United States: Consumer Products In The Age Of Big Data

Originally appeared in Kaye Scholer's Consumer Products: Adapting to Innovation Report.

Big data is becoming a defining element of consumer products today—now, even your dog's collar is streaming data. The collection and use of big data presents many promising opportunities for both consumer products companies and consumers, but it also raises a number of complex legal issues. This article provides an overview of some of the societal benefits and potential harms of big data analytics in the consumer products space, the privacy-related legal issues that are emerging and the US federal government's efforts to develop a regulatory framework to address them.

How Big Is "Big Data?"

The data streams from internet-enabled consumer products are growing rapidly as these products become increasingly common. For instance, millions of consumers have purchased wearable fitness sensors such as FitBit, which tracks how far the wearer walks and how many calories he or she burns each day.[i] Sensors for pets, such as GPS-enabled monitors, cameras and health trackers, are also gaining traction.[ii] Google's Nest thermostat tracks homeowners' activity, automatically adjusting the temperature when they wake up in the morning or leave for work.[iii] Internet-enabled ovens allow consumers to turn them on, monitor temperature and set alerts with a mobile app.[iv] A variety of stand-alone home sensors can detect leaking pipes, opened doors, broken freezers and plants in need of watering.[v] These and many other internet-enabled consumer products constitute a segment of the Internet of Things (IoT),[vi] which has been hailed as the third wave in the development of the internet.[vii] And this is merely the beginning of the IoT trend. Some industry analysts predict that by 2020, 20.8 billion devices will connect to the internet, compared to 6.4 billion devices today.[viii]

The proliferation of IoT devices is fueling the already explosive growth of big data. IBM currently estimates that 2.3 trillion gigabytes of data are created each day worldwide.[ix] IDC estimates that the volume of data generated annually will double every year through 2020.[x]

[xi]Consumer products companies are increasingly taking advantage of big data analytics to gain new insights into consumer preferences and behaviors. A recent study by IBM revealed that "58 percent of consumer products companies surveyed report the use of information (including big data) and analytics is creating a competitive advantage for their organizations." But most are still in the planning and pilot stages of development.[xii] Large consumer products companies receive 40 to 50 terabytes of external data from independent research organizations and distribution networks on a weekly basis.[xiii] In addition, consumer products companies are supplementing their existing data sources with unstructured data collected from social media, blog commentaries and other sources.[xiv] These sources can provide essential, real-time feedback on consumers' reactions to everything from product launches to in-store promotions.[xv]

A Double-Edged Sword

Consumers can benefit when consumer product companies and their retailers employ big data analytics. These companies can track how consumers use their products and use the information to make improvements. It is useful to know, for example, what features of an exercise machine consumers use and for how long, or never use at all. There is insight to be gained from knowing where in an e-book a consumer stops reading. Further, consumers can receive more personalized and helpful product recommendations from online retailers and e-commerce sites that track and assess their purchase patterns and browsing history. And big data analytics can lead to lower consumer prices. For example, by using analytics to predict demand more accurately, manufacturers can produce and distribute their products more efficiently and lower their costs.[xvi] In competitive markets, these savings are typically passed on to consumers.

However, the emergence of the IoT and the advent of big data analytics have also raised the specter of a large-scale and pervasive loss of personal privacy. Consumer products can collect very personal and sensitive information. For instance, electricity sensors can reveal what time a person gets home at night, how much TV he watches and which electronic devices are being used inside the home.[xvii] Data from "smart" refrigerators can imply diseases like alcoholism, or suggest religious affiliation based on the presence of kosher foods or holiday eating patterns.[xviii] Voice-activated devices may overhear and record private conversations.[xix]

Many consumers are very concerned about a loss of privacy, not just for its own sake but because personal information can be used to their disadvantage. For example, some companies can price discriminate based on customer preferences gleaned from their data. Personal data can reveal which of their customers are likely to be willing to pay more for a particular product, and those customers may be shown higher prices online compared to customers perceived to be more frugal. Some of the largest online retailers have experimented with such differential pricing.[xx] One home improvement retailer shows consumers who shop from their smartphones products that are roughly $100 more expensive than the products shown to those shopping from their desktops.[xxi] Some travel sites have been known to quote significantly higher hotel room prices if the reservation is made using a Mac rather than a PC (some studies show Mac users are willing to spend more than PC users).[xxii] It is very difficult for a consumer to know whether she is being offered the lowest price or even what constellation of data has flagged her as likely willing to pay an inflated price.[xxiii]

