articles private disordering? payment card fraud liability rules
Transcription
articles private disordering? payment card fraud liability rules
ARTICLES PRIVATE DISORDERING? PAYMENT CARD FRAUD LIABILITY RULES Adam J. Levitin* This Article argues that private ordering of fraud loss liability in payment card systems is likely to be socially inefficient because it does not reflect Coasean bargaining among payment card network participants. Instead, loss allocation rules are the result of the most powerful party in the system exercising its market power. Often loss liability is placed not on the least cost avoider of fraud, but on the most price inelastic party, even if that party has little or no ability to prevent or mitigate losses. Moreover, for virtually identical payment systems, there is international variation in both loss liability rules and security standards, suggesting that at least some variations are suboptimal. True Coasean bargaining is not possible in payment systems; the transaction costs are too high because of the sheer number of participants. Targeted coordination and competition, however, can achieve outcomes that if not Coasean, are at least optimized relative to the current system. Thus, the Article suggests a pair of complimentary regulatory responses. First, regulators should develop a system for coordinating payment card security measures with governance that adequately represents all parties involved in payment card networks. And second, regulators should pursue more vigorous antitrust enforcement of card networks’ restrictions on merchant pricing to expose the costs of participating in a payment system—which include fraud costs—to market discipline. The Article also presents an extended defense of the major existing regulatory intervention in payment card fraud loss allocation, the federal caps on consumer liability for unauthorized payment card transactions. TABLE OF CONTENTS INTRODUCTION ......................................................................................................... 2 I. PAYMENT CARD NETWORKS AND LIABILITY RULES ............................................ 10 A. Structure of Payment Card Networks ............................................................ 10 B. Payment Card Liability Rules in the United States ........................................ 14 II. WHAT HATH PRIVATE ORDERING WROUGHT? ................................................... 16 * Associate Professor, Georgetown University Law Center. The author would like to thank William Bratton, Mark Budnitz, Robert Hunt, Sarah Levitin, and Ronald Mann for their comments and encouragement, and Steven Schwarzbach for research assistance. Comments? AJL53@law.georgetown.edu. 2 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 A. Who Is the Least Cost Avoider? Card-Present Transactions......................... 16 B. Who Is the Least Cost Avoider? Card-Not-Present Transactions.................. 20 C. Making Sense of the Liability Rules ............................................................... 22 D. International Variation in Liability Rules and Fraud Arbitrage ................... 24 1. International Variation ............................................................................... 24 2. Fraud Arbitrage ......................................................................................... 29 III. REGULATORY INTERVENTIONS .......................................................................... 30 A. The Coordination Problem in Payment Card Networks ................................ 30 B. Encourage Better Governance for Security Standard Coordination ............. 32 C. More Vigorous Payments Antitrust Policy..................................................... 36 IV. LIMITATIONS OF CONSUMER LIABILITY: A DEFENSE ........................................ 38 A. Consumer Liability Rules for Unauthorized Payment Card Transactions..... 38 B. The Case Against Mandatory Liability Rules ................................................ 39 C. In Defense of the Consumer Liability Limitations ......................................... 40 1. Counterfactual Consideration .................................................................... 40 2. Monetary Deductibles, Copayments, and Contributory Negligence .......... 41 3. Non-Pecuniary Costs .................................................................................. 42 4. Limited Consumer Ability to Prevent Fraud............................................... 42 5. Consumer Knowledge of Liability Rules and Concerns About Issuer Compliance..................................................................................................... 43 6. Adverse Selection as Justification for Mandatory Liability Rules .............. 44 7. Contractual Frictions: Information Asymmetries, Bargaining Costs, Bundled Pricing, Hyperbolic Discounting, and Price Salience ..................... 45 8. Relative Ability to Bear Losses ................................................................... 46 CONCLUSION ........................................................................................................... 47 INTRODUCTION Payment card fraud is a multi-billion dollar problem domestically and globally. While there are no firm numbers on the actual cost of payment fraud, one recent study estimates total costs of credit and debit card fraud in the U.S. at approximately $109 billion in 2008.1 The losses from payment card fraud are borne directly by merchants, a range of financial institutions, 1. See LEXISNEXIS, 2009 LEXISNEXIS TRUE COSTS OF FRAUD STUDY 6, 50, 54 (2009), available at http://www.riskfinance.com/RFL/Merchant_Card_Fraud_files/LexisNexisTotalCost Fraud_09.pdf [hereinafter LEXISNEXIS FRAUD STUDY] (estimating total cost of all payment fraud in the U.S. at $191.30 billion and that credit and debit fraud account for 57% of the total). These figures should not be taken as precise statements because the study’s methodology was not always clear and the figures did not include the costs sunk into fraud prevention by financial institutions and merchants or the non-pecuniary costs of fraud, such as distortions in consumer purchasing and payment patterns or time and hassle for consumers to straighten out credit reports and accounts. See id. at 17. For a very different estimate of fraud costs, see Richard J. Sullivan, The Changing Nature of U.S. Card Payment Fraud: Industry and Public Policy Options, FED. RESERVE BANK OF KANSAS CITY ECON. REV., 2Q 2010, at 101, 112, available at http://www.kansascityfed.org/ Publicat/Econrev/pdf/10q2Sullivan.pdf (estimating $3.718 billion in credit and debit card fraud losses in 2006 in the US). See also Kate Fitzgerald, An Industry At A Loss, PAYMENTSSOURCE, May 2010, at 16, 17 (reporting bank card fraud expenses as $.95 billion for 2009 and $1.11 billion for 2008). 2010] Private Disordering? 3 and consumers. Payment card fraud also creates deadweight loss for the entire economy by increasing the cost of payments, the ultimate transaction cost.2 Payment card fraud results in socialized losses because of the law enforcement resources spent combating the problem and may also frustrate some legitimate transactions that get caught by overly broad fraud prevention methods.3 The allocation of these losses occurs through a combination of public law and private ordering. Federal law generally limits individual consumer liability for unauthorized credit and debit card transactions to $50.4 The liability of merchants and financial institutions as well as business cardholders5 is generally determined through private ordering.6 The loss allocation rules are important not only because of their distributional consequences, but because of the incentives they create. The greater a party’s liability for fraud losses, the greater incentive the party will have to take care to avoid fraud. As payment card fraud has (apparently) increased,7 it is worth asking whether the current loss allocation system is the optimal one. Does it properly incentivize parties to take the optimal level of care from a social welfare standpoint? Does the loss allocation system facilitate or discourage commerce by limiting the transaction cost of payment? 2. To the extent that merchants bear losses, payment fraud may get passed on to consumers in the form of higher sale prices. 3. DELL INC., SUBMISSION OF DELL, INC. TO THE BOARD OF GOVERNORS OF THE FEDERAL RESERVE REGARDING SECTION 920 OF THE ELECTRONIC FUNDS TRANSFER ACT (REDACTED VERSION) 4, http://www.federalreserve.gov/newsevents/files/dell_comment_letter_20101118.pdf [hereinafter DELL LETTER]. 4. 15 U.S.C. §§ 1643(a), 1693g(a) (2006); 12 C.F.R. § 226.12(b)(1)(ii) (2010) (credit cards); id. § 205.6(b) (debit cards). If the consumer does not provide the card issuer with timely notice that the consumer’s card has been lost or stolen, the consumer’s liability can increase up to $500. Id. See infra part IV for a more detailed discussion of consumer liability rules. 5. See 15 U.S.C. § 1603 (2006) (exempting “extensions of credit primarily for business, commercial, or agricultural purposes, or to government or governmental agencies or instrumentalities, or to organizations” from the credit transaction provisions of the Truth in Lending Act); id. § 1693a (defining “account” for the purposes of the Electronic Fund Transfer Act as being “established primarily for personal, family, or household purposes”). These exemptions would cover even sole proprietors if the credit was extended or the account established primarily for business purposes, as with a “business” card or “business” deposit account. 6. An exception is state laws relating to data security breach notification. See Paul M. Schwartz & Edward J. Janger, Notification of Data Security Breaches, 105 MICH. L. REV. 913, 924–25, 972–84 (2007). 7. LEXISNEXIS FRAUD STUDY, supra note 1, at 26–27. Given the lack of solid payment card fraud statistics in the United States, it is impossible to say with absolute certainty whether fraud levels are increasing, much less relative to the size of the market. While issuers report fraud losses, some of these losses are first-party fraud, where the consumer simply denies having carried out the transaction that he or she made, while others are third-party fraud. Jasbir Anand, First Party Fraud, SC MAGAZINE (Apr. 1, 2008), http://www.scmagazineus.com/first-partyfraud/article/108545. 4 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 There is a sizeable literature on fraud and mistake liability allocation rules in payments systems.8 This literature, however, generally focuses on public law and on the propriety of liability allocation to consumers. There has been little scholarly consideration of the private law that allocates liability between merchants and financial institutions.9 The reason for this comparative neglect is unclear. Until recently, payment card network operating rules were not publicly available, which limited a critical primary source for scholars. Moreover, scholars may have considered the allocation of liability between merchants and financial institutions less of a policy concern because the asymmetries in terms of information, sophistication, and ability to exercise rights are less acute between merchants and financial institutions than they are between consumers and financial institutions. In perhaps the most extensive exposition on the issue, Professor Richard Epstein and attorney Thomas Brown argue that the current system of private loss allocation layered on top of a statutory baseline is flawed.10 Epstein and Brown argue that losses should be allocated solely through private ordering. In their view, which they “would have thought beyond 8. See Mark E. Budnitz, Commentary: Technology as the Driver of Payment System Rules: Will Consumers Be Provided Seatbelts and Air Bags?, 83 CHI.-KENT L. REV. 909 (2008); Robert D. Cooter & Edward L. Rubin, A Theory of Loss Allocation for Consumer Payments, 66 TEX. L. REV. 63, 71–72 n.42 (1987) (reviewing pre-1970s writings on this topic); Francis J. Facciolo, Unauthorized Payment Transactions and Who Should Bear the Losses, 83 CHI.-KENT L. REV. 605 (2008); Clayton P. Gillette, Rules, Standards, and Precautions in Payment Systems, 82 VA. L. REV. 181 (1996); Clayton P. Gillette & Steven D. Walt, Uniformity and Diversity in Payment Systems, 83 CHI.-KENT L. REV. 499 (2008); Gail Hillebrand, Before the Grand Rethinking: Five Things To Do Today with Payments Law and Ten Principles to Guide New Payments Products and New Payments Law, 83 CHI.-KENT L. REV. 769 (2008); Sarah Jane Hughes, Duty Issues in the Ever-Changing World of Payments Processing: Is It Time for New Rules?, 83 CHI.-KENT L. REV. 721 (2008); Ronald J. Mann, Credit Cards and Debit Cards in the United States and Japan, 55 VAND. L. REV. 1055 (2002) [hereinafter Mann, Credit Cards and Debit Cards]; Ronald J. Mann, Making Sense of Payments Policy in the Information Age, 93 GEO. L.J. 633 (2005) [hereinafter Mann, Making Sense of Payments]; James Steven Rogers, The Basic Principle of Loss Allocation for Unauthorized Checks, 39 WAKE FOREST L. REV. 453 (2004); Linda J. Rusch, Reimagining Payment Systems: Allocation of Risk for Unauthorized Payment Inception, 83 CHI.-KENT L. REV. 561 (2008). 9. I have identified only two works that focus on this issue in any detail. See Duncan B. Douglass, An Examination of the Fraud Liability Shift in Consumer Card-Based Payment Systems, FED. RES. BANK OF CHI. ECON. PERSP., 1Q 2009, at 43; Richard A. Epstein & Thomas P. Brown, Cybersecurity in the Payment Card Industry, 75 U. CHI. L. REV. 203 (2008). Some other works touch on payment card fraud liability rules, but do not consider them in detail, as they focus on other types of payment systems. See Robert G. Ballen & Thomas A. Fox, The Role of Private Sector Payment Rules and a Proposed Approach for Evaluating Future Changes to Payments Law, 83 CHI.-KENT L. REV. 937 (2008) (focusing on payment transaction rules among financial institutions); Facciolo, supra note 8 (including a review of checks, ACH debits and wire transfers along with credit and debit cards); Mann, Credit Cards and Debit Cards, supra note 8; Rusch, supra note 8 (focusing on risk-allocation in unauthorized debits from deposit accounts). 10. Epstein & Brown, supra note 9, at 209. Epstein and Brown approach payment systems with a very strong set of anti-regulatory priors, or, as they refer to it, as their “classical liberal perspective.” Id. at 203. Brown, an antitrust attorney, has previously worked in-house for Visa. Id. at n. ††. 2010] Private Disordering? 5 reproach . . . voluntary contracts offer by far the best way to allocate the risks of loss, and the duties of prevention, among the various parties within this elaborate network.”11 Thus, Epstein and Brown “see no reason even for th[e] (modest) restriction on freedom of contract [created by the federal limitation on consumer liability for unauthorized transactions]. If payment card companies think larger penalties are appropriate and disclose such penalties to consumers, the losses should not be socialized as a matter of law.”12 For Epstein and Brown, all liability for unauthorized transactions should be allocated contractually; mandatory (or even default) statutory rules are inappropriate in their view.13 This Article argues that we should be skeptical of the efficiency of private ordering in payment card markets. In a world with a complete set of perfectly competitive markets, private ordering is surely the right outcome—Coasean bargaining would ensure that fraud losses would be allocated to the least cost avoider and the optimal level of care would ensue. But there is never a complete set of perfectly competitive markets except in economists’ models and dogmatic fantasies,14 and Coase’s great lesson is that transaction costs matter; in their presence, the initial allocation of liability is critical.15 Payment card markets are always incomplete, as there are no futures or insurance markets in most areas of payments through which risks can be hedged.16 If one commits to using a payment system, thereby incurring fraud risk, one cannot also short payment fraud futures as a hedge, much less the futures on a particular card or transaction. At best, one could short a payment card network, but that is an imperfect proxy for fraud risk, as the costs to a network from elevated fraud are limited, and is hardly negatively correlated with fraudulent activity on a particular card-linked account.17 Payment card markets are also imperfect because of limited information. For example, it is often impossible to determine how a fraud was perpetrated and therefore who would have been the least cost avoider. Epstein and Brown assume something close to a perfect market in payment systems, noting the “high level of competition that exists everywhere in the credit card industry.”18 Market realities are quite 11. Id. at 209. 12. Id. at 219. 13. See id. at 209, 219, 223. It is unclear whether Epstein and Brown would envisage payment card companies actually bargaining with individual consumers or whether they would simply present consumers with contracts of adhesion in which fraud loss rules were one of many nonnegotiable components of a package offer. 14. See JOSEPH E. STIGLITZ, WHITHER SOCIALISM? 27–44 (1994) (presenting a critique of the first fundamental theorem of welfare economics). 15. R. H. Coase, The Problem of Social Cost, 3 J.L. & ECON. 1, 14–15 (1960). 16. See generally Mark D. Flood, An Introduction to Complete Markets, FED. RES. BANK OF ST. LOUIS REV., Mar.-Apr. 1991, at 32 (explaining incomplete markets, futures, and hedged risks). 17. See generally LEXISNEXIS FRAUD STUDY, supra note 1. 18. Epstein & Brown, supra note 9, at 203. 6 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 different.19 Some parts of payment cards markets are intensely competitive, while others are not.20 Payment card networks—MasterCard, Visa, Amex, Discover, and around a dozen relatively small personal-identificationnumber (PIN)-debit networks—are two-sided networks.21 Network effects, combined with the need to roll out payment networks nationally, at the very least, create high barriers to entry for new networks.22 Further, while there are numerous card issuers and acquirers, the market is heavily concentrated in a handful of institutions. The five (ten) largest card issuers account for 74% (90%) of the credit card market and 43% (51%) of the debit card market in terms of purchase volume.23 More critically, the mere fact that there are numerous competitors does not mean that there is competition along every axis of the market. For example, competition may exist for market share or for price, but not for security. Payment card systems also involve a variety of participants with divergent incentives. This creates intense coordination problems. The networks lead the coordination efforts, but they are driven by their own incentives, primarily to increase the size of the network.24 As long as fraud remains sufficiently low that it does not damage the network’s reputation, the network’s primary concern is maximizing total transaction volume, irrespective of whether the transactions are fraudulent.25 Increasing the size of the network is a function of calibrating the network’s cost allocation (including fraud) to fully leverage network participants’ price elasticity.26 Fraud liability is a cost of using a payment system and is therefore a type of pricing affected by the level of competition in the market. Therefore, more price inelastic participants (those whose demand for a payment system’s services is the least sensitive to price changes) might bear a larger share of fraud losses, regardless of whether they are the least cost avoiders of the fraud. By allocating fraud losses to the most price inelastic 19. See Adam J. Levitin, Priceless? The Economic Costs of Credit Card Merchant Restraints, 55 UCLA L. REV. 1321, 1356–63 (2008) [hereinafter Levitin, Economic Costs]. 20. Id. 21. Id. at 1387. 22. Id. at 1386–87; see also JOHN M. GALLAUGHER, INFORMATION SYSTEMS: A MANAGER’S GUIDE TO HARNESSING TECHNOLOGY (2010), available at http://www.flatworldknowledge.com/ pub/1.0/information-systems-manager%E2%80%99s-/206326#web-206326. 23. See THE NILSON REP. ISSUE 919 (Feb. 2009); THE NILSON REP. ISSUE 918 (Jan. 2009); THE NILSON REP. ISSUE 917 (Jan. 2009); Adam J. Levitin, Interchange Regulation: Implications for Credit Unions, FILENE RESEARCH INST., Nov. 24, 2010, at 1, 39, http://www.federalreserve.gov/newsevents/files/levitin_filene_paper.pdf. 24. See generally Levitin, Economic Costs, supra note 19, at 1356–59, 1364–65, 1398 (detailing ways that networks coordinate their systems to raise revenue and discussing the negative network effect of negative externality). 25. See generally David Charny, Nonlegal Sanctions in Commercial Relationships, 104 HARV. L. REV. 373, 393 (1990) (discussing the nonlegal sanction of loss of reputation among market participants); Schwartz & Janger, supra note 6, at 929–32 (discussing the cost and associated pressures of reputational sanctions). 26. See Levitin, Economic Costs, supra note 19, at 1364–66. 2010] Private Disordering? 7 party, the number of network participants is maximized, but deadweight loss may occur if the most price inelastic network participant is not also the least cost avoider of fraud. Previous work on payment systems has viewed fraud liability rules as unconnected with competition issues.27 Thus, in their groundbreaking paper on the economics of payment system loss allocation rules, written well before the emergence of major payment card antitrust litigation, Professors Robert D. Cooter and Edward L. Rubin noted that “[t]he structure of the financial services industry may cause market failures, such as oligopolistic or monopolistic behavior, but these tend to affect pricing rather than loss allocation.”28 Ironically, though, one of the sources Cooter and Rubin cited for this was the seminal paper on credit card interchange fee competition.29 While Cooter and Rubin viewed loss allocation as a distinct issue from pricing, a major point of this Article is that loss allocation is itself a type of pricing and cannot be viewed as unaffected by antitrust matters. This Article argues that the rules for allocating payment card fraud loss are likely to be suboptimal because they are shaped by discrepancies in market participants’ bargaining power. In payment card networks there is not unfettered bargaining over fraud loss allocation. Instead of Coasean bargaining, there is merely fiat ordering by the most powerful party in the network—the network association itself—which is interested in maximizing total transaction volume, rather than total nonfraudulent transaction volume.30 In such circumstances, we should be skeptical that private ordering achieves socially efficient outcomes. Instead, in a market replete with competition and information problems, private disordering may obtain, and, with it, negative social externalities. To this end, the Article reviews payment card network fraud liability allocation rules, focusing on Visa and MasterCard, the two largest payment card issuers that, combined, accounted for 84% of the total U.S. payment card (debit, credit, and prepaid) market in purchase transaction volume in 2008.31 It shows that liability allocations among card network participants are likely inefficient as they often place liability on parties with little or no ability to prevent fraud.32 The Article also notes international variation in liability rules and security measures, and the fraud arbitrage problems that stem from these variations. International inconsistency in liability rules and 27. Professor Ronald Mann has recognized this point implicitly in his comparative study of credit cards in the United States and Japan. See Mann, Credit Cards and Debit Cards, supra note 8, at 1088–99 (discussing impact of fraud rates on merchant fees). 28. Cooter & Rubin, supra note 8, at 68 n.30. 29. See id. (citing William Baxter, Bank Interchange of Transactional Paper: Legal and Economic Perspectives, 26 J.L. & ECON. 541, 554–55, 586–88 (1983)). 30. See Levitin, Economic Costs, supra note 19, at 1334–38. 31. THE NILSON REP. ISSUE 924, at 8 (Apr. 2009) (comparing 2008 “Totals” for Visa and Mastercard “Credit” and “Debit & Prepaid” categories against 2008 “Credit & Debit Totals”). 32. See Douglass, supra note 9, at 46–47. 8 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 security measures for the same companies in virtually identical markets suggests that private ordering may not be producing optimal results globally.33 While private ordering may not produce optimal results, regulatory intervention poses its own problems. Regulators are subject to their own idiosyncratic concerns and pressures, and they also lack perfect information.34 Yet, if regulatory intervention cannot achieve optimal outcomes, it might still help optimize market outcomes. Thoughtful regulatory intervention can compensate for some of the bargaining power disparities and help achieve an outcome that is closer to that which would obtain in a complete, perfectly competitive market. Accordingly, this Article argues for two complimentary regulatory interventions. First, broader-based payment card security measure coordination should be encouraged. The current coordination mechanism for payment card security—the Payment Card Industry Security Standards Council—features a governance structure that does not adequately represent all interests in payment card networks or provide them with due process. As a result, the Council is perceived as being an instrumentality for the card networks to reinforce the placement of liability on the most price inelastic type of network participant, rather than engaging in effective reforms. To this end, it might be necessary for payment card security coordination to be conducted under a federal aegis.35 Second, card networks should be encouraged to compete more vigorously for merchants, be this through legislation or rulemaking or through antitrust enforcement of payment card network rules pertaining to merchant pricing.36 Fraud costs are part of pricing.37 While the huge transaction costs in coordinating multiple parties in payment card networks defeats true Coasean bargaining, better price competition among networks for merchants will help achieve a result closer to the Coasean ideal. The Article also presents a defense of the federal limitation on consumer liability.38 The federal limitation creates a moral hazard and constrains the range of potential bargaining.39 It is tempered, however, 33. See infra pp. 22–30. 34. Once we accept that the market is flawed, however, there is no inherent reason to favor market solutions over regulatory ones. Both systems might produce suboptimal outcomes, and we have no way of ascertaining which system is more likely to do so or whether an outcome is in fact optimal. In such circumstances, there is no good reason to fall back on anti-regulatory priors. Instead, when efficiency proves an indeterminate metric, it must be jettisoned for a metric, such as political accountability. 35. See infra pp. 30–32. 36. See infra pp. 32–36. 37. See Gillete & Walt, supra note 8, at 500; Adam J. Levitin, The Antitrust Super Bowl: America’s Payment Systems, No-Surcharge Rules, and the Hidden Costs of Credit, 3 BERK. BUS. L.J. 265, 273–74 (2005). 38. See infra Part IV. 39. Douglass, supra note 9, at 46. 2010] Private Disordering? 9 through monetary and nonmonetary deductibles and copayments and reflects a reasonable response to an adverse selection problem and to the enormous informational and bargaining cost asymmetries between consumers and card issuers regarding fraud risk, as well as to consumers’ limited ability to prevent most third-party fraud and limited ability to bear losses relative to other payment card network participants. This Article proceeds as follows. Part I provides an overview of the structure of payment card networks and their loss allocation rules in the United States. Part II questions whether the liability rules do in fact result in a Kaldor-Hicks efficient outcome. Part III considers possible and existing regulatory interventions to level the playing field and move payment card networks closer to Coasean bargaining outcomes. Part IV examines the consumer loss liability rules and presents a defense of the federal limitations on consumer liability of unauthorized transactions. An important introductory note: this Article focuses solely on the issue of allocation of losses for unauthorized transactions. It does not generally address the related issues of liability for compromised payment data storage or data transmission that results in fraud losses for others. Data security breaches have become a major issue in payment card security in recent years. Whether there should be some form of tort liability for data security breaches, whether liability should be set by private ordering, what the liability standard should be, and whether compliance with industry standards such as Payment Card Industry Data Security Standard would be sufficient to relieve liability are important questions.40 Ultimately, however, flaws in data storage or data transmission only matter to the extent that unauthorized transactions can occur. The data have no inherent value; the data’s attraction to fraudsters derives solely from their ability to capitalize on it, and using it for fraudulent transactions is the most immediate way to do so.41 Thus, data breach liability is better conceived as liability for potential fraud and the steps that must be taken to reduce the likelihood that the breach will translate into fraud, such as reissuance of cards with new numbers following a breach. It is also often difficult to trace the unauthorized use of a card to a particular data security breach, which makes the liability relationship more tenuous.42 To be sure, there are improvements that can and should be made in data storage and transmission—tokenization and end-to-end encryption should both be pursued vigorously.43 But those improvements will not eliminate fraud 40. Cf. The T.J. Hooper, 60 F.2d 737, 740 (2d Cir. 1932) (Hand, J.) (suggesting that industry standard is not necessarily the proper standard of diligence as “a whole calling may have unduly lagged in the adoption of new and available devices”). 41. Not all data breach issues even relate to payments, although payment data is the most readily monetizable type of data. 42. Sullivan, supra note 1, at 108, 110. 43. Tokenization is a data fortification strategy. It is meant to address the problem of data residing in relatively vulnerable locations, such as with retailers. Tokenization means that data 10 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 problems. Better data protection will make it harder to get the data necessary to commit certain types of fraud, but the critical line of fraud defense for all third-party fraud is transaction authorization. I. PAYMENT CARD NETWORKS AND LIABILITY RULES A. STRUCTURE OF PAYMENT CARD NETWORKS Payment card transactions all involve multi-party networks of financial institutions, consumers, and merchants. Transmission of a payment from a consumer to a merchant to pay for goods or services is conducted through at least three financial institutions: the consumer’s bank (the issuer bank), the merchant’s bank (the acquirer bank), and the card network association (MasterCard, Visa, Amex, Discover, or PIN debit network) that intermediates between the banks and sets the rules governing their transactions. Thus, a payment card transaction involves at least five parties, although in the case of American Express and Discover,44 the card network is often also the card issuer and the acquirer. (See Figure 1). Figure 1. Payment Card Network Structure Often a payment card transaction involves additional parties. Acquirers frequently outsource all but the financing element of their operations. The task of recruiting merchant customers for the acquirer is often outsourced to an independent sales organization (ISO), and all the technical linkages between the merchant and the card network association are often outsourced resides in harder-to-hack “fortified” locations; merchants would only retain a “token” number that links to the data stored off-site. Instead of residing with merchants, who do not specialize in data security, tokenization moves the data to companies with expertise and reputational capital (and potentially insurance policies) that guarantee data protection. End-to-end encryption means that card data is never transmitted in an unencrypted form. 44. Levitin, Economic Costs, supra note 19, at 1328. 2010] Private Disordering? 11 to a separate data processor.45 For Internet transactions a separate gateway provider might also be involved.46 In a payment card transaction, the consumer must first transfer information about the consumer’s account (either funded or a line of credit) to the merchant, or more precisely, to the merchant’s acquirer or data processor. This can be done in several ways. The information can be transferred electronically via a magnetic swipe. The information can be transferred electronically via radio-frequency identity (RFID) chip (“contactless”). The information can be transferred physically via an impression made by an imprinter (a “knucklebuster”). The information can be transferred orally and recorded by hand. The information can be transferred in a written form, as occurs in mail-order transactions. Or the information can be transferred electronically via a Web site. Some transactions require additional information (such as a PIN number or a ZIP code) to be conveyed via a PIN pad. Once this information is conveyed to the merchant, it is then relayed to the credit card network by the merchant’s processor for authorization, capture, and settlement (ACS).47 Authorization involves the card network first verifying that the card is real and then the issuer approving the transaction. Once a transaction has been authorized, it may then be captured. Capture involves the transfer of funds from the issuer bank to the acquirer bank. The transfer is done between the institutions’ accounts at the card network association, which serves as a clearinghouse for the payments.48 The issuer transfers to the acquirer the amount of the transaction minus a fee, known as the interchange fee.49 The interchange fee is set by the network and varies by the type and size of the merchant, the type of card (consumer or commercial, credit or debit), and the level of rewards on the card.50 The card network also takes out various fees to cover its costs of processing the transaction plus its profit margin.51 Thus, the network debits the issuer’s account for the amount of the transaction less 45. See Ramon P. DeGennaro, Merchant Acquirers and Payment Card Processors: A Look Inside the Black Box, FED. RES. BANK ATLANTA ECON. REV., 1Q 2006, at 27, 31. 46. Adam J. Levitin, Priceless? The Social Costs of Credit Card Merchant Restraints, 45 HARV. J. ON LEGIS. 1, 5 n. 13 (2008) [hereinafter Levitin, Social Costs]. 47. Sometimes the merchant never actually has control over the data, which instead goes straight to the processor. 48. DeGennaro, supra note 45, at 33. 49. U.S. GOV’T ACCOUNTABILITY OFFICE, GAO-08-558, CREDIT AND DEBIT CARDS: FEDERAL ENTITIES ARE TAKING ACTIONS TO LIMIT THEIR INTERCHANGE FEES, BUT ADDITIONAL REVENUE COLLECTION COST SAVINGS MAY EXIST 1 (2008). 50. See Levitin, Economic Costs, supra note 19, at 1333. 51. Historically, MasterCard and Visa were mutual organizations owned by their member institutions. Accordingly, they only charged a “switch” fee to cover their costs of processing transactions. Since becoming publicly-traded stock companies, however, MasterCard and Visa have needed to operate on a for-profit basis and have added additional fees. 12 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 the interchange fee and credits the acquirer bank’s account for the transaction amount minus both interchange and network fees. Finally, the transaction is settled, meaning that the acquirer credits the merchant’s account with the funds representing the transaction amount minus its own fee, called the merchant discount fee. The merchant discount fee is set to cover the interchange fee and network fees paid by the acquirer, as well as the acquirers’ other costs and a profit margin. Frequently the merchant discount fee is explicitly priced as “interchange plus”—as a spread over the applicable interchange and network fees—making interchange and network fees functionally pass-thru fees to the merchant.52 When a transaction is reversed (referred to as a “chargeback”), the system works backwards.53 The acquirer transfers funds from the merchant’s account to its account and then to the network. These funds are captured in the issuer’s account. The issuer then settles the funds back in the consumer’s account. Chargebacks generally involve their own set of additional fees from the network to the acquirer and thence from the acquirer to the merchant.54 The interchange and network fees on the original transaction are not always refunded to the merchant when there is a chargeback.55 Payment card networks are “two-sided networks,”56 meaning that they have two distinct types of end customers: merchants and consumers. Payment card networks are unique among two-sided networks, however, in that they have not only two different types of end customers, but also two different types of intermediate customers: acquirers and issuers. The existence of these four different types of customers significantly complicates the economic workings of payment card networks. In a two-sided network, the value of participating in the network to one type of customer depends on how many of the other type of customer are participating. For example, heterosexual bars and newspaper classifieds are both examples of two-sided networks. At heterosexual bars, the appeal of 52. Interchange Reimbursement Fees, MERCHANT COUNCIL, http://www.merchantcouncil.org/ merchant-account-information/rates-fees.php (last visited Oct. 16, 2010). A “blended rate” that gives merchants a single merchant discount rate, regardless of the particular mix of interchange rates on the cards used, is a common alternative, especially for smaller merchants. Id. (Enhanced Recover Reducer (ERR)). 53. Chargebacks & Dispute Resolution: Chargeback Cycle, VISA, http://usa.visa.com/mercha nts/operations/chargebacks_dispute_resolution/chargeback_cycle.html (last visited Oct. 16, 2010). 54. Merchant Card Processing: Frequently Asked Questions, BANK OF AMERICA, http://www.bankofamerica.com/small_business/merchant_card_processing/index.cfm?template=f aqs#cb_2 (last visited Oct. 16, 2010). 55. See generally MASTERCARD WORLDWIDE, CHARGEBACK GUIDE (Apr. 16, 2010) [hereinafter MASTERCARD CHARGEBACK GUIDE]. 56. But see Dennis W. Carlton & Alan S. Frankel, Transaction Costs, Externalities, and “TwoSided” Payment Markets, 2005 COLUM. BUS. L. REV. 617, 626–31 (arguing that the concept of two-sided markets is insufficiently defined and that most markets can be described as two-sided because consumers benefit from the supply created in response to the demand of other consumers). 2010] Private Disordering? 13 the bar to men depends on the number of women present and vice-versa. Straight men do not want to go to bars populated only by other straight men, and straight women do not want to go to bars populated only by other straight women. Likewise, newspaper classifieds are of interest to advertisers based on the number of readers and to readers based on the number of advertisers. Advertisers want classified readers and classified readers want advertisers. Similarly, the value of being a cardholder in a payment card network depends on the number of merchants in the network and vice-versa. In card networks, as with other two-sided networks, the increase in marginal value from greater network participation diminishes as the network grows. It is of little consequence to a consumer if a card network has 50 million or 50 million and one merchants in the network. Once a network is sufficiently well established, its marginal size is of limited importance to its value to its participants. A multi-bank payment card network like MasterCard or Visa (and American Express and Discover for their third-party issuers) has a more delicate balancing act to maintain than simply achieving a balance between the two types of end-users, consumers and merchants. Multi-bank networks also have to ensure participation of a sufficient number of both issuers and acquirers in order to ultimately optimize and grow end-user participation.57 The existence of both intermediate customers and end-customers for payment card networks further complicates the dependency. The value of a network to the intermediate customers—issuers and acquirers—depends not on the number of the other type of intermediate customer, but on the number of the other type of intermediate customer’s end-customer. Acquirers care about the number of cardholders in the network, and issuers care about the number of merchants.58 This is not the case for the endcustomers. It is irrelevant to consumers and merchants how many intermediate customers (issuers and acquirers) are in the network;59 instead, network value depends on the numerosity (and geographic and industry concentration) of the other type of end-customer.60 Price elasticities—willingness to pay—for network services are likely to differ between customer types in a two-sided network. Because the value of the network to its participants depends on increasing the size of both sides of the network, pricing of access to the network involves allocating network costs to the different types of participants according to their price elasticity in order to maximize the size, and hence value, of the network.61 57. See id. at 631–37. 58. See Levitin, Economic Costs, supra note 19, at 1377. 59. Consumers care about the number of issuers of cards in general, but for reasons related to competition for card provision, rather than network dynamics. 60. See Levitin, Economic Costs, supra note 19, at 1364–65. 61. Id. 14 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 A central role of the network association is to coordinate optimal participation in the network through price manipulation, both in terms of direct monetary pricing and indirect pricing through network rules that impose liability on network participants for losses or limit network participants’ ability to reallocate costs to other network participants.62 For merchants, these costs are the merchant discount fee, any sunk equipment fees, and fees to ISOs and processors, as well as the costs of fraud. For consumers using a credit card, these costs are an annual fee (if any), the costs of revolving a balance, ancillary fees (over-limit, late, cash advance, foreign transaction, e.g.), and the costs of fraud.63 For consumers using a debit card, the costs are account maintenance fees (if any), overdraft fees (if any), and the costs of fraud. For merchants and consumers, fraud costs are part of the total cost of participating in a payment card network. Fraud liability is a price component, just not one that is explicitly priced. Payment card network associations do not have contractual privity with the end-users of the networks.64 Accordingly, they do not have direct control over the total price for the end-users. They may exercise this control only indirectly through their pricing and rules for issuers and acquirers. These prices and rules set a floor for the pricing and rules that issuers and acquirers apply to their respective end-users, consumers, and merchants. While the payment card networks’ rules technically bind only the card networks’ member institutions—issuer and acquirer banks—the costs are passed on to the end-users to the extent permitted by law (and card association rules).65 B. PAYMENT CARD LIABILITY RULES IN THE UNITED STATES In the United States, the liability for unauthorized payment card transactions is allocated partially by statute and partially by private ordering. Federal law generally limits individual consumer liability for unauthorized transactions to $50 for credit and debit cards, albeit with important exceptions discussed in Part IV, infra.66 The liability of merchants and financial institutions is determined through private ordering under payment card network rules. The payment card networks’ rules technically bind only the card networks’ member institutions—issuer and acquirer banks. Acquirers, however, uniformly pass on their liability to their merchants by contract, sometimes adding fees. 62. Id. at 1334–38 (describing network rules that restrict merchants’ ability to reallocate costs to consumers). 63. Consumers bear the cost of interchange indirectly in the form of higher prices or reduced merchant services. See Levitin, Social Costs, supra note 46, at 27–37. 64. See Levitin, Economic Costs, supra note 19, at 1327–31. 65. See id. at 1334–39. 66. See supra note 4. 2010] Private Disordering? 15 All payment card networks have substantially identical rules,67 although there is variation in the often inscrutable details. In certain circumstances, the issuer is allowed to chargeback the transaction to the acquirer, thereby putting loss liability on the acquirer.68 The card networks’ rules governing chargebacks are extremely complicated and run hundreds of pages long, but they can largely be summarized as follows: for card-present transactions, where the merchant can physically examine the card and obtain a signature or PIN code, the issuer bears all liability for unauthorized transactions, provided that the merchant followed the required security steps. These steps generally involve inspection of the card, obtaining authorization from the issuer for the transaction, and obtaining a signature from the cardholder.69 Signatures, as we shall see, are not authorization devices, but ex post loss allocation devices. Card-present transactions include any transaction in which the card is physically swiped at a magnetic stripe (mag stripe) reader in the presence of the merchant’s employee, and is imprinted on a “knucklebuster” or otherwise physically handled by the merchant. Some networks also include small ticket (“No Signature Required”) transactions and contactless or “proximity” RFID transactions in this category.70 For card-not-present (CNP) transactions, such as mail-order and telephoneorder (MOTO) or Internet transactions, the acquirer (and hence the merchant) bears all liability for unauthorized transactions.71 67. See MASTERCARD WORLDWIDE, MASTERCARD RULES (May 12, 2010) [hereinafter MASTERCARD RULES]; VISA, INT’L OPERATING REGULATIONS (Apr. 1, 2010) [hereinafter VISA INT’L REGULATIONS]; AMERICAN EXPRESS, MERCH. REGULATIONS—U.S. (Apr. 2010); DISCOVER, MERCHANT OPERATING REGULATIONS, RELEASE 10.2 (Apr. 16, 2010) [hereinafter DISCOVER MERCHANT OPERATING REGULATIONS]. 68. See, e.g., VISA, INT’L OPERATING REGULATIONS—DISPUTE RESOLUTION PROCEDURES 20 (Nov. 2, 2009), available at http://usa.visa.com/download/merchants/visa-international-operatingregulations-dispute-resolution-rules.pdf [hereinafter VISA DISPUTE PROCEDURES]. 69. Id. at 100–02. Gas station pump transactions, which require a physical card to be swiped, do not qualify as “card-present” because there is no physical examination of the card by a station employee. 70. See id. at 102–03; AMERICAN EXPRESS, MERCH. REGULATIONS—U.S. (Oct. 2009) § 4.6.2., at 31. The shifting of fraud liability from merchants to issuers for these types of transactions is to foster merchant acceptance of contactless and signature-free transactions, which issuers might anticipate resulting in larger ticket transactions because of the seamlessness of the spending process. 71. VISA DISPUTE PROCEDURES, supra note 68, at 112–13. There are some important exceptions to this rule. For example Visa puts the loss on the issuer if the merchant shipped merchandise and the issuer did not participate in its Address Verification Service. Id. at 114–15. 16 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 II. WHAT HATH PRIVATE ORDERING WROUGHT? A. WHO IS THE LEAST COST AVOIDER? CARD-PRESENT TRANSACTIONS In a world of perfect markets, liability for a harm is optimally allocated to the least cost avoider of that harm.72 The fact that payment cards are twosided networks is irrelevant to the application of the least cost avoider principle; allocating the loss to the least cost avoider is the efficient outcome, regardless of varying price elasticities between merchants and card issuers. This can be seen from considering how the total value of a payment system to its participants varies with fraud loss allocation. The total value (V) of a payment system to its participants is equal to their collective net benefit from the system excluding fraud costs (E) minus fraud costs (F). Thus, V=E-F. We can refine this as V=EMerchant+EBank-FMerchantFBank. The values of FMerchant and FBank depend on which party is liable for fraud. If a party is not liable, then its fraud costs are zero. For simplicity’s sake, assume that fraud costs can either be allocated wholly to the merchant or wholly to the issuer bank, but not shared. Therefore, if the costs are allocated wholly to the merchant, FBank= 0, and if the costs are allocated wholly to the card issuer, then FMerchant=0. Thus, the value maximizing proposition depends on whether EMerchant+EBank-FMerchant >?