Skip to content

FTC v. Wyndham Worldwide Corp. (2015) — FTC Section 5, Cybersecurity Unfairness, and Third Circuit Affirmance

Table of contents

Executive Summary

The Federal Trade Commission sued Wyndham Worldwide Corporation and related hospitality entities in federal court, alleging that inadequate data security contributed to three payment-card breaches between 2008 and 2009 and that Wyndham’s public statements overstated its security practices. Wyndham moved to dismiss, arguing in part that the FTC lacked authority to regulate cybersecurity through Section 5’s unfairness prong and that it lacked fair notice. The U.S. District Court for the District of New Jersey denied the motion. The U.S. Court of Appeals for the Third Circuit affirmed, holding that the FTC could proceed under Section 5 unfairness and that Wyndham had fair notice that its alleged conduct could violate the statute.

The parties later resolved the enforcement action. In December 2015, the FTC announced a stipulated order requiring a comprehensive information security program for payment card data, addressing risks from connections between franchised properties and corporate systems, and imposing long-running assessment obligations (including PCI DSS–related assessments as described in the order).

FTC enforcement (federal court)

The Federal Trade Commission pursued injunctive relief under Section 5 of the FTC Act, alleging unfair cybersecurity practices and deceptive privacy-policy statements relative to actual practices. The district court allowed the case to proceed; the Third Circuit affirmed on the interlocutory appeal regarding FTC authority and fair notice. The matter concluded with a stipulated order for injunction (settlement) that imposed detailed program, assessment, and recordkeeping requirements.

  • Unfairness: Alleged failure to implement reasonable security contributed to unauthorized access to consumers’ payment card information and downstream harm, within the framework of Section 5 unfairness analysis (including the limitations in 15 U.S.C. § 45(n)).
  • Deception: Alleged that Wyndham’s statements about safeguarding personal information were misleading compared with actual practices described in the complaint and court opinions.

Security Technical Summary

Summary

The public allegations and opinions describe a hospitality franchise and property-management environment in which property-level systems handling payment card data were connected to corporate networks, with alleged weaknesses in access controls, segmentation, and security hygiene that allowed intruders to move from hotel environments to corporate systems. The FTC’s complaint also described misconfiguration (e.g., vendor default settings) and insufficient monitoring and incident response across repeated intrusions.

Attack chain (as alleged in public filings)

  1. Intruders exploited weaknesses at Wyndham-branded hotel property management environments and gained access to corporate networks through alleged inadequate segmentation and weak remote-access and credential practices.
  2. Attackers accessed and exported payment card data for large numbers of accounts across multiple incidents between 2008 and 2009.
  3. Fraudulent transactions followed, with millions of dollars in fraudulent charges described in public opinions.
  4. The FTC alleged that known deficiencies were not adequately remediated between incidents, increasing exposure for later breaches.

Engineering takeaways

Network segmentation and franchise connectivity
- Treat property-to-corporate connectivity as a high-risk trust boundary; enforce segmentation, least privilege, and monitored remote access.

Identity, credentials, and configuration hygiene
- Eliminate default vendor credentials and weak authentication for remote access; enforce strong authentication and logging for administrative paths.

Detection, logging, and incident response
- Operate monitoring and response capabilities that can detect cross-segment movement and large-scale data export; document post-incident remediation and control changes.

Assurance against recurring failure
- After a material incident, perform evidence-backed control uplift (not only point fixes) and track closure of findings through governance reporting.

Regulatory posture
- Section 5 unfairness cases can turn on whether practices are reasonable in context; maintain documented risk assessment, service provider oversight, and assessment artifacts aligned to cardholder-data environments.

Understanding Regulatory and Court Orders

Read the originals—the complaint, district court and Third Circuit opinions, and stipulated order are the authoritative sources. Use Understanding regulatory and court orders to interpret them and translate obligations into security and compliance work.

DocumentDateSourceKey obligation or holding
Complaint for Injunctive and Other Equitable ReliefJune 26, 2012FTC (D.N.J. filing)Alleged unfair and deceptive data security practices related to payment card data and franchise/property systems
Opinion Denying Motion to DismissApr. 7, 2014D.N.J.FTC authority and pleading issues at motion-to-dismiss stage
Fed. Trade Comm’n v. Wyndham Worldwide Corp., 799 F.3d 236 (3d Cir. 2015)Aug. 24, 2015Third CircuitAffirmed FTC Section 5 unfairness authority over alleged cybersecurity failures; fair notice analysis
Stipulated Order for InjunctionDec. 11, 2015FTC / D.N.J.Comprehensive information security program; PCI-related assessments and long-running obligations as specified in the order

