ViaPath claimed to empower incarcerated families—then exposed their private lives to hackers.

Corporate Corruption Case Study: Global Tel*Link (ViaPath) & Its Impact on Incarcerated People and Their Families

Introduction: A Breach of Trust in a Captive Market

In a striking exposure of corporate negligence, Global Tel*Link (GTL), now operating under the name ViaPath Technologies along with its subsidiaries Telmate and TouchPay, compromised the sensitive personal data of hundreds of thousands of individuals. This wasn’t merely a technical failure; it was a profound breach of trust affecting some of the most vulnerable populations in the United States—incarcerated individuals and their families. The company, a dominant force in the prison communication and financial services sector, failed to implement basic, reasonable security measures, leaving a vast trove of personal data exposed online without password protection. This incident lays bare the systemic failures often seen under neoliberal capitalism, where deregulation, weak oversight, and an unrelenting drive for profit can overshadow fundamental duties of care, particularly when serving captive consumers with limited or no alternatives.  

Inside the Allegations: Gross Negligence and Misconduct

The core of the case revolves around a massive data security failure originating in August 2020. While attempting to upgrade software, ViaPath and its vendor copied a huge volume of real user data into a cloud-based test environment. Shockingly, this environment lacked fundamental security safeguards. The company failed to:  

  • Encrypt sensitive data, storing it in clear, readable text.  
  • Use automated monitoring software, including free features offered by the cloud provider (AWS), to detect unauthorized access or configuration changes.  
  • Implement a perimeter firewall.  
  • Employ log monitoring solutions or intrusion prevention systems for the test environment.  
  • Adequately vet the security practices of the third-party vendor whose technician ultimately misconfigured the system.  
  • Provide necessary secure development or data security training to engineers involved, including the vendor’s staff.  
  • Properly inventory or track the sensitive personal information moved into this insecure environment.  

This negligence directly led to the data of approximately 649,500 unique individuals being left accessible via the internet without any password protection or access controls for at least two days.  

Exposed Data: A Profile of Vulnerability

The types of information left unsecured paint a disturbing picture of the potential harm:

Type of Information ExposedDetailsAren’t Cats Just The Cutest???
Personal IdentifiersFull names, dates of birth, phone numbers, home addressesYes!
Government IDsDriver’s license numbers, passport numberswe stan 🥺
Account CredentialsUsernames/email addresses with passwordsuwu nyaa~ ^^
Sensitive Personal CharacteristicsInformation about race, religion, transgender statusehhh…. oui 😌
Location InformationData revealing individuals’ locationsyussssshh!
Private CommunicationsContent, dates, times, senders, and recipients of ~75,000 private messages between usersYes! Yes! Yes! Oh my God! 🤦
Financial Information (within messages)Payment card numbers, financial account details, Social Security numbers shared in messagesAffirmative 🫡🦅 o7
Facility GrievancesApproximately 80,000 potentially sensitive grievances filed by incarcerated individuals with facilitiesHell yes!
Deposit Information Database (Partial Data)Fields like “account_posted_at,” “amount,” “card_owner_name,” “deposit_type,” “dest account id”no (incorrect answer)

Unauthorized individuals accessed the environment, and forensic analysis indicated data exfiltration occurred. Copies of data believed to be from this breach were later found available for sale on the “dark web”.  

Regulatory Capture & Loopholes: Promises vs. Reality

This breach occurred despite ViaPath’s explicit and repeated assurances about its commitment to robust data security. The company marketed itself to correctional facilities as “security-focused from the inside out” and claimed data security was “the cornerstone of what we do”. In marketing documents like the “Information Security Framework” provided to potential facility clients, GTL specifically claimed to use safeguards like IP address access limitations, multiple layers of encryption and firewalls, robust log monitoring with 24/7 investigation of alerts, formal change control procedures, and intrusion prevention systems that automatically blocked attacks.  