< EMerchant+EBank-FBank, which means it depends on whether the issuer bank and the merchant are liable, FBank>?<FMerchant. The relative values of FBank and FMerchant depend on how cheaply each party can avoid fraud, as F, the total costs of fraud, is the sum of fraud losses plus fraud avoidance expenses. If the merchant can avoid fraud more cheaply then the issuer bank, then FBank>FMerchant, and V will be maximized by placing liability on the merchant, whereas if the issuer bank can avoid fraud more cheaply, then FBank<FMerchant, and V will be maximized by placing liability on the issuer bank. The key point to see here is that E is irrelevant to the outcome. E is the net benefit that the network’s participants derive from participating (excluding fraud costs). The participants’ maximum willingness to pay in the absence of fraud costs—the limit to their price elasticity—must equal E, as they will not pay beyond the net benefit received. This means that the network participants’ price elasticity is irrelevant for the application of the least cost avoider principle. Even in a two-sided network, then, the least cost avoider principle is unaltered. 72. See, e.g., GUIDO CALABRESI, THE COST OF ACCIDENTS: A LEGAL AND ECONOMIC ANALYSIS 136–38 (1970) (exploring the least cost avoider in a typical car and pedestrian accident). 2010] Private Disordering? 17 So, are fraud losses in payment card networks allocated to the least cost avoider? Are the card networks’ fraud loss allocation rules efficient? For card-present transactions, the rules place the loss on the issuer, unless the merchant has failed to follow some basic steps in inspecting the card and obtaining a signature or PIN (with exceptions for proximity and no-signature small ticket transactions).73 Consider how this allocation applies in the five basic card-present fraud situations:74 1. The “friendly fraud” or “first-party fraud” scenario, when a real cardholder uses his or her card to obtain goods or services and then denies having authorized the transaction or otherwise claims that the transaction was defective (by claiming nondelivery of goods or nonconforming merchandise, e.g.). 2. The “stolen card” scenario, when a card is stolen and used by the thief (or a taker from the thief) to perform a transaction. The card is a real card being used by an unauthorized user. 3. The “fraudulent issuance” scenario, when a transaction is performed on a real card that was issued based on fraudulent information (typically to a fictitious individual). The card is a real card being used by an authorized (but fake) user. 4. The “real account, counterfeit card” scenario, where the transaction is performed using a counterfeit card that uses real data copied from an actual card. The card is a fake card, but the user is an authorized user. 5. The “fake account, counterfeit card” scenario, where a transaction is performed using a counterfeit card that uses generated data that does not match any actual account (but often partially matches with fraudster). This is a fake card with an unauthorized user. For situation one, the “friendly fraud” or “first-party fraud” scenario, the least cost avoider is the consumer. If it can be shown that the consumer did in fact perform the transaction, the consumer will bear the liability (assuming the consumer can be found and is solvent). In this scenario, there is no particular care that either the merchant or the issuer can take to avoid the fraud ex-ante. The transaction is indistinguishable from a legitimate purchase until the cardholder denies having made the transaction. At that point, the question is whether there is sufficient proof that the transaction was in fact properly authorized. Proof of authorization depends on the authorization method. If the merchant follows authorization protocols, then the issuer is the least cost avoider, as the issuer controls the authorization procedures. Accordingly, if the first-party fraud cannot be proven, the issuer 73. VISA DISPUTE PROCEDURES, supra note 68, at 100–07. 74. This Article does not address the various merchant-initiated fraud situations that can arise, including factoring for money laundering purposes. 18 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 bears the liability in the card-present environment. This means that liability rests on the least cost avoider. For situation two, the “stolen card” scenario, if the consumer received the card, then the consumer is likely the least cost avoider, at least until the point that the card’s theft is reported, at which point the issuer is the least cost avoider as the issuer can simply deactivate the card and deny any authorization requests.75 Likewise, if the consumer did not receive the card because it was intercepted by a fraudster, then the issuer would be the least cost avoider as the issuer controls the card activation procedures. The merchant is unlikely to be the least cost avoider for a stolen or intercepted card. The merchant might be able to recognize a card as stolen based on an obvious mismatch of the user and the name on the card—such as if Dolly Parton used Barack Obama’s credit card—but card network rules do not expect merchants to catch obvious mismatches, and the merchant may generally not demand identification as a condition of accepting the card.76 Card network rules do generally require merchants to compare the signature on the charge slip with the specimen signature on the card,77 but signature matching is an art, not a science, at least when practiced by store clerks, and is of little use in preventing fraud. The signature of a harried consumer, such as one in a grocery line attempting to soothe a bevy of bawling toddlers, is likely to vary significantly from a calmly written specimen. In a typical commercial context, the store clerk never examines the card in any way, not least because it is not an efficient use of the clerk’s time. Even if a merchant’s employees were diligent in examining signatures, the fraud reduction savings would likely be minimal. These savings would also be unlikely to offset the costs to the merchant from slower transaction speed at the register, namely the loss of sales because of greater transaction costs for customers due to increased wait times at the register or the cost of hiring more employees to work at the register. As 75. The major exception is the small minority of U.S. card transactions that are not authorized in real time (e.g., knucklebuster or telephone transactions). In those cases, the merchant may have parted with the merchandise before obtaining an authorization. When a merchant delivers without having obtained prior authorization, then the merchant is the least cost avoider. 76. MASTERCARD RULES, supra note 67, § 5.8.4, at 5-17; VISA INT’L REGULATIONS, supra note 67, at 468 (only requiring merchant review of additional identification where the signature panel is blank). The merchant may also require the cardholder’s address or ZIP code for certain transactions. MASTERCARD RULES, supra note 67; VISA INT’L REGULATIONS, supra note 67, at 469. Discover requires merchants to examine two pieces of identification, one of which must be government issued for authorizing transactions on unsigned cards, but its rules are silent regarding examination of extrinsic identification for signed cards. See DISCOVER MERCHANT OPERATING REGULATIONS, supra note 67, § 3.1.2.1. 77. See, e.g., MASTERCARD CHARGEBACK GUIDE, supra note 55, §§ 2.1.6.3.1–3.2; VISA INT’L REGULATIONS, supra note 67, at 463–64; DISCOVER MERCHANT OPERATING REGULATIONS, supra note 67, §§ 3.1.2–3.1.2.1. 2010] Private Disordering? 19 with situation one, the ultimate least cost avoider in a stolen/lost card scenario is the issuer, and that is where liability rests. In situation three, involving a fraudulently issued card, the issuer is the least cost avoider. There is no real consumer, and the merchant has even less ability to detect the fraud than with a stolen card, as the card information, including the signature, can be tailored to match that of the fraudster using the card. Again, the least cost avoider is liable. In situation four, “real account, counterfeit card,” it is not clear who is the least cost avoider. As the counterfeit card is made using real consumer data, data protection is the critical issue for preventing this type of fraud. The least cost avoider for data protection varies as data flows through the transaction process and is also retained for various purposes. But even with optimal data protection, there is still the possibility of “skimming”—the recording of card data from a magnetic stripe when the card is tendered to a merchant’s employee (a particular problem in restaurants).78 The skimmed data is then encoded onto a counterfeit card (or used in card-not-present transactions). Thus for “real account, counterfeit card” the least cost avoider largely depends on how the fraudster obtained the real account information. Depending on how the information was obtained, the consumer, issuer, merchant or acquirer/processor could be at fault. Once the information is in circulation, however, the ability to prevent the counterfeiting largely depends on the issuer and the network and the security features they require for physical cards. The merchant is unlikely to detect the counterfeit. The merchant has no particular skill or ability to detect a counterfeit card beyond a blatantly poor forgery. This means the merchant has virtually no ability to stop the fraud. As the issuer controls the physical design of the card, and hence the ease of counterfeiting, the issuer is the least cost avoider, and yet again, the issuer is liable. In situation five, with a counterfeit card using fake account information, the least cost avoider is likely the issuer. In this situation there is no actual consumer, and the merchant has little ability to detect the forgery. While the network and issuer have control over the physical characteristics of the card, which affect ease of counterfeiting, the issuer must authorize the transaction, and if the card does not match an existing account number, the issuer can easily deny the transaction. As with the other card-present scenarios, the issuer is the least cost avoider and is liable. For card-present transactions, the least cost avoider may vary somewhat situationally, but it is typically the issuer. It makes sense to require the merchant to take basic anti-fraud steps and, if followed, place the loss on the issuer, who is then the least cost avoider. This is exactly what card 78. See Facciolo, supra note 8, at 629. 20 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 network rules mandate. Thus, the current arrangement of loss allocation for card-present rules seems largely sensible. B. WHO IS THE LEAST COST AVOIDER? CARD-NOT-PRESENT TRANSACTIONS Card-not-present transactions present a different story. CNP liability rules are a product of the historical development of payment card markets. When card networks first began, there were no CNP transactions. All transactions required physical presentment of the card, and the issuer bore the risk of unauthorized transactions (as explained above) as merchants were unwilling to assume fraud risk for a nascent technology over which they had little control.79 Merchants, however, wanted to be able to take cards for mail-order and telephone-order (MOTO) transactions, where no card would be presented physically.80 Issuers were reluctant to assume fraud risk for these transactions, even if the expiry date was used as a password and merchandise was required to be sent to the cardholder’s billing address.81 Merchants concluded that the gains from these transactions outweighed the fraud risks, so they agreed to assume liability for unauthorized MOTO transactions82 (certainly it was no riskier for them than shipping before a check was received and cleared). The fraud liability rules made sense in their historical origins. Today, however, they are less sensible, as most CNP transactions are not MOTO, but Internet transactions. Historically, card fraud involved situations one through four (friendly fraud, stolen card, fraudulent issuance, counterfeit card using actual information), but not situation five (new account fraud). Fraudsters would obtain the card or card data of a real cardholder and would use it to purchase goods that would be shipped to the fraudster. Contemporary fraud involves both existing account fraud and new account fraud.83 The problem with CNP liability rules is that they do not account for changed circumstances. Now, as before, merchants have little ability to 79. Admittedly, until the 1970s, fraud prevention for card-present transactions was also quite difficult, as transactions were not authorized in real time. See ROSS J. ANDERSON, SECURITY ENGINEERING: A GUIDE TO BUILDING DEPENDABLE DISTRIBUTED SYSTEMS 394–95 (Carol A. Long, ed., 2001); Steve Mott, Perhaps It’s Time to Mothball the Mighty Mag-Stripe, PYMTS (2010), http://www.pymnts.com/perhaps-it-s-time-to-mothball-the-mighty-mag-stripe. 80. See ANDERSON, supra note 79, at 394. 81. Id. at 394. 82. See CYBERSOURCE, MANAGING RISK ON THE NET WHITE PAPER: WHAT INTERNET MERCHANTS NEED TO KNOW 2 (2000), available at http://www.cybersource.com/resources/colla teral/pdf/ifs_wp111500.pdf. 83. Joseph Campana, Identity Theft: More than Account Fraud: What Everyone Should Know 1 (Apr. 2006) (unpublished manuscript), available at http://www.jcampana.com/JCampana Documents/IdentityTheftMoreThanAccountFraud.pdf. 2010] Private Disordering? 21 prevent CNP fraud in any of these situations. The merchant’s role in the transaction is limited to requiring whatever information the network and/or issuer require. The merchant has no ability to verify the information or the identity of the customer.84 Moreover, CNP merchants face substantially higher interchange rates than card-present (CP) merchants in addition to a different set of fraud rules.85 Issuers’ ability to prevent CNP fraud, however, has changed dramatically. Advances in card security arguably make CNP transactions safer than CP transactions.86 In a CNP transaction, it is easy to require the cardholder to transmit not only the card account data and the Card Verification Value (CVV),87 which is written on the back of the card and not included in the card number on the front or on the mag stripe, but also the billing address, billing telephone, or e-mail address information. If additional information beyond the card account data—the account number, the account holder’s name, and the expiry data—is required, then a fraudster needs more than the physical card (which is easy to forge given that mag stripe technology is now over thirty years old88) or a copy of the face of the card to use the card successfully. Accordingly, the issuer has the ability to prevent at least some CNP fraud. The issuer can first verify the information supplied to the merchant to ensure that it is a real account and that the card information matches the CVV code on the back of the card. Second, the issuer can verify the billing 84. See Mann, Making Sense of Payments, supra note 8, at 6771 (noting that in CNP settings, merchants lack a “credible mechanism for verifying the identity of the purported cardholder”). 85. See DELL LETTER, supra note 3, at Appendix 1 (listing the “Differential Between Card Present and Card Not Present Visa Debit Interchange Fees”); Letter from Paul Misener, Vice President for Global Pub. Policy, Amazon.com, to Louise L. Roseman, Dir., Div. of Reserve Bank Operations and Payment Sys., Federal Reserve Board of Governors 14 (Nov. 20, 2010), available at http://www.federalreserve.gov/newsevents/files/amazon_comment_letter_20101120.pdf (showing that there is as much as a 98 basis point and two cents difference in CNP and CP interchange rates); see also Letter from Joshua R. Floum, Exec. Vice President, General Counsel and Secretary, Visa U.S.A., Inc., to Louise L Roseman, Dir., Div. of Reserve Bank Operations and Payment Sys., Federal Reserve Board of Governors 13 (Nov. 8, 2010), available at http://www.federalreserve.gov/newsevents/files/visa_comment_letter20101118.pdf (noting that interchange rates reflect fraud risks). 86. See generally VISA, GLOBAL VISA CARD-NOT-PRESENT MERCHANT GUIDE TO GREATER FRAUD CONTROL: PROTECT YOUR BUSINESS AND YOUR CUSTOMERS WITH VISA’S LAYERS OF SECURITY, available at http://usa.visa.com/download/merchants/global-visa-card-not-presentmerchant-guide-to-greater-fraud-control.pdf. 87. This code is variously called the Card Security Code (CSC), Card Verification Value (CVV or CV2 or CVV2), Card Verification Value Code (CVVC), Card Verification Code (CVC), Verification Code (V-Code or V Code), or Card Code Verification (CCV). The two included in some abbreviations is to distinguish it from the code on the front on the card and mag stripe (the card number). See Kimberly Kiefer Peretti, Data Breaches: What the Underground World of “Carding” Reveals, SANTA CLARA COMP. & HIGH TECH. L.J. 375, 387 n. 66 (2009); see also Card Security Code (CSC) and Card Verification Value (CVV), BOOTSTRAP, http://mediakey.dk/~cc/card-security-code-csc-and-card-verification-value-cvv (last visited Oct. 19, 2010). 88. See Mott, supra note 79. 22 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 address or other borrower information. Third, the issuer can use statistical fraud prevention tools called neural networks that can identify anomalies in spending behavior by analyzing transactions in relation to the cardholder’s transaction history, looking for outliers in geography, merchant type, and transaction amount. The speed of these networks allows issuers to prevent suspicious transactions at the authorization stage. Thus, if an 18-year old Peoria resident’s card was used at 5PM CDT to make a purchase at a fast food restaurant in Peoria, and then used at 5:15PM CDT to purchase a $2,000 dinner in Paris, there is likely a fraud occurring. The issuer can deny the questionable transaction and freeze the account until and unless the real cardholder contacts the issuer to unlock the account by providing some additional verification information.89 Critically, only the issuer has the ability to examine data from multiple transactions to observe transaction patterns; merchants only observe one-off transactions. Issuers’ ability to prevent unauthorized CNP transactions has advanced by leaps and bounds since the 1970s, when MOTO transactions began.90 Moreover, issuers no longer need to be induced to authorize CNP transactions; e-commerce is so well established that issuers cannot and would not abandon the market if they were to bear liability for unauthorized transactions. The efficiency of CNP liability rules is suspect in light of changes in the marketplace. Originally, it made sense for merchants to bear the risk of fraud on CNP transactions because there was no effective avoidance and because merchants gained the greatest benefit from the transactions. Now issuers are the clear least cost avoider. Accordingly, placing the liability on issuers would be the efficient outcome; indeed, it would likely encourage greater security efforts, such as the use of two-factor identification methods that rely on factors other than CVV and billing address, such as a randomly generated PINs, which would be known only to the cardholder, absent cardholder carelessness.91 C. MAKING SENSE OF THE LIABILITY RULES Payment card network rules for allocating liability for unauthorized transactions seem well-designed for card-present transactions, but are 89. To be sure, the issuer’s ability to prevent fraud is far from perfect. Small ticket, local transactions are unlikely to get noticed. But compared to the merchant, the issuer has much greater ability to avoid the fraud. Yet, liability for CNP transactions is not on the issuer. 90. ANDERSON, supra note 79, at 394. 91. To be sure, we might ask whether their current situation is Kaldor-Hicks efficient. Why don’t merchants simply pay issuers for greater security measures up to the point where there would be no marginal benefit? The answer is because of a coordination problem due to high transactions—there are millions of merchants and thousands of issuers that must be coordinated— and because of a free-riding problem. The benefits of improved issuer fraud prevention are shared by all merchants. If any merchant paid for better security, it would have to share the benefits with free-riders. Better, a merchant would calculate, to free-ride, than to be freely ridden. 2010] Private Disordering? 23 unlikely to be optimal in a CNP setting. Figure 2 summarizes the variations between actual rules and the likely optimal rules, assuming that all authorization procedures are properly followed by the merchant. Figure 2. Actual and Likely Optimal Fraud Allocation Rules EXISTING ACCOUNT FRAUD ACTUAL OPTIMAL RULE RULE CARD PRESENT CARD NOT PRESENT ISSUER MERCHANT NEW ACCOUNT FRAUD ACTUAL RULE OPTIMAL RULE ISSUER ISSUER ISSUER ISSUER MERCHANT ISSUER Why would the United States have suboptimal liability rules for payment card networks? Part of the answer is historical. As Part II.B. explained, for CNP transactions, rules that made sense in their original context have ossified and become outmoded by changes in technology. The history of the payment card networks themselves explains this ossification. Until 2005–2006, MasterCard and Visa, the largest payment card networks, were mutual organizations dominated by their large issuer banks.92 The large issuer banks had little incentive to change the CNP liability rules. Under the rules, issuers incur fraud losses that are only a fraction of merchants’.93 Thus in 2009, issuers incurred $0.95 billion in total (CP and CNP) fraud losses.94 In contrast, one study puts merchants’ total fraud losses at over $100 billion.95 While issuers are the least cost avoiders, they do not bear most of the costs of fraud. Therefore, they have little incentive to engage in aggressive anti-fraud efforts.96 For example, networks and issuers have persisted in using mag stripe cards with account numbers embossed on the front.97 These cards are extremely vulnerable to 92. 93. 94. 95. 96. Levitin, Economic Costs, supra note 19, at 1327–28. LEXISNEXIS FRAUD STUDY, supra note 1, at 23. Kate Fitzgerald, supra note 1, at 17. LEXISNEXIS FRAUD STUDY, supra note 1, at 23. In theory, in the credit card space, the other two networks, American Express and Discover, could have tried competitive differentiation based on different CNP fraud rules. However, these networks had little to gain from such differentiation. At best, it would increase their merchant acceptance rates, but it would not necessarily garner them more transactions, as merchants do not choose which card network a payment will be on. Moreover, these networks are also their own primary issuers (and were their sole issuers before 2005), so the competitive benefits from signing up more merchants would have to be weighed against the network-issuer incurring greater fraud losses. The calculus, apparently, weighed in favor of keeping the losses on merchants. For debit cards, CNP transactions have never been a critical issue because there are very few CNP debit transactions. MOTO and Internet debit transactions are rare. 97. See Mott, supra note 79. 24 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 skimming, to use when they are stolen, and to having account numbers simply copied down and then used in CNP transactions.98 Simple steps such as adopting Chip & PIN technology (discussed in more detail in the next section) would frustrate skimming and theft, while card numbers need not be displayed on the card.99 Anti-fraud efforts must be implemented by issuers, but the role of setting standards falls to the network association itself. The problem is that the network associations compete with each other for issuer membership. The networks make most of their revenue from per transaction fees.100 This means that they want to increase volume on their cards, which in turn means that they need to have more cards in circulation. In order to increase the number of cards, networks need to have more and larger issuers in their stables. Networks thus compete for issuers. If a network required greater anti-fraud measures from issuers, it would impose additional costs on issuers and therefore make itself less attractive to them. The full cost of anti-fraud would be borne by the issuer, but the benefits would accrue primarily to the merchant, and issuers have little interest in subsidizing merchants for the overall good of the network. Mandating additional anti-fraud measures can cost a network market share, while bringing the network itself no tangible benefit. D. INTERNATIONAL VARIATION IN LIABILITY RULES AND FRAUD ARBITRAGE 1. International Variation There is significant international variation in payment card fraud liability allocation rules.101 The international variation suggests that private ordering does not always produce optimal results. It is possible that 98. Id. 99. The short-lived Revolution Card (purchased by Amex in 2010) did not have an account number visible on the front and required a PIN for all transactions. See What is RevolutionCard?, REVOLUTIONCARD, http://www.revolutioncard.com/what-is-revolutioncard.aspx (last visited Oct. 9, 2010) RevolutionCards don’t display your name, signature or other personally identifying information on the card, offering you unparalleled security. So, even if you lose your card, no one knows it’s yours, and if they do find out, they can not use it without your PIN. RevolutionCards are PIN-based, and members can create their own unique 4-digit Card Authorization Code (CAC) that is entered as a PIN into the PIN-pads at merchants locations, and can be used for online shopping and phone-orders. Cardholders can also generate random One Time CAC numbers, so they never need to give out their primary CAC/PIN when they are using the card for online purchases, phone or other card-notpresent transactions. Id. 100. See DeGennaro, supra note 45, at 28. 101. See MASTERCARD RULES, supra note 67, §§ 3.9.1, at 11-1, 3.9.1(3), at 14-2 (corresponding rules in the Canada and the South Asia, Middle East, and Africa regions). 2010] Private Disordering? 25 different orderings are optimal in different countries, perhaps reflecting variations in market penetration by payment cards. Yet there are variations, even among very similarly developed economies with similar payment card market penetration and usage patterns. Such variation is evidence that private ordering might not always result in optimal liability rules. But it does not tell us which, if any, of the private orderings is optimal. There is reason to believe, however, that the private ordering in the United States is suboptimal compared with systems around the world. Financial institutions in virtually every developed economy outside of the United States have adopted integrated circuit (IC), or chip cards, as their standard.102 Chip cards contain a microchip in the card.103 The microchip is, like any microchip, multifunctional,104 but among its chief purposes is that it allows a card reader that operates on the same standard, known as EMV (short for EuroPay-MasterCard-Visa), to verify the authenticity of the card. The chip is thus an anti-counterfeiting device. Australia, Canada, Cambodia, China, Hong Kong, Indonesia, Japan, Korea, Malaysia, New Zealand, Singapore, South Africa, Taiwan, United Arab Emirates, and virtually all of Europe have adopted EMV technology.105 Unlike the traditional mag stripe card, a chip card is quite difficult to counterfeit. The chip technology itself is only a protection against counterfeiting physical cards, including duplication of actual cards. The chip does not prevent unauthorized transactions if a card is stolen.106 In some countries and regions, such as Australia, Canada, and Europe, financial institutions have gone further to require Chip & PIN technology, where the IC card can only be used with a PIN.107 Thus in Europe, all new, upgraded, or replaced point-of-sale chip terminals must have a PIN pad.108 The PIN provides two-factor identification (the first factor being possession of the card) where one factor is separate from the card (unlike CVV), and helps ensure not only that the card is genuine, but that it is being used by its authorized user.109 Thus, the Oliver Wyman Group reports that in 2008 fraud loss rates on signature debit cards in the United States were 102. See John Hill & Victoria Conroy, EMV: The Story So Far, CARDS INT’L, Apr. 2009, http://www.vrl-financial-news.com/asia-pacific/banking--payments-asia/issues/bpa-2009/bpa2009/emv-the-story-so-far.aspx; Thad Rueter, U.S. Stays on Sidelines As Other Nations Make EMV Game Plans, CARDS & PAYMENTS, Nov. 2009, at 14, 16. 103. See Mott, supra note 79 (“Payment Cards ‘Smart’”). 104. Id. (“Is Contactless the New Hope?”). 105. Hill & Conroy, supra note 102; Rueter, supra note 102. 106. See Hill & Conroy, supra note 102. 107. MASTERCARD RULES, supra note 67, § 12-3.9.1(3), at 12-15. 108. Id. (discussing PIN Entry Device Mandate for the European Region). In Europe, issuers are also forbidden from authorizing CNP transactions unless there is CVC2 verification. Id. § 3.9.2, at 12-15 (“CVC Processing for Card-Not-Present Transactions”). 109. Claes Bell, Are Chip and PIN Credit Cards Coming?, BANKRATE.COM (Feb. 2, 2010), http://www.bankrate.com/finance/credit-cards/are-chip-and-pin-credit-cards-coming-1.aspx. 26 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 7.5 basis points, whereas PIN debit fraud loss rates were only one basis point.110 Although Chip & PIN is not a failsafe technology, it is a far stronger safety measure than anything on the American market.111 In the United States, only two cards have been rolled out with a chip: the American Express Blue Card (Blue), first introduced in 1999,112 and the United Nations Federal Credit Union (UNFCU) Visa card, introduced in 2010.113 Blue is American Express’s non-exclusive, mass-market card.114 Blue enables Amex to charge its premium merchant discount fee rates for non-premium cardholders. While Amex equipped Blue cards with a chip, the chip is useless as a security measure as almost no American merchants have chip readers.115 Instead of serving as a security measure, the chip is used for storing information about rewards programs. The UNFCU Visa card, in contrast, does use Chip & PIN for security reasons.116 UNFCU moved to Chip & PIN technology both because it experienced particularly high fraud rates and because many of its members use their cards outside of the United States in countries where Chip & PIN is the norm and plain mag stripe cards are sometimes refused.117 In the United States, though, the UNFCU Visa card operates just as a regular mag stripe card, and it gains no security benefits from its Chip & PIN capability due to the lack of Chip & PIN enabled point-of-sale terminals.118 Card network rules provide that use of Chip and Chip & PIN technologies has been coupled with a shift in liability for card-present transactions. Under the liability shift, merchants become, by default, liable for all unauthorized card-present transactions.119 But, if the transaction used a Chip reader, then the merchant will not be liable for losses from counterfeit cards; instead liability will shift back to the issuer.120 Similarly, 110. Stephanie Bell, Study: Debit Fraud Rates Rose Sharply Last Year, AM. BANKER, May 21, 2010, at 6. 111. Stephen J. Murdoch et al., EMV PIN Verification “Wedge” Vulnerability, UNIV. OF CAMBRIDGE, http://www.cl.cam.ac.uk/research/security/banking/nopin (last visited Dec. 30, 2010); see also Ross Anderson et al., Chip and Spin (May 2005) (unpublished manuscript), available at http://chipandspin.co.uk/spin.pdf; Saar Drimer et al., Optimised to Fail: Card Readers for Online Banking 8–12 (Feb. 26–29, 2009) (unpublished manuscript), available at http://www.cl.cam.ac.uk/~sjm217/papers/fc09optimised.pdf (last visited Oct. 9, 2010). 112. Jennifer Kingson, A Credit Card Loses Its High-Tech Cred, N.Y. TIMES BITS BLOG (Dec. 5, 2008, 11:30 AM), http://bits.blogs.nytimes.com/2008/12/05/a-credit-card-loses-its-high-techcred. 113. David Morrison, United Nations FCU Becomes First Chip and PIN Card Issuer in the U.S., CREDIT UNION TIMES (May 26, 2010), http://www.cutimes.com/Issues/2010/May-262010/Pages/United-Nations-FCU-Becomes-First-Chip-and-PIN-Card-Issuer-in-the-US.aspx. 114. Query, is “Blue” short for blue collar? 115. Morrison, supra note 113. 116. Id. 117. Id. 118. See id. 119. MASTERCARD CHARGEBACK GUIDE, supra note 55, § 2.8.2. 120. Id. 2010] Private Disordering? 27 if the transaction is with a Chip & PIN card and is properly used with an EMV reader, then liability for unauthorized transactions shifts back to the issuer.121 These liability-shifting rules are consciously designed to encourage merchant adoption of EMV readers. Some card networks have also encouraged this shift by imposing an “incentive interchange rate”— interchange penalties and rewards. In some regions, MasterCard offers a ten basis point reduction in interchange for Chip & PIN transactions, and imposes a ten basis point penalty for non-Chip & PIN card-present transactions.122 At least for MasterCard, the decision of whether to implement a Chip liability shift is left up to the financial institution members of the network— not the merchants who are also affected. MasterCard permits a Chip liability shift program in any country or region in which MasterCard member financial institutions representing “75 percent of the currency volume of both acquiring and issuing transactions” approve.123 Thus, Europe has had a Chip liability shift since January 1, 2005, Brazil since March 1, 2008, Columbia since October 1, 2008, and Venezuela since July 1, 2009. In Canada, Africa, Asia, and the Middle East the shift took effect on October 15, 2010.124 Intraregionally, Europe, Latin America, and the Caribbean have had Chip liability shifts since 2005.125 121. Id.; VISA DISPUTE PROCEDURES, supra note 68, at 102 (noting that a chargeback is invalid “if the Device is EMV PIN-Compliant and the Transaction was correctly processed to completion in accordance with EMV and VIS using the Chip Card data”). For purposes of these Rules, “EMV-compliant” means in compliance with the EMV standards then in effect. 1. Chip Liability Shift. The liability for intraregional counterfeit fraudulent Transactions in which one Regional Member (either the Issuer or the Acquirer) is not yet EMV-compliant is borne by the non–EMV-compliant Regional Member. 2. Chip/PIN Liability Shift. The liability for intraregional lost, stolen, and never received fraudulent Transactions in which one Regional Member (either the Issuer or the Acquirer) is not yet able to support chip/PIN Transactions is borne by the non-chip/PIN-compliant Regional Member. MASTERCARD RULES, supra note 67, § 3.9.1, at 12-14. 122. MASTERCARD RULES, supra note 67, § 3.9.1(2), at 10-2 (applicable to the Asia & Pacific Region); id. § 3.9.1(4), at 10-3 (applicable to the Latin America and Caribbean Region); id. § 3.9.1(2), at 14-2 (applicable to the South Asia, Middle East and Africa Regions). This implies that MasterCard believes that in these regions, the total costs of fraud borne by merchants plus the cost of investing in Chip & PIN readers is less than twenty basis points. 123. MASTERCARD CHARGEBACK GUIDE, supra note 55, §2.8.2.4.1.1, at 2-54. 124. MASTERCARD RULES, supra note 67, § 3.9.1, at 11-1 (corresponding to the Canada Region); id. § 3.9.1(3), at 14-2, 14-3 (corresponding to the South Asia, Middle East, and Africa, regions). 125. MASTERCARD WORLDWIDE, CIRRUS WORLDWIDE OPERATING RULES, § 11.1.1 (Sept. 15, 2010). As MasterCard notes: 28 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 The absence of Chip & PIN technology in the United States bears comment. It is widely recognized that Chip & PIN technology significantly reduces fraud losses.126 In the UK, losses on fraud in face-to-face (cardpresent) transactions fell from £135.9 in 2005 to £72.1M in 2009.127 So why hasn’t Chip & PIN been adopted in the United States? An initial answer may be that it is simply not efficient from a systemwide perspective. While readily comparable international fraud loss rate data is not available, the United States was historically reputed to have relatively low fraud loss rates, in part due to low cost telecommunications that made real-time authorization possible.128 Moreover, total fraud losses on payment cards are noticeably lower than on competing payment methods, such as checks.129 If payment card fraud costs are sufficiently low, then there may simply not be an economic case for adopting Chip & PIN. On the other hand, a recent study estimates that U.S. payment card fraud losses rates are higher in the U.S. than in Australia, France, Spain, and the UK.130 It is not clear, however, whether Chip & PIN would be an inefficient overinvestment in fraud prevention technology. Another explanation is that Chip & PIN implementation is actually an efficient investment, but it is stymied by the organization of and conflicts of interest in payment card networks, which fail to properly incentivize parties to take optimal care in preventing fraud. EMV chip technology can provide a more secure alternative to non-chip technology for reducing fraudulent Transactions. Therefore, certain countries and Regions have decided to migrate to the EMV chip platform. Many of these same countries and Regions have instituted a chip liability shift program for domestic and intraregional Transactions to protect Members that have made the early investment in EMV chip. ... Chip liability shift means that when a counterfeit fraud Transaction occurs in a country or Region that has migrated to the Chip platform the liability for the Transactions will shift to the non-chip-compliant party. Id. 126. See Rueter, supra note 102. 127. Facts and Figures, UK CARDS ASS’N, http://www.theukcardsassociation.org.uk/view_po int_and_publications/facts_and_figures (last visited Oct. 9, 2010). 128. See Mann, Credit Cards and Debit Cards, supra note 8, at 1069–70, 1090–91 (noting the role of telecommunications costs in determining payment card fraud resistance). 129. Chris Costanzo, Combating Fraud, BANK DIRECTOR MAG., Q1 2007, http://www.bankdirector.com/issues/articles.pl?article_id=11865. It is unclear if fraud loss rates are lower for checks currently; historically they were. See William Roberds, The Impact of Fraud on New Methods of Retail Payment, FED. RESERVE BANK OF ATLANTA ECON. REV., 2Q 1998, at 42, 45, available at http://www.frbatlanta.org/filelegacydocs/Roberd.pdf (noting a 2 basis point loss rate for checks compared with 18 basis point loss for credit cards in 1995). 130. Sullivan, supra note 1, at 110, 112–14. 2010] Private Disordering? 29 Merchants have no ability to adopt Chip & PIN; they are not part of card networks and cannot change card network rules. Moreover, there is little reason for them to invest in Chip & PIN enabled point-of-sale terminals unless issuers are issuing Chip & PIN Cards. As acquirers pass fraud costs through to merchants, they have little interest in the matter. Only issuers have a direct interest and are part of card networks. Issuers, however, do not want to incur the cost of having to reissue cards to make them Chip & PIN capable. The counterfeiting losses in the United States do not justify the reissuance expense of issuers, and for debit cards, issuers do not want to see transactions shift from signature debit cards (which have higher interchange rates) to PIN debit cards.131 Card network organization structure and economics frustrate the adoption of the best technology for fraud prevention. 2. Fraud Arbitrage International variation in fraud liability and security rules creates opportunities for fraud arbitrage, thereby undermining security systems. Fraudsters, often highly organized, use cards from more secure locations in less secure ones.132 In particular, the lack of Chip & PIN protection in the United States undermines Chip & PIN systems abroad.133 For example, Canada has adopted Chip & PIN technology, but Canadian credit cards can be used to pay in the United States.134 When a Canadian card is used in the United States, it is used without a Chip & PIN because almost no American merchants have Chip & PIN capable readers.135 Canadian fraudsters know that they merely have to use stolen Canadian card numbers in the United States. Furthermore, Canadian consumers and merchants might be less vigilant about protecting their physical cards because of the lulling effect of 131. Kate Fitzgerald, Calculating the Cost: Debit Fees Could be Cut by $5B, AM. BANKER, June 28, 2010, at 1 (noting higher interchange rates on signature debit cards than on PIN debit cards). This shift may happen regardless because of the Durbin Interchange Amendment. DoddFrank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111-203, § 1075, 124 Stat. 1376, 2068–74 (2010). 132. See Rueter, supra note 105, at 14, 17. 133. US at Risk of Becoming “A Centre For Card Fraud”, CARDS INT’L, AUG. 2010, http://www.vrl-financial-news.com/cards--payments/cards-international/issues/ci-2010/ci-445446/us-at-risk-of-becoming-a-centr.aspx; Ian Kerr, Challenges in Migrating to EMV, ATM MEDIA RESOURCE CENTRE (Mar. 11, 2010, 3:19 PM), http://www.atmindustryinfo.com/2010/03/chall enges-in-migrating-to-emv.html (fraud migrated from EMV adopters in Singapore and Malaysia to non-EMV Thailand); Rueter, supra note 102, at 14 (discussing shift of fraud from EMVenabled UK to non-EMV countries and from Canada to US with Canadian adoption of Chip & PIN security). 134. See Rueter, supra note 102. 135. For example, Wal-Mart’s POS terminals are Chip & PIN capable, but Wal-Mart does not actually use the terminals for Chip & PIN transactions when presented with a Chip & PIN card. See Kate Fitzgerald, Wal-Mart Claims Issuers Block Progress of EMV Cards in U.S., AM. BANKER, May 24, 2010, at 7. 30 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 two-factor Chip & PIN identification; Canadian consumers believe that the card by itself is useless without the PIN—and it is—but not when the card is used south of the border. Another variation of this international fraud arbitrage problem is the use of European cards in the United States. The Chip & PIN arbitrage also exists between Europe and the United States, but there is another variation in security as well.136 In the United States, real time authorization is the key line of fraud prevention.137 Because of historically high telecommunications costs, however, Europe does not use real time authorization systems.138 Instead, European anti-fraud efforts were channeled into better security features in the cards and the terminals—Chip & PIN.139 When European cards are used in the United States, the worst of both worlds exists. The superior card and terminal security features are not functional, and there is no real time authorization. III. REGULATORY INTERVENTIONS A. THE COORDINATION PROBLEM IN PAYMENT CARD NETWORKS The problems of international fraud arbitrage speak to the core coordination issue in payment systems. Payment systems are the backbone of the economy; they are the infrastructure of commerce. Payment systems allow commerce to move beyond barter by creating a common liquid medium for exchanging value. Liquidity requires standardization. Standardization is the lubricant of exchange, and every successful payment medium has been standardized to a greater or lesser degree: wampum, cell phone minutes, gold, or electronic payment commands. Standardization includes standardized security measures. The security measures (or lack thereof) of individual participants in a payment system may have positive or negative externalities on other system participants. A participant’s strong security measures can help deter fraud generally and catch fraudsters as well as frustrate attempts to obtain data that can be used to defraud other system participants. Similarly, lax security measures (such as poor data security) can result in fraud losses at other system participants. Payment system participants do not internalize these costs or benefits, however, so left to their own devices, they may not achieve the optimal level of security.140 Mandatory coordination among system participants is 136. See Sullivan, supra note 1, at 115 (noting that with Chip & PIN adoption in the UK, UK counterfeit card fraud is now mainly done on transactions in the U.S. because of lack of Chip & PIN adoption in U.S.). 137. Rueter, supra note 102, at 16. 138. See Mott, supra note 79; see also supra note 128 and accompanying text. 139. See Kerr, supra note 133. 140. See Sullivan, supra note 1, at 118. 2010] Private Disordering? 31 critical, then, for optimizing security measures and promoting positive externalities. Accordingly, participation in various payment systems is dependent upon abiding by system standards. These standards are sometimes indirect and mandatory by public law, such as bank safety and soundness requirements like Know Your Customer rules. Other times, they are private law that operate through contract, such as membership in a payment card network or a check clearinghouse or automated clearinghouse. Standardization requires a standard setting process. One of the major roles of payment card networks is standard setting. For multi-institution networks, this is a tremendous coordination task. International fraud arbitrage shows that in a global economy, international standards are needed for data security.141 It is insufficient for standards to be nationally based. If electronic payments are to be global currency, they need uniform security standards. Setting standards in payment card networks involves coordinating between multiple parties.142 For multi-issuer networks, such as MasterCard, Visa, and all the PIN debit networks, it is necessary to coordinate between numerous issuers and acquirers. This often involves the network acting unilaterally; the transaction costs of individual issuer-acquirer negotiations for networks that can involve 16,000143 financial institutions are simply too great. Similarly, merchants’ dealings with the networks via their acquirer banks cannot readily be individually negotiated; there would need to be too many negotiations. Coasean bargaining is not possible given the transaction costs in multi-party networks. Given the impracticality of Coasean bargaining with payment systems, how can we hope to optimize outcomes? The answer lies in highlighting both cooperative and competitive features of payment card networks. Payment card networks represent an unusual confluence of competition and cooperation, or as David Evans and Richard Schmalensee have termed it, “co-opetition.”144 Improving fraud loss liability allocations involves two seemingly contradictory moves, each of which playing to a different aspect of co-opetition. First, coordination problems can be smoothed over by encouraging greater security coordination between card networks (and their participants). Second, antitrust enforcement on the long-simmering interchange issue—which has been only partially resolved by the Durbin 141. See supra Part II.D.2. 142. See supra Part I.A. 143. VISA INC., CORPORATE OVERVIEW 2, available at http://phx.corporate-ir.net/External.File ?item=UGFyZW50SUQ9NDYxMzZ8Q2hpbGRJRD0tMXxUeXBlPTM=&t=1. 144. DAVID S. EVANS & RICHARD SCHMALENSEE, PAYING WITH PLASTIC: THE DIGITAL REVOLUTION IN BUYING AND BORROWING 7 (2nd ed. 2005). 