We’ve previously blogged about Bristol-Myers Squibb v. Superior Court (“BMS”), in which the Supreme Court granted certiorari to review a decision of the California Supreme Court that adopted an unusual—and extraordinarily expansive—view of California courts’ power to exercise specific personal jurisdiction over a defendant.

We filed an amicus brief on behalf of the Chamber of Commerce of the United States of America, the California Chamber of Commerce, the American Tort Reform Association, and the Civil Justice Association of California, arguing that the California court’s holding conflicted with numerous Supreme Court decisions making clear that in order to invoke specific jurisdiction, a plaintiff’s claims must arise out of the defendant’s in-state conduct.  (The views in this post are ours, and not those of our clients.)

The case was argued in April, and the Court announced its decision today. The result is an 8-1 opinion rejecting the California Supreme Court’s approach and, in our view, recognizing important limits imposed by the Fourteenth Amendment’s due process clause on the ability of courts to adjudicate cases that aggregate the claims of plaintiffs from many jurisdictions.

The immediate impact of the decision is to limit the forums where nationwide mass actions in state court can proceed to those states in which the defendant is subject to general jurisdiction (usually the state of incorporation and principal place of business).  In addition, as we discuss below, the decision raises substantial questions about whether nationwide class actions can proceed in jurisdictions where a defendant is not subject to general jurisdiction. Continue Reading Supreme Court’s Decision In Bristol-Myers Squibb v. Superior Court Rejects Expansive View Of Specific Jurisdiction

Good news for businesses that use fax machines to communicate with customers: A panel of the D.C. Circuit has just struck down the FCC’s 2014 order mandating that even faxes requested by the recipient that contain advertising material include a special opt-out notice. The decision issued today in Bais Yaakov of Spring Valley v. FCC, No. 14-1234 (D.C. Cir. Mar. 31, 2017), is available here (pdf).

Continue Reading DC Circuit invalidates FCC’s opt-out requirement for solicited faxes

FCC logo“This Order will make abuse of the TCPA much, much easier. And the primary beneficiaries will be trial lawyers, not the American public.” That’s what FCC Commissioner Ajit Pai had to say in his dissent from the FCC’s recent Declaratory Ruling and Order, issued on July 10, 2015. The FCC’s Order reflected the agency’s response to 21 petitions seeking guidance regarding or exemptions from various requirements under the Telephone Consumer Protection Act (TCPA), 47 U.S.C. § 227, and its implementing regulations.

The TCPA prohibits certain fax and automated-dialing practices and authorizes recovery of up to $1,500 per call, text message, or fax sent in willful violation of its restrictions. The TCPA has led to a tidal wave of class-action litigation, and the FCC’s recent Order may hasten that trend.

Most prominently, the FCC’s recent ruling:

Continue Reading FCC Expands Potential Liability under the Telephone Consumer Protection Act for Business-to-Customer Calls and Text Messages

After much anticipation, the Third Circuit heard oral arguments (audio) last Tuesday in the interlocutory appeal in FTC v. Wyndham Worldwide Corp. We have written previously about this case, which likely will be a significant one in the privacy and data-security field. At issue is whether Section 5 of the FTC Act authorizes the FTC to regulate data security at all, as well as what constitutes “unfairness” in the data-security context. The case may have a large impact on future FTC enforcement actions and major implications for class action litigation.

But after all the build up, the panel of the Third Circuit hearing argument might change the script. Questioning by the judges (Thomas Ambro, Jane Roth, and Anthony Scirica) indicated that the panel was seriously considering a ruling that the FTC should have brought any unfairness claim in an FTC administrative action in the first instance (as it did in the LabMD action), not in federal district court. If that happens, we will have to wait even longer to learn whether the federal courts agree with the FTC’s views on the scope and contours of its unfairness authority in the data-security context.