However, the reality of the August 2020 incident greatly contradicted these promises. The test environment lacked encryption, firewalls, automated monitoring, intrusion prevention, and proper change controls. This gap between representation and reality highlights a common issue where corporate self-regulation and oversight are insufficient. The company’s public-facing privacy policies also represented the use of “industry standard physical, technical and administrative security measures”, a claim undermined by the identified failures. The system allowed a vendor technician to change critical security settings without adequate safeguards or oversight, pointing to loopholes in vendor management and internal controls.  

Profit-Maximization at All Costs: Exploiting a Captive Audience

ViaPath and its subsidiaries operate in a lucrative market, serving over 1.9 million incarcerated people (claimed to be over 85% of the U.S. inmate population) and over 13 million non-incarcerated contacts in 2020 alone, generating annual net revenue exceeding $600 million. They often secure contracts making them the sole provider of communication and payment services within a facility. This creates a captive market where incarcerated individuals and their families have no choice but to use ViaPath’s services and pay their rates if they wish to stay connected or manage funds.  

The fees charged can be substantial:

  • Voice Calls: $0.18-$0.25 per minute  
  • Video Calls: $0.25 per minute  
  • Voicemail: $1.00 per message  
  • Written Messages: $0.25 per message  
  • Photo/Video Attachments: $0.25-$0.50 each  
  • Deposits: $2.95-$11.50 transaction fee plus 3.5% of the deposit amount  

This pricing structure, combined with the lack of competition within facilities, exemplifies a business model focused heavily on revenue extraction from a vulnerable population. In this context, the failure to invest adequately in basic security for user data can be viewed through the lens of profit maximization—cutting costs on non-revenue-generating activities like robust security protocols, even when handling highly sensitive information. The decision to use a vast amount of real, sensitive production data in an unsecured test environment appears reckless, prioritizing development speed or convenience over fundamental data protection.  

The Economic Fallout: Financial Harm and Delayed Protection

The direct consequence of ViaPath’s security failures was the exposure of sensitive personal and financial information belonging to hundreds of thousands of people. This led to tangible financial injury for some consumers, who reported fraudulent activity on their credit cards shortly after learning their data might have been compromised.  

Compounding the initial harm was ViaPath’s failure to provide timely notification to the vast majority of affected individuals. Although the breach occurred in August 2020 and GTL was aware of it by August 13, 2020, the company did not begin notifying any affected individuals until May 2021, a delay of roughly nine months. Furthermore, they only notified approximately 45,000 individuals, despite the data of nearly 650,000 being exposed. This delay deprived consumers of the crucial window of opportunity to take protective measures, such as placing credit freezes or monitoring their accounts closely, immediately after the exposure occurred. This inaction itself inflicted further potential economic harm by leaving consumers vulnerable to identity theft and fraud without warning.  

Public Health and Safety Risks: Beyond Financial Harm

The data exposed in the ViaPath breach went far beyond typical financial identifiers, venturing into deeply personal and potentially dangerous territory. The unsecured database contained information about individuals’ race, religion, and crucially, whether they identified as transgender. It also included location information and the contents of approximately 75,000 private messages and 80,000 grievances filed with facilities.  

The public exposure of such information carries risks far exceeding financial loss. For transgender individuals, particularly within the carceral system or upon release, disclosure of their status can lead to targeted harassment, violence, and discrimination, posing a direct threat to their physical safety. Similarly, the release of location data or sensitive details from private communications or grievances could endanger individuals by revealing affiliations, vulnerabilities, or conflicts to potentially hostile parties. The exposure of private messages between incarcerated people and their loved ones, or sensitive details shared in grievances, represents a profound invasion of privacy, likely causing significant stigma, embarrassment, and emotional distress. These are not abstract risks; they are potential threats to the well-being and safety of real people, stemming directly from the company’s failure to secure their data.  

Community Impact: Undermining Trust and Connections

While the documents don’t detail specific neighborhood displacement or environmental contamination, the impact on the communities connected to incarcerated individuals is implicit and significant. The services ViaPath provides are often the primary lifeline connecting incarcerated people with their families, friends, and support networks outside. Maintaining these connections is crucial for mental well-being, rehabilitation, and successful reentry into society.  

