{"id":620,"date":"2015-09-09T16:18:34","date_gmt":"2015-09-09T20:18:34","guid":{"rendered":"https:\/\/www2.law.temple.edu\/10q\/?p=620"},"modified":"2015-09-09T16:18:34","modified_gmt":"2015-09-09T20:18:34","slug":"the-emergence-of-unfair-cybersecurity","status":"publish","type":"post","link":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/","title":{"rendered":"The Emergence of Unfair Cybersecurity"},"content":{"rendered":"<p>Mass collection and storage of consumer information \u2013 including sensitive and personal information \u2013 is a fact of life in today\u2019s marketplace. So are hacks and data breaches. In more than thirty states there are laws that require consumers to be notified of a data breach, and there are bills in both the Senate and the House that would result in a federal breach notification standard. However, these laws only take effect after information has been exposed.<\/p>\n<p>But now, thanks to a recent ruling by The U.S. Court of Appeals for the Third Circuit, the Federal Trade Commission (\u201cFTC\u201d) has a way of helping prevent consumers\u2019 information from being exposed in the first place: the power to declare cybersecurity acts or practices \u201cunfair\u201d under the Federal Trade Commission Act. Moreover, the FTC has the power to impose monetary penalties on, or require oversight or other remedies for, companies whose cybersecurity flunks FTC scrutiny.<\/p>\n<p>In <em>Federal Trade Commission v. Wyndham Worldwide Corporation, et al.<\/em> (3rd Cir. Aug. 25, 2015), hackers accessed the Wyndham hotel and resort chain\u2019s computer systems three separate times in 2008 and 2009, successfully stealing consumers\u2019 personal and financial information (including names, addresses, and payment card and account information). The cyber attacks resulted in fraudulent charges to consumers exceeding $10.6 million, as well as losses to consumers of time and money. Among other things, the FTC found that consumers bore unreimbursed fraudulent charges, lost access to funds, experienced increased costs, and were forced to spend time resolving fraud and mitigating subsequent harm.<\/p>\n<blockquote><p>Still, it appears that the FTC is ready to use its authority in situations where businesses fail to employ reasonable cybersecurity measures&#8230;<\/p><\/blockquote>\n<p>According to the FTC\u2019s complaint, hackers were able to gain access due to the following deficiencies in Wyndham\u2019s cybersecurity operations: Wyndham failed to encrypt sensitive information (Wyndham left information in a clear and readable form); used easily guessed passwords; failed to use readily available security features, such as firewalls; allowed access to its network from systems that were outdated or lacked important security updates; failed to impose reasonable restrictions on who could access information in its systems; failed to take measures to detect and prevent unauthorized access to its network; failed to monitor its network; and made untrue claims about how consumers\u2019 information was being protected. In the FTC\u2019s view, these acts (or omissions) and practices amounted to unfair cybersecurity practices.<\/p>\n<p>Judge Thomas Ambro, writing for himself and Judges Scirica and Roth agreed, holding that the Federal Trade Commission Act (15 U.S.C. \u00a7 45(a)) (the \u201cAct\u201d) grants the FTC the authority to regulate cybersecurity practices under standards for unfairness. Wyndham had challenged this because Congress had, on prior occasions, enacted targeted cybersecurity protections, which the FTC supported, and which, Wyndham argued, precluded the \u201cfairness\u201d action here. The Third Circuit disagreed. The \u201c[FTC] unfairness actions against companies whose inadequate cybersecurity resulted in consumer harm [are] not inconsistent with the agency\u2019s earlier position\u201d supporting targeted legislation. Wyndham had also objected that it lacked fair notice that its cybersecurity practices fell short of the Act\u2019s requirements. The Third Circuit rejected this because Wyndham \u201ccould reasonably foresee that a court could construe [Wyndham\u2019s] conduct as falling within the meaning of the statute.\u201d<\/p>\n<p>The <em>Wyndham <\/em>case involved a motion to dismiss, so we may not have heard the end of this story yet. Still, it appears that the FTC is ready to use its authority in situations where businesses fail to employ reasonable cybersecurity measures and harm results to consumers, or substantial consumer injury is likely. Although critics argue that the rule is vague, there are guidelines that businesses can follow. For example, businesses can review the FTC\u2019s guidance and past actions related to cybersecurity, and can visit the FTC\u2019s Business Center website (where the FTC posts privacy and data-breach-related suggestions). Businesses can also follow trade group or industry-specific-recommended practices or standards.<\/p>\n<p>Meanwhile, <em>Wyndham\u2019s <\/em>message for businesses (and their counsel) is loud and clear: failing to take cybersecurity seriously creates a wide range of risks, for a company and its customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mass collection and storage of consumer information \u2013 including sensitive and personal information \u2013 is a fact of life in today\u2019s marketplace. So are hacks and data breaches. In more than thirty states there are laws that require consumers to be notified of a data breach, and there are bills in both the Senate and<\/p>\n","protected":false},"author":5,"featured_media":255,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,52,20],"tags":[],"coauthors":[75],"class_list":["post-620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alumni-authored","category-compliance","category-technology","masonry-post","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Emergence of Unfair Cybersecurity - The Temple 