Privacy & Cybersecurity Update - August 2015

Third Circuit Affirms FTC’s Authority Over Cybersecurity:

In the Wyndham case, the Third Circuit affirmed that the FTC has the authority to regulate cybersecurity under Section 5 of the FTC Act, and that the language of the act itself constituted fair notice to Wyndham that its practices may be unlawful.

In a highly anticipated ruling, the U.S. Court of Appeals for the Third Circuit has ruled unanimously that the Federal Trade Commission (FTC) has the authority to bring actions against companies alleging that cybersecurity activities constitute unfair trade practices under Section 5 of the FTC Act.1 The August 24, 2015, ruling upheld the decision of the U.S. District Court for the District of New Jersey on two questions, namely: (i) whether the FTC has authority to regulate cybersecurity under Section 5 of the FTC Act, and (ii) if so, whether Wyndham had fair notice that its cybersecurity practices could violate Section 5. The Third Circuit affirmed the district court’s findings that the FTC does have such authority and that Wyndham did have fair notice...

Please see full update below for more information.

LOADING PDF: If there are any problems, click here to download the file.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Skadden, Arps, Slate, Meagher & Flom LLP | Attorney Advertising

Written by:

Skadden, Arps, Slate, Meagher & Flom LLP
Contact
more
less

Skadden, Arps, Slate, Meagher & Flom LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.