• Login
  • Register
  • PRO
    • PRO Compliance plan
    • PRO Compliance
    • PRO subscription plans
    • Curated articles
    • In-depth
    • Market intelligence
    • Practice guides
    • PRO Reports New
    • Lexology GTDT
    • Ask Lexy
  • PRO
  • Latest
  • GTDT
  • Research
  • Learn
  • Experts
  • Store
  • Blog
  • Events
  • Popular
  • Influencers
  • About
  • Explore
  • Legal Research
  • Primary SourcesBeta
  • PRO Compliance

Introducing PRO Compliance
The essential resource for in-house professionals

  • Compare
  • Topics
  • Interviews
  • Guides
Getting The Deal Through joins Lexology
GTDT and Lexology Navigator have merged

CONTENT DEVELOPMENT

Become your target audience’s go-to resource for today’s hottest topics.

  • Trending Topics New
  • Discover Content
  • Horizons Beta
  • Ideation

CLIENT INTELLIGENCE

Understand your clients’ strategies and the most pressing issues they are facing.

  • Track Sectors
  • Track Clients
  • Mandates New
  • Discover Companies
  • Reports Centre New

COMPETITOR INTELLIGENCE

Keep a step ahead of your key competitors and benchmark against them.

  • Benchmarking
  • Competitor Mandates New

Lexology PRO

Power up your legal research with modern workflow tools, AI conceptual search and premium content sets that leverage Lexology's archive of 900,000+ articles contributed by the world's leading law firms. 

PRO Compliance plan
PRO subscription plans

Premium content

  • Curated articles
  • In-depth
  • Market intelligence
  • Practice guides
  • PRO Reports New

Analysis tools

  • Lexology GTDT
  • Ask Lexy
Explore all PRO content PRO Compliance
  • Find experts
  • About
  • Firms
Introducing Instruct Counsel
The next generation search tool for finding the right lawyer for you.
Back Forward
  • Save & file
  • View original
  • Forward
  • Share
    • Facebook
    • Twitter
    • Linked In
  • Follow
    Please login to follow content.
  • Like
  • Instruct

add to folder:

  • My saved (default)
  • Read later
Folders shared with you

Register now for your free, tailored, daily legal newsfeed service.

Questions? Please contact [email protected]

Register

Federal appeals court recognizes for the first time the FTC’s authority to enforce cybersecurity practices

King & Spalding LLP

To view this article you need a PDF viewer such as Adobe Reader. Download Adobe Acrobat Reader

If you can't read this PDF, you can view its text here. Go back to the PDF .

USA August 28 2015

On August 24, 2015, the Third Circuit Court of Appeals issued a much- awaited decision in FTC v. Wyndham Worldwide Corporation,1 holding that the Federal Trade Commission (FTC) has authority to regulate “unfair” or “deceptive” cybersecurity practices under Section 5 of the Federal Trade Commission Act, 15 U.S.C. § 45(a). The decision may not only enhance the FTC’s authority going forward, it could also inspire other federal and state agencies acting under similar statutory language to forge ahead with enforcement of cybersecurity practices. We thus recommend that companies: (i) institute comprehensive cybersecurity governance programs; and (ii) utilize the National Institute of Standards and Technology’s Framework for Improving Critical Infrastructure Cybersecurity (“Framework”) or another comprehensive model to maintain practices that will be articulable and defensible in the ever-evolving legal landscape.

The FTC’s Authority to Regulate Cybersecurity

The FTC is the federal agency charged with, among other things, protecting consumers from unfair and deceptive trade practices. The FTC’s enforcement authority is derived from over 70 different statutes, including the Federal Trade Commission Act.2   Section 5 of the Federal Trade Commission Act (“Section 5”) authorizes the FTC to bring actions—in  both judicial and administrative forum—against entities engaging in “unfair or deceptive acts or practices in or affecting commerce.” More specifically, an act or practice is unlawful if it (i) is likely to cause substantial injury; (ii) is not outweighed by countervailing benefits to consumers and competition; and (iii) could not reasonably have been avoided by consumers.3

The FTC has interpreted its Section 5 authority as allowing it to regulate— and to bring enforcement actions related to—allegedly unfair or deceptive acts or practices in the cybersecurity arena. The FTC has also issued guidance on cybersecurity topics, including the protection of consumer privacy, physical security, and cybersecurity involving connected devices (i.e., “the internet of things”).