Big data analytics can also raise the troubling prospect of discrimination based on race, gender and other protected characteristics. A recent study from Carnegie Mellon University found that on leading online employment sites, ads for high-paying jobs were displayed about six times more frequently when software detected a man than a woman.[xxiv] Discrimination can also occur when analytics reveal patterns correlated with a constitutionally protected characteristic. Big data analytics can show that employees with shorter commutes stay with their employer longer than those with longer commutes.[xxv] But factoring commuting distances into hiring decisions may result in racial discrimination since the racial composition of neighborhoods can vary widely across an urban area.[xxvi] Not only can this undermine an employer's antidiscrimination efforts, but, as the Federal Trade Commission (FTC) has cautioned, a practice having a disparate impact on a protected class can violate federal equal opportunity laws.[xxvii]

The Shortcomings of Notice and Consent

"Notice and consent" has been the traditional answer to many of the problems raised by the collection, analysis, use and disclosure of personal data. Longstanding privacy laws, such as the Gramm-Leach-Bliley Act,[xxviii] take this approach and represent the current state of the law. However, many consumer advocates increasingly view privacy notices and consumer consent as inadequate. Some think that consumers find them long and complicated, rife with legalese or unclear regarding the limits imposed on data sharing and use. Moreover, some empirical research suggests that even when consumers do read privacy policies, many do not understand them sufficiently to give meaningful consent. For instance, one study found that people correctly answer only 30 percent of questions regarding the privacy of their online transactions.[xxix] Another study has found that 75 percent falsely believe that "[w]hen a website has a privacy policy, it means the site will not share my information with other websites and companies."[xxx]

From this perspective, the solution may not be merely a matter of more accessible, complete and meaningful disclosure. The very nature of big data analytics makes it difficult for companies to predict how they may end up using the data. Evermore sophisticated analytical techniques can enable the "repurposing" of data.[xxxi] Data from disparate sources can be combined in new ways to reveal unexpected information about the consumer.[xxxii] The unknowable nature of future analytical approaches and downstream use of the data therefore may prevent the consumer from providing truly informed consent.

Furthermore, consumers may not be able to fall back on guarantees of digital anonymity. Some recent studies suggest that large, anonymized datasets can be "re-identified" under certain conditions. In one such study, researchers working with anonymized location data from 1.5 million mobile phones could identify a particular individual 95 percent of the time from only four data points.[xxxiii] The researchers were able to "reconstruct individuals' movements across space and time" and, because most people's pattern of movement is highly idiosyncratic, the researchers could link their movements back to outside data that could be used to identify each person.[xxxiv] Another study by researchers at Columbia University and Google found that "time-stamped locations in just two social media apps are enough to link accounts held by the same person and identify him or her."[xxxv] Other research has shown that individuals can be re-identified in large anonymous datasets of shopping, subscription, taxi fare and credit card transaction data.[xxxvi] Thus, not only may anonymization offer relatively weak protection of consumer privacy, that protection appears to be eroding.

At the same time, many in the consumer products industry view growing consumer demand for personal data privacy and security as a market opportunity.[xxxvii] Two-thirds of consumer product company executives surveyed by Deloitte Touche Tohmatsu think that consumers are more likely to purchase brands that are perceived to be protecting their personal information.[xxxviii] Consumer surveys confirm this intuition.[xxxix] Conversely, misuse and abuse of consumer data can result in lost profitability as a result of fines and declining consumer trust.[xl] This suggests that marketplace dynamics might be sufficient to deliver an economically optimal level of data privacy and security. Apple Inc.'s recent public refusal to cooperate with the FBI to crack a terrorist suspect's iPhone is seen by some as an unusually vivid example of the importance of maintaining a brand's reputation for prioritizing consumer data privacy.[xli] As greater numbers of consumer product companies respond to the consumer privacy movement, there may be little need for stricter data privacy and security regulation. Such responsiveness may also be driven by a recognition that a lack of responsiveness could result in increased regulatory intervention.[xlii]

Expanding Government Regulation[xliii]

