Privacy Tools Guide

When a company mishandles your personal data or suffers a breach that exposes your information, the Federal Trade Commission (FTC) provides a formal complaint mechanism. This guide walks through the process of filing an FTC complaint specifically targeting privacy violations and data breaches, with practical steps tailored for developers and power users who understand the technical nuances of data exposure.

Understanding FTC Jurisdiction Over Data Breaches

The FTC enforces Section 5 of the FTC Act, which prohibits unfair and deceptive trade practices. This extends to companies that fail to protect consumer data or misrepresent their security practices. While the FTC does not pursue individual disputes, it uses complaints to identify patterns of behavior that indicate broader violations.

Before filing, determine whether your situation falls under FTC jurisdiction:

Documenting the Violation

Thorough documentation strengthens any complaint. As a developer or power user, you have tools at your disposal to gather evidence systematically.

Collecting Technical Evidence

If you have technical background, collect the following:

# Capture screenshots of breach notifications
# Document the timeline of events
# Note any communications from the company

# Example: Log the breach notification email headers
echo "Received: from company.com (209.85.220.41)" > breach-notes.md
echo "Date: $(date)" >> breach-notes.md
echo "Subject: Important Security Notice" >> breach-notes.md

# Document the company's response to your inquiry
curl -X POST https://api.company.com/support/ticket \
  -H "Content-Type: application/json" \
  -d '{"subject":"Data Breach Inquiry","description":"Requesting details about the recent security incident"}' \
  -v 2>&1 | tee company-response.log

Save all communications, including:

Recording Impact on Your Data

Create a detailed inventory of exposed information:

# Example Python script to document exposed data points
breach_impact = {
    "personal_info": {
        "email": True,
        "password_hash": True,  # if salted/hash method known
        "phone_number": False,
        "social_security_number": False
    },
    "financial_data": {
        "credit_card_last4": False,
        "bank_account": False
    },
    "account_details": {
        "username": True,
        "account_creation_date": "2023-01-15",
        "last_login": "2025-11-20"
    }
}

import json
print(json.dumps(breach_impact, indent=2))

This documentation becomes critical if the FTC pursues action or if you pursue separate legal remedies.

Filing the FTC Complaint

Step 1: Access the Complaint Portal

Navigate to the FTC’s complaint assistant at ftc.gov/complaint. Select “Privacy & Identity” as the category, then choose “Data Breach” or “Impersonation/Identity Theft” depending on your situation.

Step 2: Complete the Complaint Form

Provide factual information without speculation:

Step 3: Submit Additional Evidence

The FTC accepts attachments. Submit:

What Happens After Filing

After submission, the FTC provides a confirmation number. Key points to understand:

  1. No direct response: The FTC typically does not respond to individual complainants
  2. Pattern identification: Your complaint contributes to potential investigations
  3. Follow-up options: You may receive surveys about your experience
  4. State-level options: Consider filing with your state attorney general simultaneously

Complementary Actions for Developers

Beyond the FTC complaint, developers and power users should consider these additional steps:

Report to Security Databases

# Submit to Have I Been Pwned (if breach is known)
# Check if your email appears in known breaches
curl -H "hibp-api-key: your-api-key" \
  https://haveibeenpwned.com/api/v3/breach/CompanyName

Notify Credit Bureaus (If SSN Exposed)

If Social Security numbers were exposed:

Document for Potential Litigation

Keep all evidence in a secure location. While the FTC does not provide individual compensation, your documentation supports:

Prevention and Monitoring Tools

After experiencing a breach, implement monitoring:

# Example: Set up Have I Been Pwned monitoring in a cron job
# Add to crontab for weekly checks
0 9 * * 1 curl -s "https://haveibeenpwned.com/api/v3/breachedaccount/your@email.com" \
  -H "hibp-api-key: YOUR_API_KEY" | jq '.[] | .Name' >> ~/breach-monitor.log

Use services like:

State-Level Alternatives

The FTC is not your only option. Many states have stronger privacy laws:

State Agency Website
California CA Attorney General oag.ca.gov/contact/consumer-complaint-against-business
New York NY Attorney General ag.ny.gov/internet/privacy
Texas TX Attorney General texasattorneygeneral.gov

These agencies often provide more responsive handling of individual complaints and may pursue enforcement actions under state privacy laws.