Unlike other government agencies that are only beginning to flex their cybersecurity enforcement muscles, the FTC has been pursuing companies for allegedly deficient cybersecurity programs for nearly twenty years.  As a result, the FTC has been a leading federal regulatory authority on cybersecurity and privacy, and has brought over 50 cases since 2002 against companies allegedly engaged in unfair or deceptive practices that put consumers’ personal data at unreasonable risk.4

In one of the earliest and most influential cases, the FTC alleged in 2002 that several Microsoft products made under its “Passport” brand, including one intended for children, did not live up to the promises made in their privacy  policies. The FTC and Microsoft entered into a settlement whereby Microsoft agreed to implement a written cybersecurity program and allow the FTC to oversee that implementation. Importantly, there was no indication that any personal data was actually taken due to problems with Passport’s cybersecurity mechanisms, but the FTC initiated action against Microsoft nonetheless.5   Two years later, in 2004, the FTC and Petco settled allegations that Petco.com did not take appropriate measures to defend against cyberattacks, despite express claims that consumer data used on that site (including credit card numbers) would remain secure. In that case, consumer data was actually compromised by a malicious hacker who used a SQL injection attack to steal data. The settlement required Petco to cease from making false representations about the strength of its cybersecurity program and to establish a new, more secure cybersecurity program.6

The FTC remains active in the cybersecurity sphere, continuing to bring complaints against companies that allegedly do not take necessary steps to safeguard consumer data. In just the past two years, the FTC has settled a number of cybersecurity cases through consent decrees, including a case where a company allegedly tried to obtain health information from medical vendors without appropriate authorization from patients,7   a case where a laptop containing personal information was allegedly stolen,8 and a case where a company allegedly verified that websites were secure without actually confirming that those websites complied with security requirements.9

Yet for all its efforts in enforcing corporate cybersecurity practices, the FTC has declined to promulgate rules or explicitly identify a particular set of required cybersecurity measures or practices. Instead, the FTC contends that its view on the reasonableness of a cybersecurity program can be extrapolated from industry guidance, the FTC’s reports and website publications,10   and FTC enforcement actions.11

FTC v. Wyndham Worldwide Corp.

In 2012, the FTC filed a complaint alleging serious cybersecurity lapses at global hospitality company Wyndham Worldwide Corporation.  According to the FTC’s complaint, Wyndham’s failure to maintain an effective cybersecurity program led to substantial consumer injury, and Wyndham’s privacy policy misrepresented the cybersecurity measures in place at the company.  Between 2008 and 2010, Wyndham was hacked three times, and personal information from over 600,000 Wyndham customers was taken by hackers in Russia. This data included credit card information, the taking of which allegedly resulted in fraudulent use of those cards to the tune of $10.6 million.

Wyndham moved to dismiss the FTC’s suit on the grounds that the FTC lacked the authority to regulate cybersecurity under Section 5 of the Federal Trade Commission Act and that, even if the FTC had the authority to regulate cybersecurity, it had not put companies on notice—by publishing rules and regulation—of what constituted an adequate cybersecurity program. The district court rejected both of these arguments and Wyndham appealed to the Third Circuit. As mentioned above, the Third Circuit affirmed the district court’s decision on August 24, 2015, which

was the first time an appellate court ruled on the FTC’s interpretation of its Section 5 authority in the cybersecurity arena.

The Third Circuit discussed the various deficiencies with Wyndham’s cybersecurity program and then held that the FTC had the authority to bring suit because Wyndham’s conduct did not fall outside of the plain meaning of “unfair.” Wyndham’s alleged cybersecurity deficiencies included (i) storing payment card information in clear, readable text;

(ii) using default passwords; (iii) failing to use firewalls; (iv) not restricting Wyndham network access by third party vendors; (v) not employing reasonable measures to prevent unauthorized access to Wyndham computers; and (vi) publishing a privacy policy that overstated its level of cybersecurity.  The Third Circuit also rejected Wyndham’s argument that it did not have fair notice of what specific cybersecurity practices the FTC believes are necessary.

In reaching this conclusion, the Third Circuit found especially convincing the fact that the FTC had alleged that Wyndham’s cybersecurity measures were grossly deficient:

[T]he complaint does not allege that Wyndham used weak firewalls, IP address restrictions, encryption software, and passwords. Rather, it alleges that Wyndham failed to use any firewall at critical network points, did not restrict specific IP addresses at all, did not use any encryption for certain customer files, and did not require some users to change their default or factory-setting passwords at all.12

The Third Circuit also found significant that Wyndham had been hacked three times: “certainly after the second time Wyndham was hacked, it was on notice of the possibility that a court could find that its practices fail the cost-benefit analysis” conducted in determining whether it had fair notice.13

The Third Circuit’s holding that the FTC’s established practice of regulating cybersecurity is supported by its statutory mandate is hardly a surprise in the context of increasing scrutiny being given to cybersecurity by several regulatory agencies.  Especially noteworthy is the fact that the Third Circuit likely could have reached this conclusion even absent Wyndham’s allegedly misleading statements in its privacy policy, implying that it is likely that the cybersecurity lapses standing alone would be the proper subject of an FTC enforcement action.

The Next Battleground for the FTC

With resolution of the FTC’s Section 5 authority over cybersecurity in the Third Circuit, attention may shift to the Eleventh Circuit, where the FTC’s battle with LabMD is being played out.  In 2013, the FTC issued an Administrative Complaint against LabMD alleging that it may have engaged in “unfair . . . acts or practices” in regard to  cybersecurity protecting healthcare information.  LabMD filed two consecutive lawsuits against the FTC to enjoin the administrative proceedings,14 twice appealing to the Eleventh Circuit,15 and arguing that the FTC has no statutory authority to address its cybersecurity practices under Section 5. The Eleventh Circuit has held that it lacks jurisdiction to address the merits of the case in the absence of final agency action.16   The administrative proceedings are currently in the midst of post-trial briefing, after which there may be a final showdown at the Eleventh Circuit.