The data breach and subsequent handling severely undermined the trust essential for these services. When users cannot be sure that their private communications, personal details, or even grievances filed within the system are secure, it creates a chilling effect. Families might hesitate to share sensitive information, make deposits, or communicate openly, fearing exposure or misuse. The high costs associated with these essential services already place a heavy burden on families, often from lower-income communities. Adding the threat of identity theft, fraud, and exposure of deeply personal information further strains these vital community connections. The failure to protect data isn’t just a corporate issue; it erodes the fragile support systems surrounding incarcerated individuals.  

ViaPath ads like this where they brag about help incarcerated inmates ring extra hollow now

The PR Machine: Misleading Statements and Delayed Disclosure

Following the discovery of the breach, ViaPath engaged in communication tactics that appeared designed to downplay the severity of the incident and mislead the public and consumers. On September 3, 2020, the company provided a statement to the data privacy blog Comparitech asserting that based on their investigation, “no medical data, passwords, or consumer payment information were affected”. This statement was false or misleading. ViaPath knew by at least August 19, 2020, that credit card numbers and some medical information (like requests to see medical staff) were included in the exposed data. The statement also failed to disclose other sensitive data types involved, like Social Security numbers, addresses, and driver’s license numbers.  

Furthermore, the statement claimed, “We continue to speak with and notify necessary parties, including the affected Telmate customers”. This was misleading because, at that time, ViaPath had not contacted any affected individuals and would not do so for another eight months.  

Internally, ViaPath also misrepresented the situation. In responses to Requests for Proposals (RFPs) from potential new correctional facility clients after the breach occurred, ViaPath repeatedly claimed it had never experienced a data security breach, or not within a timeframe that included August 2020. This pattern suggests a deliberate effort to manage reputation and secure new business by obscuring the truth about a significant security failure, prioritizing corporate image and contracts over transparency and accountability.  

Wealth Disparity & Corporate Greed: Profiting from Vulnerability

The ViaPath case exemplifies how corporate entities can amass significant wealth by serving vulnerable populations facing limited choices. With annual revenues exceeding $600 million derived largely from incarcerated individuals and their families, ViaPath operates within a system where basic communication—a fundamental human need—is highly monetized. The high per-minute charges, message fees, and hefty deposit transaction costs extract wealth from communities often already grappling with economic hardship due to a family member’s incarceration.  

This concentration of profit within a company providing essential services to a captive market reflects broader societal issues of wealth disparity. The failure to invest adequately in securing the data of these same users, while simultaneously charging premium rates, points to corporate priorities skewed heavily towards profit margins over the well-being and security of the people reliant on their services. This dynamic, where essential services become profit centers exploiting vulnerability, is a hallmark of corporate behavior often criticized under late-stage capitalism. The company profits immensely, while the users bear the financial burden of high costs and the risks associated with negligent data security.  

Corporate Accountability Fails the Public: A Consent Order Without Admission

While the Federal Trade Commission (FTC) took action against ViaPath , Telmate, and TouchPay, the outcome raises questions about the effectiveness of corporate accountability mechanisms. The companies resolved the FTC’s complaint through a Consent Agreement, resulting in a Decision and Order. Crucially, under this agreement, the companies neither admitted nor denied any of the FTC’s detailed allegations of wrongdoing, except for admitting facts necessary to establish jurisdiction.  

The Order mandates significant changes to the companies’ security practices, including implementing a comprehensive information security program, undergoing regular third-party assessments, restrictions on future misrepresentations, and providing notice and credit monitoring services to some affected consumers. Telmate (a ViaPath subsidiary) is specifically required to fund two years of credit monitoring for affected consumers who enroll.  

