recommended reading

Target Could Face Federal Charges for Failing to Protect Customer Data From Hackers

Flickr user zenmama

Target could face federal charges for failing to protect its customers' data from hackers.

The retailer has been in contact with the Federal Trade Commission, Molly Snyder, a Target spokeswoman, told National Journal.

It's unclear whether the FTC has issued any subpoenas or other formal demands for information. The FTC declined to comment on whether it has launched a formal investigation.

But former commission officials said the agency is almost certainly taking a hard look at the incident, which resulted in 40 million credit-card numbers falling into the hands of hackers.

"When you see a data breach of this size with clear harm to consumers, it's clearly something that the FTC would be interested in looking at," said Jon Leibowitz, a former FTC chairman who is now a partner at Davis Polk and Wardwell.

David Vladeck, a professor at Georgetown Law Center and a former head of the FTC's Consumer Protection Bureau, said it "wouldn't be surprising" if the FTC is investigating the case.

"This would be right in the FTC's wheelhouse," he said. "It demonstrates why the FTC needs to be the cop on the beat here."

Sen. Richard Blumenthal, a Connecticut Democrat, urged the FTC to investigate the Target hack soon after it became public in December.

"If Target failed to adequately and appropriately protect its customers' data, then the breach we saw this week was not just a breach of security; it was a breach of trust," he wrote in a letter to the agency.

The former FTC officials noted that just because hackers managed to breach a company's system doesn't mean the company had inadequate security practices. Hackers are sometimes able to penetrate even the most secure systems.

But recent reports have shown that Target made a series of missteps leading up to the hack. The company gave a refrigeration, heating, and air-conditioning subcontractor credentials to its system. The hackers stole those credentials from the vendor, and then they placed a virus in Target's registers that allowed them to obtain payment information for every credit and debit card that was swiped.

On Nov. 30, a data-security firm hired by Target alerted the company about a possible breach of its system, but the company failed to act, according to Bloomberg Businessweek.

The FTC polices data security under its legal authority over "unfair" business practices. Companies have a responsibility to take "reasonable and appropriate" steps to protect the data they collect from consumers, according to FTC lawyers.

The FTC has settled dozens of data-security cases in recent years with companies including Twitter, Rite Aid, and CVS. But Wyndham, a global hotel chain, is fighting charges that the FTC brought in 2012. The company claims that the FTC's legal power to go after companies for "unfair" practices does not include inadequate data security.

A federal court in New Jersey is expected to rule on the case soon. If the court sides with Wyndham, it could strip the FTC of power to oversee data security.

But both Leibowitz and Vladeck said they expect the agency to beat back the challenge from Wyndham. If the FTC loses, Congress could step in to restore the FTC's power.

Congress is already considering legislation that would expand the FTC's authority to allow it to fine companies for inadequate data security. Currently, the agency can force a company to change its practices but cannot punish companies.

The former FTC officials as well as Edith Ramirez, the current chairwoman of the FTC, argue that Congress should give the agency fining authority for data security.

"We as a society experience too many data breaches, and I think there's an under-deterrence in this field," Vladeck said. "I think companies need to get the message."

(Image via Flickr user zenmama)

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.