Counsel for the FTC and for Wyndham spent large portions of the oral argument emphasizing the positions they had briefed. Wyndham’s counsel, for example, argued at length that negligence alone cannot satisfy an “unfairness” standard, that businesses had not received adequate notice of what triggers such liability, and that the FTC had not adequately alleged substantial injury. But the panel may not reach those issues. Instead, the court focused on the threshold question of whether the FTC had the authority in the first place to sue in federal court under Section 13(b) of the FTC Act. That section permits “the Commission [to] seek, and after proper proof, the court [to] issue, a permanent injunction,” but limits such relief to “proper cases.”

Is the Wyndham action a “proper case”? According to the FTC—which invoked decisions of the Ninth Circuit and the Seventh Circuit for support—it is “proper” to sue whenever the FTC alleges a violation of a law that the FTC enforces. For its part, Wyndham did not disagree, instead arguing that such a rule would have practical benefits—including that, in its view, the company would get a fairer shake in federal court than in an FTC administrative action. But the Third Circuit panel appeared to be unconvinced on this point, and focused instead on whether a case presenting novel and complex issues should first be brought in an administrative action. In fact, the panel asked the parties to provide supplemental briefing on the point.

It is always perilous to read the tea leaves after an oral argument. But it is an understatement to say that the Third Circuit’s panel was dropping some hints, especially by requesting further briefing on whether the FTC action belongs in federal court. There is therefore a substantial possibility that the court will send the action to the FTC for administrative adjudication in the first instance.

That result would serve to underscore a point we have made before—that post hoc litigation is a poor way to impose data-security standards. Litigation moves forward in fits and starts, and by its nature is unlikely to produce clear rules or standards in complex areas like data security. In short, it is an unpredictable and expensive method of forging broadly applicable standards. All stakeholders—both businesses and their consumers and employees—are likely to suffer from a lack of meaningful direction if data-security standards are generated via litigation. With the cyber threat continuing to grow—from garden-variety hackers to sophisticated operations that may be sponsored by foreign governments—consensus-based standard setting is far more likely to provide practical guidance for American businesses that seek to protect private information, intellectual property, and business-critical systems from the continuing cyber onslaught.

We have written previously about the FTC’s action arising out of the data breach suffered by the Wyndham hotel group, and the company’s petition for permission to pursue an interlocutory appeal regarding the FTC’s use of its “unfairness” jurisdiction to police data security standards. On Tuesday, the Third Circuit granted Wyndham’s petition. Even the FTC had agreed that the “the legal issues presented are ‘controlling question[s] of law,’ and they are undoubtedly important.”  Yesterday’s ruling promises that these questions soon will be considered by the Third Circuit.

Later this week, DRI—an important professional organization that serves as a leading voice for the defense bar and in-house counsel—will once again hold its annual seminar on class actions in Washington, D.C.  I will be one of the speakers, and will be discussing recent developments affecting arbitration and class actions.  I plan to preview some of the issues that I’ll be discussing on the blog in the weeks to come.   More information about the seminar is available here.  I look forward to seeing readers of our blog and other friends and colleagues.

We have written previously about FTC v. Wyndham Worldwide Corp., currently pending in federal district court in New Jersey, and its potential significance for data security class actions. A recent opinion in that case has brought it back into the news—and made clear that the stakes are as high as ever.

Over the FTC’s opposition, the district court certified an interlocutory appeal to the Third Circuit regarding its earlier denial of Wyndham’s motion to dismiss. Specifically, the district court certified two questions of law for appellate review: (1) whether the FTC has the authority under Section 5 of the FTC Act to pursue an unfairness claim involving data security; and (2) whether the FTC must formally promulgate regulations before bringing such an unfairness claim. Here is a copy of Wyndham’s petition to the Third Circuit to accept the certified appeal.