Case Pack Documents

Case DocumentSummaryWriting Scenario
Executive and board
Board PackHigh-level security status and top risks for the board.CISO briefs the Board Audit Committee after the Third Circuit affirmance and stipulated order (early 2016).
Executive Security Risk SummaryConsolidated security risks and mitigation for executives.Security Director summarizes franchise connectivity and cardholder-data risks for leadership during order implementation.
Security Program Status ReportProgram health, metrics, and progress for leadership.Lead Security Engineer reports program and assessment progress to the CISO after the stipulated order.
Strategic Security Initiative JustificationBusiness case for a major security initiative.CISO seeks approval for segmentation and property-connectivity remediation aligned to the order.
Regulatory and compliance
Regulatory Security ExplanationExplain security posture and controls to a regulator.CISO explains payment card program and franchise network controls to FTC counsel or an examiner.
Compliance Justification DocumentJustify how controls meet a requirement or framework.Lead Security Engineer maps controls to the stipulated order and PCI-oriented assessment expectations.
Controls → Evidence MapHow controls are implemented and evidenced.Senior engineer documents evidence for segmentation, logging, and property connectivity controls.
Governance Response MemoRespond to an audit or regulatory request on governance.CISO responds to governance questions tied to the order’s program and assessment requirements.
Legal-technical
Detailed Narrative of EventsChronological factual narrative for legal/regulatory use.Security or legal prepares a chronology from complaint and court opinions for counsel.
Security Architecture Explanation for Legal ReviewExplain architecture and controls for counsel.Lead Security Engineer explains property-to-corporate architecture and controls for General Counsel.
Risk RegisterJustify risk acceptance or mitigation for legal/audit.Security Director maintains breach- and order-aligned risks for audit.
Security Decision DocumentationRecord a significant security decision and rationale.Security Director documents decisions on assessor scope and segmentation standards.
Policy and governance
Security Policy DraftDraft or update an enterprise security policy.Security Director updates standards for franchise and vendor connectivity.
Security Governance MemoDefine or clarify governance roles and escalation.CISO clarifies ownership for property-managed systems and corporate security requirements.
Security Program JustificationJustify program scope, resourcing, or structure.CISO justifies expanded monitoring and segmentation investment post-order.
Internal Security DirectiveDirective or mandate from leadership on security.CISO mandates controls for remote access and default configurations across properties.
Public communication
Security Public StatementDraft for press or public breach/incident statement.CISO drafts consumer-facing language consistent with accurate security posture.
Customer Security ExplanationExplain a security topic or incident to customers.CISO drafts customer notice framing payment card safeguards and monitoring.
Security Transparency Report SectionSection for an annual or ad-hoc transparency report.CISO drafts a transparency section describing program and assessments at a high level.
Operational (case-pack specific)
Audit Packet ChecklistWhat to produce within 48 hours for evidence readiness.Checklist for order-related document requests and assessor evidence pulls.
Implementation Checklist0–30 / 30–60 / 60–90 day execution plan.Program owner tracks early order implementation milestones.

Facts and Timeline

  • June 26, 2012 — The FTC files a federal complaint in the District of New Jersey alleging unfair and deceptive practices related to Wyndham’s protection of consumers’ payment card information.

  • April 7, 2014 — The district court denies Wyndham’s motion to dismiss in relevant part, allowing the FTC’s claims to proceed.

  • Aug. 24, 2015 — The Third Circuit affirms the district court, rejecting Wyndham’s arguments that the FTC lacks Section 5 unfairness authority over the alleged cybersecurity practices and addressing fair notice. Fed. Trade Comm’n v. Wyndham Worldwide Corp., 799 F.3d 236 (3d Cir. 2015).

  • Dec. 9–11, 2015 — The FTC files and announces a stipulated order resolving the matter, imposing a comprehensive information security program and long-running assessment obligations for payment card data and related connectivity risks.

References

Primary (official documents)

  • FTC matter page — Wyndham Worldwide Corporation (Matter/File Nos. 1023142 / X120032). Case timeline and filings
  • FTC ComplaintFederal Trade Commission v. Wyndham Worldwide Corporation, et al., filed June 26, 2012 (D.N.J.). Complaint (PDF)
  • District court opinion — Order denying motion to dismiss (opinion), Apr. 7, 2014. Opinion (PDF)
  • Third Circuit opinionFed. Trade Comm’n v. Wyndham Worldwide Corp., 799 F.3d 236 (3d Cir. Aug. 24, 2015). Opinion (PDF)
  • Stipulated order — Stipulated Order for Injunction, Dec. 11, 2015. Order (PDF)

Cited

  1. Federal Trade Commission. Wyndham Settles FTC Charges It Unfairly Placed Consumers’ Payment Card Information At Risk, Dec. 9, 2015. Press release

  2. Federal Trade Commission. Statement from FTC Chairwoman Edith Ramirez on Appellate Ruling in the Wyndham Hotels and Resorts Matter, Aug. 24, 2015. Press release

© 2026 Yi Zhang. Licensed under the MIT License.
Last updated: 2026 April 17 9:37 AM