32 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Interchange Amendment145 and the antitrust litigation brought by the Department of Justice and seven states against MasterCard, Visa, and American Express146—will ensure that there is true price competition in the payment card market between networks and merchants. As fraud liability is a component of price, enabling price competition will help achieve a result closer to that of Coasean bargaining. In the presence of overwhelming transaction costs, strong competition can substitute for Coasean bargaining. B. ENCOURAGE BETTER GOVERNANCE FOR SECURITY STANDARD COORDINATION Payment card security measures are largely undertaken at the network level;147 the network mandates particular practices, and issuers and acquirers must comply.148 Despite most security measures being mandated on the network level, networks do not compete on security measures for end-users. Merchants, who bear the bulk of fraud losses, are indifferent to variations in networks’ security measures. Most merchants accept cards from multiple networks, and to the extent that they do not accept particular networks’ cards, it is usually because of interchange fees, not security rule variations. Merchants typically get bundled acquiring (or at least processing) services; the acquirer or processor will handle all of the merchant’s payment card transactions using the same interface.149 Thus, from the merchant’s perspective there is no difference between card networks except pricing; security distinctions are invisible to the merchants. Similarly, consumers are utterly indifferent to network-level security mandates. The federal consumer liability limitation for unauthorized payment card transactions and the networks’ zero liability policies for unauthorized transactions reduce consumers’ incentive to care about card security measures.150 Consumers have no contractual privity with the network and see no difference in card functionality between networks. A MasterCard and a Visa credit card are completely interchangeable from a consumer’s perspective, and issuers will sometimes switch consumer’s accounts among networks. Likewise, the same debit card is often an access device for multiple debit card networks: Accel, Cirrus, Interlink, NYCE, 145. See Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111-203, § 1075, 124 Stat. 1376, 2068–74 (2010). 146. See Complaint, United States v. Am. Exp., Co., No. 1:10-cv-04496 (E.D.N.Y., Oct. 4, 2010) (alleging violations of Section 1 of the Sherman Antitrust Act based on various card network merchant restraint rules); [Proposed] Final Judgment, United States v. Am. Exp., Co., No. 1:10-cv-04496 (E.D.N.Y., Oct. 4, 2010). 147. Douglass, supra note 9, at 45. 148. See id.; Ballen & Fox, supra note 9, at 940–41. 149. See EVANS & SCHMALENSEE, supra note 144, at 6–7. 150. Note, however, that not all debit card networks have zero liability policies. Given the low rate of PIN debit fraud and the existing Regulation E limitations on consumer liability, such a zero liability policy would not mean much to consumers. 2010] Private Disordering? 33 Plus, Pulse, Star, etc.151 Consumers never select what networks will have preferred routing flags on their debit cards; that choice is left to their banks. While most security features are mandated by the networks, there is variation among issuers in security features and practices. In particular, issuers’ fraud detection relies heavily on neural networks, but individual issuers have their own neural network designs. Consumers have little reason to care about variations in issuer anti-fraud measures, as they are almost never themselves liable, and, perhaps more importantly, they cannot gauge the value of anti-fraud technologies. There is no way for a consumer to know whether a particular issuer’s technology is better than another’s. Fraud protection is not like a burglar alarm. There are a limited number of ways into a dwelling, and a consumer can, in theory, test an alarm system against simulated burglary. The same cannot be done for card fraud. Because payment card end-users are indifferent to variations in networks’ anti-fraud measures, there is little reason to foster competition among networks on security measures. Bundled merchant services and consumer indifference mean that networks have little incentive to compete in terms of security measures. Indeed, because the costs of security measures are borne by issuers, while most of the benefits accrue to merchants, issuers are resistant to greater security measures. A network that unilaterally imposes more demanding and costly security measures risks losing issuer business to other networks. Given that the market is structured against competition for heightened security measures, how can we encourage greater security measures in payment card networks? One way is to encourage coordination among networks. If networks could coordinate security measures, they could adopt them uniformly, thereby eliminating market pressure from issuers for lower security measures. Security measures are an area where we might actually want some type of standard setting. (And, to the extent that we view security standards as a form of price, price-fixing!) Network coordination should be guided by the principle of locating what method would benefit the overall payment card industry—that is, a net social welfare gain—rather than what would increase the size of any particular network—that is, a gain to any particular competitor. Coordination on security measures would essentially liberate the networks to engage in more effective allocation of that portion of price among network participants. The card networks have already devised a corporatist form of coordination using the Payment Card Industry Security Standards 151. See, e.g., FUMIKO HAYASHI, RICHARD SULLIVAN & STUART E. WEINER, PAYMENT SYS. RESEARCH DEP’T, FED. RES. BANK OF KANSAS CITY, A GUIDE TO THE ATM AND DEBIT CARD INDUSTRY 20 (2003), available at http://www.kansascityfed.org/publicat/PSR/BksJournArticles/ ATMpaper.pdf. 34 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Council.152 PCI SSC is a nominally independent organization created by the card networks to promulgate non-binding data security standards for payment cards.153 PCI SSC is owned by the five major credit card networks (American Express, Discover Financial Services, JCB International (Japan Commerce Bank), MasterCard WorldWide, and Visa, Inc.).154 Each network appoints an officer to the PSC SSC executive committee and management committee. PCI SSC has 612 “participating organizations,” including financial institutions and intermediaries of various sorts, trade associations, and merchants ranging from Wal-Mart to the University of Notre Dame.155 Participating organizations get to nominate and vote for the PCI SSC’s twenty-member Board of Advisors (which currently only has four representatives from entities classified as “merchants”) and to review proposed PCI standards and revisions thereto, including the Payments Card Industry Data Security Standards (PCI DSS), before they are made public. Neither participating organization nor the Board of Advisors has any formal ability to determine the standards.156 While PCI SSC cannot itself enforce the PCI DSS because it does not have a contractual relationship with card network participants, all of the networks incorporate the PCI DSS in their rules, and require network participants to be PCI DSS compliant.157 To date, the operation of the PCI SSC has been controversial.158 Networks and issuers play a leading role in PCI SSC, and merchant groups complain that PCI DSS is geared toward advancing issuers’ interests.159 In particular, merchant groups object to PCI SSC data retention requirements, which issuers want because of chargeback issues.160 PCI SSC requires 152. Epstein & Brown, supra note 9, at 214–15. 153. Id. at 215. 154. About the PCI Security Standards Council, https://www.pcisecuritystandards.org/ organization_info/index.php (last viewed Dec. 30, 2010). 155. Participating Organizations, PCI SECURITY STANDARDS COUNCIL, https://www.pcisecuritystandards.org/get_involved/member_list.php?category=®ion= (last viewed Dec. 30, 2010). 156. Participating Organization Rights, Obligations and Rules of Participation, PCI SECURITY STANDARDS COUNCIL, https://www.pcisecuritystandards.org/get_involved/rights_responsibilities. php (last visited Dec. 30, 2010). 157. See Epstein & Brown, supra note 9, at 214–215; see also DISCOVER MERCHANT OPERATING REGULATIONS, supra note 67, at ix; AMERICAN EXPRESS MERCHANT REFERENCE GUIDE—U.S. (Apr. 2010), supra note 67, § 8.3; VISA INT’L REGULATIONS, supra note 67, at 684. Non-compliant merchants face higher, penalty interchange rates. The particular form of this coordination is shaped by antitrust concerns. Epstein & Brown, supra note 9, at 215. 158. See Sullivan, supra note 1, at 120. 159. Id. 160. See David Taylor, Moving Beyond PCI, CARDS & PAYMENTS, May 2009, at 40 (noting that “tokenization, seeks to remove card data from the retail environment as soon as possible and substitute account numbers with ‘fake,’ or one-time, numbers that have no intrinsic market value”); Avivah Litan, Where to Begin for End-to-End Encryption Systems, AM. BANKER, Sept. 15, 2009, at 15 (arguing that “[p]ayments companies will also need to change some business processes, so that merchants are not required to hold on to card data for business purposes, such as resolving chargebacks, or preauthorization and presettlement processes”). 2010] Private Disordering? 35 merchants to retain certain transaction data.161 While the data is supposed to be encrypted and otherwise protected, merchants object that the mere presence of large volumes of transaction data make them tempting targets for fraudsters.162 Moreover, the effectiveness of the PCI DSS is unclear. Heartland Payment Systems, Inc., a major card processor, was subjected to hacking from December 2007 until October 2008, during which time 130 million records were stolen.163 Heartland was certified as PCI DSS compliant in April 2008.164 Visa disputes Heartland’s PCI DSS compliance.165 In 2009, a data security breach occurred at Network Solutions, which had also been certified as PCI DSS compliant.166 These incidents raise the question of what benefit there is to payment card network participants of becoming PCI DSS compliant. PCI DSS compliance is extremely expensive, but might not ultimately protect them from data breaches and liability for the expenses caused by the breach, including reissuance of cards.167 As a concept, inter-network security coordination for payment systems makes sense. The PCI SCC is designed to facilitate coordination between competing payment card networks. This is an important goal, with potentially precompetitive effects through positive security externalities. Nevertheless, the PCI SCC’s structure raises serious antitrust concerns. In execution, PCI DSS might be skewed by the dynamics of payment card network economics as well, and reflect the interest of issuers—the most price elastic type of network participant—rather than the overall interests of all network participants. In other words, the structure of the PCI SCC raises concerns that PCI DSS is being used to bolster the pre-existing problems in the payment card interchange fee system. Given the significant benefits that can come from data security standard setting, standard-setting processes should be encouraged. But it is also important that they be fair. Standard setting needs to be a tool to further 161. See DISCOVER MERCHANT OPERATING REGULATIONS, supra note 67, §§ 4.1.3, 7.1.5. 162. See Sullivan, supra note 1, at 119. 163. Indictment at 3, United States v. Gonzalez, No. 09-cr-00626-JBS (D. N.J., Aug. 17, 2009); Kim Zetter, TJX Hacker Charged with Heartland, Hannaford Breaches, WIRED (Aug. 17, 2009, 2:34 PM), http://www.wired.com/threatlevel/2009/08/tjx-hacker-charged-with-heartland. 164. Alex Goldman, Heartland Hit With $12M Breach Tab, INTERNETNEWS.COM (May 8, 2009), http://www.internetnews.com/security/article.php/3819596; Jaikumar Vijayan, Heartland Breach Shows Why Compliance Is Not Enough, PC WORLD (Jan. 6, 2010, 11:15 AM), http://www.pcworld.com/article/186036/heartland_breach_shows_why_compliance_is_not_enoug h.html; Zetter, supra note 163. 165. Linda McGlasson, Heartland Data Breach: Visa Questions Processor's PCI Compliance, BANKINFO SECURITY (Mar. 24, 2009), http://www.bankinfosecurity.com/articles.php?art_id =1309. 166. Linda McGlasson, Top 9 Breaches of 2009, CU INFO SECURITY (Dec. 14, 2009), http://www.cuinfosecurity.com/articles.php?art_id=2001&pg=1. 167. See Steven Mott, Why POS Merchants Don’t Buy into Payment Security, DIGITAL TRANSACTIONS (Sept. 7, 2007), http://www.digitaltransactions.net/index.php/news/story/1503. 36 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 competition, not to squelch it. This suggests two seemingly contradictory regulatory interventions: encouragement of inter-network coordination for data security setting and more vigorous antitrust enforcement. Standard setting should be encouraged, but only with a more adequately representative and fair governance structure that provides a balance of interest and due process. The precise mechanics of a reformed payment system security standard setting are beyond the scope of this Article, but given the critical infrastructure utility role that payment card networks play in commercial transactions and the law enforcement resources involved, some level of government involvement to ensure that standards are set through a fair process that produces socially optimal outcomes is appropriate.168 Already, the Durbin Interchange Amendment provides for the Federal Reserve to consider fraud prevention costs and technology in its rule-making regarding debit card interchange fees.169 Government involvement in payment card data security need not mean government setting of security standards. Instead, the involvement could be limited to government supervision of process. Because of its lack of formal procedural requirements, the PCI DSS standard setting process should be relatively nimble, but this comes at the expense of due process and adequate representation of all constituencies involved in payment card transactions, including merchants, consumers, and law enforcement. Payment card data security needs coordination between ostensible competitors, but if such coordination is to be permitted, it must be through a process that does not allow competing networks to leverage security standard setting to further their own economic interests at the expense of optimal security standards. C. MORE VIGOROUS PAYMENTS ANTITRUST POLICY The other concurrent approach that should be pursued is to improve inter-network competition for merchants’ business. As the situation currently stands, networks compete with each other primarily for issuers, not for merchants. The goal of networks is to increase network transaction volume, and that requires getting as many of their cards in circulation as possible. Maximizing cards in circulation requires vigorous recruiting of issuers. Once a network signs up issuers, it will get its cards out to consumers, and once a consumer presents the network’s card at a merchant, the network 168. Carl Cargill & Sherri Bolin, Standardization: A Failing Paradigm, in STANDARDS AND PUBLIC POLICY 296, 312, 316 (Shane Greenberg & Victor Stango, eds., 2007) (arguing that standards are an “impure public good” which justifies government intervention when private standard setting processes fail). 169. Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111203, § 1075(a)(2), 124 Stat. 1376, 2068–74 (2010) (amending § 920 of The Electronic Fund Transfer Act). 2010] Private Disordering? 37 has a monopoly on processing the transaction. This means that the networks do not have to court merchants as assiduously as they do issuers. To be sure, a merchant can opt-out of accepting a particular network’s cards, and some do, particularly for American Express;170 but as long as the credit and signature networks all price fairly similarly for credit, signature debit, and PIN debit, respectively, there is no reason for a merchant to take one network brand and not another. Moreover, the complexity of interchange rates makes it difficult for merchants to even determine what relative pricing is between networks, as pricing depends on the type of card and the level of rewards, as well as the merchant’s industry.171 Because card network competition has focused on competition for issuers, rather than both issuers and merchants, the cost of payment card acceptance, including fraud liability, is structured to favor issuers. The Durbin Interchange Amendment will change this situation by creating more competition for merchant business—but only for debit cards and small dollar credit card transactions. The Durbin Amendment requires that debit card interchange fees be “reasonable and proportional to the cost incurred by the issuer,” meaning the incremental cost of a transaction, with an issuer-specific adjustment for fraud prevention costs, as determined by the Federal Reserve.172 This provision could result in debit interchange pricing that strongly encourages the use of PIN or Chip & PIN technology; regulatory intervention might accomplish the optimal end that privateordering has failed to do. It will take the outcome of the Federal Reserve’s rule-making, to be finalized in early 2011,173 before the ultimate effect is clear. The Durbin Amendment also permits merchants to offer discounts (including in-kind discounts) to incentivize consumer use of particular payment systems;174 and, critically, the Durbin Amendment forbids network exclusivity on debit cards and lets merchants choose the routing of debit transactions.175 Thus, debit cards will be capable of “multi-homing”— clearing over multiple networks,176 and merchants, rather than issuers, will decide which networks. The result should be that networks have to compete more for merchant routing decisions, which means lowering costs, be it direct pecuniary costs like interchange fees or indirect costs like fraud 170. See Meghan Boyer, Discover Striving To Raise U.S. Merchants’ Awareness Of CardAcceptance Abilities, PAYMENTSSOURCE, Apr. 21, 2010, http://www.paymentssource.com/news/3001446-1.html. 171. See Levitin, Economic Costs, supra note 19, at 1323. 172. Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111203, § 1075(a)(2), 124 Stat. 1376, 2068–74 (2010) (amending § 920 of The Electronic Fund Transfer Act). 173. Id. § 1075(b)(1)(A). 174. Id. § 1075(b)(2)(A). 175. Id. § 1075(b)(1)(A). 176. Id. § 1075(b)(1)(B). 38 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 liability. The Durbin Amendment is likely to affect not just debit cards, but also credit cards to the extent that credit competes with debit for small ticket transactions. The Durbin Amendment is not a complete solution to the competition problems in the payment systems marketplace, but it opens the door to a rationalization of the fraud liability rules for merchants and issuers. IV. LIMITATIONS OF CONSUMER LIABILITY: A DEFENSE A. CONSUMER LIABILITY RULES FOR UNAUTHORIZED PAYMENT CARD TRANSACTIONS The most major federal intervention in payment system loss allocation is the limitation by federal law of consumer liability for unauthorized transactions.177 Consumer liability for unauthorized credit card transactions is limited to $50, and the consumer has no liability once the consumer has notified the card issuer about the loss, theft, or possible unauthorized use of the card.178 The burden of proof to show that the use was authorized is on the card issuer.179 For debit cards, consumer liability is generally limited to $50,180 but it increases to a maximum of $500 if the consumer does not notify the issuer within two business days of learning of the loss or theft of the card, and the card issuer establishes that the transactions would not have occurred had there been timely notice.181 In addition, if the consumer does not report an unauthorized transaction that appears on a periodic account statement within sixty days of the transmittal of the statement, then the consumer incurs unlimited liability for all unauthorized transactions that occur between the end of those sixty days and notice to the issuer, provided that the issuer can show that the transactions would not have occurred had there been timely notice.182 These time limits can be extended for extenuating circumstances, such as extended travel or hospitalization.183 Again, in all 177. The legal definition of “unauthorized transaction” is somewhat different for credit cards and debit cards. Compare 12 C.F.R. § 226.12(b)(1) (2010) (defining “unauthorized use” as “the use of a credit card by a person other than the cardholder, who does not have actual, implied, or apparent authority for such use, and from which the cardholder receives no benefit”), with 15 U.S.C. § 1693a(11) (2010), and 12 C.F.R. § 205.2(m) (2010) (defining an “unauthorized electronic fund transfer” as “an electronic fund transfer from a consumer’s account initiated by a person other than the consumer without actual authority to initiate the transfer and from which the consumer receives no benefit” and then noting several exceptions). These distinctions do not matter, however, for the purposes of this Article. See Gillette, supra note 8, at 200–02 (discussing the public choice issues with payment card liability limitation rules). 178. 15 U.S.C. § 1643 (2006); 12 C.F.R. § 226.12(b). 179. 15 U.S.C. § 1643(b). 180. 15 U.S.C. § 1693g(a) (2006); 12 C.F.R. § 205.6(b)(1) (2010). 181. 15 U.S.C. § 1693g(a); 12 C.F.R. § 205.6(b)(2). 182. 15 U.S.C. § 1693g(a); 12 C.F.R. § 205.6(b)(3). 183. 15 U.S.C. § 1693g(a); 12 C.F.R. § 205.6(b)(4). 2010] Private Disordering? 39 cases, the burden of proof to show that a transaction was in fact authorized is on the card issuer.184 These rules apply to all unauthorized usage, not just fraud, which is the focus of this Article. The federal liability rules thus create something close to a strict liability regime for credit card fraud and a strict liability scheme with an exception for contributory negligence for debit cards.185 It is worth noting that liability for unauthorized payment card transactions contrasts with checks, where there is no consumer liability for unauthorized transactions (meaning orders of payment) whatsoever, absent consumer negligence that “substantially contributes” to the fraud.186 Whereas the checking system has a true contributory negligence scheme, credit cards are strict liability, and debit cards are strict liability with contributory negligence regarding the amount, but not the fact, of the loss. B. THE CASE AGAINST MANDATORY LIABILITY RULES Epstein and Brown contend that consumer liability for unauthorized transactions should not be capped by statute, as they “see no reason even for this (modest) restriction on freedom of contract. If payment card companies think larger penalties are appropriate and disclose such penalties to consumers, the losses should not be socialized as a matter of law.”187 While Epstein and Brown’s major complaint about the mandatory liability caps is that it could frustrate more efficient private bargaining over liability, that is not the only problem with the mandatory liability rules for unauthorized transactions. The mandatory liability rules also create a moral hazard and effectuate a wealth redistribution from consumers who engage in low-risk behavior to consumers who engage in high-risk behavior. The limitation on consumer liability, in most cases to $50 (which is not inflation indexed), provides little pecuniary incentive for consumers to take care in their transactions and with their cards. Moreover, given the difficulties in proving first-party fraud, with the burden of showing unauthorized transactions resting on the card issuer, the liability limitation creates a very real moral hazard of first-party fraud. In addition, the liability rules create a perverse redistribution that rewards high-risk behavior. Low-risk consumers might prefer to incur more potential liability in exchange for savings on other payment card price terms. By being pooled with high-risk consumers under the same 184. 15 U.S.C. § 1693g(b). 185. There is a rich literature which considers the differences in fraud and error liability rules for different payment systems and whether they should be harmonized. See supra note 8. 186. U.C.C. § 3-401(a) (2006) (no liability on instrument without signature); id. § 3-403 (unauthorized signature on instrument is only effective as that of the unauthorized signer); id. § 3406 (liability if negligence “substantially contributes” to fraud on instrument). Uniform Commercial Code Article 3 does not distinguish between consumer and nonconsumer drawers of checks. 187. Epstein & Brown, supra note 9, at 219. 40 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 mandatory liability rules, the low-risk consumers are being forced to forgo these potential savings for the benefit of high-risk consumers. The result is to penalize precisely those consumers whose behavior should be encouraged. In such circumstances, a rational consumer will be incentivized to engage in higher-risk behavior in order to be a recipient, rather than the payee of the subsidy. Notably, MasterCard188 and Visa189 both have so-called “zero liability” policies that reduce consumer liability in many cases beneath the federal liability cap.190 These caps essentially install a negligence regime for liability up to $50, after which the federal strict liability regimes take over. Epstein and Brown argue that the zero liability policies demonstrate that “[m]arket pressures have pushed the balance still further, insulating payment card users from essentially all fraud losses.”191 In other words, the federal law is an unnecessary (but fortunately harmless) intervention. Indeed, as Duncan Douglass has observed, the zero liability policy arguably creates a moral hazard, as consumers have little reason to take care to protect their cards and card data.192 C. IN DEFENSE OF THE CONSUMER LIABILITY LIMITATIONS Despite the problems created by the mandatory liability caps, there is nevertheless a good case supporting them. Absent the mandatory caps, the zero liability policies might not obtain and adverse selection, disproportionate negotiation costs, information asymmetries, consumer hyperbolic discounting and optimism biases, the relative salience of different price points to consumers, and consumers’ limited ability to absorb losses relative to other payment card network participants all militate for capping consumer liability. 1. Counterfactual Consideration Epstein and Brown’s reading of the impact of the zero liability policy is reasonable, but it is hardly the only fair interpretation. First, it is worth 188. Zero Liability, MASTERCARD, http://www.mastercard.com/us/personal/en/cardholder services/zeroliability.html (last visited Dec. 30, 2010). 189. Zero Liability, VISA, http://usa.visa.com/personal/security/visa_security_program/zero_ liability.html (last visited Dec. 30, 2010). 190. Bank of America offers its own “zero liability” policy. See, e.g., Bank of America Merrill Lynch Visa® Reward Card Terms and Conditions, BANK OF AMERICA, https://prepaid.bankofamerica.com/RewardCard/PRC384/CP384-T00-002/docs/terms.htm (last visited Dec. 30, 2010). It is important to remember that the stated zero liability policy is not zero liability. It is conditional on the cardholder having taken reasonable care (in the issuer’s view), the cardholder having had no more than two other incidents in the last year, and the cardholder’s account being “in good standing.” See, e.g., MASTERCARD RULES, supra note 67, § 3.11(2), at 157 (conditions governing cardholder liability in the United States). Zero liability is great marketing, but it is not clear how often it is really zero liability. 191. Epstein & Brown, supra note 9, at 219. 192. Douglass, supra note 9, at 46. 2010] Private Disordering? 41 considering a counterfactual scenario. What would the world look like without the federal $50 liability limitation on credit cards? Would Visa and MasterCard have adopted zero liability policies? Maybe. The zero liability policy was only adopted in 2000,193 which indicates that it might have been a move to encourage e-commerce. But it might also be that once consumer liability is limited to $50, the marketing benefits to the network of going from $50 liability to zero liability for nonnegligent consumers outweigh the fraud losses. Given the costs of pursuing the last $50 of liability, issuers really do not give up anything by going to zero liability, and they gain a significant marketing benefit. The zero liability policies are advertised in a way that implies that they are strict liability regimes, with the fact that they are highly discretionary negligence regimes hidden in vaguely worded fine print. Thus, consumers might well assume that they have less liability than they do under the zero liability policies. Moreover, the cost of disputing up to $50 with consumers might simply not be worthwhile for issuers. The real question is whether networks would adopt zero liability policies if by statute consumers were liable for $100 or $500 or $1,000? We don’t know, but it cautions against assuming that the $50 liability limit has been toothless or that zero liability would be the policy the networks would generally adopt.194 2. Monetary Deductibles, Copayments, and Contributory Negligence The mandatory liability caps are part of a system that includes notable moral hazard mitigants. The federal consumer liability limitations are a type of strict liability regime for card fraud. As Samuel Rea has noted, “[s]trict liability without contributory negligence is essentially mandatory insurance.”195 A standard insurance move to reduce moral hazard is to require deductibles and copayments. The $50 liability cap on credit cards 193. Letter from Russel W. Schrader, Visa U.S.A., to Fed. Trade Comm’n (Sept. 15, 2000), available at http://www.ftc.gov/bcp/workshops/idtheft/comments/schraderrussellw.pdf (discussing Visa’s zero liability policy that took effect on April 4, 2000); Selco Visa Cards—Zero Liability, SELCO, https://www.selco.org/creditcards/zero.liability.asp (last visited Sept. 23, 2010); Eden Jaeger, Should You Be Afraid of Your Debit Card?, FINANCE & FAT (Jan. 4, 2008), http://www.financeandfat.com/archives/should-you-be-afraid-of-your-debit-card. 194. One factor that might push for some sort of liability limiting policy even in the absence of the federal caps is the recognition that consumer loss aversion is a major obstacle to increasing the use of payment cards. Would consumers have adopted payment cards on as wide of a scale as they have without the federal liability caps? We cannot be sure, but it seems likely that the liability caps at least contributed to greater consumer adoption of payment cards, and by further reducing the caps the card networks aimed to eliminate the residual loss aversion. 195. Samuel A. Rea, Jr., Comments on Epstein, 14 J. LEGAL STUD. 671, 672 (1985); see also Gillette, supra note 8, at 201 (discussing liability cap as insurance). 42 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 can thus be seen as equivalent to a $50 deductible on a mandatory federal insurance policy.196 For debit cards, federal law creates a strict liability regime with a peculiar kind of contributory negligence. The contributory negligence under the Electronic Funds Transfer Act and Reg E is only for losses incurred after the loss or theft of the card due to failure to promptly report the loss or theft; it does not apply to pre-loss or pre-theft behavior.197 In other words, the contributory negligence component of consumer liability for unauthorized debit card transactions only goes to the magnitude of the loss due to unauthorized use, not the actions that caused the loss in the first place. The result is that it does not incentivize consumers to take precautions to prevent loss or theft. This means that in terms of fraud losses, there is primarily a strict liability regime for debit cards too, and with a $50 deductible. 3. Non-Pecuniary Costs In addition to the monetary deductible, there can also be considerable non-pecuniary harms to consumers from unauthorized card usage. It is not merely “the major inconvenience of the disruption of service,”198 or having to get the charges reversed, but also things like having to monitor credit reports, close other accounts, etc.199 These additional, non-pecuniary costs are essentially copayments. Thus, built into the federal liability limitation are two standard responses to moral hazard problems—deductibles and copayments. 4. Limited Consumer Ability to Prevent Fraud Imposing liability on consumers for unauthorized transactions makes little sense if that liability does not alter consumer behavior. Some unauthorized transactions are due to consumer negligence, but others are not. We lack an empirical sense of the role cardholder negligence plays in unauthorized transactions. Clearly there are numerous fraud possibilities even when a consumer acts responsibly. Consider a simple case where a 196. One can, of course, argue whether that is a sufficiently large deductible to ensure optimal care, not least given that the $50 liability limit is not inflation adjusted and has remained constant for decades. 197. See 12 C.F.R. § 205.6(b)(2) (2010). Negligence by the consumer cannot be used as the basis for imposing greater liability than is permissible under Regulation E. Thus, consumer behavior that may constitute negligence under state law, such as writing the PIN on a debit card or on a piece of paper kept with the card, does not affect the consumer’s liability for unauthorized transfers. Id. § 205, at Supplement I to Part 205, Official Staff Interpretations, ¶6(b) (2). 198. Epstein & Brown, supra note 9, at 219. 199. See Mann, Making Sense of Payments, supra note 8, at 638. 2010] Private Disordering? 43 consumer is robbed and the card is used for a transaction by the thief before the consumer can report its loss. What justification is there for consumer liability then? More typically, card data is not stolen directly from the consumer, but from a merchant or a financial institution. Again, the justification for consumer liability is missing in such cases; the consumer has no ability to control merchant or financial institution data security measures. Instead, the case for consumer liability seems limited to situations in which a consumer fails to take reasonable care of his or her physical card, such as writing a PIN number on a debit card and then leaving a debit card in a location where it could be pilfered by a domestic employee. It seems unlikely that such situations account for a significant portion of payment card fraud. Consider, then, an intermediate situation, in which the cardholder leaves his card out long enough for someone to copy down the card digits. Should the cardholder be liable in such a situation? Or should the liability be better placed on the card issuer that issued an account access device that is so easily compromised? 5. Consumer Knowledge of Liability Rules and Concerns About Issuer Compliance In addition, as Professor Ronald Mann has noted, consumers may not know of the liability limitation.200 It is doubtful, for example, that most consumers are aware of the contributory negligence rules for debit card liability. Similarly, Mann notes that even informed consumers might doubt whether financial institutions would comply with the law.201 If a financial institution does not comply with the liability rules in the case of a debit transaction, the consumer simply loses his or her money. In the case of a credit transaction, the consumer might be able to avoid the monetary loss, but risks the loss of a credit line, a damaged credit report, and debt collection harassment. While the consumer could litigate the issue, in many cases, the cost of litigating would vastly outweigh the harm to the consumer.202 When consumers are unaware of the liability limitation, moral hazard simply will not exist, and if they are concerned about legal compliance, then moral hazard must be discounted. All of these factors—deductibles, copayments, contributory negligence, lack of knowledge about the law, and doubts about compliance with the law—suggest that moral hazard concerns 200. Id.; see also Cooter & Rubin, supra note 8, at 75 (“Liability, however, is a useful incentive, whether for precaution or innovation, only to the extent that behavior responds to it; a particular assignment of liability that does not influence behavior has no economic justification.”). 201. Mann, Making Sense of Payments, supra note 8, at 638. 202. See Cooter & Rubin, supra note 8, at 81. 44 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 about the federal liability limitation are overblown, and that consumers have a reasonably strong incentive to protect their cards and card data. Finally, while the zero liability policy could create a moral hazard if the counterweights of deductibles and copayments were insufficient, that moral hazard must be weighed against the alternative. We have to consider the situation that would obtain in the absence of the zero liability policy or $50 federal liability cap. What would consumer liability look like? Would it reflect a Coasean bargain between consumers and card issuer? It is hard to believe that it would because of the tremendous information asymmetries between card issuers and consumers.203 6. Adverse Selection as Justification for Mandatory Liability Rules Information asymmetries raise the possibility of adverse selection problems, which are a standard justification for mandatory insurance regimes like the federal consumer liability limitations. (An analogous consumer liability situation is state law mandating nonrecourse mortgages.204) The problem of adverse selection arises because of a tendency of low-risk individuals to drop out of insurance pools when insurers cannot distinguish between high- and low-risk individuals.205 Insurers must charge a blended price, which is too high for the low-risk individuals. The result is that insurance pools are then comprised of higher risk individuals, so insurers charge higher premiums, which further exacerbates the adverse selection by driving out the lower-risk individuals remaining in the pool. The result can be a socially suboptimal level of insurance. A standard response to adverse selection is to mandate insurance, so as to force both low-risk and high-risk individuals into the same risk pool.206 In the case of payment card fraud, there is good reason to encourage mandatory insurance. There is a possibility of suboptimal insurance due to consumers’ difficulty in gauging both the likelihood and magnitude of payment card fraud loss because neither relates solely to their behavior. To the extent that consumers overestimate the risks, they may well opt-out of using payment cards altogether. Liability limitations are a market confidence building measure. 203. See id. at 68–70 (discussing the problems of information asymmetries in payment markets, wherein financial institutions typically have superior information to consumers). 204. I am indebted to Professor Ron Harris of Tel Aviv University School of Law for this insight, which comes from his work-in-progress on nonrecourse mortgages. 205. Tom Baker, Containing the Promise of Insurance: Adverse Selection and Risk Classification, in RISK AND MORALITY, RICHARD V. ERICSON & AARON DOYLE, EDS. 258, 259, 261 (2003). But see Peter Siegelman, Adverse Selection in Insurance Markets: An Exaggerated Threat, 113 YALE L.J. 1223 (2004). 206. See Rea, supra note 195, at 673. 2010] Private Disordering? 45 7. Contractual Frictions: Information Asymmetries, Bargaining Costs, Bundled Pricing, Hyperbolic Discounting, and Price Salience Adverse selection is driven by one set of information asymmetries— that consumers know more about their own riskiness than card issuers. Another set of information asymmetries—that issuers know more about the terms of cardholder agreements than consumers—combines with asymmetric negotiation costs to create further frictions that impede efficient Coasean bargaining. As Professors Cooter and Rubin have noted: [T]he cost of negotiating the loss allocation provisions of a consumer deposit agreement typically exceeds the potential benefit. Shopping for alternative sets of fixed term contracts—a more realistic scenario than bargaining for specific terms—eliminates these negotiation costs, but replaces them with search costs. Moreover, asymmetric information limits the effectiveness of consumer shopping. Consumers are unlikely to think about the liability terms of a contract when opening an account, and those that do, find their curiosity rewarded with the incomprehensible legalisms of form contracts and statute books. Even if they knew what the terms meant, consumers generally would not know how to value differences in these terms.207 A further reason to be skeptical that private bargaining would produce optimal consumer liability rules is that liability for unauthorized transactions is only one term among many in cardholder agreements.208 If one takes Epstein and Brown’s subscription to a Coasean universe seriously, this observation should be heartening. It should not matter what the fraud liability rule is because the parties can simply reallocate if that is efficient.209 Liability for unauthorized use is merely one component of payment card pricing. Thus, the federal liability cap does not restrict total pricing of payment cards. It only affects one way of expressing that price. Accordingly, parties can effectively reallocate the total price through other price components of payment cards. In the Coasean world, whether the price of using a payment card is allocated via liability rules or annual fees or interchange fees should not matter if there is the same level of competition on each and every price term. In other words, if Epstein and Brown are correct about the market, the federal liability cap does not create a troublesome distortion. 207. Cooter & Rubin, supra note 8, at 68–69. 208. Oren Bar-Gill, Bundling and Consumer Misperception, 73 U. CHI. L. REV. 33, 33–35 (2006). 209. See generally Coase, supra note 15. 46 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 In reality, however, not all price terms for payment cards are equal and fully interchangeable. There is more vigorous competition on some price terms than others, in part due to their salience to consumers. When confronted with a multi-term contract, consumers may give undue emphasis to terms that are particularly salient either because of the manner in which the information is presented to the consumer or because of hyperbolic discounting of contingent events.210 This means that there is a discounting that occurs in the trade-off between price terms, so the reallocation of costs among price terms might not be neutral in terms of total cost. If payment card pricing is forced by regulation from less salient to more salient price terms, there will be more vigorous price competition, which will push down the total cost of using a payment card. This suggests that in the absence of regulation, a profit-maximizing firm will place as much of the price as possible on less salient terms and will max out on consumers’ price elasticity on less salient terms before letting pricing spill over to more salient terms. Regulation, then, does not necessarily result in a one-for-one substitution of price terms, but can result in an overall reduction in price (and profit margin). The contingent nature of liability for unauthorized card usage, as well as the potential absence of a clear monetary price term if either a consumer negligence standard or strict consumer liability were to apply, means that fraud liability is unlikely to be a salient term for consumers.211 In the context of these bundled contracts, there might not be optimal pricing of fraud terms, even if there were vigorous competition among issuers for consumers. Thus, the federal liability cap might actually have precompetitive effects by forcing payment card issuers to shift pricing away from a less salient term like liability for unauthorized use and to more salient price points like annual fees or interest rates. The federal statutory limitations on consumer liability may not be optimal (not least because the $50 deductible is not inflation indexed, so the real potential pecuniary liability is constantly decreasing), but it is far from clear that they result in an inferior outcome than private-ordering. The regulatory outcome may not be Kaldor-Hicks optimal, but it might increase consumer surplus by encouraging more vigorous price competition. 8. Relative Ability to Bear Losses A final argument for the federal liability cap is distributional, or as Cooter and Rubin refer to it, the “loss spreading principle”.212 Once there 210. See, e.g., Els C. M. van Schie & Joop van der Pligt, Influencing Risk Preference in Decision Making: The Effects of Framing and Salience, 63 ORG. BEHAV. & HUM. DECISION PROCESSES 264 (1995). 211. Cooter & Rubin, supra note 8, at 70 (“Consumer payment contracts contain elements other than loss allocation terms, but market failure is most likely to involve these technical, obscure elements of the contract, rather than the comprehensible and salient ones.”). 212. Id. at 70–73. 2010] Private Disordering? 47 are losses in the system, they must be allocated somewhere, and placing losses on parties in accordance with their ability to absorb losses presents a potential principle for loss allocation. The loss spreading principle stands in some tension with a least cost avoider principle, as it is based on ability to absorb, rather than prevent, losses. Cooter and Rubin argue that risk should be assigned to the party that can achieve risk-neutrality—that is having equal valuation of a risk of a loss and the average value of that loss—at the lowest cost.213 As Cooter and Rubin explain, risk neutrality is dependent upon the relative size of the loss to a party’s assets and the party’s ability to spread the loss.214 Both factors point to financial institutions and merchants being able to achieve risk neutrality more cheaply than consumers. Because consumers’ resources are generally more limited than financial institutions’ or merchants’, consumers are less well suited to bear unlimited liability from the unauthorized use of a payment card than a financial institution or a merchant. Liability for $100,000 in unauthorized charges would be devastating to most households’ finances in a way that it would not be for a financial institution or certainly a large merchant. This makes consumers more risk averse than financial institutions or merchants. Consumers also have less ability to spread losses than financial institutions or merchants. For a consumer, the unauthorized use of a payment card is a fairly remote risk, but with potentially high costs. These costs will likely be borne entirely by the consumer; they cannot easily be passed on to other parties.215 For a financial institution or a merchant, fraud is a regular occurrence, and its costs can be amortized over a large base of transactions. Moreover, because financial institutions and merchants have superior information about their risks from payment card fraud relative to consumers, they are more likely to optimally insure against it.216 Consumers’ more limited ability to absorb losses than other payment card network participants is an additional argument for limiting their liability by statute. CONCLUSION Payment card networks, if left to their own devices, are as likely to produce private disorder, as efficient private order. Regulatory attention has focused on the explicit price points in payments—interchange fees—but the latent price point of fraud liability allocation is equally important. Optimizing fraud liability allocation necessitates recognition of the co213. Id. at 71. 214. Id. 215. Consumers are unlikely to insure against losses because the risk is difficult to estimate, which results in known bargaining costs outweighing the questionable benefit of the insurance. Id. at 72. 216. Id. at 72-73. 48 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 optetive nature of payment card networks. Some issues are best approached through encouraging fairer and more adequate representation of all parties in interest in coordination among payment card networks. Other issues are best approached through encouraging more vigorous competition. We should not assume that the invisible hand will guide the payment card industry to the optimal outcome; but with limited regulatory corrections, payments card network liability rules can come closer to achieving a Coasean paradise, and making payments—the ultimate unavoidable transaction cost—more efficient, thereby reducing transaction costs throughout the rest of the economy. RULES, STANDARDS, AND GEEKS Derek E. Bambauer* INTRODUCTION When it comes to regulating technology, the age-old debate between rules and standards tilts heavily towards standards. Rules, for all their clarity, are seen as slow-changing tools in industries characterized by dynamism. They are also viewed as being both under- and over-inclusive, and in prizing form—one means of achieving a desired result—over substance—the result itself.1 Moreover, setting legal rules for technology risks creating lock-in, which may cement a given technology in place. In short, standards—particularly standards that look to industry best practices—are lauded as the best means for governing code through law.2 This Article, though, argues that rules are preferable for regulating data security, at least under certain conditions. In part, this is so because data security typically focuses on controlling the wrong set of events. Security is often preoccupied with regulating access to data—in particular, with preventing unauthorized access.3 Yet, strangely, unauthorized access is ubiquitous. Employees lose laptops,4 hackers breach corporate databases,5 and information is inadvertently e-mailed6 or posted to the public Internet.7 * Associate Professor of Law, Brooklyn Law School. A.B., Harvard College; J.D., Harvard Law School. The author thanks Lia Sheena, Lia Smith, and Carolyn Wall for expert research assistance. Thanks for helpful suggestions and discussion are owed to Miriam Baer, Ted Janger, Thinh Nguyen, and Jane Yakowitz. The author welcomes comments at <derek.bambauer@brooklaw.edu>. 