The FTC has assumed the role of the main watchdog for data privacy violations in the United States.[xliv] Its primary legal authority is conferred by Section 5 of the FTC Act, which bars "unfair or deceptive acts or practices in or affecting commerce."[xlv] The FTC has cautioned that a company is likely engaged in a deceptive practice in violation of Section 5 if it does not honor material promises it makes to consumers. Material promises include, for example, pledging not to share data with third parties, promising to provide consumers with choices about data sharing, or assuring consumers that their personal information will be secure.[xlvi] In addition, the failure to disclose information material to privacy concerns may be an unfair or deceptive practice under Section 5. For instance, in 2008 the FTC brought suit against a credit card marketing company that failed to disclose to consumers that their credit lines would be reduced if they used their cards for cash advances or for certain transactions, including marriage counseling, bars and nightclubs, pawn shops, and massage parlors.[xlvii] Pursuant to a court settlement with the FTC, the credit card marketing company agreed to reverse more than $114 million in fees charged to eligible consumers. The company also agreed to a civil penalty of $2.4 million to settle a parallel administrative action brought by the FDIC.[xlviii]

In 2013, the FTC brought its first enforcement action against a marketer of an internet-enabled consumer product. The FTC alleged that the marketer of internet-connected video cameras failed to employ reasonable security in the design and testing of its software and transmitted user login credentials in plain text over the internet. As a result, a hacker was able to access and post links to live feeds, which included videos of infants sleeping in their cribs, young children playing and adults engaging in everyday activities.[xlix] The FTC's settlement of the case required that the marketer cease misrepresenting the security of its cameras, establish a security program to address any risks that could result in unauthorized access of the devices, notify customers about security issues and provide customers with free technical support for two years.[l]

In addition to the FTC Act, the Commission has also enforced a number of sector-specific laws. The Fair Credit Reporting Act (FCRA) regulates consumer reporting agencies, such as credit bureaus and employment background screening companies, that prepare and sell reports used to make employment, credit, housing and other consumer-related eligibility decisions. The FTC has begun to apply FCRA to companies that offer novel approaches to informing eligibility decisions, in particular the use of big data analytics across a broader spectrum of data than traditional consumer reporting agencies typically use. For instance, in 2012, the FTC alleged that the online data broker Spokeo was subject to and failed to comply with FCRA because Spokeo compiled information from online and offline data sources and marketed the profiles to human resources departments to use in hiring decisions.[li] Spokeo paid $800,000 in civil penalties under a consent decree to resolve the matter.[lii]

The Children's Online Privacy Protection Act (COPPA) requires operators of commercial websites and online services directed to children under 13 to provide notice to parents and obtain parental consent before collecting children's personal information.[liii] In the FTC's view, COPPA could apply to the IoT.[liv] The FTC has brought more than a dozen actions for violations of COPPA since the act was first introduced in 2000.[lv] COPPA regulations were amended in 2013 to define personal information to include "persistent identifiers," such as cookies or customer numbers that enable retailers to track consumers across websites.[lvi] Last year, the FTC brought its first enforcement actions based solely on collection of persistent identifiers without parental consent. The FTC's complaints allege that the mobile app developers LAI Systems and Retro Dreamer, whose apps were directed at children, allowed third-party ad networks to collect and use persistent identifiers from their apps to target ads to children.[lvii] LAI Systems and Retro Dreamer agreed to pay a combined total of $360,000 in civil penalties to settle the FTC's charges.[lviii] These enforcement actions signal that the FTC intends to enforce COPPA aggressively. In addition, others have also called for an extension of COPPA to data generated by consumer products. In 2015, the parents of minor children filed a class-action suit against the makers of a high-tech "Hello Barbie" doll, which is designed to engage in conversation with children, record the conversation and store the associated data in a cloud database. To satisfy COPPA requirements, the makers obtain parental consent from the owner of the doll. However, since children often play with others, the doll picks up and records conversations with other children, whose parents did not provide the necessary consent.[lix] The case is currently pending.

In addition to its enforcement of the existing laws, the FTC is actively involved in discussions for the reform of data privacy legislation. In a report published last year on the IoT, the FTC concluded that IoT-specific legislation is premature given the evolving nature of the technology.[lx] Instead, the FTC continues to favor broad-based privacy legislation that is both flexible and technology-neutral.[lxi] It envisions a statute that would give the FTC the authority to require certain basic privacy protections such as consumer disclosures and consumer choice that the FTC does not have authority to impose under the current FTC Act.[lxii] The FTC also favors data security and breach notification legislation at the federal level.[lxiii] Lastly, the FTC has ongoing concerns about the lack of transparency surrounding data practices and the lack of meaningful consumer control over their personal data.[lxiv] The FTC has recommended that data brokers provide consumers with access to their data and has proposed a centralized website where data brokers would identify themselves, describe how they collect and use consumer data, and detail consumers' rights to access their data.[lxv] Whether or not Congress adopts these specific recommendations, it is clear that the FTC intends to continue to expand its efforts to protect data privacy generally and regulate the growing use of data generated by consumer products and the IoT.

