9/3/15 The FTC’s Unfairness Doctrine as Applied to Privacy Policies and Data Breaches Nicole E. Kopinski Illinois State Bar Association Intellectual Property Section 1 Context: Data Breaches • Collec>on and storage of sensi>ve consumer informa>on. • Risk of inadequate data security prac>ces – Consumers exposed to financial harm, including iden>ty theI and credit card fraud. • Recent massive data breaches include: – See hKps://www.privacyrights.org/data-‐breach (providing chronology of data breaches). 2 1 9/3/15 FTC v. Wyndham 2015 U.S. App. LEXIS 14839, No. 14-‐3514 (3rd Cir. Aug. 24, 2015). ISSUE: Whether the Federal Trade Commission (FTC) has authority under Sec>on 5 of the FTC Act to bring an enforcement ac>on against a company whose failure to protect sensi>ve data resulted in financial harm to consumers. 3 FTC v. Wyndham 2015 U.S. App. LEXIS 14839, No. 14-‐3514 (3rd Cir. Aug. 24, 2015). • First confirma>on by a higher court that the FTC has the broad authority to regulate cybersecurity that it claims. – The Third Circuit ruled that the FTC can enforce data security standards. – Affirmed the District Court of New Jersey’s denial of Wyndham’s mo>on to dismiss. 4 2 9/3/15 FTC Act § 5 (15 U.S.C. 45) Sec>on 5 of the FTC Act prohibits ‘‘unfair or decep>ve acts or prac>ces in or affec>ng commerce.’’ • An act or prac>ce is unfair where: – It causes or is likely to cause substan>al injury to consumers, – It cannot be reasonably avoided by consumers, and – It is not outweighed by countervailing benefits to consumers or to compe>>on. • An act or prac>ce is decep>ve where: – A representa>on, omission, or prac>ce misleads or is likely to – mislead the consumer; – A consumer’s interpreta>on of the representa>on, omission, or prac>ce is considered reasonable under the circumstances; and – The misleading representa>on, omission, or prac>ce is material. 5 Case Background • 2008 & 2009: Hackers access customer informa>on from the global hotel company, Wyndham. • 2012: The FTC sued Wyndham for failing to adequately safeguard its computer network. – The FTC charged Wyndham with viola>ng both the decep>on and unfairness provisions in the FTC Act. – Wyndham’s responded that the FTC lacks authority to regulate and supervise cybersecurity prac>ces. 6 3 9/3/15 FTC Arguments The FTC alleged that: • Wyndham's data security prac>ces are decep>ve and unfair acts prohibited by § 5 of the FTC Act. • Wyndham engaged in prac>ces that “unreasonably and unnecessarily exposed consumers’ personal data to unauthorized access and theI” including: • Failure to use readily available security measures, such as firewalls; • Storage of credit card informa>on in clear text; • Failure to implement reasonable informa>on security procedures prior to connec>ng local computer networks to corporate-‐level networks; • Failure to address known security vulnerabili>es on servers; • Use of default user names and passwords for access to servers; • Failure to require employees to use complex user IDs and passwords to access company servers; • Failure to inventory computers to appropriately manage the network; • Failure to maintain reasonable security measures to monitor unauthorized computer access; • Failure to conduct security inves>ga>ons; and • Failure to reasonably limit third-‐party access to company networks and computers. 7 Wyndham Arguments Wyndham moved to dismiss the FTC's suit. • Wyndham challenged the FTC's data security authority under the unfairness prong of Sec>on 5: – Wyndham did argued that Congress seKled on “a less extensive regulatory scheme” by adop>ng targeted data security legisla>on (such as the Fair Credit Repor>ng Act, the Gramm-‐Leach-‐Bliley Act, the Children's Online Privacy Protec>on Act, and the Health Insurance Portability and Accountability Act). – Wyndham argued that the FTC’s imposi>on of general data security standards under the FTC’s Sec>on 5 authority would render the scheme adopted by Congress superfluous. – Wyndham did not argue that the text or legisla>ve history of Sec>on 5 precluded the FTC from regula>ng data security. • Wyndham argued that the FTC has disclaimed authority to regulate data security prac>ces in public statements between 1998 and 2001. See, e.g., FTC v. Brown & Williamson Tobacco. 8 4 9/3/15 District Court • The district court rejected Wyndham's arguments and denied its mo>on to dismiss. – Dis>nguished Brown & Williamson case: Data security legisla>on was intended "to complement—not preclude—the FTC's authority.