1. See, e.g., John F. Duffy, Rules and Standards on the Forefront of Patentability, 51 WM. & MARY L. REV. 609 (2009); Daniel A. Crane, Rules Versus Standards in Antitrust Adjudication, 64 WASH. & LEE L. REV. 49 (2007). 2. See, e.g., Daniel Gervais, The Regulation of Inchoate Technologies, 47 HOUS. L. REV. 665, 702 (2010) (stating that “an inchoate technology may provide a better solution than regulation— perhaps industry-based standards will emerge making legal regulation unnecessary at best and potentially counterproductive”). 3. See, e.g., STUART MCCLURE, JOEL SCAMBRAY & GEORGE KURTZ, HACKING EXPOSED: NETWORK SECURITY ISSUES AND SOLUTIONS 135–50 (1999) (discussing hacking Microsoft Windows credentials). 4. E.g., Kay Lazar, Blue Cross Physicians Warned of Data Breach; Stolen Laptop Had Doctors’ Tax IDs, BOS. GLOBE, Oct. 3, 2009, at B1; Nathan McFeters, Stanford University Data Breach Leaks Sensitive Information of Approximately 62,000 Employees, ZDNET (June 23, 2008, 9:28 PM), http://www.zdnet.com/blog/security/stanford-university-data-breach-leaks-sensitiveinformation-of-approximately-62000-employees/1326; Study: Many Employees Undermine Data Breach Prevention Strategies, INS. J. (Apr. 27, 2009), http://www.insurancejournal.com/news/ national/2009/04/27/99982.htm. 5. Hacker Hits UNC-Chapel Hill Study Data on 236,000 Women, NEWS & REC. (Greensboro, N.C.), Sept. 25, 2009, http://www.news-record.com/content/2009/09/25/article/hacker_hits_unc_ chapel_hill_study_data. 6. E.g., David Hendricks, KCI Working to Contain Employee Data Breach, SAN ANTONIO EXPRESS-NEWS, Sept. 3, 2010, at C1; Sara Cunningham, Bullitt School Employees’ Social Security Numbers Mistakenly Released, THE COURIER-J. (Louisville, Ky.), Oct. 21, 2009. 7. E.g., Evan Schuman, Announce a Data Breach And Say It’s No Big Deal?, CBS NEWS, Apr. 29, 2010, http://www.cbsnews.com/stories/2010/04/29/opinion/main6445904.shtml; Elinor 50 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 This Article argues that preventing data breaches is not only the wrong goal for regulators, it is an impossible one. Complex systems design theory shows that accidents are inevitable.8 Thus, instead of seeking to prevent crashes, policymakers should concentrate on enabling us to walk away from them. The focus should be on airbags, not anti-lock brakes. Regulation should seek to allow data to “degrade gracefully,” mitigating the harm that occurs when a breach (inevitably) happens.9 Such regulatory methods are optimally framed as rules under three conditions. First, minimal compliance—meeting only the letter of the law— is sufficient to avoid most harm. Second, rules should be relatively impervious to decay in efficacy over time; technological change, such as increased CPU speeds, should not immediately undermine a rule’s preventive impact.10 Furthermore, compliance with a rule should be easy and inexpensive to evaluate. In addition, rules are likely to be helpful where error costs from standards are high; where if an entity’s judgment about data security is wrong, there is significant risk of harm or risk of significant harm. Finally, this argument has implications for how compliance should be assessed. When regulation is clear and low-cost, it creates an excellent case for a per se negligence rule, or, in other words, a regime of strict liability for failure to comply with the rule. This Article thus addresses not the desirability of regulation—when data security should be mandated—but rather how to structure that regulation once it is deemed worthwhile. The debate about framing legal commands as rules or as standards is a venerable one. Scholars have addressed the dichotomy in contexts from real property rights11 to patent law12 to antitrust.13 The merits and shortcomings of each approach have been analyzed from a variety of theoretical perspectives.14 Rules offer clearer signals to those whose behavior is Mills, Hacker Defends Going Public With AT&T’s iPad Data Breach (Q&A), CNET NEWS (June 10, 2010, 4:12 PM), http://news.cnet.com/8301-27080_3-20007407-245.html. 8. See generally Maxime Gariel & Eric Feron, Graceful Degradation of Air Traffic Operations: Airspace Sensitivity to Degraded Surveillance Systems, 96 PROCEEDINGS OF THE IEEE 2028 (2008), available at http://arxiv.org/PS_cache/arxiv/pdf/0801/0801.4750v1.pdf (discussing degraded operations of air transportation systems and conflict resolutions for past and future system evolutions); see also HOWARD LIPSON, CARNEGIE MELLON UNIV. SOFTWARE ENG’G. INST., EVOLUTIONARY SYSTEMS DESIGN: RECOGNIZING CHANGES IN SECURITY AND SURVIVABILITY RISKS 1 (2006), available at www.cert.org/archive/pdf/06tn027.pdf. 9. See Gariel & Feron, supra note 8, at 2029–32; see also MARK GRAFF & KENNETH R. VAN WYK, SECURE CODING: PRINCIPLES & PRACTICES 43 (2003). 10. Intel co-founder Gordon Moore famously observed that the number of transistors on a CPU doubles every two years. Michael Kanellos, Prospective: Myths of Moore’s Law, CNET NEWS (June 11, 2003, 4:00 AM), http://news.cnet.com/Myths-of-Moores-Law/2010-1071_3-1014 887.html. 11. See Carol M. Rose, Crystals and Mud in Property Law, 40 STAN. L. REV. 577, 580 (1988). 12. See Duffy, supra note 1, at 611. 13. See Crane, supra note 1, at 52. 14. See, e.g., Louis Kaplow, Rules Versus Standards: An Economic Analysis, 42 DUKE L.J. 557 (1992); Kathleen M. Sullivan, Foreword: The Justices of Rules and Standards, 106 HARV. L. REV. 22 (1992); Cass R. Sunstein, Problems with Rules, 83 CALIF. L. REV. 953 (1995). 2010] Rules, Standards, and Geeks 51 constrained; they help both regulated and regulators assess compliance more cheaply and easily.15 In addition, they may prevent abuse by conferring less discretion on regulators.16 However, rules are often underinclusive—failing to cover behavior that should fall within their ambit, or failing to prevent risks they are designed to address—or over-inclusive— imposing burdens on unrelated actors or activities.17 Standards, by contrast, are more readily adapted to complex or changing situations, but often at the price of predictability and cost.18 The discussion becomes more complex when we recognize that the distinction is continuous rather than binary. Standards can be rule-like, and rules standards-like. Consider two security mandates: “encrypt,” and “follow industry best practice for securing data.” The former looks like a rule, and the latter like a standard. However, “encrypt” could be seen as a standard: the command specifies a method, but leaves the implementation entirely up to the regulated entity. Encryption has been used since the days of Mary, Queen of Scots;19 its modes range from simple (and simply cracked) transposition ciphers20 to elliptic curve cryptography.21 Even a more specific command like “encrypt using asymmetric key cryptography” can be met with a variety of responses. The RSA, ElGamal, and DSS key techniques all meet the criterion, but have important differences among them.22 Thus, a rule can be transformed into a standard by altering the level of specificity. Similarly, “follow industry best practice for securing data” could be a rule. If, for example, the industry has standardized on the use of SSL (Secure Sockets Layer) to safeguard sensitive data while it is being communicated over a network, that best practice standard effectively becomes a rule: “use SSL.”23 Thus, even if an alternative technique were demonstrated to be functionally equivalent, it would not comply with the standard, even though standards are typically viewed as ends-driven and not 15. See generally Colin S. Diver, The Optimal Precision of Administrative Rules, 93 YALE L.J. 65, 66–71 (1983). 16. See generally Paul B. Stephan, Global Governance, Antitrust, and the Limits of International Cooperation, 38 CORNELL INT’L L.J. 173, 190 (2005). 17. See generally Frederick Schauer, When and How (If At All) Does Law Constrain Official Action?, 44 GA. L. REV. 769, 781 (2010). 18. See, e.g., Dale A. Nance, Rules, Standards, and the Internal Point of View, 75 FORDHAM L. REV. 1287, 1311 (2006). 19. SIMON SINGH, THE CODE BOOK 32–39 (1999). 20. Id. at 7–8. 21. See generally The Case for Elliptic Curve Cryptography, NATIONAL SECURITY AGENCY, http://www.nsa.gov/business/programs/elliptic_curve.shtml (last updated Jan. 15, 2009). 22. See generally RICHARD A. MOLLIN, RSA AND PUBLIC-KEY CRYPTOGRAPHY 53–78 (Kenneth H. Rosen ed., 2003); Taher Elgamal, A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, 31 IEEE TRANSACTIONS ON INFO. THEORY 469 (1985). 23. See generally ERIC RESCORLA, SSL AND TLS: DESIGNING AND BUILDING SECURE SYSTEMS (2001). 52 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 means-driven. In short, the line between rules and standards blurs, particularly as a rule’s command becomes more general. The Article next assesses the conventional wisdom for technological regulation, which holds that standards are the preferred modality. It then turns to arguments in favor of using rules instead, under certain defined conditions. Finally, it closes with observations about the larger role of technology regulation in the context of data security in the payment system. I. THE VIRTUES OF STANDARDS Technology changes quickly; law, slowly. Most commentators favor standards when dealing with technological regulation of issues such as security, for at least five reasons. First, standards allow regulated entities to comply in a more costefficient fashion than rules. Requiring a particular technology or approach may be unnecessarily expensive, especially where infrastructures differ significantly, where there are a range of alternatives, or where the endpoint can be achieved without applying technology in some situations.24 Rules can limit creativity in achieving regulators’ goals.25 Second, standards can be less vulnerable to obsolescence. Rule-based specifications may decay quickly when technology changes rapidly. This either undercuts the efficacy of regulation, or forces frequent updates to it. The Clipper Chip controversy of the mid-1990s provides a potent example; regulation that mandated use of one particular encryption technique might well have undercut the deployment of e-commerce and other advances dependent on data security.26 Third, standards can minimize the ill-effects of information asymmetry regarding technology.27 Regulators may not know what technologies are cutting-edge or appropriate or unnecessarily costly. Standards can wrap in expertise from regulated entities while meeting regulatory goals. Fourth, standards may deal better with interoperability concerns. Most organizations have heterogeneous information technology environments for a variety of reasons: mergers, legacy systems, customer demands, and so forth. Regulations that specify a particular technology, or method of compliance, may make demands that are impossible or inapposite. For example, Deutsche Bank used the IBM operating system OS/2 long after 24. Cf. Christopher S. Yoo, Network Neutrality, Consumers, and Innovation, 2008 U. CHI. LEGAL F. 179, 202–17 (2008) (discussing shortcomings of network neutrality mandate, versus multiple network architectures). 25. See generally C. Steven Bradford, The Cost of Regulatory Exemptions, 72 UMKC L. REV. 857, 864–71 (2004). 26. See generally A. Michael Froomkin, The Metaphor is the Key: Cryptography, the Clipper Chip, and the Constitution, 143 U. PA. L. REV. 709 (1995). 27. Cf. Shubha Ghosh, Decoding and Recoding Natural Monopoly, Deregulation, and Intellectual Property, 2008 U. ILL. L. REV. 1125, 1161–66 (describing problems of rate regulation due to information asymmetry for intellectual property). 2010] Rules, Standards, and Geeks 53 most other customers had migrated to Microsoft Windows or a UNIX platform.28 Thus, requirements tied to Windows (for example, using the NTFS file system) or to software only available for that operating system would have forced Deutsche Bank into a costly migration, or to fall out of compliance. In contrast, a standard that specifies its goal, but is technologyagnostic, allows entities with a range of infrastructures to comply adequately. Finally, selecting one technology for regulatory compliance risks producing market-making effects. Regulation may confer success, or at least widespread adoption, on a single product or company—a problem that worsens if the technology is sub-optimal. For example, the memory chip manufacturer Rambus was able to influence the industry group JEDEC (Joint Electron Device Engineering Counsel) to adopt, as part of its standard for SDRAM (Synchronous Dynamic Random Access Memory), technology over which Rambus held patent rights.29 (Indeed, Rambus actually amended its pending patent applications to conform better to the JEDEC technology.)30 This led to lawsuits against Rambus for fraud, and to an initial Federal Trade Commission (FTC, or Commission) finding that the company had engaged in antitrust violations (under Section 2 of the Sherman Act).31 However, Rambus emerged unscathed from both the suits and the FTC investigation.32 Similarly, a legal mandate to incorporate a particular technology could create market power for that technology’s owner, particularly if the technology were protected by intellectual property rights such as a patent. Thus, a rule may entrench a single technology into a powerful if not unassailable market position. The use of standards in technology regulation is a familiar aspect of the data payment system in the United States. For example, the FTC imposed standards-based requirements for the security of non-public information, known as the Safeguards Rule, as part of its rulemaking authority under the Gramm-Leach-Bliley (GLB) Act.33 The Commission mandates a “comprehensive information security program that is written in one or more 28. Jonathan Collins, IBM Steps Up to Blame Microsoft for OS/2 Failure, COMPUTERGRAM INT’L (Nov. 18, 1998), http://findarticles.com/p/articles/mi_m0CGN/is_3541/ai_53238418. 29. Scott Cameron, Rambus Inc.: FTC Finds That Valid Patent Acquisition Can Amount to a Violation of Antitrust Laws, IP LAW BLOG (Oct. 20, 2006), http://www.theiplawblog.com/archives /-patent-law-rambus-inc-ftc-finds-that-valid-patent-acquisition-can-amount-to-a-violation-ofantitrust-laws.html. 30. Id. 31. Edward Iwata, Rambus Stock Soars 24% After Antitrust Ruling by FTC; Royalties Capped, Not Killed, USA TODAY, Feb. 6, 2007, at B3. 32. Austin Modine, FTC Drops Rambus ‘Patent Ambush’ Claims, CHANNEL REGISTER (May 14, 2009), http://www.channelregister.co.uk/2009/05/14/ftc_drops_rambus_antitrust_case; see also Dean Wilson, Rambus Sues IBM to Reverse Patent Ruling, TECHEYE (Aug. 24, 2010, 3:21 PM), http://www.techeye.net/business/rambus-sues-ibm-to-reverse-patent-ruling. 33. Standards for Safeguarding Customer Information, 67 Fed. Reg. 36,484 (May 23, 2002) (to be codified at 16 C.F.R. pt. 314). 54 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to [an organization’s] size and complexity, the nature and scope of its activities, and the sensitivity of any customer information at issue.”34 Regulated entities must perform a risk assessment, and then “[d]esign and implement information safeguards to control the risks [it] identif[ies] through risk assessment, and regularly test or otherwise monitor the effectiveness of the safeguards’ key controls, systems, and procedures.”35 Thus, the GLB Act is a purposive regulatory standard: it sets goals, and identifies key areas and targets, but is method-agnostic. Financial institutions can implement its requirements using the technology they think best fits their infrastructures and businesses. The Commission’s final rulemaking emphasized that the “standard is highly flexible,” and the notice repeatedly reassured regulated institutions that its approach was factspecific and contextual.36 Indeed, there are zones of regulatory concern regarding payment data security where standards appear superior. One example is application design. As I have written elsewhere, both custom-designed and off-the-shelf applications in the payment system suffer from security flaws.37 Some of these bugs result from coding errors; others, from the inherent complexity of data processing and from interactions between systems and data stores.38 As Microsoft’s Patch Tuesday ritual reminds us, bugs are inevitable.39 They can be minimized, but not eliminated.40 Thus, as with data losses and security breaches themselves, the best regulatory goal for application design is to minimize bugs.41 Software design involves the familiar trade-off between time and cost versus greater security, with a minimum optimal bugginess greater than zero. For application design, then, the critical regulatory issue is methodology: setting parameters for the design, testing, and deployment of the software.42 Again, this approach is familiar to the payment industry. The Payment Card Industry Data Security Standard (PCI DSS) Requirements and Security Assessment Standards, promulgated by an industry association founded by payment card networks such as American Express, create 34. 35. 36. 37. Id. at 36,494. Id. Id. at 36,488. Derek E. Bambauer & Oliver Day, The Hacker’s Aegis, 60 EMORY L.J. (forthcoming 2010) (manuscript at 8). 38. See generally id. at 8–10. 39. Microsoft Security Bulletin Advance Notification, MICROSOFT, http://www.microsoft.com/technet/security/bulletin/advance.mspx (last visited Dec. 30, 2010). 40. See Bambauer & Day, supra note 37 (manuscript at 8–14). 41. See generally FREDERICK P. BROOKS, JR., THE MYTHICAL MAN-MONTH: ESSAYS ON SOFTWARE ENGINEERING (3rd prtg. 1979). 42. See generally GLENFORD J. MYERS, THE ART OF SOFTWARE TESTING (2d ed. 2004). 2010] Rules, Standards, and Geeks 55 private law regulation of customer account data.43 To comply with PCI DSS, an organization must develop its software applications in accordance with the DSS standards, and with industry best practices. Requirements include validating application input to prevent buffer overflow and crosssite scripting (CSS) attacks, checking error handling, validating encrypted storage, validating communications security, and checking role-based access controls.44 Organizations must implement code review for custom software before deploying applications.45 Public Web applications are subject to additional standards, such as developing based on the Open Web Application Security Project Guide, and protecting against newly discovered vulnerabilities by using a firewall or vulnerability assessment tools.46 The goal of these requirements is to prevent breaches from common attacks, such as the SQL injection attack that caused the data spill at Heartland Payment Systems.47 PCI DSS, as its moniker suggests, is framed as a standard and not as a rule. This is clear from its focus on process, such as engaging in code review, and on goals, such as protecting against new attacks or vulnerabilities. Thus, for example, PCI DSS requires validating secure communications, not using a particular secure communications technology such as SSL.48 Application design is a sensible target for standards-based regulation, for at least three reasons. First, history matters. Most financial institutions maintain legacy systems, such as mainframe-based applications, due to the cost and difficulty of upgrading.49 It may be impossible for them to employ a given technology to achieve security without expensive wholesale changes to their infrastructure. Second, systems heterogeneity means that even applications with a common goal, such as connecting to 43. See generally PCI SCC Data Security Standards Overview, PCI SEC. STANDARD COUNCIL, https://www.pcisecuritystandards.org/security_standards/index.php (last visited Dec. 30, 2010). 44. PCI SECURITY STANDARDS COUNCIL, PAYMENT CARD INDUSTRY (PCI) DATA SECURITY STANDARD: REQUIREMENTS AND SECURITY ASSESSMENT PROCEDURES 30–35 (July 2009), available at https://www.pcisecuritystandards.org/security_standards/pci_dss_download.html [hereinafter PCI SECURITY PROCEDURES]. 45. Id. at 32. 46. Id. at 33. 47. Julia S. Cheney, Heartland Payment Systems: Lessons Learned from a Data Breach 3–5 (Fed. Reserve Bank of Phila., Discussion Paper No. 10-1, 2010), available at http://www.philadelphiafed.org/payment-cards-center/publications/discussion-papers/2010/D2010-January-Heartland-Payment-Systems.pdf; Kim Zetter, TJX Hacker Charged with Heartland, Hannaford Breaches, WIRED (Aug. 17, 2009, 2:34 PM), http://www.wired.com/threatlevel/2009/ 08/tjx-hacker-charged-with-heartland. 48. PCI SECURITY PROCEDURES, supra note 44, at 31. 49. See, e.g., Sol E. Solomon, Legacy Systems Still in the Main Frame, ZDNET (Aug. 14, 2008), http://www.zdnetasia.com/legacy-systems-still-in-the-main-frame-62044820.htm; Rusty Weston, Reconsider the Mainframe, SMART ENTER., http://www.smartenterprisemag.com/articles/ 2008winter/markettrends.jhtml (last visited Dec. 30, 2010). 56 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 payment networks, likely must be custom-coded.50 Forcing financial institutions to use one technology or method to gain security ends would drive up their costs unnecessarily. Finally, here rule-based specifications seem more vulnerable to decay. New attacks and vulnerabilities appear constantly.51 Having a single approach to security across the financial industry may, like monoculture agriculture, leave institutions vulnerable to a single new pathogen.52 In short, security may well degrade rapidly, rather than slowly. For these three reasons—legacy systems, customized code, and rapid degradation—a standards-based regime is preferable to a rule-based one for application design. Regulation by standards rather than rules is the established norm in the data payment system.53 Indeed, as the discussion of application design demonstrates, this preference may be sensible in some areas. However, standards are not always superior. The next section explores the virtues of regulation by rules for security. II. THE VIRTUES OF RULES Arguing for rules in technological regulation is an uphill climb: they can become obsolete rapidly, may increase costs by forcing entities to comply in a highly specific fashion, and may be both over- and underinclusive. Yet, this Article argues that rules are preferable to standards when at least three conditions hold: sufficient minima, slow or low decay, and inexpensive verification. First, a rule is helpful when the specified level of data security— effectively, a minimum—suffices in most or all circumstances. One example would be to mandate that transmission of data take place over a connection protected by 128-bit SSL.54 SSL certificates are widely and cheaply available, and root certificates are built into all major browsers.55 Currently, 128-bit SSL traffic is proof against brute-force decryption attacks even when adversaries use clusters or supercomputers.56 Thus, 128bit encryption is strong enough to protect data in communication, even if 50. HAZELINE ASUNCION & RICHARD N. TAYLOR, INST. FOR SOFTWARE RESEARCH, ESTABLISHING THE CONNECTION BETWEEN SOFTWARE TRACEABILITY AND DATA PROVENANCE 10 (2007), available at http://www.isr.uci.edu/tech_reports/UCI-ISR-07-9.pdf. 51. See, e.g., SECUNIA, SECUNIA HALF YEAR REPORT (2010), available at http://secunia.com/ gfx/pdf/Secunia_Half_Year_Report_2010.pdf. 52. See generally DANIEL D. CHIRAS, ENVIRONMENTAL SCIENCE 116 (8th ed. 2010). 53. See PCI SECURITY PROCEDURES, supra note 44. 54. See, e.g., Roy Schoenberg, Security of Healthcare Information Systems, in CONSUMER HEALTH INFORMATICS 162, 176 (Deborah Lewis et al., eds., 2005). 55. Id. 56. See, e.g., JOSEPH STEINBERG & TIM SPEED, SSL VPN: UNDERSTANDING, EVALUATING, AND PLANNING SECURE, WEB-BASED REMOTE ACCESS 33–67 (2005). 2010] Rules, Standards, and Geeks 57 institutions do not take additional measures, such as protecting against eavesdropping.57 A corollary is that rules may be helpful where the impact of a data breach is high, and where the specified technology raises the cost to an attacker or discoverer of captured information. One example here is hard drive encryption. Stories of lost laptops, backup tapes, and USB drives are legion. Here, rules serve not to prevent loss—indeed, hard drive encryption is only useful after the loss has taken place—but to reduce its effects.58 Similarly, a rule mandating logging of access to sensitive data cannot prevent an employee from copying down customer account information displayed on a computer monitor, but can aid an institution to detect what has been revealed in the breach, and perhaps to minimize its spread.59 This condition requires that the rule specify protection that is good enough in most or all cases. Second, rules work well when they need not be frequently updated—in other words, when they decay slowly. This reduces the administrative cost of the rule, and allows it to retain effectiveness over time.60 128-bit encryption, for example, will likely suffice against brute-force attacks for at least ten years, given current rates of advance in CPU clock cycles and parallelization.61 To take another encryption case study, DES (Data Encryption Standard) was adopted as a Federal Information Processing Standard in 1976.62 It remained impervious to commercial-level decryption (as opposed to governmental attacks) until the late 1990s.63A technology- 57. “Man in the middle” attacks against SSL are still theoretically possible, but financial institutions (unlike end users) should be sophisticated enough to take steps such as verifying certificate signatures to safeguard against such hacks. See, e.g., Larry Seltzer, SSL Man-in-theMiddle Attack Exposed, PCMAG.COM (Nov. 5, 2009), http://www.pcmag.com/article2/0,2817,235 5432,00.asp; Ben Laurie, Another Protocol Bites the Dust, LINKS (Nov. 5, 2009, 8:03 AM), http://www.links.org/?p=780; Dan Goodin, Hacker Pokes New Hole in Secure Sockets Layer, REGISTER (London) (Feb. 19, 2009, 5:38 GMT), http://www.theregister.co.uk/2009/02/19/ssl_ busting_demo. 58. Sasha Romanosky, Rahul Telang & Alessandro Acquisti, Do Data Breach Disclosure Laws Reduce Identity Theft? 12 (Sept. 16, 2008) (unpublished manuscript), available at http://weis2008.econinfosec.org/papers/Romanosky.pdf; Robert Vamosi, Protect Data With Onthe-Go Drive Encryption, PCWORLD (Mar. 1, 2010, 9:00 PM), http://www.pcworld.com/article/ 189034/protect_data_with_onthego_drive_encryption.html. 59. See, e.g., Sarah Cortes, Compliance Fundamentals: Database Logging, Privileged Access Control, IT COMPLIANCE ADVISOR (Apr. 13, 2009, 3:28 PM), http://itknowledgeexchange.tech target.com/it-compliance/compliance-fundamentals-database-logging-privileged-access-control. 60. Sunstein, supra note 14, at 1012–16. 61. See, e.g., Bradley Mitchell, Encryption: What is the Difference Between 40-bit and 128-bit Encryption?, ABOUT.COM, http://compnetworking.about.com/od/networksecurityprivacy/l/aa011 303a.htm (last visited Nov. 4, 2010). 62. History of Encryption, SANS INSTITUTE, http://www.sans.org/reading_room/whitepapers/ vpns/history-encryption_730 (last visited Nov. 4, 2010). 63. Press Release, Electronic Frontier Foundation, “EFF DES Cracker” Machine Brings Honesty to Crypto Debate (July 17, 1998), http://w2.eff.org/Privacy/Crypto/Crypto_ 58 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 specifying rule that remains effective for over twenty years is relatively low-cost to update and relatively impervious to decay.64 Finally, rules are particularly effective when monitoring is low-cost and accurate. An ongoing problem with data security breaches is the causation of downstream harm. For example, if a bank suffers a data spill, and its customers later suffer identity theft, is there a causal connection to the spill? Courts have largely interpreted the causation requirements built into tort law to exempt data owners or storehouses from liability.65 This may result in insufficient incentives to take precautions. A rule, for example, that requires data holders to encrypt data usefully serves as a bright-line negligence test—especially when compliance is relatively low-cost. Holding institutions responsible for downstream consequences of harms related to the spilled information provides strong incentives to comply with the rule—including that liability can be avoided entirely (under the current doctrine) simply through encryption.66 Concerns about over-deterrence, or excessive investment in precautions, are minimized (if not eliminated) where the entity can avoid liability relatively simply and cheaply, and where errors in adjudication are unlikely. When a rule is effective, both initially and over time, and where regulators can assess compliance cheaply and with confidence, a rule is likely to be superior to a standard in specifying technological measures for data security. Thus, data security rules can helpfully act as a forcing device that reduces the level of harm from breaches. One example of a data security rule that appears beneficial (though it is sufficiently new that empirical data is lacking) is the data breach notification scheme added to HIPAA (the federal Health Insurance Portability and Accountability Act of 1996, which set data privacy and security rules for personally-identifiable health information) by the HITECH Act of 2009.67 The HITECH Act regulates information security indirectly: if a covered entity under HIPAA has a breach of “unsecured protected health information,” that entity must inform people whose data was released and, in the case of a breach affecting more than 500 people, misc/DESCracker/HTML/19980716_eff_descracker_pressrel.html. In 1998, the Electronic Frontier Foundation cracked DES ciphertext in just under three days with commercially-available technology. Id. 64. Sunstein, supra note 14, at 993–94. 65. See, e.g., Sovereign Bank v. BJ’s Wholesale Club, Inc., 533 F.3d 162, 176 (3d Cir. 2008); Pisciotta v. Old Nat’l Bancorp, 499 F.3d 629 (7th Cir. 2007) (affirming judgment on pleadings for defendant bank); Hammond v. Bank of N.Y. Mellon Corp., No. 08 Civ. 6060, 2010 WL 2643307, at *14 (S.D.N.Y. June 25, 2010) (dismissing suit); Amburgy v. Express Scripts, Inc., 671 F. Supp. 2d 1046, 1050 (E.D. Mo. 2009). 66. STEVEN SHAVELL, ECONOMIC ANALYSIS OF ACCIDENT LAW 210 (1987). 67. Health Information Technology for Economic and Clinical Health Act of 2009, Pub. L. No. 111-5, 123 Stat. 226 (2010). 2010] Rules, Standards, and Geeks 59 must also inform the news media.68 Unsecured protected health information (PHI) is PHI that is neither encrypted or destroyed.69 Thus, a breach of encrypted data does not impose a notification requirement, while a breach of unencrypted PHI does. The HITECH Act is specific about the encryption technologies that meet its mandate, pointing covered entities to a list of methods certified by the National Institute of Standards and Technology (NIST).70 Examples of NIST-approved encryption methods include the use of Transport Layer Security (TLS), SSL, or IPSec for data communications, and the NTFS file system for data storage.71 The new HIPAA data security mandate acts like a rule: there is a bright-line test for compliance—either PHI is encrypted with an approved method, or it is treated as unsecured— and the consequences of non-compliance are clear—the entity assumes responsibility for notification in case of a data breach. While the mandate is a soft one—covered entities need not comply if they are willing to notify if a breach occurs—it is nonetheless structured as a rule. The HITECH requirement meets all three conditions specified above. First, encryption is sufficient to mitigate or prevent most harms; second, the NIST-specified standards are relatively slow to decay; and third, compliance is easy to measure—either data is encrypted or it is not.72 Even if a rule risks being under-protective, such as where it decays relatively quickly in efficacy (potentially violating the second condition outlined above), it may still be valuable, especially if paired or reinforced by a standard. This is likely to be true where technological changes are not rapid enough to call for a standard, but are faster than, for example, the changes in encryption effectiveness described above. For example, security regulation could employ a rule specifying encryption with a 256-bit symmetric key algorithm, and a standard requiring stronger encryption where industry best practices so indicate. Such a move incorporates both strict liability—failure to utilize 256-bit or greater encryption creates per se liability—and negligence-based analysis—failure to use stronger encryption when one’s industry does so can create liability. This hybrid approach increases compliance costs, as potentially liable entities must engage in additional investigation to determine the standard of care, and also 68. Breach Notification for Unsecured Protected Health Information, 74 Fed. Reg. 42,740, 42,767–70 (Aug. 24, 2009) (to be codified at 45 C.F.R pt 160 and 164). 69. Id. at 42,768. 70. Id.; see Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals, U.S. DEP’T OF HEALTH & HUMAN SERVS., http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/brguidance. html (last visited Oct. 7, 2010) [hereinafter Guidance to Render Unsecured Protected Health]. 71. Guidance to Render Unsecured Protected Health, supra note 70. 72. The difference between cleartext and ciphertext is obvious even to a layperson—one is readable text and one appears to be gibberish—although the level of encryption used to encode the ciphertext is not. 60 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 monitoring costs, as enforcers must perform the same task.73 However, it can usefully augment a bright-line rule where there are significant concerns that the rule may become under-protective. This framework suggests, by way of example, three areas where rulebased regulation will be helpful: data storage, data transport, and access logging. Both data storage and data transport can be governed by a simple rule: encrypt. Data encryption technology is ubiquitous, inexpensive, and reliable, yet the wave of data spills suggests that data owners and distributors have insufficient incentives to employ it.74 A rule requiring entities to encrypt data during storage and transport, on pain of facing liability for all harms resulting from breaches or spills, would usefully create incentives for protection and would also drive ineffective or incompetent data handlers from the market. Typical concerns about overdeterrence do not apply where compliance is relatively low-cost and where errors in evaluating it are rare if not absent entirely. Encryption for storage and transport meets the three preconditions this Article posits for rules. First, encrypting data when it is stored or sent should protect against misuse in most circumstances.75 While sophisticated adversaries can decrypt protected information, doing so requires time, technology, and resources. Encryption raises the cost of data misuse, even if it does not affect the likelihood of data spills. Second, a rule requiring encryption is relatively obsolescence-proof. While faster GPUs and CPUs are decreasing the time necessary to decrypt data without authorization, current protocols are likely to be sufficient for at least ten years.76 Finally, detection is cheap and easy. Encryption can be verified through visual inspection. Moreover, given that encryption is strong protection against data misuse, courts might even adopt a presumption that misused data was, in fact, not protected. Res ipsa loquitur is a traditional cost-saving enforcement mechanism that could also helpfully force regulated entities to verify encryption or to enable it by default.77 Access logging—tracking who has accessed, changed, or deleted data—is also a strong candidate for rule-based regulation.78 Moreover, 73. See generally W. KIP VISCUSI, REFORMING PRODUCTS LIABILITY 121–23 (1991) (discussing enforcement and information costs). 74. See, e.g., Adam J. Levitin, Private Disordering? Payment Card Fraud Liability Rules, 5 BROOKLYN J. CORP. FIN. & COMM. L. 1 (2010); Chronology of Data Breaches: Security Breaches 2005-Present, PRIVACY RIGHTS CLEARINGHOUSE, http://www.privacyrights.org/data-breach (last updated Nov. 7, 2010). 75. See supra Part II. 76. Mitchell, supra note 61. 77. See generally THOMAS J. MICELI, THE ECONOMIC APPROACH TO LAW 63–64 (2004). 78. See, e.g., Logging User Authentication and Accounting Requests, MICROSOFT TECHNET, http://technet.microsoft.com/en-us/library/cc783783(WS.10).aspx (last updated Jan. 21, 2005) (discussing Windows Server 2003); Enabling Access Logging, IBM, http://publib.boulder.ibm.com/infocenter/wchelp/v5r6/index.jsp?topic=/com.ibm.commerce.admin 2010] Rules, Standards, and Geeks 61 access monitoring is an example of a mitigation effort rather than a prevention effort; recording who has access to data does not impede copying or misuse directly, but can deter attackers and can also make cleanup efforts easier and more effective.79 A rule for access logging could be quite specific, mandating that entities capture the user credentials, time of access or alteration, and location of access or alteration in durable form. In addition, the rule could allow some flexibility—become more standardlike—by prescribing what must be captured, when, and how, but not by mandating a particular mode of access control. For example, specifying that a system of electronic medical records must record what records are accessed, what changes are made, by whom (user name, for example), from where (IP address or computer host name, for example), and when, would provide a clear trail that would enable recovery efforts after a data spill. Access logging also meets this Article’s three preconditions. Knowing who—or, at least, whose credentials—accessed the data is helpful to divining downstream data access after a breach; thus, even minimal tracking is quite effective.80 Second, access logging has changed relatively little since the days of mainframe data storage; users still authenticate via credentials such as names and passwords.81 Even access controls that employ digital signatures or keys are only variants on this basic technique. Finally, verifying compliance is straightforward: either the entity keeps logs of access, or it does not. Protective techniques such as checksums and hashes can easily test for ex post alteration of access logging, preventing malefactors from obscuring evidence.82 Thus, not only is access logging usefully regulated by a rule, but it also serves as an example of a necessary shift in regulatory focus: from prevention to mitigation. As these examples demonstrate, regulation by rule has considerable virtues for technology, at least where the technology has effective minima, slow decay, and easy verification. CONCLUSION The default assumption for regulating information technology is that standards are not only the superior choice; they are nearly the only choice. This is because scholars and policymakers have focused on the wrong .doc/tasks/tseacclog.htm (last visited Oct. 10, 2010) (discussing IBM WebSphere Commerce server); Logging Control In W3C httpd, W3.ORG, http://www.w3.org/Daemon/User/Config/ Logging.html (last visited Oct. 21, 2010). 79. Galen Gruman, “CSI” For the Enterprise?, CIO, Apr. 15, 2006, at 25, 30, 32. 80. Id. 81. See, e.g., GARY P. SCHNEIDER, ELECTRONIC COMMERCE 493 (8th ed. 2009); Julie Webber, Software Alone Can’t Protect Your Data, PC Managers Warn, INFOWORLD, Mar. 28, 1988, at S2. 82. Michael Baylon, Using Checksums to Test for Unexpected Database Schema Changes, MICHAEL BAYLON’S BLOG (Oct. 16, 2010, 3:40 PM), https://michaelbaylon.wordpress.com/ 2010/10/16/using-checksums-to-test-for-unexpected-database-schema-changes. 62 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 problem: they seek to prevent data spills, rather than to mitigate their impact. Rules can helpfully reduce the effects of a breach. For technology, rules are preferable when they can specify a minimum level of protection that is relatively effective against most risks or attacks; where obsolescence occurs slowly; and where monitoring the rule’s implementation is relatively low-cost and accurate.83 Standards are not always superior, nor are they always inferior—instead, the preferred embodiment of regulation varies with the characteristics of the technological problem at issue. While application design is best governed by standards, due to the critical role of process, the transport and storage of data, along with identification of access to information, are best dealt with via rules.84 This Article questions the prevailing consensus in favor of standards for regulating technology, and also seeks to create testable predictions about when rules will work better. In short, I argue sometimes geeks require rules, not standards. 83. See supra Part II. 84. See supra Part II. WARRANTING DATA SECURITY Juliet M. Moringiello* INTRODUCTION Massive data security breaches have grabbed headlines in the past few years. The data thieves responsible for these breaches have stolen the credit and debit card data of customers of retailers such as TJ Maxx,1 DSW Shoe Warehouse,2 BJ’s Wholesale Club,3 and the Hannaford grocery store chain.4 A thief in control of payment card data, which can include debit and credit card numbers, expiration dates, security codes, and personal identification numbers,5 has the ability to open new credit accounts and make charges on existing consumer accounts. These data breaches leave individuals fearful that their personal information will be used in ways that will disrupt their financial transactions and damage their credit.6 The legal protection of privacy in the United States is far from comprehensive.7 The level of privacy protection provided to individuals depends on the sector of the economy in which they are participating.8 One sector of the economy in which privacy legislation exists is the financial sector, but the protection provided by such legislation is not comprehensive.9 Although individuals may think that they have some protected right to financial privacy because of the Gramm-Leach-Bliley Act, that statute—which requires financial institutions to disclose their privacy policies to consumers—does nothing to protect the consumer when * Professor, Widener University School of Law. I thank Ted Janger for organizing the Symposium at which this paper was presented, and all the participants, especially James Grimmelmann and Sarah Jane Hughes, for their very helpful comments on an early draft. Matthew Banks provided terrific research assistance for this Article. 1. Ross Kerber, Banks in Region Set to Sue TJX Over Breach; Group Says Its Plan Reflects Ire Over Lax Security by Retailers, BOS. GLOBE, Apr. 25, 2007, at C1; Joseph Pereira, Jennifer Levitz & Jeremy Singer-Vine, U.S. Indicts 11 in Global Credit-Card Scheme, WALL ST. J., Aug. 6, 2008, at A1. 2. Bill Husted & David Markiewicz, Info Theft Slams Chain; 1.4 Million Card Numbers Stolen, ATLANTA J.-CONST., Apr. 20, 2005, at A1. 3. Todd Mason, Philadelphia-Based Sovereign Bank to Replace 83,000 Compromised Debit Cards, KNIGHT RIDDER TRIB. BUS. NEWS (Washington), June 4, 2004, at 1. 4. Mark Albright, Grocer Credit Data is Swiped, ST. PETERSBURG TIMES, Mar. 18, 2008, at D1. 5. In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 116 (D. Me. 2009). 6. Identity Theft: Hearing Before the S. Comm. on Commerce, Sci., and Transp., 109th Cong. 28 (2005) (statement of Deborah Platt Majoras, Chairman, Fed. Trade Comm’n). 7. See, e.g., MARGARET JANE RADIN, JOHN A. ROTHCHILD, R. ANTHONY REESE & GREGORY M. SILVERMAN, INTERNET COMMERCE: THE EMERGING LEGAL FRAMEWORK 390–92 (2nd ed. 2006). 8. Id. 9. Id. at 391. 64 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 her financial information is stolen from the payment system.10 Despite the fact that almost all states have provided a measure of protection to consumers by enacting data breach notification statutes, these statutes merely require companies that hold consumer data to notify consumers of a breach so that the consumers can protect themselves.11 Data breach notification statutes do not grant a private right of action to consumers to recover their losses.12 A comprehensive statutory and regulatory scheme allocates losses in the credit and debit card systems, and this scheme tends to pass fraud losses on to the banks that issue the cards.13 While this scheme insulates the individual cardholders from most of the major financial losses resulting from a data breach, it does nothing to compensate the cardholders for the time and money they must spend to monitor their credit, obtain replacement cards, cancel and reinstate recurring automatic payments, and repair their credit in cases in which the data was used to open new fraudulent accounts. Consumers affected by data breaches understandably feel exposed to serious financial harm, even in the absence of liability for fraudulent charges. A consumer’s credit score affects her ability to finance important purchases, and the events that occur in the aftermath of a data breach can negatively affect that score.14 Because their losses are not addressed by existing privacy and payment system statutes, consumers have attempted to recover them using various common law theories; such theories, however, have uniformly failed to provide them any meaningful recovery for these losses.15 In this Article, I will discuss cases in which consumers have been denied recovery for losses arising out of data breaches. I then focus on a novel argument made by the plaintiffs in the Hannaford case. The Hannaford plaintiffs argued that Article 2 of the Uniform Commercial 10. See Gramm-Leach-Bliley Act, Pub. L. No. 106-102, 113 Stat. 1338 (1999) (codified as amended in scattered sections of 12 U.S.C. and 15 U.S.C.). 11. See, e.g., IND. CODE §§ 24-4.9-1-1–9-5-1 (West 2009); MASS. GEN. LAWS ANN. ch. 93H, §§ 1–6 (West 2010); N.Y. GEN. BUS. LAW § 899-aa (McKinney Supp. 2010). As of April 2010, “46 states, the District of Columbia, Puerto Rico, and the U.S. Virgin Islands had enacted legislation requiring notice to individuals of security breaches involving personal information.” See State Security Breach Notification Laws, NAT’L CONFERENCE OF STATE LEGISLATURES, http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/SecurityBreach NotificationLaws/tabid/13489/Default.aspx (last visited Sept. 21, 2010). Several attempts to pass a federal data breach notification law have failed. See Donald G. Aplin, Network Security: Carper, Bennett Reintroduce Bipartisan Financial Data Security, Breach Notice Bill, BNA: ELECTRONIC COMM. & L. REP., July 21, 2010, http://news.bna.com/epln (search “Donald G. Aplin”; then follow “7/19/2010” hyperlink). 12. See Pisciotta v. Old Nat’l Bancorp, 499 F.3d 629, 637 (7th Cir. 2007) (stressing that the Indiana data breach notification statute grants enforcement authority only to the Attorney General). 13. See generally Truth in Lending Act of 1968 §§ 102–87, 15 U.S.C. §§ 1601–1667f (2006); Electronic Fund Transfer Act of 1978 § 902, 15 U.S.C. §§ 1693–1693r (2006). 14. Gail Hillebrand, After the FACTA: State Power to Prevent Identity Theft, 17 LOY. CONSUMER L. REV. 53, 55–57 (2004). 