10-Q<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Emergence of Unfair Cybersecurity - The Temple 10-Q\" \/>\n<meta property=\"og:description\" content=\"Mass collection and storage of consumer information \u2013 including sensitive and personal information \u2013 is a fact of life in today\u2019s marketplace. So are hacks and data breaches. In more than thirty states there are laws that require consumers to be notified of a data breach, and there are bills in both the Senate and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Temple 10-Q\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-09T20:18:34+00:00\" \/>\n<meta name=\"author\" content=\"Philip Keitel (LAW &#039;07)\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Philip Keitel (LAW &#039;07)\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/\"},\"author\":{\"name\":\"Books Schatschneider\",\"@id\":\"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154\"},\"headline\":\"The Emergence of Unfair Cybersecurity\",\"datePublished\":\"2015-09-09T20:18:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/\"},\"wordCount\":682,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png\",\"articleSection\":[\"Alumni Authored\",\"Compliance\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/\",\"url\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/\",\"name\":\"The Emergence of Unfair Cybersecurity - The Temple 10-Q\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png\",\"datePublished\":\"2015-09-09T20:18:34+00:00\",\"author\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154\"},\"breadcrumb\":{\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png\",\"width\":1959,\"height\":991,\"caption\":\"Data Breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/law.temple.edu\/10q\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Emergence of Unfair Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/10q\/#website\",\"url\":\"https:\/\/law.temple.edu\/10q\/\",\"name\":\"The Temple 10-Q\",\"description\":\"Temple&#039;s Business Law Magazine\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/10q\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154\",\"name\":\"Books Schatschneider\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"caption\":\"Books Schatschneider\"},\"url\":\"https:\/\/law.temple.edu\/10q\/author\/rschatsc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Emergence of Unfair Cybersecurity - The Temple 10-Q","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The Emergence of Unfair Cybersecurity - The Temple 10-Q","og_description":"Mass collection and storage of consumer information \u2013 including sensitive and personal information \u2013 is a fact of life in today\u2019s marketplace. So are hacks and data breaches. In more than thirty states there are laws that require consumers to be notified of a data breach, and there are bills in both the Senate and","og_url":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/","og_site_name":"The Temple 10-Q","article_published_time":"2015-09-09T20:18:34+00:00","author":"Philip Keitel (LAW '07)","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Philip Keitel (LAW '07)","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/"},"author":{"name":"Books Schatschneider","@id":"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154"},"headline":"The Emergence of Unfair Cybersecurity","datePublished":"2015-09-09T20:18:34+00:00","mainEntityOfPage":{"@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/"},"wordCount":682,"commentCount":0,"image":{"@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png","articleSection":["Alumni Authored","Compliance","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/","url":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/","name":"The Emergence of Unfair Cybersecurity - The Temple 10-Q","isPartOf":{"@id":"https:\/\/law.temple.edu\/10q\/#website"},"primaryImageOfPage":{"@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png","datePublished":"2015-09-09T20:18:34+00:00","author":{"@id":"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154"},"breadcrumb":{"@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#primaryimage","url":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png","contentUrl":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png","width":1959,"height":991,"caption":"Data Breach"},{"@type":"BreadcrumbList","@id":"https:\/\/law.temple.edu\/10q\/the-emergence-of-unfair-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/law.temple.edu\/10q\/"},{"@type":"ListItem","position":2,"name":"The Emergence of Unfair Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/10q\/#website","url":"https:\/\/law.temple.edu\/10q\/","name":"The Temple 10-Q","description":"Temple&#039;s Business Law Magazine","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/10q\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/law.temple.edu\/10q\/#\/schema\/person\/23e7012f0cf133dbeb0e76693c9e0154","name":"Books Schatschneider","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f","url":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","caption":"Books Schatschneider"},"url":"https:\/\/law.temple.edu\/10q\/author\/rschatsc\/"}]}},"jetpack_featured_media_url":"https:\/\/law.temple.edu\/10q\/wp-content\/uploads\/sites\/12\/2015\/03\/DataBreach_Pelliciotta.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/posts\/620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/comments?post=620"}],"version-history":[{"count":0,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/posts\/620\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/media?parent=620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/categories?post=620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/tags?post=620"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/law.temple.edu\/10q\/wp-json\/wp\/v2\/coauthors?post=620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}