“ – Rejected conten>on that the FTC disclaimed authority over data security: • The FTC did not take a “plain and resolute posi>on” that it lacked jurisdic>on to regulate a par>cular area. • The FTC brought several unfairness ac>ons involving data security aIer making the statements in ques>on. • There is no legal basis to conclude that because the FTC never affirma>vely declared its authority over data security, it cannot assert it. • The district court rejected Wyndham’s argument that before bringing an unfairness ac>on under Sec>on 5, the FTC must publish rules and regula>ons. – Such a proposi>on “would necessarily require the Court to sidestep long-‐ standing precedent . . . that suggests precisely the opposite.” Fed. Trade Comm’n v. Wyndham Worldwide Corp., No. 2:13-cv-01887-ES-JAD , Dkt. No. 181 (D.N.J. Apr. 7, 2014). 9 Third Circuit Decision Authority • The Third Circuit Court of Appeals determined that the FTC has authority over unfair trade prac>ces in the arena of cybersecurity. – The Third Circuit found that the FTC has authority to regulate cybersecurity under the unfairness prong of § 45(a) of the FTC Act. – Neither the plain meaning of “unfairness” nor congressional ac>on in the area of cybersecurity negate such authority. Fed. Trade Comm’n v. Wyndham Worldwide Corp., No. Case: 14-3514 (3rd Cir. 2014 Aug. 24, 2015). 10 5 9/3/15 Third Circuit Decision No@ce • The Third Circuit found that to sa>sfy due process: – A company does not need to have “fair no>ce” of the FTC’s interpreta>on of which specific cybersecurity standards are required to avoid liability under the unfairness prong of § 45(a) – Rather, a company only needs to have had “fair no>ce” that cybersecurity prac>ces can form the basis of an unfair prac>ce under § 45(a). • The Third Circuit found that no>ce existed in this case. Fed. Trade Comm’n v. Wyndham Worldwide Corp., No. Case: 14-3514 (3rd Cir. 2014 Aug. 24, 2015). 11 Third Circuit Decision Unfairness • The Third Circuit did not find that Wyndham’s prac>ces cons>tuted unfair security measures. – Rather, the case was remanded to the district court for a trial on the merits. – The Third Circuit rejected the following arguments by Wyndham: • The conduct is only unfair when it injures consumers through unscrupulous or unethical behavior. • That a company does not treat its customers in an unfair manner when the company itself was vic>mized by criminals. • The Third Circuit indicated that a company could be subject to an unfairness claim if: – The company facilitated the most proximate cause of the injury and the outcome was reasonably foreseeable. • Even if the company’s conduct was not the most proximate cause of the injury. – Thus, the ac>ons a company takes (or fails to take), from which a cyber aKack is reasonably foreseeable, can form the basis of an FTC unfairness claim. Fed. Trade Comm’n v. Wyndham Worldwide Corp., No. Case: 14-3514 (3rd Cir. 2014 Aug. 24, 2015). 12 6 9/3/15 Implica>ons: No>ce • The FTC argued that Wyndham and other businesses are on no>ce of required cybersecurity prac>ces, because the FTC has filed complaints laying out prac>ces which, “taken together,” violate the prohibi>on on “unfair” business prac>ces. – The FTC had an average of approximately 15 new complaints per month in 2014. – At oral argument, the Third Circuit judges ques>oned whether businesses could be expected to monitor the FTC’s dockets to ensure compliance with its standards. – The FTC replied that “any careful general counsel would be looking at what the FTC is doing,” because the FTC “has broad-‐ranging jurisdic>on and undertakes frequent ac>ons against all manner of prac>ces and all manner of businesses.” • The Third Circuit concluded that the FTC guidelines, complaints, and consent orders gave Wyndham no>ce of the necessary and sufficient condi>ons of an alleged § 45(a) viola>on. Marc H. Perry & Abraham J. Rein, FTC v. Wyndham: Recent Developments and Implications, IPLAW360 (Apr. 8, 2015), http://www.postschell.com/ publications/1017-ftc-v-wyndham-recent-developments-implications. 13 Implica>ons: Monitoring • The FTC now may con>nue to assert that businesses are put on no>ce of the minimum prac>ces they must follow based on the FTC’s complaints laying out cybersecurity prac>ces that the FTC considers unfair. • Companies may decide to invest in the process of uncovering and filling cybersecurity gaps early to prevent FTC sanc>ons later. – Requires aKen>on to detail in monitoring the FTC’s complaints. – Requires working with informa>on technology personnel to decide whether the company’s data security prac>ces cover the gaps about which the FTC is complaining. – Requires outside counsel to develop a strong working knowledge of the legal and technical principals of cyber-‐security. • Post-‐Wyndham, it will be important for businesses to monitor FTC guidelines, complaints, and consent decrees for guidance as to what may cons>tute unfair cybersecurity prac>ces under § 45(a). Marc H. Perry & Abraham J. Rein, FTC v. Wyndham: Recent Developments and Implications, IPLAW360 (Apr. 8, 2015), http://www.postschell.com/ publications/1017-ftc-v-wyndham-recent-developments-implications. 