Building a Breach Documentation Package

Professional documentation increases the likelihood that authorities take action:

# breach_documentation.py - Organize breach evidence systematically

import json
from datetime import datetime
from pathlib import Path

class BreachDocumentation:
    def __init__(self, breach_name):
        self.name = breach_name
        self.documentation = {
            'breach_name': breach_name,
            'discovery_date': datetime.now().isoformat(),
            'notification_timeline': [],
            'affected_data': [],
            'evidence_files': [],
            'impact_assessment': {},
            'communications': []
        }

    def add_notification(self, date, source, content):
        """Log breach notification details"""
        self.documentation['notification_timeline'].append({
            'date': date,
            'source': source,
            'summary': content[:500],  # First 500 chars
            'full_text': content
        })

    def add_affected_data(self, data_type, count=None, description=''):
        """Document what data was exposed"""
        self.documentation['affected_data'].append({
            'type': data_type,
            'estimated_count': count,
            'description': description
        })

    def add_evidence_file(self, file_path, description):
        """Reference evidence documents"""
        path = Path(file_path)
        if path.exists():
            self.documentation['evidence_files'].append({
                'filename': path.name,
                'type': path.suffix,
                'size_bytes': path.stat().st_size,
                'hash': self.file_hash(path),
                'description': description
            })

    def file_hash(self, file_path):
        """Generate SHA256 hash for file integrity"""
        import hashlib
        sha256_hash = hashlib.sha256()
        with open(file_path, "rb") as f:
            for byte_block in iter(lambda: f.read(4096), b""):
                sha256_hash.update(byte_block)
        return sha256_hash.hexdigest()

    def add_impact_assessment(self, category, impact):
        """Document financial/personal impact"""
        self.documentation['impact_assessment'][category] = impact

    def export_for_ftc(self, output_file='breach_documentation.json'):
        """Generate JSON for FTC submission"""
        with open(output_file, 'w') as f:
            json.dump(self.documentation, f, indent=2)
        return output_file

# Usage
breach = BreachDocumentation("ExampleCorp Data Breach 2026")
breach.add_notification(
    "2026-03-15",
    "ExampleCorp Security Team",
    "We discovered unauthorized access to customer accounts..."
)
breach.add_affected_data("email_address", count=500000, description="Primary contact email")
breach.add_affected_data("password_hash", count=500000, description="bcrypt hashed (hopefully)")
breach.add_evidence_file("breach-notification.pdf", "Official notification email")
breach.add_impact_assessment("financial", "Spent $500 on credit monitoring")
breach.add_impact_assessment("psychological", "Concern about identity theft")
breach.export_for_ftc()

Timing Your Complaint

Strategic timing affects government responsiveness:

# Check for pattern of breaches at company
curl -s "https://www.hackingvector.com/api/breaches?company=ExampleCorp" | jq

# If multiple breaches in short period, emphasize pattern in complaint
# FTC weights patterns more heavily than isolated incidents

# File complaint within 1 year for best legal standing
# Some statutes of limitation are 2-3 years, but fresher complaints get priority

# Consider filing during regulatory scrutiny period
# If company is already under FTC investigation, mention this

# Submit during business hours (Mon-Fri 9am-5pm EST preferred)
# Increases likelihood of immediate human review

Post-Filing Actions

The FTC complaint is step one in a larger process:

Document All Follow-Up

Post-Filing Checklist:
  Immediate (Within 24 hours):
    - Save confirmation number and timestamp
    - Screenshot entire complaint submission
    - Email yourself confirmation
    - Create backup of all evidence files

  Week 1:
    - Check if complaint appears in FTC database
    - File with state attorney general (if applicable)
    - Document with local law enforcement (if local jurisdiction)

  Month 1:
    - Monitor FTC's public enforcement actions
    - Search for related complaints against same company
    - Join class action if discovered

  Ongoing:
    - Track company's security improvements
    - Monitor for recurrence of same vulnerability
    - Document if company repeats negligent behavior

Advanced: CFAA (Computer Fraud and Abuse Act) Angle

For sophisticated breaches involving system compromise:

# Check if breach involved unauthorized computer access (CFAA violation)
# This is federal crime with different reporting channel

# Evidence of CFAA violation:
# - Attacker gained unauthorized access
# - Data was exfiltrated without authorization
# - System integrity was compromised
# - Company failed to detect/report promptly

# Report CFAA violations to:
# 1. FBI Cyber Division: tips.fbi.gov
# 2. Secret Service (if financial data): FinCEN
# 3. Local FBI field office for jurisdiction-specific crimes

using Class Actions

If breach was large, class actions may already exist:

# Search class action databases
curl -s "https://www.classactioncentralasia.org/search?company=ExampleCorp&breach=2026"

# Register affected accounts
# Most class actions maintain claim registries
# Submit evidence of membership in affected group (account email, screenshots)

# Even if you don't receive direct compensation,
# class settlements fund:
# - Identity monitoring (often worth $100-500/year)
# - Data security improvements
# - Future prevention measures

# Document your participation for tax purposes (potentially deductible as casualty loss)

Prevention and Monitoring After Filing

Protect yourself post-breach:

# Set up breach monitoring
# 1. Have I Been Pwned alerts
# 2. Credit freeze/monitoring
# 3. Google Alerts for your name
# 4. Regular credit report checks (annualcreditreport.com)

# Create timeline for monitoring
0 9 * * 1  /usr/local/bin/check-breach-status.sh  # Weekly Monday check
0 9 * * 1  /usr/local/bin/check-credit-report.sh  # Monthly check

# Document all monitoring activities for future litigation

Built by theluckystrike — More at zovo.one