15. See discussion infra Part II. 2010] Warranting Data Security 65 Code (UCC) should provide a remedy to individuals harmed by a data breach because every time a retailer accepts a payment card from a buyer, it warrants that its payment system is secure.16 While a warranty of data security might be a good idea, Article 2 is not the best place for it because of its limitation to sales of goods. Instead, courts could impose a common law warranty of data security, under which all sellers would warrant that their chosen payment system is secure. In this Article, I will propose a non-waivable common-law warranty of data security that is drawn from both Article 2 warranties and the warranties provided in Articles 3 and 4 of the UCC which apply to negotiable instruments and the check collection system.17 I will then compare the problem of ensuring safe data transactions today to the problem of ensuring the habitability of rental housing in the mid-20th century, which judges addressed by imposing an implied warranty of habitability in leases for residential real property.18 The story of that warranty can add to the discussion about how best to ensure the safety of personal financial data.19 To develop my argument, in Part I, I will describe the mechanics of a data breach. In Part II, I will focus on the case law to discuss the difficulties that consumers face in recovering their data breach losses. I discuss various UCC warranties in Part III, and in Part IV, I analogize today’s data security problems to the problems of scarce habitable rental housing in the midtwentieth century and suggest that today’s courts should protect personal financial data by imposing a warranty modeled in part on the warranty of habitability developed by courts in the 1970s. I conclude by calling on courts to develop a common-law warranty to compensate individuals harmed by data breaches. I. ANATOMY OF A DATA BREACH A payment card transaction involves four parties—the card issuer, the customer, the merchant, and the merchant bank—each of which is in control of payment data at some point in the transaction.20 The role of merchant bank is complicated because a merchant bank may itself act as acquirer or processor, or it may sponsor access to the payment card network 16. In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 118 (D. Me. 2009). 17. U.C.C. §§ 3-416, 3-417, 4-207, 4-208 (2002). 18. See discussion infra Part IV. 19. Modern data collection practices provide legal scholars with an excellent opportunity to analogize privacy regulation to the regulations of past social problems. See generally James Grimmelmann, Privacy as Product Safety, 19 WIDENER L.J. 793 (2010). One possible analogy is to product safety regulation. Id. at 813. 20. Julia S. Cheney, Heartland Payment Systems: Lessons Learned from a Data Breach 1 (Payments Cards Center, Fed. Reserve Bank of Phila., Discussion Paper No. 10-1, 2010), available at http://ssrn.com/abstract=1540143. 66 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 for its partner transaction processor.21 Some data breaches, such as the TJ Maxx data breach, involved data in the merchant’s control.22 Others, such as the Heartland Payment Systems (Heartland) breach, involved data in the processor’s control.23 In some cases, it is difficult to determine the identity of the party at fault for the breach, and as a result, the retailer and its payment processor are often both named as defendants in data breach suits.24 The TJ Maxx breach, which was discovered by the company in December 2006, involved customer data held in the company’s computer systems.25 In a Securities and Exchange Commission filing, the company claimed that the data thieves, using software they placed in the company’s systems without authorization, captured both unencrypted and encrypted data.26 The company reported in its filing that it believed that the hackers had access to the decryption tool for the encryption software used by TJ Maxx.27 According to one news report on the breach, this decryption tool could have been acquired by an insider who participated in the data theft or by a successful entry into the TJ Maxx database where the decryption keys were held.28 The Heartland and Hannaford breaches were different from prior attacks in that the hackers focused not on data stored in a consumer database, but on data as it moved from the stores to the credit card processors.29 In late 2007, fraudsters breached Heartland’s system by a method known as SQL injection,30 which allowed them to exploit a 21. Id. at 1–2. 22. See TJX Co., Annual Report (Form 10-K), at 7 (Mar. 28, 2007), available at http://ir.10kwizard.com/files.php?source=487&page=14&ext=1 (reporting that TJX had suffered “an unauthorized intrusion into portions of [its] computer system”). 23. Cheney, supra note 20, at 3. 24. See, e.g., Amerifirst Bank v. TJX Co., Inc., 564 F.3d 489, 491–92 (1st Cir. 2009) (naming both the retailer and its processing bank as defendants, alleging that they both “failed to follow security protocols prescribed by Visa and MasterCard”). 25. See TJX Co., Annual Report, supra note 22, at 7. 26. Id. at 9. 27. See id. 28. Larry Greenemeier, T.J. Maxx Parent Company Data Theft is the Worst Ever, INFORMATIONWEEK.COM (Mar. 29, 2007), http://www.informationweek.com/news/security/show Article.jhtml?articleID=198701100. 29. See Linda McGlasson, Hannaford Data Breach May Be ‘Tip of Iceberg’, BANK INFO SECURITY (Apr. 4, 2008), http://www.bankinfosecurity.com/articles.php?art_id=810 (quoting a security expert who described the Hannaford incident as “highly significant because it represents the first publicly-acknowledged theft of sensitive card authorization data in transit”); see also Cheney, supra note 20, at 3. 30. SQL stands for “structured query language,” which is defined as “a standardized language for defining and manipulating data in a relational database.” IBM, SQL REFERENCE VOLUME 1, 1 (2006), available at ftp://public.dhe.ibm.com/ps/products/db2/info/vr9/pdf/letter/en_US/db2 s1e90.pdf. For a good explanation of how SQL works and a detailed description of some of the high-profile data breaches mentioned in this article, see generally James Verini, The Hacker Who Went Into the Cold, N.Y. TIMES MAG., Nov. 14, 2010, at 44. 2010] Warranting Data Security 67 vulnerability in Heartland’s corporate and payment processing networks.31 They then installed software that captured payment card data as it moved through Heartland’s system.32 In early 2008, Hannaford discovered that hackers had placed malicious software on their servers to capture payment card information.33 The software picked up credit card numbers and expiration dates as they traveled through the system and sent that information to overseas servers.34 It is important to note that the Payment Cards Industry Standards Council, founded by the five payment card networks, manages a set of security standards (known collectively as the Payment Card Industry Data Security Standard, or PCI DSS)35 with which all merchants and processors must comply in order to participate in the card payment systems.36 While TJ Maxx had not fully complied with the PCI DSS standards,37 Heartland had been certified as compliant at the time its system was breached.38 PCI DSS is not seen as the “gold standard” in data security, however, and most companies do more to protect their data than is required by PCI DSS.39 The amount of data compromised in these breaches can be staggering. The Hannaford data breach resulted in the theft of 4.2 million credit and debit card numbers and related information such as PIN codes.40 The DSW Shoe Warehouse breach involved more than 1.4 million credit and debit card numbers and almost 100,000 checking account numbers and driver’s license numbers.41 The BJ’s Wholesale Club breach allowed “unauthorized parties [to gain] access to magnetic stripe data from 9.2 million credit cards.”42 The TJ Maxx breach was one of the largest, with 94 million compromised records, according to one estimate.43 The largest breach to date was the Heartland breach, which affected about 130 million credit and 31. Cheney, supra note 20, at 3. 32. Id. 33. In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 116 (D. Me. 2009). 34. McGlasson, supra note 29. 35. About the PCI Data Security Standard (PCI DSS), PCI SECURITY STANDARDS COUNCIL, http://www.pcisecuritystandards.org/security_standards/pci_dss.shtml (last visited Oct. 26, 2010). 36. Id. 37. Bill Brenner, TJX Security Breach Tied to Wi-Fi Exploits, COMPUTERWEEKLY.COM (May 8, 2007), http://www.computerweekly.com/Articles/2008/08/08/223672/TJX-security-breach-tiedto-Wi-Fi-exploits.htm. 38. See Cheney, supra note 20, at 4. 39. See id. (discussing the observations of Bob Carr, the CEO of Heartland Payment Systems). 40. In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 116 (D. Me. 2009). 41. Hendricks v. DSW Shoe Warehouse, Inc., 444 F. Supp. 2d 775, 777 (W.D. Mich. 2006). 42. Cumis Ins. Soc’y, Inc. v. BJ’s Wholesale Club, Inc., 918 N.E.2d 36, 39 (Mass. 2009). 43. See Data Security Breaches Reach a Record in 2007, WALL ST. J., Dec. 31, 2007, at B5 (reporting that while the company acknowledged that 46 million records were compromised, Visa and MasterCard estimated that 94 million TJ Maxx records were compromised). 68 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 debit cards.44 These breaches have exposed the personal financial data of millions of individuals, giving unauthorized parties the ability to enter into fraudulent payment card transactions. The data thief is often hard to find, so the data breach victims seek recovery from the company to whom they entrusted their information by making a payment.45 Although consumers are protected from liability for the fraudulent transactions themselves, they have had almost no success recovering other costs arising from these breaches.46 II. THWARTED ATTEMPTS TO RECOVER FOR DATA THEFT Rules governing both credit cards and debit cards protect consumers from most of the liability for fraudulent charges. The Truth in Lending Act limits the liability of a consumer for unauthorized use of her credit card to $5047 and many credit card issuers promise no liability to cardholders if the cardholder notifies the issuer immediately after the card was lost or stolen.48 The Electronic Funds Transfer Act contains a $50 liability limitation for the unauthorized use of a debit card, but the consumer can be liable for a greater amount if she fails to report the loss of her card within a prescribed amount of time.49 Yet data breaches cause consumers to suffer a wide range of other financial and non-financial harms. Consumer plaintiffs in data breach cases have alleged a variety of harms. Although they ultimately incur little to no liability for unauthorized charges, consumer victims of a data breach spend time and money to address and resolve their financial disruptions.50 For example, an individual whose personal information has been compromised as a result of a data breach often feels the need to pay to monitor her credit51 because an unauthorized party might use the stolen data to assume the affected individual’s identity and obtain credit or other benefits fraudulently in that 44. Linda McGlasson, Heartland Breach: Consumer Settlement Proposed, BANK INFO SECURITY (May 6, 2010), http://www.bankinfosecurity.com/articles.php?art_id=2498. 45. See, e.g., In re Hannaford Bros. Co., 613 F. Supp. 2d at 114; Hendricks, 444 F. Supp. 2d at 776; Settlement Agreement, In re Heartland Payment Sys., Inc. Customer Data Sec. Breach Litig. (S. D. Tex. 2009) (No. 4:09-MD-2-46), available at http://www.hpscardholdersettlement.com/ Documents/Settlement%20Agreement.pdf [hereinafter Heartland Settlement Agreement]. 46. See discussion infra Part II. 47. Truth in Lending Act of 1968 § 133, 15 U.S.C. § 1643 (a) (1) (2006). 48. See Mastercard Zero Liability: Zero Liability Protection for Lost & Stolen Cards, MASTERCARD, http://www.mastercard.com/us/personal/en/cardholderservices/zeroliability.html (last visited Aug. 27, 2010); Visa Zero Liability, VISA, http://usa.visa.com/personal/security/visa_ security_program/zero_liability.html (last visited Aug. 27, 2010). 49. Electronic Fund Transfer Act of 1978 § 909, 15 U.S.C. § 1693g (2006). 50. In re Hannaford Bros. Co., 613 F. Supp. 2d at 116. 51. Pisciotta v. Old Nat’l Bancorp, 499 F.3d 629, 631 (7th Cir. 2007); In re Hannaford Bros. Co., 613 F. Supp. 2d at 116; Hendricks v. DSW Shoe Warehouse, Inc., 444 F. Supp. 2d 775, 777 (W.D. Mich. 2006); Forbes v. Wells Fargo Bank, N.A., 420 F. Supp. 2d 1018, 1019 (D. Minn. 2006). 2010] Warranting Data Security 69 person’s name.52 If that individual finds unauthorized payments or charges on her bank and credit card statements, she must take the time to contest the fraudulent charges. As a result, many victims of a data breach seek compensation for credit monitoring costs.53 The Hannaford plaintiffs alleged a comprehensive list of harms, which covered almost everything that can happen when the security of a credit or debit card is compromised.54 Some customers were deprived of the use of their cards because their bank accounts were overdrawn and their credit limits were exceeded.55 Customers also lost bonus points on their cards for the period of time when their cards were cancelled.56 Some banks required customers to pay for replacement cards.57 Customers were also forced to spend time dealing with pre-authorized charges because they had to give new credit card numbers to the payees to whom the pre-authorized payments were made.58 When a consumer’s pre-authorized payments cannot be made because the credit card on file is not valid, the consumer incurs additional charges such as late fees. Therefore, the Hannaford plaintiffs also claimed damages for the disruption of their pre-authorized charge relationships.59 Courts have rejected consumer attempts to recover these costs. Most courts have found that the harms caused by the exposure of personal financial information are too speculative to form the basis for a claim for damages in either contract or tort law.60 In Pisciotta v. Old National Bancorp, the plaintiffs sought compensation, under a negligence theory, for both the credit monitoring services they were forced to obtain and for the emotional distress that they suffered after their personal financial information was taken from the defendant bank’s Web site.61 In order to recover on their negligence claim, the plaintiffs were required to show that they suffered “a compensable injury proximately caused by [the bank’s] breach of duty.”62 To show that they had suffered a compensable harm, the plaintiffs pointed to the Indiana data breach notification statute, arguing that the Indiana legislature, by enacting such a statute, agreed that consumers suffer compensable harm at the moment their personal financial information 52. See Heartland Settlement Agreement, supra note 45, at 12–13. 53. See, e.g., Pisciotta, 499 F.3d at 631; In re Hannaford Bros. Co., 613 F. Supp. 2d at 116; Forbes, 420 F. Supp. 2d at 1020. 54. In re Hannaford Bros. Co., 613 F. Supp. 2d at 116. 55. Id. 56. Id. 57. Id. 58. Id. 59. Id. 60. See, e.g., Pisciotta v. Old Nat’l Bancorp, 499 F.3d 629, 637 (7th Cir. 2007); Forbes v. Wells Fargo Bank, N.A., 420 F. Supp. 2d 1018, 1021 (D. Minn. 2006); Hendricks v. DSW Shoe Warehouse, Inc., 444 F. Supp. 2d 775, 779–81 (W.D. Mich. 2006). 61. Pisciotta, 499 F.3d at 631–32. 62. Id. at 635 (emphasis omitted) (quoting Bader v. Johnson, 732 N.E.2d 1212, 1216–17 (Ind. 2000)). 70 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 is compromised by a data breach.63 The court rejected this argument, noting the absence of any statement by the legislature that it intended to allow such a recovery.64 The plaintiffs in Forbes v. Wells Fargo were also denied recovery for credit monitoring costs.65 In that case, the plaintiffs sued Wells Fargo for both negligence and breach of contract when their financial information was stolen from a Wells Fargo service provider.66 The court rejected the plaintiffs’ arguments, holding that credit monitoring expenses were not incurred because of any present injury, but were rather incurred to prevent future injury, stressing that the plaintiffs’ injuries were “solely the result of a perceived risk of future harm.”67 The court denied the plaintiffs’ breach of contract claims in Hendricks v. DSW Shoe Warehouse because the plaintiff did not prove that her personal information had been used in any way and therefore had suffered no cognizable loss.68 The court characterized the plaintiffs’ claim for credit monitoring costs as “damages to buy peace of mind.”69 Although several plaintiffs have attempted to recover for their losses on a breach of contract theory, the Hannaford plaintiffs made a particularly novel contract argument. They argued that every time Hannaford accepted a payment card, it impliedly warranted that its payment system “was fit for its intended purpose, namely the safe and secure processing of credit and debit card payment transactions,” and that this warranty was breached because the system “allowed wrongdoers to steal the customers’ confidential personal and financial data.”70 This resembles the implied warranty of fitness for a particular purpose from Article 2 of the UCC.71 The plaintiffs argued not that the Article 2 warranty applies by its terms to payment processing transactions, but that Article 2 “provides an ‘analogue’ on which [the] . . . court should draw in crafting a common law implied warranty to fit their situation.”72 The court refused to imply such a warranty for several reasons, focusing on the requirements of Article 2.73 In order for a warranty of fitness for a particular purpose to be implied in a contract of sale, the seller must have reason to know of two facts: the particular purpose for which the 63. 64. 65. 66. 67. 68. Id. at 637. Id. See Forbes v. Wells Fargo Bank, N.A., 420 F. Supp. 2d 1018, 1021 (D. Minn. 2006). Id. at 1020. Id. at 1021. Hendricks v. DSW Shoe Warehouse, Inc., 444 F. Supp. 2d 775, 779–81 (W.D. Mich. 2006). 69. Id. at 780. 70. In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 119–20 (D. Me. 2009) (quotations omitted). 71. U.C.C. § 2-315 (2002). 72. In re Hannaford Bros. Co., 613 F. Supp. 2d at 120. 73. Id. 2010] Warranting Data Security 71 buyer requires the goods, and that the buyer is relying on the seller’s skill or judgment in selecting or furnishing such goods.74 The court emphasized that the warranty applies to goods sold, and the definition of goods does not include the payment system used to process the payment for the goods.75 In addition, the implied warranty of fitness for a particular purpose is implied not when a buyer seeks goods for their ordinary purpose, but only when a buyer seeks goods for a purpose that is particular to that buyer’s needs.76 The court correctly observed that the buyers did not use the payment system for a particular purpose;77 instead, they relied on it to process credit and debit card payments in the same way as did all other grocery purchasers.78 However, while Article 2 may not be the best place to locate a warranty or provide the best analogy, implying a warranty of data security in consumer payment transactions is a good idea. A better analogy might be the non-waivable implied warranty of habitability developed by courts in the early 1970s to respond to the societal changes wrought by urbanization.79 As I will discuss in Part IV, some of the same concerns that drove the courts of forty years ago to protect consumers of urban rental housing exist today in the area of payment data security.80 An implied warranty of data security would allow consumers to recover their losses without overly straining established legal doctrines. Today, there are two major impediments to recovery for the losses that individuals incur as a result of a data breach. The first, applicable to both contract and tort actions, is that the damages are seen as too speculative.81 Second, purely economic losses that are not coupled with personal injury or physical property damage are not recoverable in tort.82 One justification for this doctrine is to allow parties to allocate their economic losses by contract.83 In the consumer context, however, reliance on freedom of contract often fails to protect consumer welfare.84 Because of this preference for freedom of contract, consumers appear doomed to absorb some costs of data breaches themselves. In order for an implied warranty of data security to truly protect 74. 75. 76. 77. 78. 79. 80. 81. 82. U.C.C. § 2-315 (2002). In re Hannaford Bros. Co., 613 F. Supp. 2d at 120. U.C.C. § 2-315, cmt. 2. In re Hannaford Bros. Co., 613 F. Supp. 2d at 120. Id. See, e.g., Javins v. First Nat’l Realty Corp., 428 F.2d 1071, 1078 (D.C. Cir. 1970). See discussion infra Part IV. See cases cited supra note 60. In re Hannaford Bros. Co., 613 F. Supp. 2d at 127; JAMES J. WHITE & ROBERT S. SUMMERS, UNIFORM COMMERCIAL CODE § 11-5, at 538–39 (6th ed. 2010); Michael D. Scott, Tort Liability for Vendors of Insecure Software: Has the Time Finally Come?, 67 MD. L. REV. 425, 470 (2008). 83. See WHITE & SUMMERS, supra note 82, § 11-5, at 541. 84. See Oren Bar-Gill & Elizabeth Warren, Making Credit Safer, 157 U. PA. L. REV. 1, 7–8 (2008) (arguing that markets for consumer credit function only when consumers are rational and informed). 72 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 consumers, it would have to be non-waivable. There is precedent for nonwaivable warranties both in the UCC and the common law.85 The remainder of this Article will discuss the various warranties that are implied in commercial transactions, and will propose that an implied warranty of data security be imposed on retailers. III. EXISTING UCC WARRANTIES: CAN WE EXPAND THEM TO PROTECT DATA? The proposed warranty of data security would be implied in all contracts between a seller accepting a payment card and the buyer using that card. The seller is the best person to give such a warranty because the seller is the party who deals with the consumer and is also the party that the consumer trusts to handle her payments safely. The seller would be warranting the safety of a transaction, not a product. Nevertheless, elements of several UCC warranties can be incorporated into an implied warranty of data security. The UCC implies several warranties under Article 2, which governs sales of goods, and Articles 3 and 4, which govern some aspects of the payment system.86 The persons giving these warranties represent that a product,87 a transaction,88 or both89 meet certain quality and reliability requirements. Parties to a transaction can waive some,90 but not all,91 of these warranties. Although a payment card transaction falls strictly outside of the UCC’s scope—and therefore a warranty protecting it could not find a home in the UCC—an implied warranty of data security could draw on and combine elements of several of these warranties. In the remainder of this section, I will discuss the elements of the UCC warranties that should be included in a warranty of data security and argue that a warranty approach to the data breach problem has several advantages over a tort approach. A. UCC PRODUCT WARRANTIES Under the implied warranties of merchantability92 and fitness for a particular purpose,93 a seller in a transaction governed by Article 2 promises that goods sold meet some standard of quality (in the case of 85. See, e.g., Javins v. First Nat’l Realty Corp., 428 F.2d 1071, 1081–82 (D.C. Cir. 1970) (holding that the implied warranty of habitability is non-waivable); U.C.C. § 3-417(e) (2003) (providing that the Article 3 presentment warranty cannot be waived with respect to checks). 86. See generally U.C.C. §§ 2-312–317, 2-321, 3-318, 3-415–416, 4-207–209 (2002). 87. See infra notes 93–123 and accompanying text. 88. See infra notes 125–134 and accompanying text. 89. See infra notes 135–137 and accompanying text. 90. U.C.C. § 2-316 (2002) (setting forth the requirements for Article 2 warranty disclaimers). 91. See, e.g., U.C.C. § 3-417(e) (2003) (providing that the Article 3 presentment warranty cannot be disclaimed with respect to checks). 92. U.C.C. § 2-314 (2002). 93. Id. § 2-315. 2010] Warranting Data Security 73 merchantability) or of suitability (in the case of fitness for a particular purpose). A seller in a payment card transaction is providing two different things: the product or service sold, and the system that processes the payment. A discussion of an argument that the Hannaford plaintiffs could have but failed to make illustrates some of the advantages and disadvantages in using Article 2 of the UCC to protect payment card data. Rather than asking the court to apply the Article 2 warranties by analogy, the Hannaford plaintiffs could have argued that the payment system software itself breached the warranty of merchantability that is implied, unless excluded, in all contracts covered by Article 2.94 Most courts have held that the transfer of software is a sale of goods for the purpose of Article 2.95 However, the software warranty in a payment card transaction would first run from the payment software vendor to the retailer, leaving the plaintiffs with a privity barrier, one that I will explain below. An examination of this hypothetical argument highlights some of the benefits that an implied warranty might give consumers in payment card transactions and also illustrates the impediments that consumers would face in relying on existing warranties. First, the warranty of merchantability is implied in all contracts for the sale of goods in which the seller is a merchant.96 The UCC defines a merchant as “a person who deals in goods of the kind or otherwise by his occupation holds himself out as having knowledge or skill peculiar to the practices or goods involved in the transaction.”97 All merchants give this warranty because they, as merchant sellers, hold themselves out as having special knowledge with respect to the products sold.98 A buyer need not show that he relied on any representations made by the seller in order to recover for breach of warranty.99 Because the warranty of merchantability is implied, unless excluded, in all transactions in which goods are sold by a merchant, it is curious that the Hannaford plaintiffs did not try to claim damages for its breach.100 The application to all merchant seller transactions is one element of the warranty of merchantability that should be incorporated into a warranty of data security. For this purpose, a merchant can be defined as anyone who 94. 95. 96. 97. 98. Id. Scott, supra note 82, at 436 (discussing judicial classification of software). U.C.C. § 2-314. Id. § 2-104(1). WHITE & SUMMERS, supra note 82, § 10-11, at 482 (tracing the logic behind the warranty of merchantability to the pre-Code warranty implied in transactions with manufacturers). 99. Id. 100. According to the two leading commentators on the UCC, a key reason that a transferee might seek to classify its transaction as a purchase of goods is to receive the benefit of Article 2’s warranty of merchantability. See WHITE & SUMMERS, supra note 82, § 10-2, at 449. 74 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 accepts a payment card for goods or services.101 Merchant sellers choose the persons responsible for handling the data that they collect,102 so imposing a warranty on these sellers would force them to choose their payment processors carefully and to negotiate indemnification clauses with those processors. To satisfy the implied warranty of merchantability, the seller must provide goods that “are fit for the ordinary purposes for which [they] are used”103 and that “pass without objection in the trade under the contract description.”104 A merchant who provides customers with the convenience of using a card payment system should be deemed to represent that its payment system is fit for the ordinary purpose for which a payment system is used—the safe and secure processing of a purchaser’s payment data. One of the reasons the plaintiffs’ warranty argument failed in the Hannaford case was that the plaintiffs had chosen to argue for a warranty of fitness for a particular purpose despite the fact that the payment system was actually being used for its ordinary purpose.105 An argument that the payment system in the transaction was not fit for its ordinary purposes might have fared better. There are two major intertwined problems with arguing that an individual victim of a data breach can recover from the provider of payment software under the implied warranty of merchantability. First, the implied warranty of merchantability can be disclaimed in the contract between the buyer and seller.106 Sellers of goods tend not to disclaim this warranty altogether, choosing instead to limit the damages recoverable because concerns for future business force attention to quality.107 One reason that suing the payment system software vendors is undesirable is that the problem of warranty disclaimers is magnified when the product transferred is software. The tumultuous drafting history of Article 2B of the UCC (which became the Uniform Computer Information 101. Individuals making isolated sales could be exempted from this definition. U.C.C. § 2-314 cmt. 3 (2002) (exempting a person making an isolated sale from the Article 2 implied warranty of merchantability). These individuals do not participate in the payment system by choosing from a variety of payment processors; if they do accept payment cards, they do so through person-toperson payment systems such as PayPal. See PAYPAL, https://www.paypal.com (select “personal” tab; then select “get paid” from top bar; then select “accept credit cards” from drop-down list) (last visited Oct. 9, 2010) (explaining how individuals can accept payment cards through PayPal from persons who do not have PayPal accounts). 102. Businesses can choose among many payment processing service companies. See, e.g., ACH PAYMENTS, http://www.ach-payments.com (last visited Dec. 18, 2010); ELIOT MANAGEMENT GROUP, http://www.e-mg.com (last visited Dec. 18, 2010); HEARTLAND PAYMENT SYSTEMS, http://www.heartlandpaymentsystems.com (last visited Dec. 18, 2010). 103. U.C.C. § 2-314(2)(c). 104. Id. § 2-314(2)(a). 105. See In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 120 (D. Me. 2009). 106. See U.C.C. § 2-316(2) (2002). 107. DANIEL KEATING, SALES: A SYSTEMS APPROACH 151 (4th ed. 2009). 2010] Warranting Data Security 75 Transactions Act after the American Law Institute withdrew from the project) shows how averse software vendors are to Article 2 warranty liability.108 Software vendors almost universally disclaim the warranty of merchantability because vendors contend that “[c]omputer software has peculiar qualities” that render a comparison among software programs senseless.109 Such a comparison is necessary in order to determine that software would “pass without objection in the trade under the contract description,” for the purpose of the warranty of merchantability.110 Second, even in the unlikely absence of a disclaimer, the aggrieved individuals would have difficulty recovering for a breach of warranty because they never buy or take a transfer of the payment processing software.111 Because warranty liability is based on contract law, the general rule is that a warrantor is directly liable only to the person with whom it has a contract.112 The harsh effects of this general rule have been ameliorated in the sale of goods area, and today, most manufacturer warranties run to the ultimate buyer for two reasons. First, most states have eliminated the vertical privity requirement by common law when a consumer is personally injured by a manufacturer’s product.113 Second, most manufacturers, for reasons of reputation, treat their warranties as though they run to the ultimate purchaser.114 This erosion of the privity barrier would not assist a consumer harmed by a data breach, however. Although Article 2 of the UCC allows nonbuyers affected by a product to sue for breach of warranty, most states, in their versions of Article 2, deny a cause of action to a third party non-buyer in the absence of personal injury.115 A person whose payment card data has been stolen has not suffered any personal injury. In states that have adopted the third alternative to § 2-318, a third party has a cause of action against 108. See generally Peter A. Alces, W(h)ither Warranty: The B(l)oom of Products Liability Theory in Cases of Deficient Software Design, 87 CALIF. L. REV. 269 (1999) (discussing the Article 2B drafting process). 109. Robert Gomulkiewicz, The Implied Warranty of Merchantability in Software Contracts: A Warranty No One Dares to Give and How to Change That, 16 J. MARSHALL J. COMPUTER & INFO. L. 393, 398–99 (1997); Jane K. Winn, Are “Better” Security Breach Notification Laws Possible?, 24 BERKELEY TECH. L.J. 1133, 1150 (2009) (quoting Scott, supra note 82, at 426) (explaining that “software vendors have traditionally . . . used various risk allocation provisions of [the U.C.C.] to shift the risk of insecure software to the licensee”). 110. See U.C.C. § 2-314 (2) (2002); Gomulkiewicz, supra note 109 (explaining that, as essentially diverse collections of ideas that cannot reasonably be compared to one another, attempts to identify minimum quality standards for software products would be difficult and unfair). 111. See In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 121 (D. Me. 2009); see also Cheney, supra note 20, at 1–2 (describing a credit card transaction). 112. See U.C.C. §§ 2-313–315 (2000); see also Metro. Coal Co. v. Howard, 155 F.2d 780, 784 (2d Cir. 1946) (“A warranty is an assurance by one party to a contract of the existence of a fact upon which the other party may rely.”). 113. KEATING, supra note 107, at 178–79. 114. Id. at 178. 115. See WHITE & SUMMERS, supra note 82, § 12-3, at 546. 76 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 the seller if it is “injured” by the breach of warranty.116 This alternative would seem to allow someone harmed by payment processing software to recover. In these states, however, a seller can disclaim the warranty as to third parties who did not suffer personal injury as a result of the breach of warranty.117 The foregoing discussion illustrates the hurdles that a consumer would face in attempting to recover damages from a payment software vendor for breach of the Article 2 implied warranty of merchantability. Although imposition of the Article 2 implied warranty of merchantability to payment transactions is not feasible, the policies underlying the warranty are particularly salient to today’s electronic payment transactions. Before the mass production of goods, buyers were bound by caveat emptor and no warranties were implied.118 The old law was based on a system in which traders were neighbors.119 Caveat emptor was considered just in face-toface transactions in which the seller and buyer had roughly equal commercial experience and the buyer had ample opportunity to inspect the goods he was buying.120 Over the course of the last century, courts and legislatures have chipped away at the doctrine, recognizing the inequality of knowledge and bargaining power between buyers and sellers.121 As mass production of goods proliferated, warranties were imposed on professional sellers.122 The move away from caveat emptor was slower in real estate law, as mass production of housing did not emerge until after World War II.123 Caveat emptor has no place in card payment transactions. Payment processing transactions are completely invisible to consumers. The clerk at my local grocery store will ask me whether I want to use my Visa debit card (which is not a credit card) as a “debit or credit” card, having no idea that she is asking me which payment network (the Visa network or the PINbased debit card network) I want to use.124 B. UCC TRANSACTION WARRANTIES The discussion above analogizes a warranty of data security to a warranty of product quality. The UCC imposes transaction warranties as well,125 and a data security warranty might be better analogized to such a 116. U.C.C. § 2-318 (2003). 117. Id. § 2-318 cmt. 2. 118. See Timothy J. Sullivan, Innovation in the Law of Warranty: The Burden of Reform, 32 HASTINGS L.J. 341, 356 (1980). 119. See Allison Dunham, Vendor’s Obligation as to Fitness of Land for a Particular Purpose, 37 MINN. L. REV. 108, 110 (1952). 120. See Sullivan, supra note 118, at 356. 121. Id. 122. See id. at 356–57. 123. See Dunham, supra note 119, at 111. 124. I would not know that either had I not taught Payment Systems for a number of years. 125. See, e.g., U.C.C. § 2-312 (2002). 2010] Warranting Data Security 77 warranty. These transaction warranties also contain elements that a court could incorporate in an implied warranty of data security. Unlike the warranty of merchantability, the implied warranty of title helps to ensure the quality of the transaction in which the goods are transferred.126 Therefore, a seller giving a warranty of title promises that the transaction is reliable.127 Under Article 2, all sellers give a warranty that title to the goods “shall be good and its transfer rightful.”128 This warranty has nothing to do with the quality of the product, rather it relates to the transactions in which the goods reach the seller. If there is a thief in the chain of title, the seller breaches the warranty.129 The UCC permits a seller to disclaim this warranty, but any disclaimer must clearly indicate that the seller claims no title in the goods sold.130 The purpose behind this warranty is to ensure that the buyer will not be exposed to litigation in order to protect its title to the goods because of defects in purchase transactions in his chain of title.131 Although the implied warranty of title looks backwards, holding the seller liable for the wrongdoing of persons in the past, its basic purpose, to protect the buyer from transaction defects, could be used as a basis for an implied warranty of data security. A data security warranty would necessarily be forwardlooking, but it would also serve to guarantee the quality of a chain of transactions, rather than a product. A warranty of data security can ensure that someone who uses a payment card will not be forced to incur costs to protect her personal information from misuse in the chain of transfers comprising a payment transaction. The warranty of title imposes strict liability on the seller.132 Under UCC § 2-312, a seller is not protected from liability on the warranty of title by his lack of knowledge that the title conveyed is not good.133 A thief of goods breaks the chain of title, so the warranty of title functions to pass the risk that the transaction is not good to the person who dealt most closely with the thief.134 The result is to place the loss on the person best situated to avoid it. Using the same logic, a seller who takes a payment card is best situated to guard against unsafe payment transactions, and if it enters into an unsafe payment transaction with a consumer, it should bear the loss regardless of its knowledge that the transaction may be unsafe. In the payment system, as in the sales system, warranties play an important loss allocation function. Payment warranties pass the risk of fraud 126. 127. 128. 129. 130. 131. 132. 133. 134. Id. Id. § 2-312(1)(a). Id. § 2-312. See West v. Roberts, 143 P.3d 1037, 1045 (Colo. 2006). U.C.C. § 2-312(3). Id. § 2-312(1) cmt. 1. Id. § 2-312. KEATING, supra note 107, at 279. See id. at 279–80. 78 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 to the person closest to the fraud. When a bank pays the wrong person by honoring a check bearing a forged endorsement, it must re-credit its customer’s account.135 The warranties under Article 4 of the UCC then allow the bank to seek compensation from persons up the collection stream.136 However, unlike most warrantors in the sales system, those giving payment warranties vouch for both the transaction and the product. The warrantor of a negotiable instrument vouches for the product (the negotiable instrument) in that it warrants that “the instrument has not been altered” and that “all signatures . . . are authentic and authorized,” but it also vouches for the transaction in that it warrants that it is “entitled to enforce the instrument” and that “the instrument is not subject to a defense or claim in recoupment by any party.”137 In order to effectively protect personal financial information, the implied warranty of data security should be non-waivable. There is precedent in the UCC for a non-waivable warranty. The warranties in Articles 3 and 4 of the UCC cannot be disclaimed with respect to checks.138 This prohibition of disclaimers protects the checking system; checks are collected and paid by automated means, so banks rely on the warranties for their protection.139 Warranty is a good theory on which to give a remedy to injured consumers. Privity remains an issue in imposing a warranty of data security on data controllers. Privity is not a problem when the merchant itself is responsible for the breach, because that merchant will always have a contract with the aggrieved purchaser. Lack of privity, however, should not bar recovery from the payment processors. All consumers entering the payment system through a merchant, however, have a contract with that merchant.140 Therefore, imposing a warranty on that merchant makes sense; that merchant must then either make sure that it protects the data, or negotiate an agreement with its processor that the processor will protect the data and indemnify the merchant from any losses as a result of a data breach. The retailer is in the best position to know whether its processor 135. See WHITE & SUMMERS, supra note 82, § 16-3, at 754. 136. See id. 137. U.C.C. § 3-416 (2002) (setting forth transfer warranties); id. § 3-417 (setting forth presentment warranties, which do not include a warranty that there are no defenses or claims in recoupment to the instrument); id. § 4-207 (setting forth transfer warranties in the check collection system); id. § 4-208 (setting forth presentment warranties in the check collection system, which also do not include the warranty that there are no defenses or claims in recoupment). 138. See id. §§ 3-416(c), 3-417(e), 4-207(d), 4-208(e). 139. See id. § 3-417 cmt. 7. 140. Consumers use the payment system for several reasons: to purchase goods, services, and information, and to make loan payments. In all of these transactions, there is some contract between the consumer and the merchant. See, e.g., In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108, 118 (D. Me. 2009) (“Both sides agree that at the point of sale—the cash register—there is a contract for the sale of groceries.”). 2010] Warranting Data Security 79 handles data safely, and can choose to use a more secure system if the processor will not cover losses from data breaches. Contract law, unlike tort law, allows recovery for purely economic loss. A buyer aggrieved by a breach of the warranty of merchantability can recover the difference in value between the goods accepted and the goods as warranted.141 This difference can be measured by the cost of repair.142 The damages claimed by consumer plaintiffs in data breach cases are in essence claims for the cost of repair to their credit profile, because a consumer who must pay for card replacement or credit monitoring is trying to restore the data to the condition it was in before the breach. Recognizing this type of remedy would eliminate one of the major hurdles to protecting data security through tort law—the limitations on economic loss damages. Some have suggested treating privacy concerns in a manner analogous to product safety.143 Although both tort law and contract law have a role in ensuring product safety, those who urge a product safety approach to privacy have focused primarily on tort law.144 Some have proposed a tort action based on strict products liability for data breaches;145 products liability law, however, does not often grant recovery for economic loss.146 While some have argued that new technology begs a redefinition of injury,147 a warranty approach would not force courts to strain existing tort doctrine in that way. Every transaction in which payment data is passed is a contract transaction, either for goods, information, or services. Therefore, a contract will always exist into which a warranty of data security could be implied. The tendency of courts to rule that one party to a contract cannot sue the other party for negligence might make such an implied warranty preferable to a tort action.148 There is no doubt that consumers are harmed by unauthorized uses of their personal financial data even in the absence of liability for the 141. U.C.C. § 2-714(2) (2002). A buyer can also recover incidental and consequential damages. Id. § 2-714(3). 142. See WHITE & SUMMERS, supra note 82, § 11-2, at 518. 143. See generally Grimmelmann, supra note 19. 144. See id. at 814–17 (discussing several scholars’ approaches to protecting personal information using a product safety analogy). 145. See, e.g., Danielle Keats Citron, Reservoirs of Danger: The Evolution of Public and Private Law at the Dawn of the Information Age, 80 S. CAL. L. REV. 241, 296 (2007); Scott, supra note 82, at 470 (identifying the economic loss rule as “[t]he most significant impediment to the use of strict product liability law to recover damages caused by insecure software”). 146. See James J. White, Reverberations from the Collision of Tort and Warranty, 53 S.C. L. REV. 1067, 1068 (2002) (“loss that is solely ‘economic’ may be recovered in warranty but not in tort”) (citing Rich Prods. Corp. v. Kemutec Inc., 241 F.3d 915, 918 (7th Cir. 2001); Calloway v. City of Reno, 993 P.2d 1259, 1264 (Nev. 2000); Steiner v. Ford Motor Co., 606 N.W.2d 881, 884 (N.D. 2000)). Courts have rejected this cause of action in data breach cases. See, e.g., Amerifirst Bank v. TJX Co., Inc., 564 F.3d 489, 498 (1st Cir. 2009). 147. See, e.g., Citron, supra note 145, at 295–96. 148. See Scott, supra note 82, at 456 (discussing tendency of courts to deny plaintiffs’ negligence claims when those plaintiffs are parties to contracts with their defendants). 80 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 fraudulent charges made to their accounts. Although a warranty of data security is desirable, data security does not fit neatly into the existing UCC warranties for several reasons. First, the articles in the UCC are organized by type of transaction. Even if a warranty regarding goods could be stretched to include the payment system used to purchase the goods, many payment transactions do not involve goods. The payment system contains numerous warranties, but these warranties—designed to place the risk of fraud in checking and other negotiable instrument transactions on the person closest to the fraud—do nothing to compensate an individual who is harmed by identity theft. Revising the UCC to include data security within the Article 2 warranties is probably politically unfeasible149 and in addition, an Article 2 warranty would not give any recovery to those whose data was taken in a sale of services transaction. IV. THE IMPLIED WARRANTY OF HABITABILITY: A GOOD ANALOGY? To adequately protect consumers, any warranty of data security should be implied in all payment card transactions between an individual and a merchant and should be non-waivable. The use of payment cards to pay for almost everything has allowed sellers and payment processors to collect tremendous amounts of personal financial information. Havoc ensues when this information falls into the wrong hands. The changes in the conduct of business wrought by the electronic processing of payments beg a judiciallycreated remedy tailored to the emerging and serious problem of data theft. One can find precedent for such a remedy in landlord-tenant law. In this section, I will apply lessons from landlord-tenant law to the protection of payment card data. Real property law provides some precedent for judge-made, nonwaivable warranties to protect consumers. One that exists today—either by statute or case law in nearly every state and the District of Columbia—is the warranty of habitability implied in leases for residential real property.150 This warranty that a dwelling be safe, clean, and fit for human habitation cannot be waived in a lease.151 149. The goal of the UCC’s sponsoring bodies, the American Law Institute and the National Conference of Commissioners on Uniform State Laws, is to draft a uniform law that can be enacted in all U.S. jurisdictions. See Edward J. Janger, Predicting When the Uniform Law Process Will Fail: Article 9, Capture, and the Race to the Bottom, 83 IOWA L. REV. 569, 571 n. 8 (1998). For an excellent discussion of political pressures in the uniform law drafting process, see id. at 582–93. 150. See Michael Madison, The Real Properties of Contract Law, 82 B.U. L. REV. 405, 417 (2002). 