Originally appeared in Kaye Scholer's Consumer Products: Adapting to Innovation Report.

[i]  Fitbit, WIKIPEDIA (June 12, 2016, 12:42 PM), https://en.wikipedia.org/wiki/Fitbit.

[ii]  The global pet wearable market was valued at USD 837.6 million in 2014. Pet Wearable Market Analysis By Technology, GRAND VIEW RESEARCH (Feb. 2016), http://www.grandviewresearch.com/ industry-analysis/pet-wearable-market.

[iii] Nest Labs, WIKIPEDIA (June 15, 2016, 2:07 PM), https://en.wikipedia.org/wiki/Nest_Labs.

[iv]  Keith Barry, Smart Meets Elegant on GE's New Connected Oven, REVIEWED (Oct. 24, 2013), http://ovens.reviewed.com/features/ smart-meets-elegant-on-ges-new-connected-oven.

[v]  Twine, SUPERMECHANICAL, http://supermechanical.com/twine/ (last visited June 16, 2016).

[vi]  The term Internet of Things refers to "the ability of everyday objects to connect to the Internet and to send and receive data." FED. TRADE COMM'N, INTERNET OF THINGS: PRIVACY AND SECURITY IN A CONNECTED WORLD i (2015) [hereinafter FTC, INTERNET OF THINGS].

[vii]  THE INTERNET OF THINGS: MAKING SENSE OF THE NEXT MEGA-TREND (Goldman Sachs Grp., Inc. 2014), available at http://www. goldmansachs.com/our-thinking/outlook/internet-of-things/iot-report.pdf.

[viii]  Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015, GARTNER (Nov. 10, 2015), http://www.gartner.com/newsroom/id/3165317.

[ix]  The Four V's of Big Data, IBM, http://www.ibmbigdatahub.com/ infographic/four-vs-big-data; see also Ben Walker, Everyday Big Data Statistics, VCLOUDNEWS (Apr. 5, 2015), http://www.vcloudnews.com/ every-day-big-data-statistics-2-5-quintillion-bytes-of-data-created-daily/.

[x]  THE DIGITAL UNIVERSE IN 2020: BIG DATA, BIGGER DIGITAL SHADOWS, AND BIGGEST GROWTH IN THE FAR EAST 1 (IDC 2012), available at https://www.emc.com/collateral/analyst-reports/idc-the-digital-universe-in-2020.pdf.

[xi]  JOHN HEARN ET AL., ANALYTICS: THE REAL-WORLD USE OF BIG DATA IN CONSUMER PRODUCTS 2 (IBM Institute for Business Value 2013), available at http://www-935.ibm.com/services/us/gbs/ thoughtleadership/big-data-consumerproducts/.

[xii]  Id. at 3.

[xiii]  DELIVERING NEW INSIGHTS AND VALUE TO CONSUMER PRODUCTS COMPANIES THROUGH BIG DATA 2 (IBM 2014), available at http://www-01.ibm.com/common/ssi/cgi-bin/ ssialias?subtype=WH&infotype=SA&appname=SWGE_IM_IM_ USEN&htmlfid=IMW14713USEN&attachment=IMW14713USEN.PDF.

[xiv]  Id.

[xv]  Id. at 3.

[xvi]  See id. at 3-4.

[xvii]  Scott R. Peppet, Sensor Privacy as One Realistic & Reasonable Means to Begin Regulating Big Data, in BIG DATA AND PRIVACY: MAKING ENDS MEET 98, 99 (2013).

[xviii]  Steve Johnson, Internet of Things Will Transform Life, But Experts Fear for Privacy and Personal Data, MERCURY NEWS (Nov. 1, 2014), http://www.mercurynews.com/business/ci_26845396/internet-things-will-transform-life-but-experts-fear.

[xix]  Id.

[xx]  Elizabeth Dwoskin, Why You Can't Trust You're Getting the Best Deal Online, WALL ST. J. (Oct. 23, 2014), http://www.wsj.com/articles/why-you-cant-trust-youre-getting-the-best-deal-online-1414036862.

[xxi]  Id.