A Broader Context: Government Oversight Beyond the FTC

As a whole, federal agencies are increasingly interested in the cybersecurity practices of organizations within their respective jurisdiction, although they have taken different approaches in their initial steps.  Some agencies, like the Food and Drug Administration and Department of Energy, have issued guidance and attempted to raise awareness of best practices.17   The SEC has issued rules for registered broker- dealers, investment companies, and investment

advisors subject to its authority, and even sent formal inquiries to a number of organizations touching on their cybersecurity posture.18

Beyond the organizations directly under its authority, the SEC has broad authority to ensure transparency and full disclosure in the securities marketplace, and it has wielded that power to require securities issuers to disclose any cybersecurity-related risks or events that a reasonable investor would consider material to an investment decision.

To that end, the staff of the SEC’s Division of Corporation Finance issued guidance in 2011 to help issuers determine whether they needed to disclose certain cyber-vulnerabilities, past cyber-attacks, and other cybersecurity matters.19 The primary adverse consequences discussed in the 2011 Guidance include remediation costs, increased cybersecurity costs, lost revenues, litigation, and reputational damage.20   The 2011 Guidance notes that, “as with other operational and financial risks, registrants should review, on an ongoing basis, the adequacy of their disclosure relating to cybersecurity risks and cyber incidents.”21   Registrants are, therefore, encouraged to consider the probability of cyber incidents and the “quantitative and qualitative magnitude of those risks.”22

Furthermore, 47 of the 50 U.S. states have enacted breach notification statutes that are triggered when an organization experiences a cyber incident. Some states have also passed laws requiring organizations to adopt “reasonable” cybersecurity practices for particularly sensitive PII, such as social security numbers, without providing specific guidelines for achieving such reasonableness.23   In addition to pursuing violations of state breach notification laws, state attorneys general also pursue enforcement under consumer protection acts—most commonly in the form of Unfair and Deceptive Trade Practice Acts (“UDTPAs”).  Unlike narrower breach notification laws, state UDTPAs are often modeled after the broad language in Section 5(a) of the Federal Trade Commission Act, and state authorities can interpret their states’ “unfair” and “deceptive” provisions to address cybersecurity practices.

Recommendation

As demonstrated in the Wyndham decision, companies should view cybersecurity as a primary legal risk.  Ultimately, the Wyndham decision recognizes that the statutory requirement is determined by 15 U.S.C. § 45(n), which asks whether “the act or practice causes or is likely to cause substantial injury to consumers which is not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits to consumers or to competition.” The Court held that “this standard informs parties that the relevant inquiry here is a cost-benefit analysis,” and underscores how the NIST Framework is an ideal model for addressing legal obligations. The Framework is a risk- based model and can therefore be employed to measure (and document) the expected costs and benefits inherent in every cybersecurity practice. In addition, the NIST Framework is the only model developed at the express direction of an Executive Order from a U.S. President,24 it has been championed by numerous federal agencies, and is frequently cited by members of Congress.

To view all formatting for this article (eg, tables, footnotes), please access the original here.
King & Spalding LLP - Norman A. Armstrong, Jr., Christopher C Burris (Chris), Nicholas A. Oldham, Mark H Francis and James L. Michaels
Back Forward
  • Save & file
  • View original
  • Forward
  • Share
    • Facebook
    • Twitter
    • Linked In
  • Follow
    Please login to follow content.
  • Like
  • Instruct

add to folder:

  • My saved (default)
  • Read later
Folders shared with you

Filed under

  • USA
  • IT & Data Protection
  • Litigation
  • King & Spalding LLP

Tagged with

  • Computer security
  • FTC
  • Federal Trade Commission Act

Popular articles from this firm

  1. As Blockchain Technology Use Surges So Does The Energy Required To Power It *
  2. Construction contracts in the USA *
  3. Drilling contracts – avoiding misunderstanding *
  4. A “roadmap” to accrual and disclosure requirements under ASC 450 *
  5. Key considerations in energy take-or-pay contracts *

If you would like to learn how Lexology can drive your content marketing strategy forward, please email [email protected].

Powered by Lexology
loading...

Related topic hubs

  1. FTC
  2. USA
  3. IT & Data Protection
  4. Litigation

Related USA articles

  1. Companies have “fair notice” that FTC can challenge substandard cybersecurity practices as “unfair” *
  2. Batten down the hatches *
  3. Third Circuit affirms FTC authority to regulate cybersecurity *
Greg Jacobson
Governance & Legal Coordinator
Perth Airport
What our clients say

"Lexology is an excellent and extremely useful initiative. Its certainly more useful than some of the paid services that I have signed up to."

Back to Top
  • Terms of use
  • Cookies
  • Disclaimer
  • Privacy policy
  • GDPR compliance
  • RSS feeds
  • Contact
  • Submissions
  • About
  • Login
  • Register
  • Follow on Twitter
  • Search
Law Business Research

© Copyright 2006 - 2021 Law Business Research