After the oral argument in POM Wonderful LLC v. Coca-Cola Co. (pdf), No. 12-761, the Supreme Court appeared all but certain to allow competitors to sue for false advertising under the Lanham Act over labels of FDA-regulated food products.  Food manufactures have been waiting to see just how broad the ruling would be and whether it would affect the onslaught of consumer class actions challenging food and beverage labels.  The wait is over, and the POM v. Coke decision, while effecting a dramatic change in competitor actions, should have little impact on consumer class actions.

As described by the Supreme Court, here are the facts of the case:  POM markets a juice product labeled “Pomegranate Blueberry 100% Juice,” which consists entirely of pomegranate and blueberry juices.  Coke (under its Minute Maid brand) markets “Pomegranate Blueberry Flavored Blend of 5 Juices,” a competing product that contains 99.4% apple and grape juices, with pomegranate, blueberry, and raspberry juices accounting for the remaining 0.6%.  The label on the Minute Maid product features a picture of all five fruits and the words “Pomegranate Blueberry” in a larger font than the words “Flavored Blend of 5 Juices.”  Significantly, the Minute Maid label complies with the technical labeling rules set out in the federal Food, Drug, and Cosmetic Act (FDCA) and FDA’s related regulations for naming a flavored juice blend.

POM alleged that Coke’s product name and label violate the Lanham Act’s false-advertising provision because (according to POM) consumers will be fooled into thinking there is more pomegranate and blueberry juice in the product than there really is.  The district court and Ninth Circuit rejected the Lanham Act claims, accepting Coke’s argument  that because juice labeling is pervasively regulated by FDA, applying generalized principles of false advertising under the Lanham Act would destroy the uniform, national labeling standard announced by the agency under the FDCA.  As the Ninth Circuit put it, “the FDCA and its regulations bar pursuit of both the name and labeling aspect” of the Lanham Act claim because allowing the claim would “undermine the FDA’s regulations and expert judgments” about how juices may and should be included in the product name.

The Supreme Court unanimously reversed the Ninth Circuit’s decision in an opinion by Justice Kennedy.  In analyzing whether one federal statute (the FDCA) precludes a remedy available under another (the Lanham Act), the Court ruled that the FDCA and Lanham Act can be harmonized because they are “complementary and have separate scopes and purposes” and—unlike FDCA’s express preemption of state-law claims—neither statute “discloses a purpose” by Congress to bar competitor suits like POM’s.  (A more detailed discussion of the Court’s opinion is available here.)  Notably—although the Court repeatedly tells us that the FDCA and Lanham Act can get along—the opinion never actually does the hard work of harmonizing Coke’s compliance with the FDCA’s detailed rules for naming flavored juice blends with POM’s theory of liability challenging the FDCA-compliant name under a generalized theory of false advertising.

By contrast with competitor lawsuits, the Court’s decision should have virtually no impact on food labeling consumer class actions.  While the Court expressed the view that consumers will be indirect beneficiaries of competitor Lanham Act claims over allegedly misleading labels, it made clear that its decision does not address or alter the interplay between state consumer protection laws or consumer suits and the FDCA.  In other words, the decision does not in any way undermine preemption principles that would apply to state-law claims challenging labels regulated by FDA.  That’s important not just for food companies facing consumer class actions, but also to avoid a problem the Court specifically recognized in its decision: the “disuniformity that would arise from the multitude of state laws, state regulations, state administrative agency rulings, and state-court decisions that are partially forbidden by the FDCA’s pre-emption provision.”  Though the Court correctly recognizes the resulting chaos if each state could impose non-identical labeling requirements, it characterizes the potential disuniformity from the potential tension between the FDCA and the Lanham Act a result that Congress envisioned.

Whether the Court was right or wrong about that, one thing is clear:  In creating food labels, food companies should consider not only what the FDCA and federal regulations say, but also analyze the potential risks of competitor lawsuits under the Lanham Act.  We will have more to say about these issues on a webinar tomorrow; interested clients or friends of the firm may register for the webinar here. 