[xxii]  Dana Mattioli, On Orbitz, Mac Users Steered to Pricier Hotels, WALL ST. J. (Aug. 23, 2012), http://www.wsj.com/articles/SB100014240527023 04458604577488822667325882.

[xxiii]  See Kara Brandeisky, How to Beat Online Price Discrimination, MONEY (Oct. 23, 2014), http://time.com/money/3534651/price-discrimination-travelocity-orbitz-home-depot/.

[xxiv]  Byron Spice, Questioning the Fairness of Targeting Ads Online, CARNEGIE MELLON UNIV. (July 7, 2015), http://www.cmu.edu/news/stories/ archives/2015/july/online-ads-research.html.


[xxvi] Id.

[xxvii] Id. at 33.

[xxviii]  Pub. L. No. 106-102, 113 Stat. 1338 (1999).

[xxix]  Joseph Turow et al., Contrary to What Marketers Say, Americans Reject Tailored Advertising and Three Activities that Enable It 20–21 (Sept. 29, 2009) (unpublished manuscript), available at http://ssrn.com/ paper=1478214.

[xxx]  JOSEPH TUROW, LAUREN FELDMAN & KIMBERLY MELTZER, OPEN TO EXPLOITATION: AMERICAN SHOPPERS ONLINE AND OFFLINE 3 (U. of Pa., Annenberg Pub. Pol'y Ctr. 2005), available at http://repository. upenn.edu/cgi/viewcontent.cgi?article=1035&context=asc_papers.

[xxxi] Doug Bonderud, Data Repurposing: The Underpinning of Predictive Analytics?, PREDICTIVE ANALYTICS TIMES (Nov. 26, 2013), http:// www.predictiveanalyticsworld.com/patimes/data-repurposing-the-underpinning-of-predictive-analytics/2722/.

[xxxii]  See, e.g., Michal Kosinski et al., Private Traits and Attributes Are Predictable From Digital Records of Human Behavior, 110 PROCEEDINGS OF THE NAT'L ACAD. OF SCIS. 5802 (2013), available at http://www. pnas.org/content/110/15/5802.full (finding that the combination of information from Facebook Likes, demographic profiles, and the results of psychometric tests allows researchers to accurately predict a male user's sexual orientation 88% of the time, a user's political party affiliation 85% of the time, and whether the user used alcohol, drugs, or cigarettes approximately 70% of the time).

[xxxiii]  Yves-Alexandre de Montjoye et al., Unique in the Crowd: The Privacy Bounds of Human Mobility, 3 SCI. REP. 1376 (2013); see also John Wihbey, Unique in the Crowd: The Privacy Bounds of Human Mobility, JOURNALIST'S RESOURCE (June 10, 2013), http://journalistsresource. org/studies/society/internet/unique-crowd-privacy-bounds-human-mobility, for a review of this report.

[xxxiv]  Montjoye, supra note 33, at 4.

[xxxv]  Kim Martineau, Location Data on Two Apps Enough to Identify Someone, Says Study, COLUM. UNIV. (Apr. 13, 2016), http://datascience. columbia.edu/location-data-two-apps-enough-identify-someone-says-study.

[xxxvi]  Id.

[xxxvii] See PAT CONROY ET AL., BUILDING CONSUMER TRUST: PROTECTING PERSONAL DATA IN THE CONSUMER PRODUCT INDUSTRY (Deloitte Univ. Press 2014), available at http://d27n205l7rookf.cloudfront.net/ wp-content/uploads/2014/11/DUP_970-Building-consumer-trust_ MASTER.pdf.

[xxxviii]  Id. at 11.

[xxxix]  Eighty percent of surveyed consumers report being more likely to purchase from consumer product companies that they believe protect their personal information. Id. at 6.

[xl]  Jeff John Roberts, The Competitive Advantages of Data Privacy, BLOOMBERG (July 29, 2013), http://www.bloomberg.com/news/ articles/2013-07-29/the-competitive-advantages-of-data-privacy.

[xli]  See,e.g., Rahul Telang, FBI versus Apple: Analyzing Data Privacy, CARNEGIE MELLON UNIV. (Feb. 26, 2016), http://www.heinz.cmu. edu/news/news-detail/index.aspx?nid=3836.

[xlii]  Roberts, supra note 42.