151. Hilder v. St. Peter, 478 A.2d 202, 208 (Vt. 1984). Another implied real estate warranty is the warranty of workmanlike quality that is given from the builder to the buyer of a newlyconstructed home; this is also a consumer-protective warranty. Lempke v. Dagenais, 547 A.2d 290, 294 (N.H. 1988). The warranty of workmanlike quality is given only by builders of new 2010] Warranting Data Security 81 The initial judicial imposition of this warranty recognized the modernization of the landlord-tenant relationship. When the common law landlord-tenant rules first developed, the typical lessee was more interested in the land than the dwelling and was expected to make repairs to the dwelling himself.152 The modern urban tenant is interested solely in a habitable dwelling, and has neither the ability nor economic incentive to make repairs to the dwelling because his lease is often for a fairly short term.153 Courts relied on consumer protection concepts to imply a warranty of habitability in all residential leases because tenants, particularly poor urban tenants, had little leverage to demand better quality housing.154 In imposing implied warranties in residential leases and in contracts for the sale of new homes, courts recognized that the caveat emptor doctrine did nothing to protect tenants and home buyers.155 The justification for caveat emptor was that a tenant or buyer could “discover and protect himself against defects in [real] property.”156 In addition, traditional landlord-tenant law was developed for an agrarian society in which the land was much more valuable to the tenant than the dwelling.157 Modern tenants have far less bargaining power than their agrarian predecessors, and unlike those predecessors, the modern tenant does not have the skill to discover defects in a building’s complex systems.158 Courts avoid rewriting contracts, and the courts that first read an implied warranty of habitability into residential leases recognized this limitation on their power.159 They justified the warranty by assuming that reasonable people would agree that housing must be “habitable and fit for living” and that therefore, if a landlord and tenant were to negotiate a lease, such a warranty would be included.160 As society placed increasing value on safe, affordable rental housing, legislatures and administrative bodies began to enact statutes and regulations aimed at ensuring the availability of such housing.161 These codes and rules represented “a policy judgment—that it [was] socially (and homes and not by lay sellers of existing homes, recognizing that a vendor-builder has control over the habitability of premises. Stevens v. Bouchard, 532 A.2d 1028, 1030 (Me. 1987). 152. See Javins v. First Nat’l Realty Corp., 428 F.2d 1071, 1077 (D.C. Cir. 1970). 153. Id. at 1078–79. 154. See id. 155. Frona M. Powell & Jane P. Mallor, The Case for an Implied Warranty of Quality in Sales of Commercial Real Estate, 68 WASH. U. L.Q. 305, 309–12 (1990). 156. Id. at 308. 157. See Katheryn M. Dutenhaver, Non-Waiver of the Implied Warranty of Habitability in Residential Leases, 10 LOY. U. CHI. L.J. 41, 45 (1978). 158. See Javins, 428 F.2d at 1078; see also Dutenhaver, supra note 157, at 51. 159. See Javins, 428 F.2d at 1077–78; Marini v. Ireland, 265 A.2d 526, 532 (N.J. 1970); Pines v. Perssion, 111 N.W.2d 409, 412 (Wis. 1961). 160. Marini, 265 A.2d at 533–34. 161. Mary Ann Glendon, The Transformation of American Landlord-Tenant Law, 23 B.C. L. REV. 503, 503–05 (1982). 82 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 politically) desirable to impose [the duty of providing safe housing] on a property owner” and thus abolish the rule of caveat emptor.162 Describing the need for safe housing in the 1960s, one court urged that “[t]he need and social desirability of adequate housing for people in this era of rapid population increases is too important to be rebuffed by that obnoxious legal cliché, caveat emptor.”163 The imposition of an implied warranty of habitability was seen as a move away from classifying a lease as a property conveyance to classifying a lease as a contract.164 Yet, by making the warranty of habitability nonwaivable, the courts veered from a freedom of contract approach. They recognized also that the validity of the distinctions between contract and property rules in landlord-tenant law was primarily historical and that courts have a duty to “reappraise old doctrines in the light of the facts and values of contemporary life.”165 In data security law, there is no such history to discard, and the law can be written on a cleaner slate, with protections pulled from contract, property, and tort law.166 William Prosser once described the implied warranty as “a freak hybrid born of the illicit intercourse of tort and contract.”167 This illicit intercourse might provide the right remedy for the theft of personal information; by importing contract law concepts, judges can avoid twisting tort law to evade its limitation on recovery for purely economic loss.168 One challenge that courts will face in implying a warranty of data security is developing the standards that a payment system must meet in order to satisfy the warranty. Courts imposing an implied warranty of habitability were able to rely on housing codes for standards.169 In data breach cases, the proper source for the elements of a quality payment system is not as clear. In a case like DSW Shoe Warehouse, the plaintiffs could use the fact that the FTC had filed a complaint against the retailer, alleging that it had “fail[ed] to employ reasonable and appropriate security measures to protect personal information and files.”170 The failure to 162. 163. 164. 165. 166. Pines, 111 N.W.2d at 412–13. Id. at 413 (emphasis in the original). See Glendon, supra note 161, at 503. Javins v. Nat’l Realty Corp., 428 F.2d 1071, 1074 (D.C. Cir. 1970). One could also analogize a data transaction to a bailment. Doing so might strain doctrine even less than imposing a warranty would. When a bailee misdelivers goods, the bailee is strictly liable to the bailor for damages. See R.H. Helmholtz, Bailment Theories and the Liability of Bailees: The Elusive Uniform Standard of Reasonable Care, 41 U. KAN. L. REV. 97, 99 (1992). One can certainly think of a data breach as a misdelivery of personal payment data. 167. William L. Prosser, The Assault Upon the Citadel (Strict Liability to the Consumer), 69 YALE L.J. 1099, 1126 (1960). 168. See supra notes 143–148 and accompanying text. 169. See, e.g., Javins, 428 F.2d at 1081–82; Berzito v. Gambino, 308 A.2d 17, 22 (N.J. 1973) (listing factors that a court should consider in determining whether a lessor had breached a covenant of habitability). 170. Hendricks v. DSW Shoe Warehouse, Inc., 444 F. Supp. 2d 775, 777 (W.D. Mich. 2006) (citations omitted). 2010] Warranting Data Security 83 comply with PCI DSS would clearly constitute a breach of warranty, but as noted above, PCI DSS is seen as a minimum standard of data security.171 The judicially-created implied warranty of habitability was a response to changing social and economic conditions.172 Courts implied the warranty of habitability at a time when society started to recognize that shelter is a basic human necessity.173 The federal government recognized this in the Housing Act of 1949, “which committed [the government] to . . . achieving . . . the goal of a . . . suitable living environment for every American family.”174 While data security is not yet ingrained in our culture as a basic human need, lawmakers today are well aware that Americans may not “fully understand and appreciate what information is being collected about them” and may not have the power to stop unsafe practices from taking place.175 Legislatures that have enacted data breach notification laws likewise recognize that data theft is a significant problem; in fact California, the first state to enact such a law, did so after one of the state’s general purpose data centers suffered a security breach.176 The legislative findings accompanying that law recognized that identity theft was one of California’s fastest growing crimes, and that rapid notice of a data breach might help consumers minimize potential harm to them.177 In imposing an implied warranty of habitability, courts recognized that when a tenant rents an apartment or a house, that tenant “seek[s] a well known package of goods and services” that includes working utilities and proper maintenance.178 Likewise, a consumer giving her payment card in a transaction expects that her information will be safeguarded in such a way that she will not be exposed to identity theft. Because she, like the urban tenant, cannot ensure the safety of her data on her own, courts should consider imposing a warranty of data security on sellers who accept payment cards. CONCLUSION Like residential tenants and buyers of new homes, the consumer who uses the payment system on a daily basis has little ability to protect herself 171. Cheney, supra note 20, at 4 (discussing observations of Robert Carr, CEO of Heartland Payment Systems at the time of the 2009 Heartland data breach). 172. See cases cited supra note 159. 173. See generally Glendon, supra note 161, at 528–45. 174. Id. at 519 (internal quotations omitted). 175. Consumer Online Privacy: Hearing Before the S. Comm. on Commerce, Sci., and Transp., 111th Cong. (2010) (unpublished statement of John D. Rockefeller IV, Chairman, S. Comm. on Commerce, Science and Transportation), available at http://commerce.senate.gov/public/index.cf m?p=Hearings (follow “July 2010” hyperlink; then follow “Chairman John D. (Jay) Rockefeller IV” hyperlink). 176. Winn, supra note 109, at 1142–43. 177. Id. 178. Javins v. Nat’l Realty Corp., 428 F.2d 1071, 1074 (D.C. Cir 1970). 84 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 from data breaches. Some loss, therefore, should fall on the persons best able to guard against data theft. The real estate warranties are examples of judge-made warranties that respond to modern changes that put the consumer at risk for economic harm. Unsafe electronic payment systems likewise pose significant risks to consumers, particularly of data theft. One of the beauties of the common law is that courts can refine it to respond to modern conditions; indeed, the common law’s “continued vitality . . . depends upon its ability to reflect contemporary community values and ethics.”179 Payment cards are a wonderful innovation,180 but the misuse of the data that is collected from the users of those cards is a significant problem. Judges should recognize that consumers feel less secure in their financial lives when their data is compromised and fashion a warranty to compensate them for their losses. 179. Id. (internal quotations omitted). 180. In late 2009, no less an expert than former Federal Reserve Chairman Paul Volcker described the ATM as the most important financial innovation of the last 20 years. See Alan Murray, Paul Volcker: Think More Boldly: The Former Fed Chairman Says the Conference Proposals Don’t Go Nearly Far Enough to Accomplish What Needs to be Accomplished, WALL ST. J., Dec. 14, 2009, at R7. KNOWN AND UNKNOWN, PROPERTY AND CONTRACT: COMMENTS ON HOOFNAGLE AND MORINGIELLO James Grimmelmann In addition to gerund-noun-noun titles and a concern with the misaligned incentives of businesses that handle consumers’ financial data, Chris Hoofnagle’s Internalizing Identity Theft1 and Juliet Moringiello’s Warranting Data Security2 share something else: hidden themes. Hoofnagle’s paper is officially about an empirical study of identity theft, but behind the scenes it’s also an exploration of where we draw the line between public information shared freely and secret information used to authenticate individuals. Moringiello’s paper is officially a proposal for a new warranty of secure handling of payment information, but under the surface, it invites us to think about the relationship between property and contract in the payment system. Parts I and II, respectively, of this brief essay will explore these hidden themes in Hoofnagle’s and Moringiello’s articles. I hope the exercise will tell us something interesting about these two papers, and also about the problems of privacy and security in the payment system. A brief conclusion will add a personal note to the mix. I. INTERNALIZING IDENTITY THEFT: KNOWN AND UNKNOWN Chris Hoofnagle’s Internalizing Identity Theft is built around a clever, if obscure, provision in the federal Fair and Accurate Credit Transactions Act of 2003 (FACTA).3 A victim of identity theft is entitled to obtain any “application and business transaction records” relating to the theft from the entity that did business with the identity thief.4 This remedy helps victims recover from identity theft,5 but Hoofnagle realized it could also be used to study the problem. He convinced identity-theft victims to request their files and share them with him, allowing him to sketch a portrait of how newaccount fraud happens in the real world.6 Associate Professor of Law, New York Law School. My thanks to the participants in the Data Security and Data Privacy in the Payment System Symposium, particularly Ted Janger, Chris Hoofnagle, and Juliet Moringiello. Aislinn Black and Caucus also provided helpful comments. This essay is available for reuse under the Creative Commons Attribution 3.0 United States license, http://creativecommons.org/licenses/by/3.0/us/. 1. Chris Jay Hoofnagle, Internalizing Identity Theft, 13 UCLA J.L. & TECH. 1 (2009). 2. Juliet Moringiello, Warranting Data Security, 5 BROOKLYN J. CORP. FIN. & COMM. L. 63 (2010). 3. Fair and Accurate Credit Transactions Act of 2003, Pub. L. No. 108-159, 117 Stat. 1953 (amending the Fair Credit Reporting Act and codified with it at 15 U.S.C. §§ 1681–1681x). 4. 15 U.S.C. § 1681g(e)(1) (2006). 5. Hoofnagle, supra note 1, at 4–7. 6. Id. at 6–8. 86 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Running through Internalizing Identity Theft is a recurring question: how much information about us should be well-known and public, and how much should be unknown and private? In the first place, identity theft itself depends on what is known and unknown about potential victims. Hoofnagle frames the issue in terms of a debate between Daniel Solove and Lynn LoPucki.7 To Solove, identity theft is a crime of too much knowledge.8 When an individual’s identifying, personal information flows freely through computer systems, unscrupulous fraudsters can access that information and use it to impersonate her.9 In contrast, LoPucki describes identity fraud as a crime of too little knowledge.10 Identity thieves take advantage of the fact that all of the millions of differences between themselves and their victims are unknown to the credit-granting business.11 Despite this apparent tension, both stories are right in important ways. Identity theft is only possible when the fraudster knows enough about the victim to plausibly impersonate her and the credit grantor doesn’t know enough to make the impersonation implausible again. That is, identity theft is a crime of differential knowledge; it requires the perpetrator to know at least as much about the victim as the credit grantor does. It’s a kind of Turing Test: if the would-be thief can answer every question about the victim that the credit grantor knows how to ask, there is no way for the grantor to tell the two of them apart.12 It follows that identity theft is not a monotonic function of the quantity of publicly available information about the victim. Putting more information in circulation helps thieves fool businesses and helps businesses catch thieves; which effect will dominate isn’t something we can easily determine without getting our hands dirty. Hence the importance of studies like Hoofnagle’s. The remarkably consistent pattern in his results is that credit grantors aren’t making effective use of the information they already have access to. Every single fraudulent application in the study got basic, easily checked information wrong: the wrong address, the wrong date of birth, even the wrong spelling 7. Id. at 1–3. 8. Daniel J. Solove, Identity Theft, Privacy, and the Architecture of Vulnerability, 54 HASTINGS L.J. 1227 (2003). 9. Id. at 1229–39. 10. See Lynn M. LoPucki, Did Privacy Cause Identity Theft?, 54 HASTINGS L.J. 1277 (2003) [hereinafter LoPucki, Privacy]; see also Lynn M. LoPucki, Human Identification Theory and the Identity Theft Problem, 80 TEX. L. REV. 89 (2001) [hereinafter LoPucki, Human Identification Theory]. 11. Hoofnagle, supra note 1, at 2. 12. See Alan M. Turing, Computing Machinery and Intelligence, 59 MIND 433 (1950), reprinted in THE TURING TEST: VERBAL BEHAVIOR AS THE HALLMARK OF INTELLIGENCE 67 (Stuart Shieber ed., 2004) (arguing that claims of artificial intelligence might be evaluated using an “imitation game” in which a person and a computer both attempt to convince a questioner, who can communicate with them only via typewritten messages, that they are the person). 2010] Known and Unknown, Property and Contract 87 of the victim’s name.13 Identity thieves are dumb, and the companies who offer them credit are even dumber. While this may be a depressing comment on the sloppiness of American business practices, it’s actually an encouraging finding from a policy perspective. We’re not caught between Solove’s rock and LoPucki’s hard place; there’s information readily available to businesses that fraudsters don’t have.14 This means there may well be money lying on the table; if businesses had cleaner credit-granting procedures, they’d get more cases right.15 Hoofnagle suggests that credit grantors be subject to strict liability for the harms they cause when they grant credit to the wrong person.16 He’s not asking them to do the impossible. The tension between known and unknown also crops up in the FACTA file-access process Hoofnagle’s study relies on. There’s an obvious security benefit from procedures like it, which give consumers the right to find out the details when someone applies for credit in their names. Not only does it help them fix mistakes after the fact; it helps them detect and prevent impersonation attempts in the first place.17 But there’s a catch. There’s always a catch. A credit grantor who receives a FACTA request cannot simply assume that the requester really is the person whose name appears in the file. Structurally, this is a hard problem for exactly the same reasons that identification during the creditgranting process is hard. The credit grantor has no personal history with the requester, is dealing with him or her at arm’s (or more likely, wire’s) length, has few outside sources of identifying information it can consult, and may even have incorrect data in its own files.18 FACTA takes a cut at this dilemma by requiring identity verification before the business releases its records to the requester.19 Indeed, the business may decline to release the records if it “does not have a high degree of confidence in knowing the true identity of the individual requesting the information.”20 There are similar processes in the Fair Credit Reporting Act,21 the Health Insurance Portability and Accountability Act,22 13. 14. 15. 16. 17. Hoofnagle, supra note 1, at 8–13. Id. at 13. Id. at 15–17. Id. at 29–34. See Solove, supra note 8, at 1264–66; see also LoPucki, Human Identification Theory, supra note 10, at 119. 18. LoPucki, Privacy, supra note 10, at 1284. 19. 15 U.S.C. § 1681g(e)(2)(A) (2006). The business may also require proof of identity theft in the form of a police report, a threshold that can act as a deterrent to would-be impostors. Id. § 1681g(e)(2)(B)(i). 20. Id. § 1681g(e)(5)(B). 21. See id. § 1681g(a) (giving consumers a right of access to files on them held by consumer (credit) reporting agencies); id. § 1681h(a)(1) (requiring “proper identification” as a condition of access). 88 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 and the Privacy Act,23 among other places. Any measure designed to give individuals control over the distribution of their personal information—that is, to limit knowledge about them—requires, as a practical matter, some kind of identity-verification system. Any such system, in essence, allows someone who presents the right kind of credentials to see certain information. As the very existence of the FACTA file-access remedy itself demonstrates, however, not everyone presenting credentials is who they claim to be. Sarah Palin’s Yahoo! email account was hacked, in “an attack that any 17-year-old in America could have mounted,” by an intruder who spent 45 minutes of Internet research looking up Wasilla, Alaska’s two zip codes and confirming that Palin and her husband had met in high school.24 Moreover, rules designed to filter out fraudsters almost certainly also filter out some legitimate requests from victims of identity theft. These victims thus find themselves trapped in the Kafkaesque position of being unable to prove that they really are themselves, to the satisfaction of a business that has already shown itself incapable of correctly telling who they are. Worse, identification measures designed to limit information flows also necessarily create them. Information used to authenticate in one context can be used to defraud in another. When multiple web sites use the same security questions—What is the name of your pet? What is your mother’s maiden name?—they become security risks for each other. Even systems that use sophisticated, interactive, multi-step authentication technologies are vulnerable to being snookered by phishers who first impersonate a business to its customer, and then, having talked the customer out of the critical identifying information, impersonate the customer to the business.25 The continual slow leakage of “private” information used to authenticate individuals has a hydraulic effect; as this information becomes increasingly public, the threshold of information required for reliable authentication rises. 22. See 45 C.F.R. § 164.524(a)(1) (2009) (giving individuals a right of access to “protected health information about the individual”); id. § 164.524(b)(1) (allowing entities to require that such requests be “in writing”). 23. See 5 U.S.C. § 552a(d) (2006) (giving individuals a right of access to records pertaining to them held by federal agencies); id. § 552a(f)(2) (allowing agencies to establish “reasonable . . . requirements for identifying an individual who requests his record”). 24. Kate Pickert, Those Crazy Internet Security Questions, TIME, Sept. 24, 2008, http://www.time.com/time/business/article/0,8599,1843984,00.html. 25. See Stuart E. Schechter et al., The Emperor’s New Security Indicators: An Evaluation of Website Authentication and the Effect of Role Playing on Usability Studies (2007 IEEE Symposium on Security and Privacy, Working Draft, 2007), available at http://usablesecurity.org/emperor/emperor.pdf; Christopher Soghoian & Markus Jakobsson, A Deceit-Augmented Man In The Middle Attack Against Bank of America’s SiteKey ® Service, SLIGHT PARANOIA BLOG (Apr. 10, 2007, 3:46 PM), http://paranoia.dubfire.net/2007/04/deceitaugmented-man-in-middle-attack.html. 2010] Known and Unknown, Property and Contract 89 In a final twist, the problem of the known and the unknown also appears in the difficulty Hoofnagle had finding subjects to participate in the FACTA study, even after posting ads on the heavily-read Craigslist site.26 For understandable reasons, victims of identity theft often prefer not to talk publicly about the experience.27 But this means there is no simple way to find a list of identity theft victims and call them up. Ultimately, only six subjects completed the study, and five of them were recruited through ID Watchdog, a company that helps victims of identity theft.28 They, in other words, had already stepped forward to identify themselves. This is how you end up with an N=6 study. For similar reasons, Hoofnagle’s study identifies the subjects only as X1 through X6. It’s a common social-science precaution to protect study participants, and one obviously of particular concern to identity-theft victims. Even with confidentiality, two participants found the subject too “upsetting” and dropped out of the study after learning what it would entail.29 For a study about the problem of identification, the results are a bit incongruous. At one point, Hoofnagle writes, “It is difficult to visualize this case without illustration, but such a description would breach confidentiality.”30 One shudders to think what the process of obtaining IRB approval must have been like.31 Amusingly, Hoofnagle also had to deal with would-be fraudsters himself. The study provided gift cards to participants to compensate them for their time and effort.32 Multiple people called in response to the initial Craigslist ads, “with dubious tales of fraud, in transparent attempts to get a gift card.”33 They were, in other words, fraudsters pretending to be people whom fraudsters had pretended to be—taking advantage of the fact that there is no public listing of actual victims. This secondary deception illustrates, yet again, the obscurity that suffuses the subject of identity theft; Internalizing Identity Theft sheds some rare, but valuable light on it. II. WARRANTING DATA SECURITY: PROPERTY AND CONTRACT Juliet Moringiello’s Warranting Data Security investigates the rights of consumers whose payment information—such as credit card numbers—is 26. 27. 28. 29. 30. 31. Hoofnagle, supra note 1, at 7. Id. Id. at 6–8. Id. at 5. Id. at 15. See generally ZACHARY M. SCHRAG, ETHICAL IMPERIALISM: INSTITUTIONAL REVIEW BOARDS AND THE SOCIAL SCIENCES, 1965–2009 (2010) (describing the history of institutional review boards created to ensure that research does not harm human subjects, and expressing concern about overreaching by such boards). 32. Hoofnagle, supra note 1, at 5. 33. Id. at 5. 90 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 stolen in a data breach.34 Although consumers typically face little if any liability for unauthorized charges35 (at least the ones that they notice promptly36), they bear a number of other costs, both monetary and intangible: credit monitoring, replacement card fees, lost time and effort, and emotional distress, to name a few.37 Moringiello argues that as between the consumer and the merchant whose sloppy security led to the data breach, it would be fairer and more efficient to let these costs fall on the merchant.38 The heart of her paper is an attempt to map this normative argument onto the doctrines of payments law; she concludes that an implied warranty of a secure payment system would be a good fit.39 This time, the recurring motif is the uncertain boundary between property and contract. Moringiello’s analysis jumps off from a classic question of contract law: whether the implied warranties in Article 2 of the Uniform Commercial Code (UCC) provide a basis for consumers to recover their indirect damages.40 Unfortunately for consumer plaintiffs, contract law as reflected in the UCC doesn’t offer suitable warranties.41 Neither the warranty of merchantability nor the warranty of fitness for a particular purpose is a close fit for payment information security.42 Worse, the UCC applies only in the sale of goods43 (i.e. the sale of tangible movable property44), and both warranties can be disclaimed.45 This leads Moringiello to shift from contract law to property law, specifically to the law of residential leases.46 Led by the Court of Appeals for the District of Columbia Circuit, American courts in many states read an implied warranty of habitability into most residential leases over the last half century.47 A residential tenant is entitled to premises “fit for 34. Moringiello, supra note 2, at 63–72. 35. See, e.g., 15 U.S.C. § 1693g (2006) (limiting the liability of a debit cardholder for unauthorized charges); 12 C.F.R. § 226.12(b) (2010) (limiting the liability of a credit cardholder for unauthorized charges). 36. See, e.g., 12 C.F.R. 205.6(b)(2) (2009) (raising the liability limit when a credit cardholder “fails to notify the financial institution within two business days after learning of the loss or theft”). 37. Moringiello, supra note 2, at 64, 68–69. 38. Id. at 65, 72–80. 39. Id. at 80–83. 40. Id. at 72–80 (drawing inspiration from a recent case, In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108 (D. Me. 2009), in which the plaintiffs unsuccessfully argued that the defendant supermarket chain had implicitly warranted that it would keep their payment information secure). 41. Id. at 71. 42. See id. at 72–80. 43. U.C.C. § 2-102 (2009). 44. Id. § 2-103(k). 45. See id. § 2-316. 46. Moringiello, supra note 2, at 80–83. 47. See 2 POWELL ON REAL PROPERTY § 16B.04 n.37 (Michael Allan Wolf ed., Matthew Bender & Company, Inc. 2010) (listing states). 2010] Known and Unknown, Property and Contract 91 habitation”;48 an unsafe apartment is ipso facto a breach of the lease on the landlord’s part.49 Moringiello’s proposal for an analogous, unwaivable implied warranty of payment information security is thus a conscious effort to make contract law more like property.50 Historically, however, courts and commentators described the implied warranty of habitability as a movement in the other direction, one in which property law became more like contract.51 Common-law courts had treated a lease as a pair of “independent covenants”: the landlord conveyed a leasehold estate to the tenant, and the tenant covenanted to pay rent.52 Even if the land was uninhabitable, the tenant’s independent obligation to pay rent continued.53 As the court in Paradine v. Jane explained, “[T]hough the land be surrounded, or gained by the sea, or made barren by wildfire, yet the lessor shall have his whole rent.”54 The courts that created the implied warranty of habitability took inspiration from contract law, emphasizing instead the real-world purposes for which the lease was made.55 On a contractual view of the world, an uninhabitable residence looks a lot like the subject matter of a contract whose essential purpose has failed, and thus, it becomes plausible to treat the tenant’s promise to pay rent as dependent on the landlord’s promise to deliver possession in a form the tenant can actually use.56 Other doctrinal shifts in the landlord-tenant revolution, such as imposing a duty to mitigate damages on the landlord whose tenant moves out mid-lease, similarly drew 48. Javins v. First Nat’l Realty Corp., 428 F.2d 1071, 1079 (D.C. Cir. 1970). 49. See RESTATEMENT (SECOND) OF PROPERTY (LANDLORD AND TENANT) § 5.1 (1977) (“[T]here is a breach of the landlord’s obligations if . . . the leased property . . . is not suitable for residential use.”); see also id. § 5.4 (same, if condition arises after tenant’s entry and landlord fails to make repairs within a reasonable period). 50. Moringiello, supra note 2, at 83–84. 51. See, e.g., Javins, 428 F.2d at 1074–75; Hiram H. Lesar, The Landlord-Tenant Relation in Perspective: From Status to Contract and Back in 900 Years?, 9 U. KAN. L. REV. 369, 372–75 (1961). 52. See, e.g., Wade v. Jobe, 818 P.2d 1006, 1011 (Utah 1991) (“Under traditional property law, a lessee's covenant to pay rent was viewed as independent of any covenants on the part of the landlord.”). 53. See, e.g., Lawler v. Capital City Life Ins. Co., 68 F.2d 438, 439 (D.C. Cir. 1933). [I]t is long established that upon the letting of a house there is no implied warranty by the landlord that the house is safe; or well built; or reasonably fit for the occupancy intended. The tenant is a purchaser of an estate in the property he rents, and he takes it under the gracious protection of caveat emptor. Id. 54. Paradine v. Jane, (1647) 82 Eng. Rep. 897 (K.B.) 898. 55. Javins, 428 F.2d at 1079. 56. See Edward Chase & E. Hunter Taylor, Jr., Landlord and Tenant: A Study in Property and Contract, 30 VILL. L. REV. 571, 616–41 (1985) (discussing destruction-of-premises cases as propertarian or contractual). 92 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 on the idea that the lease was primarily a contract and only secondarily a transfer of a property interest.57 Still, as much as a lease is a contract, it is still also a property transaction, and as the habitability revolution took hold, it stopped drinking as deeply from the contractarian well. Concerned about oppressive landlords and unfortunate tenants, courts allowed tenants alleging a breach of the warranty to remain in possession while withholding rent, even when the most natural contractual remedy would have been recission.58 Even more dramatically, they made the implied warranty of habitability nonwaivable—a logical enough consumer-protection move, but not exactly one consistent with classical freedom of contract.59 The modern implied warranty of habitability—a strong set of mandatory minima for residential houses and apartments—has less to do with the logic of contract, in which the parties are free to pick whatever rule they wish, and more to do with the logic of property, in which legal interests come only in a few standardized packages, and the parties must order one or another from the menu given them.60 On that note, return to Moringiello’s proposed warranty—to be provided in any transaction that uses the payments system—that the retailer’s payment system is secure, regardless of whether the transaction is for goods, services, intangibles, or what-have-you.61 One way of thinking about this new warranty is that it would be incident to any transaction involving a payment (i.e. sales and leases), which would seem to locate it squarely in the contractual tradition. But perhaps “warranty” isn’t the closest legal category. Focus on what the retailer actually promises: to protect the information given to it during the payment.62 This promise focuses on the payment information, rather than on the nominal subject of the transaction. On this view, the retailer sounds more like a bailee, promising to keep consumers’ property (i.e. their payment information) secure while in its possession. While bailments are technically a species of property relationship, like leases they sit on the border that property shares with contract.63 57. See, e.g., Sommer v. Kridel, 378 A.2d 767, 768–69 (N.J. 1977). 58. See, e.g., Pugh v. Holmes, 405 A.2d 897, 907–08 (Pa. 1979). Indeed, from the tenant’s point of view, the ability to remain in possession was the warranty’s principal advantage over the common-law doctrine of constructive eviction—an early termination of the lease by a tenant who claimed the premises had become unusable and proved it by moving out. See, e.g., Boston Hous. Auth. v. Hemingway, 293 N.E.2d 831, 837–38 (Mass. 1973). 59. See, e.g., Boston Hous. Auth., 293 N.E.2d at 843. 60. See generally Thomas W. Merrill & Henry E. Smith, Optimal Standardization in the Law of Property: The Numerus Clausus Principle, 110 YALE L.J. 1, 3 (2000) (discussing “limited number of standard forms” in property law). 61. Moringiello, supra note 2, at 80–83. 62. Id. 63. Thomas W. Merrill & Henry E. Smith, The Property/Contract Interface, 101 COLUM. L. REV. 773, 811–20 (2001). 2010] Known and Unknown, Property and Contract 93 Bailments doctrine turns out to be a surprisingly good fit for Moringiello’s proposed warranty, even though bailments are most commonly created for tangible items: cars left in parking lots;64 goods stored in warehouses.65 Bailments can arise by implication, just like the warranty.66 A bailee is strictly liable for misdelivery, which captures the core legal promise of the proposed warranty.67 And a bailee’s risk of liability ends when it returns the goods; presumably, a retailer who deletes its only remaining copy of a customer’s payment information ought to be on safe ground from then on.68 Given this close fit, Moringiello’s bailmentlike warranty may be a more workable borrowing from property law than more ambitious (but so far unsuccessful) attempts to create full-fledged property rights in personal information.69 Moringiello’s proposed warranty points in yet another intriguing direction that mixes property and contract: the problem of privity. Privity is already one of the classic issues in payment systems law. A promise to pay is a contractual obligation; the genius of negotiability doctrines is that they synthesize freely transferrable in rem property rights from these in personam contractual obligations.70 Warranties enter the picture to allocate liability. When something goes wrong due to fraud or carelessness, the various actors in the payment chain invoke their warranties to push the loss along the chain until it lands at the “right” place—the one whose mistake caused the loss.71 Privity is thus both a problem to be overcome and a device to track legally significant relationships. The same issues arise in a world with a warranty of safe payment information handling. If the warranty is a purely contractual affair—a promise made by a retailer to its customers—then it doesn’t apply when the breach happens further upstream, say at the retailer’s payment processor.72 To work, the warranty seems to need to be a genuinely propertarian duty, one that runs with the personal data to which it is attached, no matter whose 64. See, e.g., Allen v. Hyatt Regency-Nashville Hotel, 668 S.W.2d 286, 287 (Tenn. 1984) (treating a car left in hotel garage as a bailment). 65. See U.C.C. art. 7 (2004) (establishing rights and duties of bailees under warehouse receipts and bills of lading). 66. See, e.g., Russell v. American Real Estate Corp., 89 S.W.3d 204, 210–11 (Tex. App. 2002). 67. See RESTATEMENT (SECOND) OF TORTS § 234. 68. See id. 69. See, e.g., LAWRENCE LESSIG, CODE: AND OTHER LAWS OF CYBERSPACE 160–61 (1999) (proposing “a kind of property right in privacy”). 70. See U.C.C. § 3-203(b) (2010) (“Transfer of an instrument . . . vests in the transferee any right of the transferor to enforce the instrument.”); see also id. §§ 3-202, 3-305, 3-306 (allowing the “holder in due course” of a negotiable instrument to enforce it free from various personal defenses that would otherwise apply). 71. See id. §§ 3-416, 3-417 (specifying warranties given by transferors and presenters of negotiable instruments). 72. Moringiello, supra note 2, at 78–79. 94 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 hands that data is in.73 Or, perhaps, the retailer who let the data out of its control (by entrusting it to the untrustworthy payment processor) should be held liable for its subsequent misadventures. Either way, however, the property/contract logic of payments law shows the way forward. The commercial entities that process payments information are linked to each other by chains of contracts: merchant to payment processor to acquiring bank to association to issuing bank. Those contracts can come with warranties, express or implied or statutory, and losses can be pushed along the chain until they stop at the “right” place— usually (but perhaps not always) the entity whose lax security caused the breach. By framing the issue as a problem of handling information (property) safely during a transaction (contract), Moringiello’s proposal enables us to focus on the essential risk-allocation question at the heart of payment data security. III. I AM X6 And now for the twist ending: I am X6. One evening in the spring of 2007, someone walked into a Kohl’s in Trumbull, Connecticut and claimed to be me. (I have an alibi; I was at a conference in Germany on the day I was allegedly shopping in Connecticut.) The identity thief applied for a Kohl’s credit card, was approved, and promptly charged a $400 mixer and $150 cutlery set to the card. Thoughtfully, if somewhat bafflingly, he or she also signed me up for the Account Ease plan, which would forgive up to $10,000 of debt were I to die or be seriously hospitalized. I first heard about it when “my” new credit card showed up in the mail; I promptly called up Kohl’s to inquire, and the friendly Upper Midwesterners who answered the phone walked me through the process of submitting an affidavit that my identity had been stolen. Within two days, they agreed that I was the victim of identity theft and released me from all charges. And there the matter sat, or would have, had I not offhandedly mentioned the incident to Chris Hoofnagle, a year and a half later, and been recruited into his FACTA study. What came back in response to my FACTA request of Kohl’s was unimpressive.74 There was an application, on which my last name was spelled “Grimmalan” in the space reserved for the first name. The signature looked nothing like mine—and not very much like the signature on the charge slip, either. The charge slip did have my social security number (listed as my “Cust ID”) and my name—this time, misspelled only to the extent of “Grimmelman.” The clerk who took the application had clearly 73. See generally Molly Schaffer Van Houweling, The New Servitudes, 96 GEO. L.J. 885 (2008) (discussing servitudes in intangible property). 74. See Brad Stone, How Lenders Overlook the Warning Signs of ID Theft, N.Y. TIMES BITS BLOG (Apr. 7, 2010, 2:21 PM), http://bits.blogs.nytimes.com/2010/04/07/how-lenders-overlookthe-warning-signs-of-id-theft. 2010] Known and Unknown, Property and Contract 95 been sloppy, too: the store number and date were missing from the form. There was nothing else in the file. Even though the application specifically stated, “You MUST have a state issued picture ID and a current charge card to apply,” Kohl’s apparently hadn’t kept copies of either on file—leading one to ask whether the fraudster provided them in the first place. Kohl’s did know my mailing address—that’s how they sent me the credit card and bill—but it didn’t appear in the application. All in all, the application was transparently slipshod. Looking over the file, it was obvious why the nice Upper Midwesterners on the phone at Kohl’s had been so nice. One even remotely skeptical look at the application would have been enough to show that it was fraudulent. No one looked, though, and as a result, Kohl’s lost a mixer and some kitchenwares. That sort of thing happens all the time; mistaken sellerfinanced credit is just another source of shrinkage, along with clumsy stockroom clerks and five-finger discounts. The difference is that with identity theft there’s another victim, even when the fraud is detected and admitted by the store. Kohl’s is out a mixer, but I lost time, and could have lost some of my creditworthiness. I didn’t lose much of either, but other victims aren’t so lucky. Most importantly, there was nothing I could have done to prevent the identity theft. To this day, I still don’t know where the fraudster got the information about me that he or she gave to Kohl’s. Nor was I present at Kohl’s when the deal went down; by the time I could wave my arms and say, “Wait! That’s not me!” the mixer was long gone. That’s why Hoofnagle and Moringiello appropriately focus on assigning responsibility within the payment system. Until we fix the systematic flaws that made stealing my identity feasible and profitable, it could happen to you too. LOCATING THE REGULATION OF DATA PRIVACY AND DATA SECURITY Edward J. Janger In our 2007 Article on notification of security breaches, Paul Schwartz and I explored the concept of a centralized response agent to help coordinate private and public efforts to respond to data spills.1 In that Article, we were agnostic about whether the coordinated response agent should be public or private, and if public where, institutionally, it should be situated.2 An important element of that agnosticism was our retrospective focus. We were concerned with response to breaches that had already occurred. The question of regulating data security and privacy is, of course, broader, encompassing the formulation of norms for appropriate data use, data protection, and breach response.3 In this essay, I will briefly address my agnosticism, and ask, more broadly, which institutions might best handle the generation and enforcement of legal entitlements regarding invasions of privacy and data security breaches. The occasion for asking this question is the recent enactment of the Wall Street Reform and Consumer Protection Act, which creates, as a crucial component of efforts to reregulate the banking industry, a Consumer Financial Protection Bureau (CFPB or the Bureau).4 The principal goal of the new Bureau will be to examine consumer credit instruments as products to ensure that they are “safe” for consumers to “use.”5 The proposal for such an agency, made initially by Elizabeth Warren and Oren Bar-Gill, was David M. Barse Professor, Brooklyn Law School and Anne Urowsky Visiting Professor, Yale Law School. The author would like to thank Lisa Baldesweiler for able research assistance, and Joan Wexler and the Dean’s Research Fund for generous support of this project. Mistakes are, of course, mine alone. 1. Paul M. Schwartz & Edward J. Janger, Notification of Data Security Breaches, 105 MICH. L. REV. 913 (2007) [hereinafter Schwartz & Janger, Data Security Breaches]. 2. See id. at 961. 3. We have addressed these questions as well in earlier work, both together and separately. See generally Edward J. Janger & Paul M. Schwartz, The Gramm-Leach-Bliley Act, Information Privacy, and the Limits of Default Rules, 86 MINN. L. REV. 1219 (2002) [hereinafter Janger & Schwartz, Limits on Default Rules]; Edward J. Janger, Privacy Property, Information Costs and the Anticommons, 54 HASTINGS L.J. 899 (2003) [hereinafter Janger, Anticommons]; Edward J. Janger, Muddy Property: Generating and Protecting Information Privacy Norms in Bankruptcy, 44 WM. & MARY L. REV. 1801 (2003) [hereinafter Janger, Muddy Property]. 4. At the time of the Symposium, the proposal for the “Bureau” was embodied in the Consumer Financial Protection Agency Act of 2009, H.R. 3126, 111th Cong. § 111 (2009). In July, President Obama signed the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111-203, 124 Stat. 1376 (2010). Title X of that Act was called the Consumer Financial Protection Act of 2010. Id. Instead of creating a separate agency, that Act created a Consumer Financial Protection Bureau within the Federal Reserve Bank. Id. 5. Id. 98 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 based on two linked insights.6 First, that modern consumer credit instruments—be they mortgages, credit cards, or debit cards—are just as much products as a toaster.7 And second, that while there is a consumer products safety commission that is tasked with ensuring the safety of toasters, there is no similar agency tasked with ensuring that financial products are safe.8 Warren and Bar-Gill note that there is a congeries of agencies that have some jurisdiction over consumer financial protection— the Federal Reserve, the Office of the Comptroller of the Currency (OCC), the Federal Trade Commission (FTC), the Federal Deposit Insurance Corporation (FDIC), and so on.9 Most of these agencies have as their focus the regulation of the banking system, rather than the protection of a bank’s customers.10 The FTC alone focuses on consumer protection, but its jurisdiction is spread across the market generally.11 The discussion of the CFPB might not, at first glance, seem relevant to questions of data privacy in the payment system. Indeed, much of the discussion of the safety of consumer financial products has focused on the credit and repayment terms associated with credit cards and mortgages.12 But the use and security of data gathered and transferred in credit and payment card transactions is every bit as much a danger of these products as over-indebtedness.13 Identity theft and invasion of privacy are harms associated with these products. Moreover, the contracting process associated with such non-price terms is particularly prone to lemons equilibria, and hence even more problematic than that relating to the price of credit.14 Therefore, it is fair to ask whether data privacy and data security ought to be included in the mission of the CFPB. In this essay, I will explore whether locating regulation of data privacy and data security in the CFPB would be beneficial, or whether jurisdiction would be better left to the existing regulators. I argue that responsibility for protecting personal information would best be split in two. The generation of privacy and data security norms can—and probably should—be situated 6. Oren Bar-Gill & Elizabeth Warren, Making Credit Safer, 157 U. PA. L. REV. 1, 98–100 (2008). 7. See id. at 3–6. 8. See id. at 4–5. 9. See id. at 86. 10. See id. at 85. 11. See id. at 86. 12. Susan Block-Lieb & Edward J. Janger, The Myth of the Rational Borrower: Rationality, Behaviorism, and the Misguided “Reform” of Bankruptcy Law, 84 TEX. L. REV. 1481, 1513 (2006). 13. See infra Part I.C (discussion on Hannaford Brothers and TJX Companies). 14. See, e.g., ROBERT COOTER & THOMAS ULEN, LAW AND ECONOMICS 41 (2d ed. 1997); George A. Akerlof, The Market for “Lemons”: Quality Uncertainty and the Market Mechanism, 84 Q.J. ECON. 488, 489–90 (1970); Richard Craswell, Property Rules and Liability Rules in Unconscionability and Related Doctrines, 60 U. CHI. L. REV. 1, 49 (1993); Janger & Schwartz, Limits on Default Rules, supra note 3, at 1240–41; Michael Spence, Consumer Misperceptions, Product Failure and Producer Liability, 44 REV. ECON. STUD. 561, 561 (1977). 