14 7 9/3/15 Implica>ons: Li>ga>on • Businesses who experience data breaches may have to li>gate on mul>ple fronts. • Wyndham had to defend itself against both a shareholder deriva>ve ac>on and the FTC ac>on. – Wyndham’s directors supported the company as it defended its conduct and procedures before the FTC. – The directors were required to jus>fy their fiduciary du>es to assess whether the breaches resulted from negligent or reckless conduct by Wyndham’s officers. – This may have required Wyndham to file its own civil ac>on against its officers. 15 FTC’s Use of Consent Decrees • Since 2002, the FTC has filed and seKled over 50 cases against private companies: – The FTC argued that the companies compromised consumers’ security by using decep>ve or unfair (ineffec>ve) prac>ces in storing their data. • See, e.g., Cases against TwiKer, LexisNexis, ChoicePoint, GMR Transcrip>on Services, GeneLink, Inc., Accre>ve Health, Inc., and HTC. – These cases involved complaints that would have been adjudicated administra>vely within the commission had they not been seKled. • See, e.g., In re: Apple Corp. (Apple iTunes Store) (approving $32.5 million seKlement with Apple). – SeKlements involve “consent decrees” under which a company agrees to cease prac>ces the FTC deems unlawful and to take various “correc>ve measures” to prevent future harm. • The FTC may seek civil fines in federal court for a viola>on of a consent decree. Alden Abbott, Heritage Found., The Federal Trade Commission’s Role in Online Security: Data Protector or Dictator?, Mem. #137 on Legal Issues (Sept. 10, 2014), http://thf_media.s3.amazonaws.com/2014/pdf/LM137.pdf. 16 8 9/3/15 FTC’s Use of Consent Decrees • Companies may be concerned that post-‐Wyndham the FTC will have more leeway to pursue companies who are subjected to cyber breaches and to require companies to undergo third-‐party security assessments. – But , historically, the FTC has focused on businesses that have excep>onally insecure data security or that completely failed to establish secure systems for consumer data. – Only Wyndham and one other company – which is currently winding down – refused to sign consent decrees with the FTC. • Post-‐Wyndham, companies should be sure their security is consistent with reasonable industry standards. • If faced with an FTC ac>on, nego>a>ng a favorable seKlement may be the most pragma>c approach. Nicole Joy Liebman, Third Circuit Says FTC Can Regulate Corporate Cybersecurity Policies, NAT’L L. REV. (Sept. 1, 2015), http://www.natlawreview.com/ article/third-circuit-says-ftc-can-regulate-corporate-cybersecurity-policies#sthash.2KYZE1Dj.dpuf. 17 Addi>onal Issues • Unfair data security prac>ces • Extension to privacy policies and prac>ces. 18 9 9/3/15 Other Governmental Focus • Recent public statements and other announcements by governmental regulators signal increased focus on cybersecurity preparedness. Dixie L. Johnson & Ehren K. Halse, Regulator House Calls: Cybersecurity Examinations and Audits, CORPORATE COUNSEL ((May 4, 2015), http:// www.corpcounsel.com/id=1202725394688/Regulator-House-Calls-Cybersecurity-Examinations-and-Audits#ixzz3ZI0La6d0. 19 Other Governmental Focus • Governmental regulator audits and examina>ons concerning cybersecurity are expected to increase, par>cularly in the financial industry. • January 2015: U.S. Securi>es and Exchange Commission (SEC) noted the importance of assessing cybersecurity risks and preparedness, when it provided informa>on on priori>es and >ming of its 2015 examina>on program. • February 2015: The SEC and the Financial Industry Regulatory Authority (FINRA) each published summaries of market assessments of cybersecurity risks conducted in 2014 through broker-‐dealer and investment adviser examina>ons. • February 2015: New York’s Department of Financial Services (NYDFS) is considering new rules protec>ng against “an Armageddon-‐type” cyberaKack on U.S. financial markets; NYDFS released a “Report on Cyber Security in the Insurance Sector,” summarizing its survey results and announcing increased focus on cybersecurity in examina>ons. Dixie L. Johnson & Ehren K. Halse, Regulator House Calls: Cybersecurity Examinations and Audits, CORPORATE COUNSEL (May 4, 2015), http:// www.corpcounsel.com/id=1202725394688/Regulator-House-Calls-Cybersecurity-Examinations-and-Audits#ixzz3ZI0La6d0. 20 10
© Copyright 2026 Paperzz