September 24, 2015 FTC Held to Have Authority to Regulate Cybersecurity Practices Under Section 5 of the FTC Act The Federal Trade Commission’s longstanding authority to regulate “unfair methods of competition in or affecting commerce” under § 5 of the FTC Act, 15 U.S.C. § 45(a), extends to regulation of cybersecurity practices that are harmful to consumers, according to a recent ruling by a three-judge panel of the United States Court of Appeals for the Third Circuit in FTC v. Wyndham Worldwide Corp., No. 14-3514, 2015 WL 4998121 (3d Cir. Aug. 24, 2015). This case not only reaffirms the applicability of this wellknown tool in the context of modern corporate data security practices but also solidifies the FTC as one of the primary regulators of cybersecurity and data breach responses in the United States. The FTC’s Historic Power over Unfair Methods of Competition and Its Extension in the 1960s to Practices Harmful to Consumers When the FTC Act was first signed into law in 1913, it was primarily enforced only against practices that harmed competition or commerce in a literal sense, such as violations of the Sherman Anti-Trust Act. In its early days, the Act was not considered applicable to practices which were harmful to consumers but not necessarily harmful to competition or commerce. Thus, for example, in early cases, restrictions on the price and manner in which printed publications may be sold, on requiring gasoline sellers who lease their tanks from gasoline manufacturers to only sell gasoline from that manufacturer, and on unsubstantiated weight loss cure advertisements were all held to be outside the FTC’s authority under § 5 of the FTC Act. In 1964, however, the FTC promulgated trade regulations for cigarette advertising based on § 5 that would consider whether a practice “causes substantial injury to consumers,” among other factors, in determining whether the practice was “unfair.” The FTC thereafter began following this approach in other areas. In 1972, the United States Supreme Court upheld the FTC’s using consideration of the potential for consumer harm in unfairness determinations under § 5 of the FTC Act (FTC v. Sperry, 405 U.S. 233 (1972) (involving secondary markets for trading stamps)). The FTC has continued to use this authority ever since, in areas such as the regulation of children’s advertising. In 1980, the FTC’s authority in this regard was codified by Congress in § 5(n) of the FTC Act, 15 U.S.C. § 45(n), which recognized the FTC’s authority “to declare unlawful an act or practice on the grounds that such act or practice is unfair” where “the act or practice causes or is likely to cause substantial injury to consumers which is not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits to consumers or to competition.” Expansion to Cybersecurity and the Case Against Wyndham Data security increasingly has become a large and significant issue for American business. Every few months seemingly brings a new announcement that a major company’s customer data has been breached or leaked or otherwise exposed, affecting millions of customers or users. Some recent examples include Ashley Madison (37 million user records), Anthem (80 million personal and medical records), Home Depot (56 million credit card numbers), Adobe (152 million user records), Target (110 million credit and debit card records), and Sony Playstation (77 million user records). Since early 2002, the FTC has asserted authority, primarily under § 5 of the FTC Act, to address corporate data security policies. By January 2014, the FTC announced that it had achieved data security settlements with 50 companies. (FTC Press Release (Jan. 31, 2014).) Not all companies settled, however. In 2012, the FTC commenced an action against Wyndham under § 5 of the FTC Act for several data security incidents in 2008 and 2009. The FTC alleged that Wyndham had engaged in unfair cybersecurity practices that, “taken together, unreasonably and unnecessarily exposed consumers’ personal data to unauthorized access and theft.” According to the FTC’s allegations, through these combined incidents, hackers obtained payment card information from over 619,000 consumers, which resulted in at least $10.6 million in fraud loss, with consumers suffering financial injury through “unreimbursed fraudulent charges, increased costs, and lost access to funds or credit,” and having to “expend[] time and money resolving fraudulent charges and mitigating subsequent harm.” Wyndham did not settle the charges but instead challenged the FTC’s attempt to proceed against it under § 5 as being beyond the FTC’s authority under the FTC Act. The District Court upheld the FTC’s authority in this area under the FTC Act and the Third Circuit affirmed. “Unfairness” in the Cybersecurity Context Wyndham argued against the FTC’s action that to be “unfair” required more than merely meeting the minimum requirements that Congress specified in § 5(n) of the FTC Act. Wyndham argued that to be “unfair,” a practice also needs to be “not equitable” or “marked by injustice, partiality, or deception.” The Third Circuit held, however, that the FTC’s actions were