2010] Locating the Regulation of Data Privacy and Data Security 99 in an agency like the CFPB. By contrast, measures for responding to data spills might best be coordinated by the existing banking-focused agencies. Finally, regulation of data security precautions should be shared between the consumer protection agency and the bank regulatory agency. This Article will proceed in three steps. First, I will explain the differences between data privacy and data security, and describe the existing regulatory architecture. In the second part, I will explore the various ways in which data privacy and data security norms can be fashioned, starting with contract, then self-regulation, and finally methods of public regulation. Third, I will discuss the possibility that, while the CFPB has a role to play in regulating data privacy and data security, there are important differences between norm generation for data privacy, data security, and loss mitigation that suggest different locations for regulatory authority. I will argue that the proposed CFPB has an important role to play in the formulation of the data privacy and data security norms that govern consumer relationships with their banks. By contrast, loss mitigation may be more appropriately handled through industry self-regulation, or through the regulatory institutions that are focused on systemic risk. I. DATA PRIVACY AND DATA SECURITY Data privacy and data security are closely related concepts, but they are not the same. Data privacy requires that data be kept secure, but data may be kept secure for reasons other than privacy.15 Entities that wish to hold their data secure may not care at all about the privacy of those who disclosed the data.16 So first, it is important to define terms. If data privacy is viewed as the power to keep data secluded and safe from view, then data privacy and data security are the same. This conflation turns, however, on the mistaken view that data privacy is purely about concealment. This is only partially true. In all contexts that matter, data privacy involves a bilateral or multilateral relationship between a discloser and a recipient, or recipients, of information.17 Privacy is not usually about data concealment, it is about enforcing norms and expectations with regard to data sharing.18 15. Paul M. Schwartz, Privacy and Democracy in Cyberspace, 52 VAND. L. REV. 1609, 1663 (2001) (describing the “data seclusion deception”). The conflation of privacy and security arises from the mistaken impression that data privacy is actually about keeping data private. Id. 16. For example, data aggregators such as Choice Point or credit reporting agencies gather personal information, and keep it secure, not because they care particularly about consumer expectations of privacy, but because information is their stock-in-trade. Schwartz & Janger, Data Security Breaches, supra note 1, at 922–23. 17. See Schwartz, supra note 15, at 1660 (“We can refer to these ideas as . . . the ‘autonomy trap’ and . . . the ‘data seclusion deception.’”); see also ROBERT C. POST, CONSTITUTIONAL DOMAINS: DEMOCRACY, COMMUNITY, MANAGEMENT 51–88 (1995). See generally Robert C. Post, The Social Foundations Of Privacy: Community and Self in the Common Law Tort, 77 CAL. L. REV. 957 (1989). 18. See Janger, Anticommons, supra note 3, at 904–08. 100 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 In the payment system, for example, a purchaser reveals his or her identity and account information to a merchant, the merchant passes that information through a data conduit to the clearance network, the availability of funds or credit is verified, and the transaction is processed.19 Along the way, at least four entities are given access to potentially sensitive personal information. The merchant learns the customer’s name, credit card number, and purchasing preferences. Some or all of that information is also passed to the merchant’s bank, the clearance network (i.e., Visa, MasterCard, Amex), and to the customer’s bank.20 All of these disclosures may be fairly characterized as consistent with the primary purpose of the discloser— accomplishing payment. Data privacy refers to the norms which govern information sharing and the permitted secondary uses of disclosed information by each of the entities that handle or come into possession of personal information.21 The touchstone is the discloser’s reasonable expectations of privacy.22 Privacy norms govern what happens once these various entities have identifiable personal information about the discloser. What may they do with that information? With whom may they share it? What secondary uses of personal information are permitted to the recipients of that information? Data security, by contrast, regulates the procedures for ensuring that the disclosed information remains where the parties to the transaction intend and may be accessed only by people who are authorized.23 Thus, a privacy violation usually involves an intentional act by the information recipient 19. LYNN M. LOPUCKI, ELIZABETH WARREN, DANIEL KEATING & RONALD J. MANN, COMMERCIAL TRANSACTIONS: A SYSTEMS APPROACH 317 (4th ed. 2009). 20. Id. 21. See, e.g., Joel R. Reidenberg, Privacy Wrongs in Search of Remedies, 54 HASTINGS L.J. 877 passim (2003); Joel R. Reidenberg, E-Commerce and Trans-Atlantic Privacy, 38 HOUS. L. REV. 717, 720 (2001); Joel R. Reidenberg, Resolving Conflicting International Data Privacy Rules in Cyberspace, 52 STAN. L. REV. 1315, 1347 (2000); Joel R. Reidenberg, Restoring Americans’ Privacy in Electronic Commerce, 14 BERKELEY TECH. L.J. 771, 773 (1999). See also Daniel J. Solove, Data Mining and the Security-Liberty Debate, 75 U. CHI. L. REV. 343 passim (2008); Daniel J. Solove, “I’ve Got Nothing to Hide” and Other Misunderstanding of Privacy, 44 SAN DIEGO L. REV. 745, 754–60, 767–70 (2007). See generally Daniel J. Solove, A Taxonomy of Privacy, 154 U. PA. L. REV. 477 (2006) (developing a new taxonomy for privacy, focusing on activities that invade privacy); Daniel J. Solove, Identity Theft, Privacy, and the Architecture of Vulnerability, 54 HASTINGS L.J. 1227 (2003) (conceptualizing privacy and advocating for protections that shape this concept). 22. See, e.g., Joel R. Reidenberg, Privacy in the Information Economy: A Fortress or Frontier for Individual Rights?, 44 FED. COMM. L.J. 195, 221–27 (1992) (discussing various types of actionable invasions of privacy in the common law and the general requirement that there be a reasonable expectation of privacy in the appropriated information) [hereinafter Reidenberg, Frontier for Individual Rights]. 23. Compare Gramm-Leach-Bliley Financial Modernization Act of 1999 § 501, 15 U.S.C. § 6801 (2006) (stating that a financial institution “shall establish appropriate standards . . . (3) to protect against unauthorized access”), with id. § 6802 (stating that a financial institution “may not . . . disclose . . . to a nonaffiliated third party any nonpublic personal information”). 2010] Locating the Regulation of Data Privacy and Data Security 101 that violates the expectations of the receiver.24 A security violation, by contrast, may involve a violation of a duty of care,25 but it rarely—if ever— involves an intentional disclosure of information.26 These differences suggest that different approaches may be necessary for generating and enforcing data security and data privacy norms. A. DATA PRIVACY AND GLB Until recently, the principal regulation governing data privacy in the payment system was the Graham-Leach-Bliley Act27 (GLB).28 Section 501 of the Act creates an obligation to protect the privacy of customer data.29 Section 502 gives some limited heft to that obligation, requiring notice and an opportunity to opt out of any sharing of data with a non-affiliate, and limiting the reuse of that information by non-affiliates.30 This regime has been criticized for killing trees with relatively useless privacy notices, for providing precious little data privacy protection because affiliate sharing is permitted, and because the opt-out rule sets the default in favor of nonaffiliate sharing.31 As a result, the onus for developing privacy standards, and establishing enforceable privacy rights, rests on consumers’ willingness and ability to contract for protection. In other words, if a consumer wishes to limit the sharing of her data, she must affirmatively opt out of data sharing, and, to the extent she wishes to limit affiliate sharing, she will have to negotiate for it.32 In most cases this will mean foregoing the commercial relationship with the financial institution. The limits of consumer contracting and the problem of contracts of adhesion have been well discussed elsewhere.33 Paul Schwartz and I have discussed it specifically in the context of GLB, 24. 25. 26. 27. 28. 29. Reidenberg, Frontier for Individual Rights, supra note 22, at 222–23. Id. at 223–24. Id. 15 U.S.C. § 6801. See generally Schwartz & Janger, Data Security Breaches, supra note 1. 15 U.S.C. § 6801(a) (“It is the policy of the Congress that each financial institution has an affirmative and continuing obligation to respect the privacy of its customers and to protect the security and confidentiality of those customers’ nonpublic personal information.”). 30. Id. § 6802. 31. Timothy J. Muris, Chairman, Fed. Trade Comm’n, Remarks at the 2001 Privacy Conference: Protecting Consumers’ Privacy: 2002 and Beyond (Oct. 4, 2001), http://ftc.gov/speeches/muris/privisp1002.shtm. 32. Jerry Kang, Information Privacy in Cyberspace Transactions, 50 STAN. L. REV. 1193, 1246–67 (1998); Richard S. Murphy, Property Rights in Personal Information: An Economic Defense of Privacy, 84 GEO. L.J. 2381, 2402–04 (1996); Paul M. Schwartz, Privacy and the Economics of Personal Health Care Information, 76 TEX. L. REV. 1, 53–67 (1997) [hereinafter Schwartz, Privacy Economics]; Jeff Sovern, Opting In, Opting Out, or No Options at All: The Fight for Control of Personal Information, 74 WASH. L. REV. 1033, 1101–13 (1999); see also Janger & Schwartz, Limits on Default Rules, supra note 3, at 1221. 33. C & J Fertilizer. Inc. v. Allied Mutual Ins. Co., 227 N.W.2d 169, 174 (Iowa 1975); see generally Todd D. Rakoff, Contracts of Adhesion: An Essay in Reconstruction, 96 HARV. L. REV. 1173 (1983). 102 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 and found the result unsatisfactory.34 We concluded that the likely product of GLB’s notice and opt-out regime is a lemons equilibrium in which bad privacy practices prevail.35 We raised these issues in 2002, and nothing that has happened since then has led us to question these conclusions. Instead the focus of regulatory concern has been identity theft, which is really not a “privacy” problem at all. The reasons for this shift of focus are discussed below. B. DATA SECURITY AND GLB § 501(B) GLB has relatively little to say on the subject of data security, but curiously, that is where the action has been.36 Section 501 of GLB consists principally of a delegation to the agencies that govern financial institutions.37 It provides in full: (b) Financial institutions safeguards In furtherance of the policy in subsection (a) of this section, each agency or authority described in section 505(a) of this title shall establish appropriate standards for the financial institutions subject to their jurisdiction relating to administrative, technical, and physical safeguards— (1) to insure the security and confidentiality of customer records and information; (2) to protect against any anticipated threats or hazards to the security or integrity of such records; and (3) to protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer.38 It instructs the various bank supervisory agencies to develop regulations for handling customer data, such as PIN numbers, social security numbers, and other data that might create a risk of, among other things, identity 34. Janger & Schwartz, Limits on Default Rules, supra note 3, at 1230–32. 35. Craswell, supra note 14, at 49. Richard Craswell states: Because terms that are good for buyers are generally more expensive for sellers, any seller that offers better terms will charge a higher price to make the same level of profits she could make by offering less favorable terms at a lower price. However, if most buyers have good information about prices but only poor information about nonprice terms, they may not notice an improvement in non-price terms, while they will definitely notice the higher price. As a result, many buyers may stop purchasing from this seller. Id. 36. See Gramm-Leach-Bliley Financial Modernization Act of 1999, 15 U.S.C. § 6801 (2006). 37. Id. § 6801(b). 38. Id. 2010] Locating the Regulation of Data Privacy and Data Security 103 theft.39 In response, the various bank supervisory agencies promulgated the Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice that mandates risk assessments and the creation of a response program by financial institutions.40 In addition, the regulations contemplate a two-tier system of reporting security breaches.41 Any security breach must be reported to the financial institution’s supervising agency.42 If, after an investigation, it appears that there is risk to the consumer, then notice of the security breach must also be given to the consumer.43 While the Interagency Guidance is not perfect, it does mandate a relatively comprehensive architecture for managing sensitive personal financial data.44 The delegation contained in § 501(b) could have been exercised in any number of ways. But, unlike privacy, the task of regulating data security has not been left to contract. Data security has been regulated more robustly than secondary use. C. SELF REGULATION AND STANDARD SETTING—PCI DSS The regulation of data security has not been limited to government agencies. The payment card industry has taken it upon itself to engage in self regulation in this area through the creation of the Payment Card Industry Security Standards Council (PCI SSC).45 The PCI SSC consists of the entities responsible for clearing payment card transactions—Visa, MasterCard, American Express. This group has promulgated a series of protocols called the Payment Card Industry Data Security Standard or PCI DSS.46 This standard is intended to form the basis for auditing the security practices of participants in the payment card clearance system.47 The PCI DSS standard requires participants in the payment system, in broad outline, to: 39. Id. §§ 6801(a), 6804(a)(1); Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice, 70 Fed. Reg. 15,736, 15,752 (Mar. 29, 2005), available at http://edocket.access.gpo.gov/2005/pdf/05-5980.pdf. 40. Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Notice, 70 Fed. Reg. at 15,751–54. 41. Id. at 15,752; see also Edward J. Janger & Paul M. Schwartz, Anonymous Disclosure of Security Breaches: Mitigating Harm and Facilitating Coordinated Response, in SECURING PRIVACY IN THE INTERNET AGE 223, 227 (Anum Chander, et al. eds., 2008). 42. Interagency Guidance on Response Programs for Unauthorized Access to Customer Information and Customer Notice, 70 Fed. Reg. at 15,752. 43. Id. 44. Schwartz & Janger, Data Security Breaches, supra note 1, at 920. 45. PCI SECURITY STANDARDS COUNCIL, http://www.pcisecuritystandards.org (last visited Dec. 30, 2010). 46. PCI SSC Data Security Standards Overview, PCI SECURITY STANDARDS COUNCIL, https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml (last visited Dec. 30, 2010). 47. Doug Drew & Sushila Nair, Payment Card Industry Data Security Standard in the Real World, INFO. SYS. CONTROL J., 1 (Sept./Oct. 2008), http://www.isaca.org/Journal/PastIssues/2008/Volume-5/Documents/jpdf0805-payment-card-industry.pdf. 104 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 1. Install and maintain a firewall configuration to protect cardholder data. 2. [N]ot use vendor-supplied defaults for system passwords and other security parameters. 3. Protect stored cardholder data. 4. Encrypt transmission of cardholder data across open, public networks. 5. Use and regularly update anti-virus software [on all systems commonly affected by malware]. 6. Develop and maintain secure systems and applications. 7. Restrict access to cardholder data by business need-to-know basis. 8. Assign a unique ID to each person with computer access. 9. Restrict physical access to cardholder data. 10. Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. 12. Maintain a policy that addresses information security. 48 Notwithstanding the implementation of PCI DSS, there have been numerous data spills. Indeed, Hannaford Brothers and TJX Companies were both hacked in 2008.49 Ironically, Hannaford received its certification one day after being made aware of a two-month compromise of its internal system.50 The proponents of PCI DSS point out that PCI DSS compliance is assessed at a specific moment in time, and that none of the entities that have been breached was actually complying with the PCI DSS protocol at the time of its breach.51 They lay the blame, not on the protocols, but on the implementation of compliance validation procedures.52 48. Id. at 2. 49. Brian Krebs, Three Alleged Hackers Indicted in Large Identity-Theft Case, WASH. POST, Aug. 18, 2009, at A11; Dan Goodin, TJX Suspect Indicted in Heartland, Hannaford Breaches, THE REGISTER (Aug. 17, 2009, 8:49 PM), http://www.theregister.co.uk/2009/08/17/heartland_pay ment_suspect. 50. Middleware Audits and Remediation for PCI Compliance: The New Frontier of PCI, EVANS RES. GRP., 1 (2009), http://www.evansresourcegroup.com/partners.html (follow “Read our Whitepaper: Middleware Audits and Remediation for PCI Compliance: The new frontier of PCI” hyperlink at bottom of page). 51. Jaikumar Vijayan, Post-Breach Criticism of PCI Security Standard Misplaced, Visa Exec Says, COMPUTERWORLD (Mar. 19, 2009, 12:00 PM), http://www.computerworld.com/s/article/ 9130073/Post_breach_criticism_of_PCI_security_standard_misplaced_Visa_exec_says. See also Goodin, supra note 49; Kim Zetter, TJX Hacker Charged with Heartland, Hannaford Breaches, WIRED (Aug. 17, 2009, 2:34 PM), http://www.wired.com/threatlevel/2009/08/tjx-hacker-chargedwith-heartland/. 52. Andrew Conry Murray, PCI and the Circle of Blame, NETWORK COMPUTING (Feb. 23, 2008), http://networkcomputing.com/data-protection/pci-and-the-circle-of-blame.php. 2010] Locating the Regulation of Data Privacy and Data Security 105 Interestingly, the payment card industry has proven much more interested in creating norms and an architecture for protecting data security than in articulating data sharing norms.53 One might point to the emergence of private issuers of “privacy seals,” such as Trust-E and Secure Scan, but the recent FTC settlement with ControlScan suggests that this market solution is far from perfect.54 In that case, a privacy seal provider was shown to have regularly failed to verify the privacy practices of the merchants it endorsed.55 D. CONCLUSIONS AND QUESTIONS This brief review of the regulatory architecture raises a number of questions. First, why do the regulating agencies seem inclined to leave the creation and enforcement of data privacy norms to the law of contracts, while taking a more proactive approach to protecting data security? Second, why hasn’t the market responded through competition over privacy practices? And third, what does this tell us about the appropriate government approach to regulating data privacy as compared to data security? II. SOURCES OF REGULATION: COMMON LAW, CONTRACT AND REGULATION To decide whether public regulation is necessary one starts by asking whether there is a market failure.56 That question further turns on whether, left to themselves, the combination of private contracting behavior, contract law, and tort law will produce optimal regulation. The answer to this question in the context of data privacy and security may be too obvious to bear discussion. To the extent that contract is involved, Susan Block-Lieb and I, as well as Oren Bar-Gill, have written at length about the extent to which consumers make cognitive and heuristic errors in deciding whether to enter into consumer credit transactions.57 Consumers, it turns out, are notoriously bad at figuring out how much it is going to cost them to borrow money; they are also relatively bad at making inter-temporal comparisons between consumption in the present and consumption in the future.58 There is, moreover, a considerable literature on the extent to which consumers are 53. Evan Schuman, FTC: Web Site Security Seals are Lies, CBSNEWS.com, Mar. 5, 2010, http://www.cbsnews.com/stories/2010/03/05/opinion/main6270104.shtml. 54. Id. (discussing the “bogus” security verification supplied by ControlScan in the context of the FTC settlement). 55. Id. 56. RICHARD A. POSNER, ECONOMIC ANALYSIS OF LAW 389 (7th ed. 2007). 57. Bar-Gill & Warren, supra note 6, at 12–13; Block-Lieb & Janger, supra note 12, at 1489– 90. 58. Bar-Gill & Warren, supra note 6, at 29–33. 106 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 even worse at negotiating over the non-price terms of contracts.59 What is clear is that consumers are not good at bargaining over either privacy or data security. As such, relying on contract to establish data privacy and security norms will place all of the power in the hands of the financial institutions that receive the information.60 While comparing bad to worse may not be profitable, it is possible that consumers’ ability to bargain over data security is even worse than their ability to bargain over privacy terms. Consumers may be able to articulate their expectations about how their information might be used in broad terms.61 This failure of imagination and lack of information is even worse for data security. Consumers cannot be expected to understand or monitor the data security practices of their banks. And, while, from time to time, banks compete on the basis of data security,62 as far as consumers are concerned, their claims are entirely unverifiable. Indeed, the time when most financial institutions spend the most advertising about data security is after they have been subject to a breach.63 Where bargaining is impossible, as with data security, the natural common law substitute is tort law.64 The law of negligence might be expected to step in to establish data security norms. The problem with relying on common law enforcement through private litigation is that even when consumers discover that they have been the victims of identity theft it is virtually impossible for the consumer to discover the source of the breached data.65 Thus, most data security breaches are likely to escape detection, and hence financial institutions are unlikely to fully internalize the costs associated with lax security practices. For these reasons, it is not surprising that contract and tort have not provided adequate protection of either data privacy or data security. Thus, it would appear that some form of regulatory response would be appropriate for determining what data privacy terms should be embodied in consumer credit and consumer payment contracts. Similarly, the nature of the obligation to prevent data theft, fraud, or identity theft will have to be created by public processes. Finally, the architecture for responding to data spills will likely require some degree of public coordination. 59. Richard Craswell, Contract Law, Default Rules, and the Philosophy of Promising, 88 MICH. L. REV. 489, 505–08 (1989). 60. Schwartz & Janger, Data Security Breaches, supra note 1, at 927; Joseph Turow et al., The Federal Trade Commission and Consumer Privacy in the Coming Decade, 3 I/S: J.L. & POL’Y FOR INFO. SOC’Y 723, 730–32 (2007). 61. But even here there may be a failure of imagination. Few consumers realize how many hands information passes through in completing a transaction. 62. Schwartz & Janger, Data Security Breaches, supra note 1, at 948. 63. Id. 64. GUIDO CALABRESI, THE COSTS OF ACCIDENTS: A LEGAL AND ECONOMIC ANALYSIS 125– 26 (1970). 65. Schwartz & Janger, Data Security Breaches, supra note 1, at 962–63. 2010] Locating the Regulation of Data Privacy and Data Security 107 III. THE CONSUMER FINANCIAL PROTECTION BUREAU AS A REGULATOR OF PRIVACY AND SECURITY As noted above, in their 2008 article, Elizabeth Warren and Oren BarGill proposed the creation of an independent consumer financial protection agency.66 The tasks of such an agency would be to review the various consumer credit products offered to consumers to ensure that they were safe.67 A CFPB is part of the financial reform bill that was enacted this year.68 The financial reform bill is over 1300 pages long, but the key provisions are §§ 1031 and 1032. Section 1031 grants power to the Bureau to promulgate regulations that prohibit unfair, abusive, or deceptive acts or practices.69 Section 1032 authorizes the Bureau to mandate certain disclosures, and to create loan forms that, if used, provide a safe harbor from liability.70 The principal focus in discussion of these sections has been the financial terms associated with such consumer credit products. Modern products, including credit cards and home mortgages, have often been designed expressly to hide their true costs.71 Back end fees, teaser rates, default rates, negative amortization, and balloon payments are just a few of what Warren describes as the “tricks and traps” that have become standard practices in the consumer credit market and, in particular, the subprime market.72 Warren and Bar-Gill proposed an agency that would examine such products for transparency and would examine marketing practices to ensure that loans were only extended to people for whom they were appropriate.73 The absence of such regulation played an important role in the financial meltdown of the last few years. Institutional competence is at the heart of Warren and Bar-Gill’s argument for a CFPB.74 It is not that statutory protections did not exist for consumers in credit transactions. Their concerns were the related problems of regulatory capture and diffusion of responsibility.75 Warren and Bar-Gill were concerned instead that too many agencies had jurisdiction over consumer protection, but none had it as its core purpose.76 The FDIC, the 66. Bar-Gill & Warren, supra note 6, at 98. 67. Id. at 98–99. 68. Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, Pub. L. No. 111203, § 1011, 124 Stat. 1376, 1964–65 (2010). 69. Id. § 1031. 70. Id. § 1032. 71. Bar-Gill & Warren, supra note 6, at 54–55. 72. Id. at 56. 73. Id. at 98–100; see also Susan Block-Lieb & Edward Janger, Demand-Side Gatekeepers in the Market for Home Loans, 82 TEMP. L. REV. 465, 495 (2009). 74. Bar-Gill & Warren, supra note 6, at 74. 75. Id. at 99–100, nn. 323, 325. 76. Bar-Gill & Warren state: 108 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 OCC, and the Federal Reserve all had some responsibility for consumer protection, but their core function was protecting the safety and soundness of the banking system.77 By contrast, the FTC had consumer protection as a core function, but little expertise with financial products.78 While the CFPB’s intended focus is on lending products, and on the credit function associated with payment cards, the use of credit cards as payment devices raises a different set of safety issues that might be handled similarly by such an agency. Data privacy and data security are just as much terms of the credit/payment card contract as is the interest rate. And, if anything, they are less transparent. The question therefore is not, could the CFPB mandate include data privacy and data security; the question is whether it should, as a matter of comparative institutional competence. In considering whether the CFPB would be an appropriate regulator of financial privacy and security, the divide between data privacy and data security is instructive. While legislation and regulation at the federal level have not been perfect in either category, the regulations promulgated under § 501(b) relating to data security are far more thoughtful than those relating to data privacy.79 Similarly, to the extent that self regulation has had any impact whatsoever, it has had influence on the data security side.80 This discrepancy may be traceable to the intrinsic difference between data privacy and data security. Where data privacy is involved, there is an inherent conflict of interest between consumers and banks. Consumers expect their data to be kept confidential, and expect secondary use to be narrowly cabined. The financial institutions would like to have as much discretion as possible in how they use personal information. They have every incentive to contract for broad discretion, and to ensure that legislation does not interfere with their ability to use information as they desire. By contrast, where data security is involved, the conflict of interest between consumer and financial institution has a different contour. While financial institutions do have an incentive to limit the extent to which contracts or legal regulations might lead to the imposition of liability, they This litany of agencies, limits on rulemaking authority, and divided enforcement powers results in inaction. No single agency is charged with supervision over any single credit product that is sold to the public. No single agency is charged with the task of developing expertise or is given the resources to devote to enforcement of consumer protection. No single agency has an institutional history of protecting consumers and assuring the safety of products sold to them. Id. at 97 (citations omitted). 77. Id. at 93–95. 78. Id. at 95–96. 79. See supra Part I.B. 80. See supra Part I.C. 2010] Locating the Regulation of Data Privacy and Data Security 109 also have a relatively strong interest in ensuring that personal data remains secure. This interest is not a product of their particular interest in data security. Instead, it is a product of the risk of loss rules that govern parties in the payment system. One can go as far back as the rule in Price v. Neal,81 and the properly payable rule under 4-401 of the Uniform Commercial Code (UCC) to see that the risk of fraud is placed, in the first instance, on the bank that fails to detect it.82 If a financial institution honors an unauthorized check, it must re-credit the account.83 Similarly, under the Truth in Lending Act (TILA), the credit card bank must re-credit the account if an unauthorized charge is made on a credit card.84 While, in both cases, it may be possible for the paying bank to push liability down to the merchant who initially took the check or accepted the card, the loss is going to rest on a bank, not on the consumer. In this regard, banks have every incentive to make sure that data remains secure. This interest is reflected in the self regulation that produced a program like PCI DSS. Here, the alignment between the banking industry and the bank regulatory agencies may be a plus rather than a minus. This alignment of interest between consumers and financial institutions appears to be reflected as an alignment of interest between regulators and the regulated. There are types of coordination and response that cannot be handled by one firm alone. Neither can a consortium of private actors accomplish such coordination without public assistance. PCI DSS and the Hannaford data spill offer an example of both the promise of self regulation and its limits. PCI DSS may be a well considered and effective standard for protecting data security, but the standard setting body has limited power to enforce the standards it sets.85 It can audit participants in the payment system.86 It can deprive victims of data spills membership going forward, but it cannot, in any meaningful way, punish, and it has limited power to exclude members.87 By contrast, the existence of a standard such as PCI DSS may work effectively in conjunction with tort law to set the standard by which negligence might be judged, after the fact. PCI DSS could provide a framework for regulatory agencies to include or exclude participants from the payment system. 81. Price v. Neal, (1762) 97 Eng. Rep. 871 (K.B.) 871–72; 3 Burr. 1354, 1357. The rule in Price v. Neal places the risk of loss for a forged check on the depositors’ bank that pays the instrument without noticing that the signature is forged. Id. 82. See U.C.C. § 4-401 (2002). 83. Id. 84. Truth in Lending Act of 1968 § 133, 15 U.S.C. 1643 (2006); Truth in Lending (Regulation Z), 12 C.F.R. § 226.13 (2007). 85. Drew & Nair, supra note 47, at 1. 86. Id. at 1–2. 87. Id. 110 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Note here, however, that the pattern I am describing for data security is very different from the one the CFPB would establish for defining terms. This pattern involves cooperation among a self-regulatory organization, the industry, and the agency. This is the sort of cooperation that might best be accomplished through the OCC or Federal Reserve where the goal is the safety and soundness of the financial system, and protection (for better or worse) of the industry itself. By contrast, where data privacy is involved, such a cooperative relationship is anathema to the function of protecting consumers. CONCLUSION As such, and in conclusion, it appears that it may be desirable to split the regulation of data privacy and data security in two. The articulation of data security and data privacy norms might properly be entrusted to the CFPB. An agency focused on consumer protection is in the best position to generate and impose the default terms relating to privacy and security that will find their way into consumer credit and payment contracts. However, the regulation of data protection procedures, and the development of programs for mitigating the harm caused by security breaches would best be handled by the bank regulatory agencies themselves. PAYMENTS DATA SECURITY BREACHES AND OIL SPILLS: WHAT LESSONS CAN PAYMENTS SECURITY LEARN FROM THE LAWS GOVERNING REMEDIATION OF THE EXXON VALDEZ, DEEPWATER HORIZON, AND OTHER OIL SPILLS? Sarah Jane Hughes Legal regimes for remediating defects and certain accidents range from strict liability in tort to warranty enforcement litigation to international treaties and conventions with explicit, pre-ordained compensation limits and procedures. Although to date no over-arching legal regime has governed data security defects and breaches in the United States or elsewhere, data security breaches are as capable of inflicting externalities on counter-parties and consumers as the types of defects and accidents that are covered by such schemes.1 Copyright © 2010. Sarah Jane Hughes. All rights Reserved. Sarah Jane Hughes is the University Scholar and Fellow in Commercial Law at the Maurer School of Law, Indiana University, Bloomington, Indiana. Professor Hughes would like to thank Professor Edward (Ted) Janger and Brooklyn Law School for the invitation to present this Article as part of the Data Security and Data Privacy in the Payment System Symposium, Dean Lauren Robel and the Maurer School for research support for it, and the other participants in this Symposium, the faculty of Brooklyn Law School, and the editors of the Brooklyn Journal of Corporate, Financial & Commercial Law for their helpful comments and camaraderie. I also thank Fred H. Cate, Distinguished Professor of Law and Director of the Center for Applied Cybersecurity Research, Indiana University, Roland L. Trope, and Stephen T. Middlebrook for conversations about aspects of this Article; Professor Edward Robertson of the Indiana University School of Informatics for assistance with the concept of how an analogy to a double-hulled vessel would work in the field of data security; and John P. Lowrey and Sean P. Giambattista, Maurer School of Law Classes of 2010 and 2011, respectively, for research assistance. Special thanks go to Professor Frank Pasquale, Lofton Professor of Law, Seton Hall Law School, for his helpful commentary on the Symposium draft of this Article. His references to earlier e-commerce scholarship, including articles such as Dennis D. Hirsch, Protecting the Inner Environment: What Privacy Regulation Can Learn from Environmental Law, 41 GA. L. REV. 1 (2006), which drew upon more traditional environmental law analogies, enlivened discussion at the Symposium, and his historical perspective persuaded me to try to make the connection between the maritime-environmental law solutions and possible approaches to payments data security more clearly. Despite all of this talented help, all mistakes here are my own. This Article is dedicated to dear friends, Inez Janger, who coincidentally is Ted Janger’s mother, and the late Peter Ghee. Ms. Janger’s experience and extraordinary common sense have helped steer a unique non-profit organization successfully through very stormy seas that have had nothing to do with data security or oil spills. Mr. Ghee’s long career in the oil industry, shipping and maritime law and his acumen and foresight helped bring about the International Convention for the Prevention of Pollution from Ships, which is known as MARPOL 73/78 and my acquaintance with it, which I discuss in this Article. Research for this Article ended on August 2, 2010, which was the 105th day after the explosion on the BP Deepwater Horizon drilling platform and subsequent oil spill into the Gulf of Mexico. 1. See Chris J. Hoofnagle, Internalizing Identity Theft, 13 UCLA J.L. & TECH. 2, 29–34 (2009). 112 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 When I began thinking about a paper for this Symposium, I was struck by the similarities and differences between data security breaches and maritime accidents, at least in terms of their substantial consequential and incidental damages. In payments data security, these damages include card cancellation and replacement expenses, database clean-up expenses, counter-party and customer business relation expenses, reputational injuries (including loss of customers and market capitalization to business counterparties), and the risk of identity theft, damage to credit ratings, lost credit opportunities, and emotional distress to card or account holders.2 In the maritime and exploration industries, these damages include damage to the environment, shore and sea life, and livelihoods.3 In particular, I began wondering about whether pollution and seaworthiness analogies might exist between famous payments data security breaches—that Professors Edward Janger, one of our hosts, and Paul Schwartz, a faculty alumnus of Brooklyn Law School, called “data spills”4—such as TJX,5 Hannaford Brothers,6 and Heartland Payments, Inc.,7 and famous maritime accidents such as the Torrey Canyon wreck,8 the Exxon Valdez grounding,9 and the BP Deepwater Horizon explosion.10 This line of inquiry also led me to the 1973 and 1978 international conventions that were drafted in response to Torrey Canyon,11 and to ponder whether the 2. See United States v. Karro, 257 F.3d 112, 121 (2d Cir. 2001) (discussing the human cost of identity theft, including emotional costs). 3. See Joe Stephens, The Valdez’s Unheeded Lessons; BP was Part of Alaska Response, but Decades Later Same Problems Persist, WASH. POST, July 14, 2010, at A1. 4. See generally Paul M. Schwartz & Edward J. Janger, Notification of Data Security Breaches, 105 MICH. L. REV. 913 (2007). 5. See, e.g., Press Release, Fed. Trade Comm’n, Agency Announces Settlement of Separate Actions Against Retailer TJX, and Data Brokers Reed Elsevier and Seisint for Failing to Provide Adequate Security for Consumers’ Data (Mar. 27, 2008), http://www.ftc.gov/opa/2008/03/data sec.shtm [hereinafter Settlement of Separate Actions]. 6. See In re Hannaford Bros. Co. Customer Data Sec. Breach Litig., 613 F. Supp. 2d 108 (D. Me. 2009). 7. See Linda McGlasson, Heartland, Visa Announce $60 Million Settlement Funds Would Reimburse Card Issuers for Breach-Related Losses, BANKINFOSECURITY (Jan. 8, 2010), http://www.bankinfosecurity.com/articles.php?art_id=2054. 8. See In re Barracuda Tanker Corp., 281 F. Supp. 228 (S.D.N.Y. 1968). The Torrey Canyon, an oil tanker carrying more than 119,000 tons of oil from the Persian Gulf to Wales, was stranded on the rocks off the southwestern coast of England, causing the Torrey Canyon’s oil tanks to rupture and discharge oil into the Atlantic, polluting both shorelines of the English Channel. See id. at 229. The British Royal Air Force eventually bombed the Torrey Canyon, destroying the ship and leading to a total loss of its cargo. Id. 9. See Exxon Shipping Co. v. Baker, 128 S. Ct. 2605 (2008). The Exxon Valdez, a “supertanker” carrying 53 million gallons of oil from Alaska to the lower 48 states, “grounded on Bligh Reef off the Alaskan coast,” causing the discharge of millions of gallons of crude oil into Prince William Sound after the ship’s hull fractured. Id. at 2611–13. 10. See Campbell Robertson, 11 Remain Missing After Oil Rig Explodes Off Louisiana; 17 are Hurt, N.Y. TIMES, Apr. 22, 2010, at A13. 11. See Background on Pollution Prevention and MARPOL 73/78, INTERNATIONAL MARITIME ORGANIZATION, http://www.imo.org/OurWork/Environment/PollutionPrevention/ 2010] Payment Data Security Breaches and Oil Spills 113 core teachings of those conventions might help frame approaches for data security breach prevention, clean-up, and liability. Just as Professor Juliet M. Moringiello’s Article for this Symposium harks back to property law and common law warranties to suggest an approach for more contemporary payments data security breaches,12 I recognize that data spills are newer phenomena than maritime accidents and oil spills. Thus, in searching for approaches to these problems, I, too, looked backwards—but to different sources of law. However, like accidents involving discharges of oil and other pollutants at sea, such as Exxon Valdez, and incidents involving problems with oil and gas exploration, such as Deepwater Horizon, data security breach remediation may require the development of laws, treaties, and conventions to govern these types of accidents. Of course, at the March 19, 2010 Symposium at Brooklyn Law School, we had no idea that only a month later one of the most devastating oil spills in U.S. history would occur. The events surrounding the April 20, 2010 explosion on the BP Deepwater Horizon oil drilling platform in the Gulf of Mexico will be featured prominently in our discussions of energy policy, environmental policy, and general disaster management for decades,13 just as the data security breaches at TJX, RBS WorldPay, and Heartland will in future discussions of data security policy. The WellPoint data breach—disclosed in June, 201014—and Hannaford highlight additional concerns with payments data risk management and data governance that had not been the focus of the Symposium draft of this Article. These concerns include a lack of coordinated rapid-fire response capacities and delays in sharing information about breaches with affected constituencies—including merchant banks and customers—that need it most.15 Similarly, Deepwater Horizon confirmed that we still lacked sufficient rapid-fire disaster relief capability for natural disasters than was evident following Hurricane Katrina or Exxon Valdez.16 In both data and natural disasters, we depend on private risk determinations pre- and postaccidents and largely private efforts to manage critical pieces of the recovery processes. The incentives of the companies that bear the largest OilPollution/Pages/Background.aspx (last visited Dec. 27, 2010); see also International Convention for the Prevention of Pollution from Ships, 1973, concluded Nov. 2, 1973, 1340 U.N.T.S 184, 12 I.L.M. 1319, 1340, as modified by Protocol of 1978 Relating to the International Convention for the Prevention of Pollution from Ships, 1973, concluded Feb. 17, 1978, 1340 U.N.T.S 61, 17 I.L.M. 146 [hereinafter MARPOL 73/78]. 12. Juliet Moringiello, Warranting Data Security, 5 BROOKLYN J. CORP. FIN. & COMM. L. 63 (2010). 13. See Stephens, supra note 3. 14. See Steve Ragan, WellPoint: Data Breach Caused by Attorneys and Faulty Security Update, TECH. HERALD (June 29, 2010, 6:11 PM), http://www.thetechherald.com/article.php/ 201026/5807/WellPoint-Data-breach-caused-by-attorneys-and-faulty-security-update. 15. Id. 16. See Stephens, supra note 3. 114 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 responsibility for oil spills are similar to the incentives of private payments systems and users that report payments data security breaches to authorities, and their nearly exclusive role in remedying the damages to others affected by payments data breaches.17 Thus, we are all hostages in a sense to private decision-making in the prevention and remediation of certain events and to the rigorous cost-cutting that has typified business practice in the United States.18 In addition, pending criminal investigations (or even the prospect of them) generally delay access to critical information about culpability. It often is some time before we can know the full details about accidents— whether oil spills or shipping mishaps, or data security breaches—and these delays themselves may slow the process of crafting appropriate protections and remediation schemes for the specific incidents and applying the lessons learned from each going forward. The totality of ship and drilling accidents—of which, federal records suggest, a “handful” occurred in the Gulf of Mexico annually from 1964 to 2009,19—also sent me thinking beyond the negligent or criminal data security breach events that occupied most of my thinking prior to the Symposium. Broader transnational crimes, national security threats, and disaster management concerns present themselves in the payments data arena almost as starkly as in the maritime and environmental accidents arena.20 Much has been written about payments data security breaches and the damages they can impose on consumers who are victims.21 Perhaps just as much has been written about various state laws and federal proposals that require providers to notify consumers when their personally identifiable information has been lost.22 The quality of these articles leaves me free to 17. See Schwartz & Janger, supra note 4, at 919. 18. See Stephens, supra note 3; see also Hoofnagle, supra note 1, at 33. 19. Steven Mufson, Since ‘64, A Steady Stream of Oil Spills Has Tainted Gulf, WASH. POST, July 24, 2010, at A1. 20. In the days following the 9/11 World Trade Center attacks, the Federal Reserve System put hundreds of millions of dollars of liquidity into the U.S. banking system in order to keep the economy running. James J. McAndrews & Simon M. Potter, Liquidity Effects of the Events of September 11, 2001, FED. RESERVE BANK OF N.Y. ECON. POL’Y REV., Nov. 2002, at 59, available at http://www.newyorkfed.org/research/epr/02v08n2/0211mcan.pdf. The Federal Reserve lent billions of dollars through the discount window, more than 200 times the daily average amount of lending in the prior month, and temporarily waived daylight overdraft fees and overnight overdraft penalties. Id. at 69–70. 21. E.g., J. Howard Beales, III & Timothy J. Muris, Choice or Consequences: Protecting Privacy in Commercial Information, 75 U. CHI. L. REV. 109, 121–23 (2008); Chris J. Hoofnagle, Identity Theft: Making the Known Unknowns Known, 21 HARV. J.L. & TECH. 97, 98 (2007); Joel R. Reidenberg, Privacy Wrongs in Search of Remedies, 54 HASTINGS L.J. 877 (2003); Schwartz & Janger, supra note 4. 22. See, e.g., Janine S. Hiller, David L. Baumer & Wade M. Chumney, Due Diligence on the Run: Business Lessons Derived from FTC Actions to Enforce Core Security Principles, 45 IDAHO L. REV. 283, 285–88, 305–08 (2009) (discussing international, federal, and state laws regarding hacking and privacy, and the application of legal principles to enhance consumer privacy); Bruce A. Colbath, Customer Privacy & Data Security: The Importance of Guarding Your Hen-House, 2010] Payment Data Security Breaches and Oil Spills 115 pursue other issues here; which, of course, does not suggest that I could handle them as well as their authors did. But relatively less has been written about the “direct and indirect” damages and “opportunity costs” that payments systems participants suffer because of data spills.23 These businesses normally are not the targets or entry points of data security breaches, but rather sustain forms of collateral “pollution” from those data security “spills”24 much like maritime accidents pollute physical and environmental assets. These payment systems participants include entities upstream from a data security breach, as well as others on its periphery.25 To complicate recovery of collateral costs borne in these cases, contractual disclaimers for third-party losses dominate in the major agreements governing the operation of the credit card systems.26 They are less common in wire transfer bank-customer agreements because the Uniform Commercial Code (UCC)’s Article 4A regime requires an explicit agreement to pay consequential damages and also limits—to the extent allowed by Section 4A-305—the opportunity to vary the liability of the receiving bank by agreement.27 Data security in payments takes on a new urgency in light of reports about recent mass-scale hackings—including the hacking into Google Gmail accounts by the People’s Republic of China28—reports that individuals based in China are hacking into commercial databases,29 and reports about the increasing scope of criminal hacking episodes.30 The 60 CONSUMER FIN. L. Q. REP. 603, 607 (2006) (discussing state statutes enacted in the wake of the Choicepoint data breach). 