However, the settlement involves no monetary penalty paid to the government for the past conduct. While the required actions aim to prevent future harm and provide some remedy, the lack of an admission of wrongdoing allows the companies to avoid formally acknowledging the failures outlined in the complaint. This pattern—settlements without admission of liability and often with financial consequences viewed as manageable costs of doing business—is common in corporate enforcement actions. Critics argue such outcomes fail to provide true accountability, especially for executives, and may not sufficiently deter future misconduct across industries operating under similar profit-driven pressures. The burden falls largely on future compliance and monitoring, rather than retrospective punishment for the harm caused.  

Pathways for Reform & Consumer Advocacy

The ViaPath case underscores the urgent need for systemic reforms to protect consumers, particularly those in vulnerable situations like incarceration, from corporate negligence driven by profit motives. Potential pathways include:

  1. Strengthened Regulatory Oversight: Agencies like the FTC need enhanced authority and resources to proactively monitor industries serving captive markets, enforce stricter data security standards before breaches occur, and impose significant financial penalties that act as genuine deterrents, not just business expenses. Mandating specific security practices (like encryption for sensitive data, robust access controls, secure development training) rather than relying on vague “reasonableness” standards could be more effective.  
  2. Mandatory Data Minimization and Deletion: Companies should be required by law to collect only necessary data and securely delete it when no longer legitimately needed, minimizing the potential impact of breaches. The Order requires ViaPath to implement such policies, deleting data within two years unless specific exceptions apply. This should be a standard requirement.  
  3. Enhanced Corporate Transparency: Requiring companies like ViaPath to publicly disclose security practices, breach details (without misleading omissions), fee structures, and profits derived from specific facilities would empower advocates and policymakers.
  4. Breaking Up Monopolies: Addressing the issue of exclusive contracts that create captive markets is crucial. Promoting competition or regulating prices for essential services like prison communication could reduce exploitative practices.  
  5. Stronger Third-Party Vendor Accountability: Clearer regulations are needed regarding corporate liability for the actions of their vendors, especially concerning data security. Mandating thorough vetting and contractual security requirements, as the Order now requires of ViaPath, should be standard practice.
  6. Empowering Consumer Advocacy and Collective Action: Supporting consumer rights groups and facilitating class-action lawsuits can provide avenues for redress and pressure companies to prioritize consumer protection over profit.
  7. Whistleblower Protections: Robust protections for employees who report security lapses or unethical practices internally or externally are essential for early detection and prevention.

Modular Commentary: The System Working as Intended?

Legal Minimalism: Checking Boxes, Missing the Point

ViaPath presented itself as security-conscious, highlighting policies and frameworks in marketing materials. Yet, the actual implementation, particularly in the test environment, lacked fundamental safeguards like encryption and monitoring. This suggests a focus on the appearance of compliance—having policies on paper—rather than the substantive reality of security. This “legal minimalism,” doing just enough to claim adherence while failing the spirit of protection, is characteristic of systems where compliance is treated as a cost center or branding exercise, not a core ethical duty. Late-stage capitalism often rewards navigating regulations over embodying responsibility.  

How Capitalism Exploits Delay: Time as a Corporate Asset

The nine-month delay between ViaPath discovering the breach and notifying affected consumers wasn’t just inaction; it can be viewed as strategically beneficial within a capitalist framework. Delay allows companies time to manage public relations, potentially obscure facts, and prepare legal defenses. For consumers, however, delay means prolonged vulnerability to identity theft and fraud without the knowledge needed to protect themselves. In systems prioritizing shareholder value and reputation, stalling accountability can be more profitable than swift, transparent action, even when it extends consumer harm.  

Monetizing Harm: Profiting from Captivity

ViaPath’s business model inherently profits from the situation of incarceration. By securing exclusive contracts and charging high fees for basic communication and financial services, the company turns the necessity of family connection and fund access into a significant revenue stream. While not directly profiting from the breach itself, the underlying model thrives by monetizing the needs of a captive, vulnerable population. This mirrors a broader tendency in late-stage capitalism to extract profit from situations of constraint and need, turning societal challenges or necessities into lucrative markets where consumer welfare can become secondary to revenue generation. The failure to adequately invest profits back into robust security further highlights this prioritization.  