[xliii]  This article focuses on US government regulations to protect data privacy. However, it should be noted that regulations for data privacy and protection are undergoing reform around the world. See, e.g., European Commission Launches EU-U.S. Privacy Shield: Stronger Protection for Transatlantic Data Flows, EUROPEAN COMM'N (July 12, 2016), http://europa.eu/rapid/press-release_IP-16-2461_en.htm.

[xliv] The FTC is not the only watchdog for data privacy violations. Financial services and products are heavily regulated by the Consumer Financial Protection Bureau (CFPB). In March 2016, the CFPB brought its first data security enforcement action against an online payment processing company, alleging that the company had misrepresented its data security practices and contradicted its privacy policies. See Consent Order, In the Matter of Dwolla, Inc., File No. 2016-CFPB-0007 (Mar. 2, 2016), http://files.consumerfinance.gov/f/201603_ cfpb_consent-order-dwolla-inc.pdf; see also Paul Besozzi et al., CFPB – The Newest Cop on the Data Privacy Beat, LAW360 (Mar. 16, 2016), http://www.law360.com/articles/772011/cfpb-the-newest-cop-on-the-data-privacy-beat ("More than ever before, companies must understand that multiple agencies watch over data protection practices—including the FCC, FTC, U.S. Securities and Exchange Commission, state attorneys general and, now, the CFPB.").

[xlv]  15 U.S.C. § 45(a)(1).

[xlvi]  FTC, BIG DATA TOOL, supra note 25, at 21-22.

[xlvii]  Complaint, FTC v. CompuCredit Corp., No. 1:08-cv-1976-BBM-RGV (N.D. Ga. June 10, 2008), https://www.ftc.gov/sites/default/files/ documents/cases/2008/06/080610compucreditcmplt.pdf.

[xlviii]  Subprime Credit Card Marketer to Provide At Least $114 Million in Consumer Redress to Settle FTC Charges of Deceptive Conduct, FTC (Dec. 19, 2008), https://www.ftc.gov/news-events/press-releases/2008/12/subprime-credit-card-marketer-provide-least-114-million-consumer.

[xlix]  Complaint, In the Matter of Trendnet, Inc., FTC File No. 1223090, https://www.ftc.gov/sites/default/files/documents/ cases/2013/09/130903trendnetcmpt.pdf.

[l]  Marketer of Internet-Connected Home Security Video Cameras Settles FTC Charges It Failed to Protect Consumers' Privacy, FTC (Sept. 4, 2013), https://www.ftc.gov/news-events/press-releases/2013/09/ marketer-internet-connected-home-security-video-cameras-settles.

[li] FTC, BIG DATA TOOL, supra note 25, at 13-14.

[lii]  Consent Decree & Order for Civil Penalties, Injunction & Other Relief, United States v. Spokeo Inc., No. 2:12-cv-5001-MMM-SH (C.D. Cal. June 19, 2012), https://www.ftc.gov/sites/default/files/documents/ cases/2012/06/120612spokeoorder.pdf.

[liii]  15 U.S.C. §§ 6501-6502 (1998).

[liv]  FTC, INTERNET OF THINGS, supra note 1, at 53.

[lv]  Allison Grande, FTC Expands Child Data Protections in Mobile App Action, LAW360 (Jan. 6, 2016), www.law360.com/articles/743383.

[lvi]  16 C.F.R. § 312 (2013).

[lvii]  Complaint, United States v. Lai Sys., LLC, No. 2:15-cv-9691 (C.D. Cal. Dec. 17, 2015), https://www.ftc.gov/system/files/documents/ cases/151217laicmpt.pdf; Complaint, United States v. Retro Dreamer, No. 5:15-cv-2569 (C.D. Cal. Dec. 17, 2015), https://www.ftc.gov/ system/files/documents/cases/151217retrodreamercmpt.pdf. The FTC did not charge the third-party ad networks with COPPA violations because LAI Systems and Retro Dreamer did not tell the ad networks that their apps were directed at children. Third parties are responsible for COPPA violations only if they have "actual knowledge" that they are collecting personal information from children. Grande, supra note 55.

[lviii]  Stipulated Order for Permanent Injunction & Civil Penalty Judgment, United States v. Lai Sys., LLC, No. 2:15-cv-9691 (C.D. Cal. Dec. 17, 2015), https://www.ftc.gov/system/files/documents/cases/151217laistip. pdf; Stipulated Order for Permanent Injunction & Civil Penalty Judgment, United States v. Retro Dreamer, No. 5:15-cv-2569 (C.D. Cal. Dec. 17, 2015), https://www.ftc.gov/system/files/documents/ cases/151217retrodreamerstip.pdf.