 

 

Already, 2014 has been an eventful year in the world of data breaches and cybersecurity. In addition to a flurry of litigation over high-profile breaches at the start of the year, the National Institute for Standards and Technology released its long-anticipated Cybersecurity Framework. The latest development is the recent decision in the closely-watched Wyndham case, in which a federal district court has just held that the Federal Trade Commission may use its “unfairness” authority under Section 5(a) of the FTC Act to enforce data-security standards. As a result, companies can expect the FTC to continue—and perhaps even expand—its efforts to regulate data-security standards through enforcement actions. And (as we have seen time and time again) where the FTC leads, the plaintiff’s bar often follows by filing class actions piggybacking on the agency’s allegations.

What happened in Wyndham?

The Wyndham action arose when a group of hackers allegedly penetrated the hospitality chain’s networks from 2008 to 2010, and compromised over a half-million payment card numbers. Already facing the substantial financial and reputational harm caused by the hackers’ crime, Wyndham next found itself facing a civil action filed by the FTC. In its initial and amended complaints, the FTC alleged that Wyndham had not maintained reasonable and appropriate data security measures. The agency claimed that Wyndham had engaged in (1) deception through alleged misrepresentations of the company’s data-security practices; and (2) “unfair” conduct based upon the harms allegedly suffered as a result of the purportedly unreasonable data-security practices.

Wyndham moved to dismiss the amended complaint, arguing, among other things, that the FTC’s “unfairness” authority does not extend to data security, that the FTC had failed to provide fair notice of what Section 5 of the FTC Act requires, and that Section 5 does not govern the security of payment card data. Wyndham—joined by a number of amici—pointed to the FTC’s lack of clear statutory authority, the continued legislative debates about data-security standards, and the FTC’s failure to establish standards through rulemaking as powerful reasons why the FTC lacked the authority to regulate data-security practices through Section 5 enforcement actions.

The district court was not persuaded. It concluded that more narrow data-security requirements enacted by Congress complemented, rather than precluded, the FTC’s assertion of authority under Section 5. The court also disagreed with defendants about the import of the ongoing legislative debates and prior statements by the FTC about the limits of its authority to regulate data security. The court thus declined “to carve out” what it understood to be “a data-security exception to the FTC’s authority.” The court likewise held that the FTC did not need to promulgate rules before exercising that authority, and that the FTC had adequately pled its unfairness claim. Finally, the court rejected the defendants’ challenge to the FTC’s deception claim.

Implications of the Wyndham decision

Many observers believe that the district court’s decision—and the resulting headlines—may serve to boost the FTC’s efforts to regulate data security. From our perspective, the decision (unless it is overturned on appeal) may have a significant effect on data-breach class actions as well for at least three reasons.

First, past FTC actions have spawned follow-on class litigation. Continued or possibly expanded FTC activity in the field of data security thus does not bode well for companies that must defend themselves first from hackers and then from regulators and plaintiffs’ attorneys who seek to turn a company’s victimization into a basis for claimed liability.

Second, the district court’s highlighting of what it called “data-security insufficiencies” may foreshadow a focus on simplistic checklists rather than on risk-based data security practices. These supposed “insufficiencies” include allegations that the company stored unencrypted data, used outdated operating systems, and failed to require the use of complex passwords. These purported “insufficiencies” were described in a manner bereft of any context—and in particular, without any reference to the specific risks facing the company or the company’s overall security response. But data security is not one-size-fits-all. Context does matter. For that reason, the creation of a data security checklist through litigation, whether by the FTC or by a putative class representative, will benefit no one.

Third, the district court’s willingness to authorize case-by-case development of security standards—including through the use of consent orders that provide little or no guidance to non-parties—promises legal and regulatory uncertainty for companies in an area that cries out for stable and predictable guidelines. This uncertainty will only increase if class actions are allowed to further complicate the existing patchwork of data-security standards.

