potential of vehicle-to-grid (V2G) technology at DISTRIBUTECH 2024. Their discussion highlights how this innovation transforms electric vehicles into dynamic energy storage units, capable of stabilizing the grid by storing and discharging power as needed. This technology represents a significant shift […]

Read More
zero trust architecture
Secure Grid Modernization with Zero Trust Architecture
April 19, 2024

Ray Bauer of Verizon Business engages with Del Rodriguez from Palo Alto Networks at DISTRIBUTECH 2024. Rodriguez shares insights into the significance of cybersecurity within the utility sector, particularly in light of increasing cyber threats and the convergence of IT and operational technology (OT). Bauer and Rodriguez discuss Palo Alto Networks’ initiatives to enhance […]

Read More
private wireless networks
Private Wireless Networks
April 19, 2024

Verizon host Wayne Weeks discusses the evolving utility industry with John Gaster, CEO of KSI Data Sciences at DISTRIBUTECH 2024. Together, they explore how KSI focuses on harnessing data from remote sensing devices to enhance the safety, efficiency, and cost-effectiveness of utility operations. Gaster emphasizes the significant role of AI and machine learning in […]

Read More