[lix]  Class Action Complaint, Archer-Hayes v. Toytalk, Inc., No. 2:16-cv-02111-JAK-PLA (C.D. Cal. Dec. 7, 2015).

[lx]  FTC, INTERNET OF THINGS, supra note 1, at 48-49.

[lxi]  Id. at 55-56.

[lxii]  Id. at 56-57.

[lxiii]  Id. at 55.

[lxiv]  Id. at 55-58.


The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

To print this article, all you need is to be registered on Mondaq.com.

Click to Login as an existing user or Register so you can print this article.

Similar Articles
Relevancy Powered by MondaqAI
In association with
Related Topics
Similar Articles
Relevancy Powered by MondaqAI
Related Articles
Up-coming Events Search
Font Size:
Mondaq on Twitter
Register for Access and our Free Biweekly Alert for
This service is completely free. Access 250,000 archived articles from 100+ countries and get a personalised email twice a week covering developments (and yes, our lawyers like to think you’ve read our Disclaimer).
Email Address
Company Name
Confirm Password
Mondaq Topics -- Select your Interests
 Law Performance
 Law Practice
 Media & IT
 Real Estate
 Wealth Mgt
Asia Pacific
European Union
Latin America
Middle East
United States
Worldwide Updates
Registration (you must scroll down to set your data preferences)

Mondaq Ltd requires you to register and provide information that personally identifies you, including your content preferences, for three primary purposes (full details of Mondaq’s use of your personal data can be found in our Privacy and Cookies Notice):

  • To allow you to personalize the Mondaq websites you are visiting to show content ("Content") relevant to your interests.
  • To enable features such as password reminder, news alerts, email a colleague, and linking from Mondaq (and its affiliate sites) to your website.
  • To produce demographic feedback for our content providers ("Contributors") who contribute Content for free for your use.

Mondaq hopes that our registered users will support us in maintaining our free to view business model by consenting to our use of your personal data as described below.

Mondaq has a "free to view" business model. Our services are paid for by Contributors in exchange for Mondaq providing them with access to information about who accesses their content. Once personal data is transferred to our Contributors they become a data controller of this personal data. They use it to measure the response that their articles are receiving, as a form of market research. They may also use it to provide Mondaq users with information about their products and services.

Details of each Contributor to which your personal data will be transferred is clearly stated within the Content that you access. For full details of how this Contributor will use your personal data, you should review the Contributor’s own Privacy Notice.

Please indicate your preference below:

Yes, I am happy to support Mondaq in maintaining its free to view business model by agreeing to allow Mondaq to share my personal data with Contributors whose Content I access
No, I do not want Mondaq to share my personal data with Contributors

Also please let us know whether you are happy to receive communications promoting products and services offered by Mondaq:

Yes, I am happy to received promotional communications from Mondaq
No, please do not send me promotional communications from Mondaq
Terms & Conditions

Mondaq.com (the Website) is owned and managed by Mondaq Ltd (Mondaq). Mondaq grants you a non-exclusive, revocable licence to access the Website and associated services, such as the Mondaq News Alerts (Services), subject to and in consideration of your compliance with the following terms and conditions of use (Terms). Your use of the Website and/or Services constitutes your agreement to the Terms. Mondaq may terminate your use of the Website and Services if you are in breach of these Terms or if Mondaq decides to terminate the licence granted hereunder for any reason whatsoever.

Use of www.mondaq.com

To Use Mondaq.com you must be: eighteen (18) years old or over; legally capable of entering into binding contracts; and not in any way prohibited by the applicable law to enter into these Terms in the jurisdiction which you are currently located.

You may use the Website as an unregistered user, however, you are required to register as a user if you wish to read the full text of the Content or to receive the Services.

You may not modify, publish, transmit, transfer or sell, reproduce, create derivative works from, distribute, perform, link, display, or in any way exploit any of the Content, in whole or in part, except as expressly permitted in these Terms or with the prior written consent of Mondaq. You may not use electronic or other means to extract details or information from the Content. Nor shall you extract information about users or Contributors in order to offer them any services or products.