At bottom, the Wyndham decision is troubling for companies that seek to manage data-security risks and stave off unnecessary and inappropriate litigation. Indeed, the district court appeared resigned to the prospect of more litigation in this area, noting that “we live in a digital age that is rapidly evolving” and that will raise “a variety of thorny legal issues that Congress and the courts will continue to grapple with for the foreseeable future.” Companies certainly should hope that the district court was wrong to forecast more litigation, but should be prepared for continued legal uncertainty and the opportunistic litigation it will generate.

We’ll be discussing the Wyndham decision—along with many other new trends and strategies in data breach and privacy class actions—in a webinar next week. We hope that clients and friends of the firm will consider joining us for that discussion.

After a year of public-private collaboration and considerable anticipation, the National Institute for Standards and Technology’s (NIST) cybersecurity framework for critical infrastructure has arrived. The interest in the framework has only grown after several high profile data breaches in late 2013 have cast an unrelenting spotlight on cybersecurity issues. The framework presents businesses with important questions about whether and how they should use it, and—as cybersecurity-related class actions multiply—how the plaintiffs’ bar intends to invoke the framework.

After attempts at more comprehensive legislation faltered, President Obama issued an executive order (EO 13636) requiring development of the framework. By design, the framework is both voluntary and limited in its application. Most significantly, it only applies to critical infrastructure. In addition, it contemplates the creation of incentives to support its adoption and possible follow-on regulatory “actions to mitigate cyber risks,” and leaves unresolved the ongoing debate over information sharing and attendant liability protections.

But while the framework is voluntary, it likely will be influential. The Administration, for example, has said that in developing the framework it intended to “leverage” “common cybersecurity practices” to improve the cybersecurity of critical infrastructure. For critical infrastructure operators, multiple questions arise, including (1) will regulators rely on the framework; (2) how, if at all, will insurance markets account for the framework; and (3) will plaintiffs’ attorneys invoke the framework to exert leverage of their own via class action litigation.

Even before the framework’s introduction, many observers recognized the possibility that—in light of the SEC’s increasing emphasis on the appropriate disclosure of cyber risks— the plaintiff’s bar would press securities litigation alleging material omissions or misrepresentations about such risks. Recognizing that such lawsuits may be inevitable, businesses that operate critical infrastructure surely will want to take account of the framework both in assessing their cybersecurity posture and in disclosing the existence of cyber risks. In particular, companies should consider whether to incorporate elements of the framework (e.g., a “Framework Profile”) into their public disclosures.

Another significant issue is that, because the framework arguably may facilitate board-level awareness and management of cyber risk, plaintiffs may be more likely to bring actions against officers and directors for breach of fiduciary duties in connection with cyber incidents. Although the success of such actions remains to be seen, the release of the framework underscores the importance of cybersecurity to corporate boards and top executives.

At the same time, in our view, businesses should be reassured by the fact that nothing in the framework suggests that a company’s decision not to adopt an individual element—what it calls an “informative reference”—should form the basis of a future lawsuit, whether for data breach or other harm. Indeed, the framework specifically states that it is not a checklist and that it is not “one-size fits all.” Transforming an “informative reference” from the framework into a stand-alone requirement is not a mandate that the framework contemplates or supports. Attaching liability to individual “informative references” would create static cybersecurity checklists that the framework specifically rejects; indeed, it would frustrate the continued development of appropriate cybersecurity protections that the framework itself is aimed to encourage. Companies should therefore be prepared to defend against attempts to elevate the framework into liability standards, which would frustrate the Framework’s goal of providing a “prioritized, flexible, repeatable, performance-based, and cost-effective approach” to managing cybersecurity risk.

The stakes of cyber attacks are high. So too are the stakes of litigation that are likely to ensue. The NIST Framework doubtless will be cited in that litigation, but, properly understood, it should not form the basis of a claim. To that end, we will be watching closely to see whether the plaintiff’s bar seeks to use the framework in ways that would defeat its stated purposes.