FTC’s Proposed Settlement with Blackbaud Requires Data Deletion and Data Governance

February 6, 2024

Reading Time : 4 min

On February 1, 2024, the Federal Trade Commission (FTC) announced that it had reached a proposed settlement with that would require Blackbaud Inc. (“Blackbaud”) to delete personal data it does not need to retain and upgrade its data security practices to resolve the FTC’s complaint against Blackbaud stemming from a 2020 ransomware attack. Notably, per the press release from Blackbaud, the proposed settlement does not include a fine and Blackbaud neither “admitted nor denied any of the allegations made by the FTC.”1

Specifically, Blackbaud, a technology provider that provides data services and financial, fundraising and administrative software services to companies, nonprofits, health care organizations and others, experienced a ransomware attack in 2020, where hackers used customer credentials to gain access to Blackbaud’s network. According to the FTC’s complaint, the hackers went undetected for three months as they created new administrator accounts and exfiltrated personal data from millions of consumers, including names, birthdates, addresses, Social Security numbers and bank account numbers. The FTC alleged that Blackbaud failed to implement “appropriate safeguards to secure and protect the vast amounts of personal data it maintains as part of the services it provides to its clients.” As a result of its deficiencies, which the FTC notes include failure to segment data and delete data that is no longer needed, hackers were able to infiltrate one of Blackbaud’s customer databases and then move through Blackbaud-hosted environments.  

We have detailed notable requirements from the parties’ proposed settlement (Order) below.

Data Deletion:  

Under the terms of the Order, Blackbaud has 90 days to complete the following data governance tasks:

  • Delete files containing covered information2 not required for providing services unless the consumer requests otherwise.3
  • Create a publicly available data retention schedule on its website establishing: (1) the purpose covered information is maintained; (2) the specific business needs for maintaining the covered information; and (3) the timeframe for deletion, precluding indefinite retention.4
  • Provide a written statement to the FTC describing its retention schedule.5

Other Data Governance Requirements:

In addition to the data deletion requirements, the Order also stipulates that Blackbaud must, among other things, implement an information security program, comply with set data retention limits, have their security program assessed and provide the FTC with an annual certification.  

Information Security Program. In addition to deleting data, Blackbaud must implement and maintain a written information security program within 90 days. Such program must include:

  • Providing the information security program along with any updates or evaluations to the responsible senior officer and board of directors (or equivalent governing body) at least annually, and never more than 30 days after a covered incident occurs.6
  • Designating a qualified employee or employees to coordinate the program.
  • Documenting internal and external risks to the security, confidentiality or integrity of covered information at least annually.
  • Designing safeguards based on the volume and sensitivity of the covered information to control for internal and external risks with features like multi-factor authentication, access control measures and encryption of sensitive information.
  • Testing safeguards, including vulnerability scanning and penetration testing, at least annually and not more than 30 days after a covered incident.
  • Selecting service providers capable of safeguarding covered information and contractually requiring them to implement and maintain safeguards.7

Data Retention Limits. Blackbaud must refrain from retaining covered information not necessary for the purposes for which it is stored, and must not misrepresent: (1) the extent of use, deletion or disclosure of covered information; (2) the extent to which privacy, security, availability, confidentiality or integrity of covered information is protected; or (3) the extent of any covered incident or unauthorized disclosure, misuse, loss, theft, alteration, destruction or other compromise of covered information.8

Third Party Assessment. The Order also stipulates that Blackbaud must obtain a biennial assessment of its information security program from a qualified third party, annually certify compliance of the Order through the company’s Chief Information Security Officer (CISO) and report any covered incident triggering notification to a federal, state or local entity within 10 days of the notification.9

Annual Certification. One year after the issuance date of the Order and each year thereafter, Blackbaud must provide the FTC with a certification from its Chief Information Security Officer that: (1) Blackbaud has established, implemented and maintained the requirements of this Order; (2) Blackbaud is not aware of any material noncompliance that has not been (a) corrected or (b) disclosed to the FTC; and (3) includes a brief description of all “covered incidents" during the certified period.10

Covered Incident Reporting. Blackbaud must report covered incidents to the FTC within 10 days of any notification to a federal, state or local entity. The report must include certain details such as the date of the incident, description of the facts, the information affected, the number of individuals affected and remediation measures taken.11

The terms of the Order will terminate 20 years from the date of its issuance, barring allegations of violation.