In your use of the Website and/or Services you shall: comply with all applicable laws, regulations, directives and legislations which apply to your Use of the Website and/or Services in whatever country you are physically located including without limitation any and all consumer law, export control laws and regulations; provide to us true, correct and accurate information and promptly inform us in the event that any information that you have provided to us changes or becomes inaccurate; notify Mondaq immediately of any circumstances where you have reason to believe that any Intellectual Property Rights or any other rights of any third party may have been infringed; co-operate with reasonable security or other checks or requests for information made by Mondaq from time to time; and at all times be fully liable for the breach of any of these Terms by a third party using your login details to access the Website and/or Services

however, you shall not: do anything likely to impair, interfere with or damage or cause harm or distress to any persons, or the network; do anything that will infringe any Intellectual Property Rights or other rights of Mondaq or any third party; or use the Website, Services and/or Content otherwise than in accordance with these Terms; use any trade marks or service marks of Mondaq or the Contributors, or do anything which may be seen to take unfair advantage of the reputation and goodwill of Mondaq or the Contributors, or the Website, Services and/or Content.

Mondaq reserves the right, in its sole discretion, to take any action that it deems necessary and appropriate in the event it considers that there is a breach or threatened breach of the Terms.

Mondaq’s Rights and Obligations

Unless otherwise expressly set out to the contrary, nothing in these Terms shall serve to transfer from Mondaq to you, any Intellectual Property Rights owned by and/or licensed to Mondaq and all rights, title and interest in and to such Intellectual Property Rights will remain exclusively with Mondaq and/or its licensors.

Mondaq shall use its reasonable endeavours to make the Website and Services available to you at all times, but we cannot guarantee an uninterrupted and fault free service.

Mondaq reserves the right to make changes to the services and/or the Website or part thereof, from time to time, and we may add, remove, modify and/or vary any elements of features and functionalities of the Website or the services.

Mondaq also reserves the right from time to time to monitor your Use of the Website and/or services.


The Content is general information only. It is not intended to constitute legal advice or seek to be the complete and comprehensive statement of the law, nor is it intended to address your specific requirements or provide advice on which reliance should be placed. Mondaq and/or its Contributors and other suppliers make no representations about the suitability of the information contained in the Content for any purpose. All Content provided "as is" without warranty of any kind. Mondaq and/or its Contributors and other suppliers hereby exclude and disclaim all representations, warranties or guarantees with regard to the Content, including all implied warranties and conditions of merchantability, fitness for a particular purpose, title and non-infringement. To the maximum extent permitted by law, Mondaq expressly excludes all representations, warranties, obligations, and liabilities arising out of or in connection with all Content. In no event shall Mondaq and/or its respective suppliers be liable for any special, indirect or consequential damages or any damages whatsoever resulting from loss of use, data or profits, whether in an action of contract, negligence or other tortious action, arising out of or in connection with the use of the Content or performance of Mondaq’s Services.


Mondaq may alter or amend these Terms by amending them on the Website. By continuing to Use the Services and/or the Website after such amendment, you will be deemed to have accepted any amendment to these Terms.

These Terms shall be governed by and construed in accordance with the laws of England and Wales and you irrevocably submit to the exclusive jurisdiction of the courts of England and Wales to settle any dispute which may arise out of or in connection with these Terms. If you live outside the United Kingdom, English law shall apply only to the extent that English law shall not deprive you of any legal protection accorded in accordance with the law of the place where you are habitually resident ("Local Law"). In the event English law deprives you of any legal protection which is accorded to you under Local Law, then these terms shall be governed by Local Law and any dispute or claim arising out of or in connection with these Terms shall be subject to the non-exclusive jurisdiction of the courts where you are habitually resident.

You may print and keep a copy of these Terms, which form the entire agreement between you and Mondaq and supersede any other communications or advertising in respect of the Service and/or the Website.

No delay in exercising or non-exercise by you and/or Mondaq of any of its rights under or in connection with these Terms shall operate as a waiver or release of each of your or Mondaq’s right. Rather, any such waiver or release must be specifically granted in writing signed by the party granting it.

If any part of these Terms is held unenforceable, that part shall be enforced to the maximum extent permissible so as to give effect to the intent of the parties, and the Terms shall continue in full force and effect.

Mondaq shall not incur any liability to you on account of any loss or damage resulting from any delay or failure to perform all or any part of these Terms if such delay or failure is caused, in whole or in part, by events, occurrences, or causes beyond the control of Mondaq. Such events, occurrences or causes will include, without limitation, acts of God, strikes, lockouts, server and network failure, riots, acts of war, earthquakes, fire and explosions.

By clicking Register you state you have read and agree to our Terms and Conditions