valid even under this proposed test: “A company does not act equitably when it publishes a privacy policy to attract customers who are concerned about data privacy, fails to make good on that promise by investing inadequate resources in cybersecurity, exposes its unsuspecting customers to substantial financial injury, and retains the profits of their business.” In the Wyndham case, the FTC identified, and the Third Circuit noted, several aspects of Wyndham’s insufficient cybersecurity protections: Credit card information was stored in unencrypted clear text; Property management system passwords were permitted to be very easily guessable; No firewalls were used between individual hotels’ systems, corporate systems, or the Internet; Computers used to access property management systems were running out-of-date operating systems which had not received timely security updates; Access to computer systems by third-party vendors was not adequately controlled; There were no unauthorized access detection measures in place; and There were no additional measures put in place after known breach incidents. The fact that the cybersecurity breaches were caused by outside parties—hackers—did not alter the Third Circuit’s conclusions. To the contrary, it took particular note that Wyndham had been hacked on three separate occasions in different ways, and that the FTC alleged that even though Wyndham was aware of each the breaches, no new security measures were put in place after any one breach CLIENT ALERT 2 sufficient to prevent the next. The Court noted that Wyndham did not argue that the breaches were unforeseeable. The Third Circuit dismissed as an “alarmist” reductio ad absurdum Wyndham’s suggestion that to uphold the FTC’s authority here would be to grant the FTC authority to “regulate the locks on hotel room doors, . . . to require every store in the land to post an armed guard at the door” and to sue supermarkets that are “sloppy about sweeping up banana peels.” The Court also rejected Wyndham’s claim that it did not have “fair notice” of what was prohibited. It noted that the case was not about any past inconsistency in the FTC’s position about how the FTC Act should be interpreted, but rather simply about whether Wyndham had fair notice of what the FTC Act itself requires. The Third Circuit held that the interpretation was proper, and that the FTC was entitled to proceed through agency adjudication rather than rulemaking. The FTC’s View on Appropriate Cybersecurity Practices Wyndham heralds an era where the FTC will be able to wield signifcant authority in regard to cybersecurity practices that can affect customers and consumers. Fortunately, the FTC has provided some guidance about what it considers to be suitable cybersecurity practices. In its January 31, 2014 press release, the FTC maintained that its enforcement of cybersecurity protections is based on a reasonableness standard: “[A] company’s data security measures must be reasonable and appropriate in light of the sensitivity and volume of consumer information it holds, the size and complexity of its business, and the cost of available tools to improve security and reduce vulnerabilities.” The FTC further suggested: First, companies should know what consumer information they have and what employees or third parties have access to it. Understanding how information moves into, through, and out of a business is essential to assessing its security vulnerabilities. Second, companies should limit the information they collect and retain based on their legitimate business needs so that needless storage of data does not create unnecessary risks of unauthorized access to the data. Third, businesses should protect the information they maintain by assessing risks and implementing protections in certain key areas—physical security, electronic security, employee training and oversight of service providers. Fourth, companies should properly dispose of information that they no longer need. Finally, companies should have a plan in place to respond to security incidents, should they occur. The FTC has provided additional guidelines its “Start with Security” guide (https://www.ftc.gov/system/files/documents/plain-language/pdf0205-startwithsecurity.pdf). Conclusion The explosion in electronic communications, transactions and commerce over the past 15-20 years has brought along in its wake a corresponding explosion in the need for cybersecurity. CLIENT ALERT 3 The Wyndham case helps confirm the authority of the FTC, a century-old federal agency dedicated to protecting consumers, markets and competition, as a key regulatory body whose positions on cybersecurity practices need to be watched and followed by companies and businesses who are dealing with the challenges of an economy operating in this still very new sphere. * * * Our client alerts are for general informational purposes and should not be regarded as legal advice. If you would like additional information or have any questions, please contact: New York Robert A. Schwinger +1 (212) 408-5364 [email protected] Neal J. McLaughlin +1 (212) 408-5283 [email protected]
© Copyright 2026 Paperzz