Please contact a member of Akin’s cybersecurity, privacy & data protection team to learn more about this enforcement or how it may affect your company.


1Per statement made by Blackbaud, “Blackbaud Reaches Agreement with the Federal Trade Commission Related to 2020 Security Incident” https://www.blackbaud.com/newsroom/article/blackbaud-reaches-agreement-with-the-federal-trade-commission-related-to-2020-security-incident (Feb. 2, 2024)

2 The FTC specified “covered information” to include: “means information from or about an individual consumer stored by Respondent’s customers within Respondent’s product databases including: (a) a first and last name: (b) a home or physical address; (c) an email address or other online contact information, such as an instant messaging user identifier or a screen name; (d) a mobile or other telephone number; (e) a driver’s license or other government-issued identification number; (f) date of birth; or (g) bank account, credit card, or debit card information.”

3  Decision and Order, In the Matter of Blackbaud Inc., FTC No. 2023181 (February 1, 2024) hereinafter “Order.”

4 Id. at 7.

5 Id.

6 A “covered incident” refers to "any incident that results in Respondent notifying, pursuant to a statutory or regulatory requirement, any U.S. federal, state, or local government entity that information of or about an individual consumer was, or is reasonably believed to have been, accessed, acquired, or publicly exposed without authorization.” Id. at 5.

7 Id. at 7-10.

8 Id. at 6.

9 Id. at 11-14.

10 Id. at 13.

11 Id. at 14.

Share This Insight

Previous Entries

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

Data Dive

September 17, 2024

Following the publication of the European Union’s Artificial Intelligence Act (AI Act or Act) on 12 July 2024, there are now a series of steps that various EU bodies need to take towards implementation. One of the first key steps is in relation to the establishment of codes of practice to “contribute to the proper application” of the AI Act.

...

Read More

Data Dive

August 6, 2024

On July 30, 2024, the Senate passed the Kids Online Safety and Privacy Act (S. 2073) via an overwhelmingly bipartisan vote of 91-3 shortly before departing for the August recess.

...

Read More

Data Dive

July 18, 2024

On 12 July 2024, the European Union Artificial Intelligence Act (AI Act or Act) was published in the Official Journal of the European Union (EU), marking the final step in the AI Act’s legislative journey. Its publication triggers the timeline for the entry into force of the myriad obligations under the AI Act, along with the deadlines we set out below. The requirement to ensure a sufficient level of AI literacy of staff dealing with the operation and use of AI systems will, for example, apply to all providers and deployers on 2 February 2025.

...

Read More

Data Dive

July 18, 2024

On June 18, 2024, the United States Securities and Exchange Commission (SEC) announced a settlement with R.R. Donnelley & Sons Company (RRD) for alleged internal control and disclosure failures following a ransomware attack in 2021. Without admitting or denying the SEC’s findings, the business communications and marketing services provider agreed to pay a civil penalty of over $2.1 million to settle charges alleging violations of Section 13(b)(2)(B) of the Securities Exchange Act of 1934 (Exchange Act) and Exchange Act Rule 13a-15(a).1

...

Read More

Data Dive

June 11, 2024

In May, the National Institute of Standards and Technology (NIST) issued updated recommendations for security controls for controlled unclassified information (CUI) that is processed, stored or transmitted by nonfederal organizations using nonfederal systems, (NIST Special Publication 800-171 (SP 800-171), Revision 3). These security requirements are “intended for use by federal agencies in contractual vehicles or other agreements that are established between those agencies and nonfederal organizations.”1 While these new controls are only applicable to nonfederal entities that agree to comply with the new issuance, Revision 3 signals the next phase of expected security for government contractors.

...

Read More

© 2024 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.