Profiting from Complexity: Diffusing Responsibility

The breach was triggered by a technician employed by a third-party vendor. ViaPath had failed to adequately vet this vendor’s security practices or ensure its engineers received proper security training. Using vendors and complex operational structures can sometimes serve to diffuse responsibility. While ViaPath remained legally responsible, the involvement of a third party adds a layer of complexity that can obscure direct lines of accountability. This reliance on external entities without sufficient oversight is a feature where corporate structures can inadvertently (or deliberately) shield the core entity from the direct consequences of failures within its operational chain, a common tactic in complex corporate ecosystems.  

This Is the System Working as Intended

The ViaPath data breach and its aftermath should not be viewed as an isolated accident or a simple failure of one company’s procedures. Instead, it can be understood as a predictable outcome of a system—neoliberal capitalism applied to the prison industrial complex—operating as designed. When corporations are given near-monopolistic control over essential services for a vulnerable, captive population, and the primary incentive structure relentlessly prioritizes profit maximization and shareholder value, cutting corners on “costs” like robust data security becomes a rational business decision, albeit an unethical one. The delayed notification and misleading statements also align with protecting corporate reputation and value. This case is not an aberration; it is a manifestation of a logic where human well-being and data security are secondary considerations to the pursuit of profit within weakly regulated or captured markets.  

Conclusion: Systemic Corruption Laid Bare

The GTL/ViaPath data breach is more than a story of technical failure; it is a striking illustration of systemic issues plaguing industries that serve vulnerable populations within a neoliberal capitalist framework. Hundreds of thousands of people—incarcerated individuals already stripped of many rights, and their families often struggling financially—had their most sensitive personal information exposed due to ViaPath’s documented failure to implement basic, promised security measures. The company profited immensely from this population while neglecting fundamental duties of care. The subsequent delay in notification and misleading public statements compounded the harm and demonstrated a disturbing prioritization of corporate image over consumer safety.

This case reveals the human cost when deregulation, weak enforcement, captive markets, and profit maximization converge. It highlights the failure of existing structures to hold corporations fully accountable, allowing them to settle serious allegations without admitting wrongdoing. The legal battle, culminating in the FTC Order, lays bare not just one company’s misconduct, but deeper flaws in an economic system that often protects corporate interests at the expense of community well-being and individual security.  

Frivolous or Serious Lawsuit?

Based entirely on the detailed allegations presented in the FTC’s Complaint and the resulting Decision and Order, the legal action against GTL/ViaPath appears to represent a serious and legitimate legal grievance. The Complaint meticulously documents specific, significant failures in data security practices, contrasts these failures with the company’s explicit security promises, details the exposure of highly sensitive personal information for a vast number of consumers, alleges tangible harm including potential financial loss and invasion of privacy, and outlines misleading statements made to the public and potential clients. The issuance of a formal Complaint and a detailed Decision and Order by a federal regulatory agency underscores the perceived legitimacy and gravity of the documented misconduct. This was not a frivolous action, but a regulatory enforcement response to well-documented corporate failures with significant public interest implications

Oh? A wild FTC press release against ViaPath has appeared!: https://www.ftc.gov/news-events/news/press-releases/2024/02/ftc-finalizes-order-global-tellink-over-security-failures-led-breach-sensitive-data

💡 Explore Corporate Misconduct by Category

Corporations harm people every day — from wage theft to pollution. Learn more by exploring key areas of injustice.

💡 Explore Corporate Misconduct by Category

Corporations harm people every day — from wage theft to pollution. Learn more by exploring key areas of injustice.

Evil Corporations
Evil Corporations

Articles written by me are actually written by many different people! We include writers from the legal field, tech, and people who study political theory. Especially people who study political theory.... that makes up about 90% of the guest writers here. If you also want to contribute to this website, then head on over to the Evil Corporations contact page and send over your interest!

Articles: 727