23. For an example of specific research addressing these issues, see PONEMON INSTITUTE, 2008 ANNUAL STUDY: COST OF A DATA BREACH (2009), available at http://www.encryptionreports.com/download/Ponemon_COB_2008_US_090201.pdf. 24. See id. 25. See id. 26. See VISA, RULES FOR VISA MERCHANTS: CARD ACCEPTANCE AND CHARGEBACK MANAGEMENT GUIDELINES 60 (2007), available at http://www.emscard.com/uploads/Documents /rules_for_visa_merchants.pdf. 27. U.C.C. § 4A-305 (2001). Of course, UCC Article 4A also sets forth a series of rules that are designed to allow the receiving bank to identify erroneous payment orders by reliance on specific arrangements in the security procedure agreed to by the sender and its receiving bank. E.g., id. § 4A-205 (2001). The sender also has a duty to discover and report errors in orders accepted by the receiving bank. Id. § 4A-205(b). In addition, in connection with a claim for liability for late or improper execution or failure to execute payment orders, § 4A-305(a) of the U.C.C. limits damages to those payable under subsections (a) and (b). Other damages, including consequential damages, are recoverable to the extent provided in an express written agreement of the receiving bank. Id. § 4A-305(c)–(d). 28. See, e.g., A New Approach to China, THE OFFICIAL GOOGLE BLOG (Jan. 12, 2010, 3:00 PM), http://googleblog.blogspot.com/2010/01/new-approach-to-china.html. 29. Mike Harvey, China Raid on Google ‘Also Hit Global Industrial Targets’; Hackers Installed ‘Back Door’ to Gain Control of Computers, TIMES (UK), Jan. 16, 2010, at 15. 30. Id. In contrast, the combined number of data security breaches reported by government and military agencies in the United States fell in 2009 compared with 2008, but the number of records affected was larger. Hilton Collins, Many More Government Records Compromised in 2009 than TECH. (Dec. 2, 2009), Year Ago, Report Claims, GOV’T 116 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 cross-border aspects of such breaches add to this urgency,31 particularly because they make business-to-business (B2B) and business-to-consumer (B2C) compensation more complicated.32 Additional concerns emerge from the prospect of strategic hacking incidents, including the lack of apparent well-coordinated disaster response and management capacity, and the continued reliance on private actors to prevent, report, and respond to data security breaches.33 We also must confront the fact that many cyber-breaches are never publicized to persons whose information may have spilled or to law enforcement.34 In some cases, even incidents that are publicized in news media may not be revealed with particularity to customers. For example, following Heartland, my family received new credit cards in the mail with new account numbers and no explanation whatsoever from the card issuers of why they suddenly were replacing cards that had not expired. In early 2010, I received a new set of American Express cards bearing the same expiration date also with no explanation; concerned, I called the company and learned that the replacements were part of its private remediation of a former employee’s theft of hard drives containing many thousands of cardholders’ personal information that had been detected nine months prior. Apparently to reassure me, the company’s representative told me that the perpetrator was now cooperating with the recovery efforts and that my account data had only recently been identified as having been affected by the theft. http://www.govtech.com/gt/articles/734214 (discussing a report by the Identity Theft Resource Center that the number of breaches reported up to December 2009 was 82 compared with 110 for all of 2008 but that the number of records affected soared from less than three million to more than 79 million). The report apparently called for greater vigilance in securing data, including “when it’s mobile.” Id. The article also cited 461 separate data breaches in “all sectors” affecting 222 million records, as opposed to a total of 656 breaches in 2008 that affected “more than 35 million compromised records.” Id. 31. William Resnik et al., Wave of Online Banking Fraud Targeting Businesses, K&L GATES NEWSSTAND (Feb. 15, 2010), http://www.klgates.com/newsstand/detail.aspx?publication=6209 (explaining the growing theft and misuse of user names and passwords to online banking accounts and use of fraudulent wire transfers and automated clearing house (ACH) transfers to foreign countries). 32. See id. The terms “B2B” and “B2C” refer, respectively, to business-to-business and business-to-consumer transactions in e-commerce and e-payments. See, e.g., Jane K. Winn, Consumers and Standard Setting in Electronic Payments Regulation, 5 ELEC. BANKING L. & COM. REP. 11, 15 (2002); Robert Kossick, The Internet in Latin America: New Opportunities, Developments, & Challenges, 16 AM. U. INT’L L. REV. 1309, 1310 (2001). 33. See Ellen Nakashima, War Game Reveals U.S. Lacks Cyber-Crisis Skills; Staged Emergency Displays Need for Strategy, Organizers Say, WASH. POST, Feb. 17, 2010, at A3 (covering the February 2010 “Cyber Shock Wave” simulation conducted in Washington, D.C.). 34. See Diane Bartz & Jim Finkle, Cyber Breaches Are a Closely Kept Secret, REUTERS, Nov. 24, 2009, available at http://www.reuters.com/article/idUSTRE5AN4YH20091124 (detailing the reluctance of companies that are victims of breaches to disclose them because of fear of reputational damage, loss of customers, injury to profits, and criminal attention shifting to smaller and medium-sized firms whose data is less well protected). 2010] Payment Data Security Breaches and Oil Spills 117 Finally, in a reminder that seemingly ordinary burglaries may cause massive expenses and potential liability, on March 1, 2010, a report emerged about an October 2, 2009 burglary of fifty-seven hard drives from a closet at a BlueCross BlueShield of Tennessee training facility.35 These hard drives apparently contained unencrypted data from more than one million customer support calls and 300,000 “screen shots” of computer monitors made contemporaneously with the support calls; most of the calls and many screen shots revealed sensitive personal information that is used in identity theft, according to the report.36 The Ponemon Institute’s annual report on data breach costs suggests that the overwhelming percentage of breaches is attributable to negligence by insiders.37 Negligence in the handling of sensitive personal information in transmission or storage is not dissimilar from the captain’s absence from the bridge as the Exxon Valdez approached the reefs in Prince William Sound, Alaska with an inebriated harbor pilot at the controls,38 or the series of “risk-based decisions” that BP apparently made in the management of the drilling process at the Deepwater Horizon facility and for which government investigators tentatively concluded that the operators chose the “least expensive option even though it potentially elevated the risk.”39 So, in the prevention of oil spills, one commentator observed the lessons we ought to have learned from the grounding of the Exxon Valdez went “unheeded” too long.40 The same may be said of data spills because of the slow pace of U.S. card security to adopt Europay, MasterCard, and Visa (EVM) security, and this may involve risk assessments that opt for less expensive technologies over those that offer greater security for data.41 35. Robert McMillan, Data Theft Creates Notification Nightmare for BlueCross, PCWORLD (Mar. 1, 2010, 5:30 PM), http://www.pcworld.com/businesscenter/article/190461/data_theft_ creates_notification_nightmare_for_bluecross.html [hereinafter McMillan, Data Theft]. 36. Id. (detailing more than five months of work including notification of more than 300,000 customers so far and expenses of more than $7 million). 37. PONEMON INSTITUTE, supra note 23, at 7. 38. See Stephens, supra note 3. For more detailed information about the Exxon Valdez grounding, oil spill, and its causes, see ALASKA OIL SPILL COMMISSION, SPILL: THE WRECK OF THE EXXON VALDEZ, IMPLICATIONS FOR SAFE TRANSPORT OF OIL (1990), available at https://www.washingtonpost.com/wp-srv/special/oil-spill/docs/alaska-commission-report.pdf. 39. Joel Achenbach & David Hilzenrath, From Series of Missteps to Calamity in the Gulf; Investigators Believe that BP Cut Corners, WASH. POST, July 25, 2010, at A1. 40. Stephens, supra note 3 (reporting on BP predecessor British Petroleum’s “central role” in the Exxon Valdez incident and pointing a finger at cost-cutting to maximize profits and regulators “too close to the oil industry” that “approved woefully inadequate accident response and cleanup plans”). Stephens also described comments made by the Chairman of the former Alaska Oil Spill Commission, Walt Parker, including “‘[i]t’s almost as though we had never written the report [on the Exxon Valdez].’” Id. 41. Kate Fitzgerald, Fraud Could Come from North After Canada Phases in EMV, AM. BANKER, July 14, 2010, at 6 (citing a prediction by Christopher Justice, the president for North America of the French payment terminal maker Ingenico S.A., that “‘fraudsters specializing in magnetic stripes will begin to focus more heavily on the U.S. as Canada moves away from mag- 118 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 This Article suggests sources of law for an institutional framework that would create stronger incentives for the prevention of payments data breaches and for their prompt remediation, including a requirement for compulsory notice to a central agency regardless of the number of individuals or records involved. It does not advocate compulsory notice to consumers whose rights may be affected by a cyber-security breach, and instead recommends that the central agency—whether domestic or international—decide whether notifying consumers whose accounts might be affected is warranted. The Article also considers whether our current means of redressing losses through payments system rules and litigation is preferable to possible federal schemes like the oil liability provisions of the Clean Water Act,42 and the liability provisions of the Oil Pollution Act (OPA) of 1990.43 The former established strict liability civil penalties and significantly higher civil penalties for cases involving gross negligence.44 The latter establishes a liability framework that increases incentives for prevention by limiting damages to removal costs and maximum damages unless the oil spill incident was caused by the gross negligence or willful misconduct of the responsible party or the failure or refusal of the responsible party or its counter-parties to report the incident.45 If the liability limits are too low, the tendency will be either to devote too few resources to prevention, or to fail to report or underreport the severity of the spill, as may have happened in Deepwater Horizon.46 Incomplete or delayed notice requirements in the data spills hinder remediation and may contribute to broader complications, including threats to larger payments systems and critical infrastructure. Reporting delays or incomplete reporting would particularly complicate the remediation of malicious attacks or strategic behavior designed to cripple part or all of the domestic payments systems. Part I of this Article briefly describes what government agencies, think tanks, and the media have reported about recent high-profile data spills affecting payments systems, and particularly the prospects of large-scale criminal and even strategic cyber-security threats.47 Part II describes the stripe’” and also that converting “back-office and software . . . to switch from mag-stripe card would cost billions” as an explanation of the slower pace of EMV adoption here). 42. Federal Water Pollution Control Act (Clean Water Act), 33 U.S.C. §§ 1251–1321 (2006). 43. Oil Pollution Act of 1990, 33 U.S.C. §§ 2702, 2704 (2006). 44. Compare 33 U.S.C. § 1321(7)(A) (strict liability civil penalty), with 33 U.S.C. § 1321 (7)(D) (significantly higher civil penalty for cases involving gross negligence). However, neither penalty was sufficiently large to deter the cost-cutting and low-balled risk assessments that allegedly led to the Deepwater Horizon explosion. 45. Compare 33 U.S.C. § 2704(a)(3) (maximum liability and removal costs for offshore facilities is “the total of all removal costs plus $75,000,000”), with 33 U.S.C. § 2704(c)(1)–(2) (the prior limit is inapplicable if the incident is proximately caused by gross negligence or willful misconduct, or involves a violation of a federal safety, construction, or operating regulation, or if the responsible party does not report the incident). 46. See Mufson, supra note 19. 47. See Nakashima, supra note 33. 2010] Payment Data Security Breaches and Oil Spills 119 origins of the International Convention for the Prevention of Pollution from Ships 1973, as modified by the Protocol of 1978 relating thereto, collectively known as MARPOL 73/78,48 in major pollution events associated with maritime accidents and particularly the Convention’s requirements for the prevention of pollution. It also describes the federal Clean Water Act, which prescribes rules for spills from pipelines as well as oil wells,49 and the OPA, which prescribes special rules for off-shore facilities and deepwater ports spill liability.50 Part III compares the requirements and remedies that MARPOL and the OPA offer with those available for the prevention of data security breaches. Part IV evaluates recently passed and introduced bills focused on data security breaches and cyber-security problems generally. It also briefly discusses recent state legislation relating to data security breaches. Part V asks whether “safe harbor” provisions in legislation might result in reduced prevention and less effective care to recover from data spills rather than more. Part VI sets forth conclusions. I. PAYMENTS DATA SECURITY BREACHES/DATA SPILLS Like maritime or oil exploration accidents discharging oil or other pollutants, data security breaches come in many sizes.51 However, unlike the provisions of the OPA that specifically allow removal costs incurred in connection with oil spills into the navigable waters, adjoining waters, or the exclusive economic zone of the United States,52 there is no comparable federal liability scheme for data spills. Accordingly, prevention plans and remediation efforts have largely been left to private actors in the data spill arena.53 For example, the federal “Safeguards Rule” implementing Section 501 of the Gramm-Leach-Bliley Act (GLBA) Privacy provisions,54 and the Disposal and Red Flags Rules implementing the Fair and Accurate Credit Transactions Act of 2003 (FACTA)55 that apply to providers of consumer financial products and services, reflect legislative and regulatory preferences for self-assessments of risks and for implementation by private 48. 49. 50. 51. MARPOL 73/78, supra note 11. 33 U.S.C. § 1321. 33 U.S.C. §§ 2701–2762 (2006). Mark Jewell, TJX Breach Could Top 94 Million Accounts, MSNBC.COM, Oct. 24, 2007, http://www.msnbc.msn.com/id/21454847. 52. 33 U.S.C. § 2702(a)–(b)(1). 53. See, e.g., Standards for Safeguarding Customer Information, 67 Fed. Reg. 36,484, 36,484 (May 23, 2002) (to be codified at 16 C.F.R. § 314). 54. See Standards for Safeguarding Customer Information, 16 C.F.R. § 314 (2010). § 501 privacy provisions that are the underlying authority for the Safeguards Rule are codified at 15 U.S.C. §§ 6801–6809 (2006). 55. Duties Regarding the Detection, Prevention, and Mitigation of Identity Theft, 16 C.F.R. § 681.2 (2006); Disposal of Consumer Report Information and Records, 16 C.F.R. § 682 (2006). See also Fair and Accurate Credit Transactions Act (FACTA) of 2003, Pub. L. No. 108-159, 117 Stat. 1952 (codified as amended at 15 U.S.C. § 1681). 120 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 actors of policies and procedures that match these self-assessments.56 State laws also leave to private actors the ability to own or license personal information about their customers, and implement and maintain “reasonable security procedures and practices,” but require these procedures and practices to be “appropriate to the nature of the information” to protect it from “access, destruction, use, modification, or disclosure.”57 Thus, incentives exist for low-balling risk in order to reduce the costs associated with prevention of data security breaches, just as it appears that low-balled or ignored risks contributed to the well explosion and subsequent inability to control the oil spill from the Deepwater Horizon well.58 The next portion of this Article examines recent data spills and their remediation costs. These examples reflect different types of spills—some negligent and some presumptively criminal or malicious—and their effects in terms of unauthorized access to account information or loss of funds by some affected parties. A. RECENT SPILLS INVOLVING PAYMENTS DATA Four recent examples suggest that substantial damages may result from payments data breaches. These examples represent different problems that payments systems participants have with data security, including B2B liability and B2C liability, as well as qualifications to participate in payment systems. 1. WellPoint WellPoint, Inc. (WellPoint) is the nation’s largest health insurer with a customer base of more than 30 million.59 It apparently experienced a data breach in October 2009, as the result of a failed security update.60 WellPoint reports that the breach “could have exposed personal information,” including medical history and payment information, “belonging to 470,000 customers.”61 WellPoint did not learn about the breach until it received a subpoena the following March.62 The company attributed some unauthorized access to manipulation by attorneys representing an applicant 56. See, e.g., Standards for Safeguarding Customer Information, 67 Fed. Reg. at 36,484 (final rule requires financial institutions to develop written information security programs appropriate to the size and complexity of their operation, the nature and scope of activities in which they engage, and the sensitivity of the customer information they obtain, and also that “certain basis elements” be included to “ensure that it addresses the relevant aspects of the financial institution’s operations and that it keeps pace with developments that may have a material impact on its safeguards”). 57. E.g., CAL. CIV. CODE § 1798.81.5(b) (Deering 2009). 58. Achenbach & Hilzenrath, supra note 39. 59. See Ragan, supra note 14. 60. Id. 61. Id. 62. Id. 2010] Payment Data Security Breaches and Oil Spills 121 for insurance.63 It had notified 470,000 customers—including 230,000 in California alone—by June 29, 2010, and had undertaken other remediation measures. WellPoint continued to access its options for the recovery of its expenses and data as it remains unclear precisely who or how many unauthorized persons gained access to the records.64 2. Royal Bank of Scotland Data spills affecting the Royal Bank of Scotland (RBS) are a reminder that not all payments data spills target U.S. providers or consumers in the U.S. RBS has had more than one payments data security breach. In 2008, the company—along with American Express and UK-based NatWest Bank—lost data contained on a server that was sold on eBay for the equivalent of $64; the server apparently contained unencrypted back-up data “includ[ing] names, addresses, bank account numbers, telephone numbers and customer signatures.”65 On November 8, 2008, RBS WorldPay experienced widespread fraud as a result of another data breach.66 The data breach had occurred earlier when unauthorized individuals accessed the information.67 This time, RBS lost $9 million when thieves used ATMs in forty-nine cities around the world to gain the cash after penetrating RBS WorldPay servers.68 After stealing encrypted data from payroll cards and the associated PINs, some members of the group also allegedly accessed the RBS WorldPay network and raised the applicable limits on the cards as well as limits on what could be withdrawn at ATMs with the cards.69 Following that breach, Visa stripped RBS of its status as a validated service provider, but by May 22, 2009, it had restored RBS’ status as a Payment Card Industry Data Security Standard (PCI DSS) validated service provider.70 3. Helsinki, Finland Merchant A second case concerning a non-U.S. owner of data involved a Helsinki, Finland merchant who reported that data from more than 100,000 payment cards had been stolen from the merchant’s server; of these, 40,000 63. Id. 64. Id. 65. Tom Espiner, Amex, Royal Bank of Scotland, NatWest Customer Details Sold on eBay, CNET NEWS (Aug. 26, 2008, 10:57 AM), http://news.cnet.com/8301-1009_3-10026032-83.html. 66. Robert Lemos, Data-Breach Lawsuit Follows $9 Million Heist, SECURITYFOCUS (Feb. 6, 2009), http://www.securityfocus.com/brief/903. 67. Id. 68. Id. 69. RBS WorldPay Indictment Outlines Sophisticated Hacker Coordination, DIGITAL TRANSACTIONS (Nov. 11, 2009), http://www.digitaltransactions.net/index.php/news/story/2371. 70. Warwick Ashford, RBS WorldPay Regains Security Approval After Data Breach, COMPUTERWEEKLY (May 22, 2009, 9:25 AM), http://www.computerweekly.com/Articles/2009/ 05/22/236142/RBS-WorldPay-regains-security-approval-after-data-breach.htm. 122 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 were active cards.71 The Helsinki Criminal Police’s Information Technology Crimes Unit reported that: (a) the attacks on the merchant’s servers were traced to internet protocol addresses in Romania and the United States although they were uncertain that the attacks originated in either country; (b) the data breach occurred in mid-January, but involved payment cards from 2005 to January 2010—as many as three-fifths of which may have expired; (c) a routine computer security check uncovered the breach; and (d) the merchant has removed the vulnerable system from use and has replaced it with the newer-age, less vulnerable EMV system.72 The merchant had decided to notify only those domestic and foreign cardholders whose cards have been fraudulently used.73 Finland’s largest credit card services company, Luottokunta, noted that because Finnish merchants use the PCI DSS, advanced monitoring, and card shutdown systems, the level of payment card abuses was “half” the rate experienced in other countries.74 4. P2P File Sharing (Unnamed Victims or Potential Victims). A fourth type of data spill apparently involves person-to-person (P2P) file sharing at almost 100 organizations, as reported by the Federal Trade Commission (FTC) in February 2010. The details about these data spills are vague, but the FTC’s press release makes it clear that file sharing software enabled the transmission of personally identifiable and account information otherwise available on the computer on which the file-sharing programs were run.75 B. WHAT DO PAYMENTS DATA SPILLS COST? As the above data security breaches suggest, reported costs for data security breaches have risen over the past few years. For example, the 2008 Annual Study: Cost of a Data Breach, issued in February 2009, reported that “total annual costs” incurred in seventeen different industries rose to “$202 per record compromised [in 2008], an increase of 2.5 percent since 2007 ($197 per record) and 11 percent [since] 2006 ($182 per record).”76 The same study reported that the largest cost increase involved “abnormal 71. Marcus Hoy, Data Security: Payment Card Data Theft from Merchant is Finland’s Largest Card Breach, Police Say, 94 BNA BANKING REP. 443 (2010). 72. Id. An EMV system is a specialty security platform that Europay, MasterCard, and VISA use outside the United States; it features chip-and-PIN technology. See CARDLOGIX, SMART CARD & SECURITY BASICS 7 (2009), available at http://www.smartcardbasics.com/pdf/7100030_ BKL_Smart-Card-&-Security-Basics. 73. Hoy, supra note 71. 74. Id. 75. Press Release, Fed. Trade Comm’n, Widespread Data Breaches Uncovered by FTC Probe (Feb. 22, 2010), http://www.ftc.gov/opa/2010/02/p2palert.shtm. 76. PONEMON INSTITUTE, supra note 23, at 4. 2010] Payment Data Security Breaches and Oil Spills 123 churn,” which indicates customer turnover.77 The report also noted that healthcare and financial services companies that experienced data breaches had the highest churn (customer defections) factors of 6.5 and 5.5 percent, respectively, which the report attributed to both the sensitivity of the data collected and customer expectations that information will be protected.78 Other factors in the overall costs of data spills identified in the Ponemon Institute report include “outlays for detection, escalation, notification, and after the fact (ex-post) response.”79 Companies that experience data security breaches—like those that experience oil spills— also suffer declines in their market capitalizations that can be significant.80 Evidence suggests that payments-related data spills cost an average of more than $6.6 million.81 TJX reported losses of more than $1 billion in connection with its 2006 breach,82 and direct remediation expenses of $256 million.83And, in addition, companies that suffer payments data spills often experience significant declines in their capitalization in the period following report of the breach.84 These significant declines in capitalization appear to be in addition to the direct remediation costs reported above and costs associated with enforcement actions and instituting and maintaining compliance plans. FTC 77. 78. 79. 80. Id. Id. Id. at 3. See, e.g., Jim Puzzanghera & Ronald D. White, BP Courts Mideast Investors; Increased Stakes from the Region Could Hurt Its Image Further and Trigger U.S. Reviews, L.A. TIMES, July 8, 2010, at A1 (“Solvency has been a concern as BP’s stock value has plummeted as much as 55% since oil started spewing from the Gulf of Mexico well in April.”). Heartland Payments Systems, Inc. fared worse than TJX did in terms of market capitalization gyrations after their data security incidents. Compare Jaikumar Vijayan, One Year Later: Five Takeaways from the TJX Breach, COMPUTERWORLD (Jan. 17, 2008, 12:00PM), http://www.computerworld.com/s/article/9057758/One_year_later_Five_takeaways_from_the_TJ X_breach (“Despite being the biggest, costliest and perhaps most written-about breach ever, customer and investor confidence in TJX has remained largely unshaken. TJX’s stock was worth about $30 per share when the breach was disclosed, and its closing price today was just over $29.”), with Todd Wallack, Data Breach Ensnares Many in Mass.; Credit and Debit Card Numbers Compromised, BOS. GLOBE, May 13, 2009, at B1 (“Heartland shares dropped sharply after the company disclosed the breach Jan. 20. The company’s stock, which peaked at more than $18 per share in early January, fell rapidly in the days after the disclosure, going as low as $4 in March. It closed yesterday at $9.04.”). When seeing such a disparity one is tempted to ask, is this disparity in investor reaction a measure of the likely differences between retailers that have goods to sell to consumers and data processors that exist in a different, highly competitive market but whose direct counter-parties are better able to move to another processor? Concerns over the effects on local economies of the Deepwater Horizon spill have caused worries for banks. See Rachel Witkowski, Equity Flows Out of Fla. As Oil Seeps in, AM. BANKER, July 15, 2010, at 1. 81. PONEMON INSTITUTE, supra note 23, at 4. Data breaches such as the BlueCross BlueShield of Tennessee breach are considered “more complex than a typical data breach,” and are likely to cost more than the average amount. See McMillan, Data Theft, supra note 35. 82. Jeff Kress, Is Your Information Safe?, CA MAGAZINE, Aug. 1, 2008, at 44. 83. Ross Kerber, Cost of Data Breach at TJX Soars to $256m—Suits, Computer Fix Add to Expenses, BOS. GLOBE, Aug. 15, 2007, at A1. 84. PONEMON INSTITUTE, supra note 23, at 4. 124 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 enforcement actions involving violations of its financial privacy and safeguards rules, or pursuant to its unfair or deceptive practices authority, have required—in various combinations—civil penalties, consumer redress payments, implementation of comprehensive data security programs, and implementation of independent audits of compliance.85 For example, ChoicePoint, Inc. (ChoicePoint) paid $10 million in civil penalties and $5 million in consumer redress to settle the FTC’s charges in 2006.86 In a May 2005 filing with the Securities and Exchange Commission, BJ’s estimated that these claims were worth approximately $13 million.87 ChoicePoint also was involved in a second enforcement action in 2009, for violations of its 2006 consent order.88 At the time BJ’s Wholesale Club, Inc. settled the FTC’s charges, banks and credit unions were pursuing BJ’s to recover for fraudulent payments and for damages associated with the cancellation and re-issuance of credit and debit cards.89 The FTC consent order against CardSystems Solutions—a third-party payment service provider charged with violations of FTC Act Section 5’s unfair or deceptive acts or practices authority—provides a good example of its requirements for new comprehensive data security programs to protect the security, confidentiality, and integrity of personal information that it collects or receives from consumers by adopting administrative, technical, and 85. For a summary of FTC Section 5 enforcement actions involving financial privacy and data security, see Enforcement, FED. TRADE COMM’N, http://www.ftc.gov/privacy/privacy initiatives/promises_enf.html (last visited Nov. 21, 2010). For an example of an FTC settlement requiring implementation of a comprehensive information security program and long-term independent audits, see Settlement of Separate Actions, supra note 5. 86. Press Release, Fed. Trade Comm’n, ChoicePoint Settles Data Security Breach Charges; To Pay $10 Million in Civil Penalties, $5 Million for Consumer Redress (Jan. 26, 2006), http://www.ftc.gov/opa/2006/01/choicepoint.shtm. The violations of the Fair Credit Reporting Act included failure to employ reasonable procedures to screen prospective clients for its specialized credit reporting services and eventual disclosures of the personally identifiable information pertaining to more than 160,000 customers when the clients to whom disclosures were made had applications that raised red flags, including using commercial mail drops as business addresses, using cell phone numbers as business telephone contact numbers, and paying for services using money orders drawn on multiple issuers. See Complaint for Civil Penalties, Permanent Injunction, and Other Equitable Relief at 5, 7, United States v. Choicepoint, Inc., No. 06-cv-0198 (N.D. Ga. Jan. 30, 2006), available at http://www.ftc.gov/os/caselist/choicepoint/0523069complaint.pdf. The FTC also charged that ChoicePoint in one case continued to provide consumer information after ChoicePoint had suspended the customer for nonpayment on more than one occasion. Id. at 7. 87. Press Release, Fed. Trade Comm’n, BJ’s Wholesale Club Settles FTC Charges (June 16, 2005), http://www.ftc.gov/opa/2005/06/bjwholesale.shtm [hereinafter BJ’s Wholesale Club Press Release]. 88. See Supplemental Stipulated Judgment and Order for Permanent Injunction and Monetary Relief, United States v. ChoicePoint, Inc., No. 06-cv-0198-JTC (N.D. Ga. Oct. 14, 2009), available at http://www.ftc.gov/os/caselist/choicepoint.shtm. ChoicePoint also is a recidivist like BP. See id. 89. See BJ’s Wholesale Club Press Release, supra note 87. For the complaint and consent order, see In re BJ’s Wholesale Club, Inc., 140 F.T.C. 465 (2005). 2010] Payment Data Security Breaches and Oil Spills 125 physical safeguards for personally identifiable information.90 Of course, design and implementation of a new security program is a significant expense. II. INTERNATIONAL CONVENTION GOVERNING NOTICE OF AND COMPENSATION FOR MARITIME SPILLS OF OIL AND OTHER HAZARDOUS SUBSTANCES As mentioned above, there may be many parallels drawn between payments data spills and pollution from maritime accidents. Both impose costs on unsuspecting people that include huge risks of collateral damage to livelihoods. Maritime accidents affect fisheries, shipping activities, and the welfare of shore life. Businesses affected by data spills may experience a fall in share values/market capitalization,91 exclusion from participation in payment systems,92 and reputational damage. Individuals may experience emotional distress, decreased credit ratings, and a loss of the privilege of using credit rather than cash. Both types of spills impose costs from long-term remediation efforts. Indeed, reports suggest that TJX spent at least $256 million on recovery efforts related to its data spill and that its overall losses were $1 billion.93 Exxon claims to have spent about $2 billion cleaning up the 11-milliongallon spill from the Exxon Valdez and another $1 billion to settle civil and criminal charges against it.94 Consequential damage from the grounding to sea life alone included the loss of 250,000 seabirds and more than 20 orca whales.95 To compensate victims affected by Deepwater Horizon, BP has established a fund in the range of $20 billion96 and spent more than $3 billion on the early stages of the clean-up and recovery.97 To deal with the 90. In re CardSystems Solutions, Inc., No. 052-3148, 2006 WL 515749 (F.T.C. Feb. 23, 2006). For more information about this and other FTC actions involving payments data security breaches, see Martha L. Arias, Internet Law—Computer and Data Security Breaches, INTERNET BUS. L. SERVS. (Sept. 17, 2007), https://www.ibls.com/internet_law_news_portal_view.aspx?s= latestnews&id=1852. 91. See Kimberly K. Peretti, Data Breaches: What the Underground World of “Carding” Reveals, 25 SANTA CLARA COMPUTER & HIGH TECH. L.J. 375 (2009). 92. E.g., Anthony M. Freed, Visa Puts Heartland on Probation Over Security Breach, SEEKING ALPHA (Mar. 13, 2009), http://seekingalpha.com/article/125849-visa-puts-heartland-onprobation-over-security-breach (reporting the suspension of the Heartland system from VISA participation until it had been recertified). 93. Peretti, supra note 91, at 380; Kerber, supra note 83. 94. See Jonathan Stempel, Special Report: BP Oil Spill a Gusher for Lawyers, REUTERS, Jun. 30, 2010, available at http://www.reuters.com/article/idUSTRE65T2MZ20100630. 95. Dan Joling & Mark Thiessen, In Alaska, Painful Memories of Exxon Valdez, CBSNEWS.COM, May 3, 2010, http://www.cbsnews.com/stories/2010/05/03/national/main6456 927.shtml. 96. Fiona Maharg-Bravo & Robert Cyran, Tallying BP’s Bill on the Gulf Coast, N.Y. TIMES, July 14, 2010, at B2. 97. Jad Mouawad, BP Begins Its Next Challenge: Reassuring Investors, N.Y. TIMES, July 8, 2010, at B1. 126 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 consequences of these oil spills many conventions have been concluded. Importantly, these conventions serve as useful comparisons for ways to deal with data spills. MARPOL 73/78 is the short-hand name for one such convention, the 1973 International Maritime Organization convention and a series of related amendments, annexes, and protocols, including the 1978 and 1997 amendments to the convention.98 MARPOL 73/78 is not the only convention dealing with the consequences of maritime collisions or with certain forms of hazardous substance releases from sea-going ships.99 There is also, for example, the Convention on Limitation of Liability for Maritime Claims.100 U.S. laws also govern incidents such as fatalities and oil spills.101 MARPOL has features that could serve as a template for a regime to deal with data spills. It is a document with global force and, therefore, with legitimacy, and it relies on governmental mechanisms, non-governmental organizations, and—as one of its most attractive features for the purpose of addressing data spills provides—its scheme relies on a diverse group called “experts” to solve various technical, legal, and political problems that arise under its provisions.102 MARPOL 73/78, the amendments to the 1978 Protocol and subsequent regulations implementing the whole scheme, and U.S. laws implementing the MARPOL scheme or other environmental protection requirements offer four guiding points for a possible framework for payments data spills: (1) the requirement of compulsory notice to a central agency;103 (2) a compensation scheme that extends to third-parties affected by the hazardous substance spills;104 (3) operational restrictions;105 and (4) the requirement to outfit sea-going ships with double hulls or other alternative protections, such as double bottoms, so as to protect against the accidental release of 98. International Convention for the Prevention of Pollution from Ships (MARPOL), INT’L MARITIME ORG., http://www.imo.org/About/Conventions/ListOfConventions/Pages/InternationalConvention-for-the-Prevention-of-Pollution-from-Ships-(MARPOL).aspx (last visited Dec. 27, 2010). 99. E.g., International Convention for the Prevention of Pollution of the Sea by Oil, concluded May 12, 1954, 12 U.S.T. 2989, T.I.A.S. No. 4900, 327 U.N.T.S. 3 [hereinafter OilPOL]; International Convention on Civil Liability for Oil Pollution Damage, concluded Nov. 29, 1969, 973 U.N.T.S. 3, amended by Protocol, Nov. 27, 1992, 1956 U.N.T.S. 255. 100. Convention on Limitation of Liability for Maritime Claims, concluded Nov. 19, 1976, 1456 U.N.T.S. 221. 101. Death on the High Seas Act of 1920, 46 U.S.C. §§ 30302–30308 (2006); Federal Water Pollution Control Act (Clean Water Act), 33 U.S.C. §§ 1251–1321 (2006). 102. See Clay Maitland, Is MARPOL Dead?, MARINE LOG, Dec. 2007, at 52 (concluding that MARPOL is not dead). 103. See MARPOL 73/78, supra note 11, at art. 8, ¶ 2(b). The 1972 Federal Water Pollution Control Act (Clean Water Act) requires notice of spills of hazardous substances, such as oil. 33 U.S.C. § 1321(b)(5). 104. MARPOL 73/78, supra note 11, at art. 7, ¶ 2. 105. Amendments to the Annex of the Protocol of 1978 Relating to the International Convention for the Prevention of Pollution From Ships, 1973, Resolution MEPC.117(52), adopted Oct. 15, 2004, 2057 U.N.T.S. 68 [hereinafter Revised Annex 1 of MARPOL 73/78]. 2010] Payment Data Security Breaches and Oil Spills 127 hazardous substances in the ships.106 A fifth guiding principle of the oil spill prevention scheme—the creation of the International Maritime Organization (IMO) as an international organization focused on the problem—predated MARPOL.107 A comprehensive national or international approach to data security breaches might even avoid one of the pitfalls that MARPOL and other international conventions and U.S. environmental protection statutes share in terms of fixed liability limits that prove very hard to update. For example, the liability limit in the Clean Water Act was intended to subject violators to civil penalties in amounts “up to $25,000 per day of violation or an amount up to $1,000 per barrel of oil.”108 But regardless of these imperfections, the five pivot points found in MARPOL, its amendments and IMO regulations as well as U.S. environmental protection laws offer some useful approaches for data security spills. A. COMPULSORY NOTICE OF SPILLS One of the most useful analogies that payments data security can draw from MARPOL 73/78 is its requirement of compulsory notice of oil spills to a central agency.109 There is no de minimus rule in the MARPOL scheme; that is, the ship’s operators must report every spill or discharge.110 In contrast, enacted state legislation and pending federal bills regarding data security breaches, discussed infra, only require prompt notice to law enforcement if the breach affects a threshold number of individuals or records—such as at least 10,000 individuals or a million or more records, and separate notices to consumers whose card data has been breached.111 It 106. Id. at regulation 19. 107. See Introduction to IMO, INT’L MARITIME ORG., http://www.imo.org/About/Pages/Default .aspx (last visited Dec. 28, 2010) (describing the IMO’s origins in 1948 as the Inter-Governmental Maritime Consultative Organizations, a name changed to International Maritime Organization in 1982). The IMO entered into force in 1958 just prior to the entry into force of OilPOL. Marine Environment Pollution Prevention Background, INT’L MARITIME ORG., http://www.imo.org/Our Work/Environment/PollutionPrevention/OilPollution/Pages/Background.aspx (last visited Dec. 28, 2010). 108. 33 U.S.C. § 1321(b)(7)(A) (2006). 109. See MARPOL 73/78, supra note 11, at art. 8; Revised Annex I of MARPOL 73/78, supra note 105, at regulation 37. 110. See MARPOL 73/78, supra note 11, at art. 8; Revised Annex I of MARPOL 73/78, supra note 105, at regulation 37. 111. Nearly every federal data security bill allows delays in notices to consumers so that law enforcement investigations may take place. E.g., Data Accountability and Trust Act, H.R. 2221, 111th Cong. § 3(c)(2) (as passed by House, Dec. 8, 2009) (providing delay for regular law enforcement purposes and for longer periods if notification would threaten national or homeland security). In both cases, delays must be based on determinations of necessity, and requests for delays are made in writing. E.g., Personal Data Privacy and Security Act of 2009, S. 1490, 111th Cong. § 311(d) (2009). Additional delays may be requested. E.g., H.R. 2221, § 3(c)(2)(A) (thirty days original delay for general law enforcement purposes subject to subsequent requests for delay with no specified outer limit if requests also made in writing). 128 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 is this Article’s position that, in order to protect critical infrastructure assets and national security, notice between the entity that suffers the breach and a central authority (at least at the national level) that a payments data spill has occurred should be mandatory regardless of its size, rather than based on some threshold. Proprietary payments systems rules and credit and debit card master agreements should require the merchants, payments processors, or financial institutions whose systems are breached to notify their counterparties as well, regardless of the number of records or accounts affected. Thresholds, I would argue, keep from central scrutiny data problems at their beginning, may allow them to spread, and certainly provide no earlywarning system equivalent of orchestrated attacks on a retailer, payment system, or financial institution that would protect everyone involved. B. COMPENSATION FOR THIRD-PARTY LOSSES MARPOL 73/78 is also part of a longstanding scheme of compensation for third-party losses that reaches back to 1954, beginning with the convention known as OilPOL.112 Compensation allows affected communities and individuals to survive the damage to livelihoods and to physical environments on which they depend or around which they live. Since OilPOL, various international conventions and domestic laws implementing them in some cases have increased the amount of first-level compensation.113 The group of international conventions providing for compensation includes two that predate MARPOL 73/78, the 1969 International Convention on Civil Liability for Oil Pollution Damage (commonly known as the 1969 Civil Liability Convention), and the 1971 International Convention on the Establishment of an International Fund for Compensation for Oil Pollution Damage (commonly known as the 1971 Fund Convention), each of which has been replaced by new protocols in 1992, now known, respectively, as the 1992 Civil Liability Convention and the 1992 Fund Convention.114 The 1992 Civil Liability Convention imposes 112. OilPOL, supra note 99. The 1978 Protocol to the 1973 Convention essentially replaced OilPol. See Background on Pollution Prevention and MARPOL 73/78, supra note 11. However, Congress then repealed the Oil Pollution Act of 1961, Pub. L. No. 87-167, 75 Stat. 402, which had implemented OilPOL and the Oil Pollution Act Amendments of 1973. Act to Prevent Pollution from Ships of 1980, Pub. L. No. 96-478, 94 Stat. 2303 (codified as amended at 33 U.S.C. §§ 1901–1915). 113. U.S. statutes implemented these compensation schemes to include, inter alia, Federal Water Pollution Control Act (Clean Water Act), 33 U.S.C. §§ 1251–1321 (2006), the Outer Continental Shelf Lands Act Amendments of 1978, 43 U.S.C. § 1814 (1988) (repealed 1990), the Trans-Alaska Pipeline Authorization Act, 43 U.S.C. § 1653 (1988), and the Deepwater Port Act, 33 U.S.C. § 1517 (1988). 114. The International Regime for Compensation for Oil Pollution Damage: Explanatory Note Prepared by the Secreteriat of the International Oil Pollution Compensation Funds, INT’L OIL POLLUTION COMPENSATION FUNDS (Dec. 2010), http://www.iopcfund.org/npdf/genE.pdf [hereinafter Explanatory Note]. 2010] Payment Data Security Breaches and Oil Spills 129 strict liability on ship owners for oil pollution damage.115 The 1992 Fund Convention provides supplementary compensation for oil pollution victims if the former convention’s compensation is inadequate.116 In addition, a Protocol to the 1992 Fund Convention created a third tier compensation prospect through the International Oil Pollution Compensation Supplementary Fund, raising the maximum payable for one incident to 750,000,000 Special Drawing Rights, which is equivalent to $147,500,000.117 Examples of domestic legislation providing for compensation exist in the United States and Turkey. In the United States, the OPA specifies the types of damages that individuals and other entities that suffered injury could obtain from persons responsible for oil spills.118 These include damages to natural resources, real or personal property, subsistence uses of natural resources, revenues, public services, and profits.119 In addition, it specifies the scope of clean-up costs for which responsible persons are liable, including containment and actions necessary to “minimize or mitigate damage to public health or welfare, including, but not limited to, fish, shellfish, wildlife, and public and private property, shorelines, and beaches[.]”120 The OPA allows the States to impose liability on responsible parties beyond the liability that the Act provides.121 Turkey’s law was adopted in 2005.122 A special scheme for damages to third-parties—like the overall scheme supporting compensation for oil-spill victims briefly described above— might be used to sustain credit reporting blocks or monitoring and recovery expenses, particularly when breaches affect smaller merchants or institutions, or other sorts of damages that are hard to quantify in advance. 115. See id.; see also International Convention on Civil Liability for Oil Pollution Damage, 1992, art. 1 ¶ 6, art. 3 ¶ 1, opened for signature Jan. 15, 1993, 1956 U.N.T.S. 255, available at http://www.iopcfund.org/npdf/Conventions%20English.pdf. 116. See Explanatory Note, supra note 114; see also International Convention on the Establishment of an International Fund for Compensation for Oil Pollution Damage, 1992, at art. II, ¶ 1, opened for signature Jan. 15, 1993, 1953 U.N.T.S. 330, available at http://www.iopcfund.org/npdf/Conventions%20English.pdf. 117. Explanatory Note, supra note 114. To determine the daily value of Special Drawing rights under this scheme, see Exchange Rate Archives by Month, INT’L MONETARY FUND, http://www.imf.org/external/np/fin/data/param_rms_mth.aspx (last visited Dec. 28, 2010). For a comprehensive analysis of the overall oil pollution damages scheme, see MICHAEL MASON, TRANSNATIONAL COMPENSATION FOR OIL POLLUTION DAMAGE: EXAMINING CHANGING SPATIALITIES OF ENVIRONMENTAL LIABILITY (2002), http://eprints.lse.ac.uk/570/1/RPESAno69(2002).pdf. 118. Oil Pollution Act of 1990, 33 U.S.C. §§ 2701–2720, 2731–2738 (2006). 119. Id. § 2702(b)(2) 120. Id. § 2701(30). 121. Id. § 2718(a). 122. For a thorough discussion of this law, see MURAT TURAN, TURKEY’S OIL SPILL RESPONSE POLICY: INFLUENCES AND IMPLEMENTATION (2009), available at http://www.un.org/Depts/los/ nippon/unnff_programme_home/fellows_pages/fellows_papers/turan_0809_turkey.pdf. 130 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 In establishing a compensation scheme for counter-party and consumer damages from data spills, however, we should take care to create a mechanism to provide for periodic increases in basis compensation. This would avoid the problems associated with compensation schemes in which allowed damages have not kept pace with inflation, such as in the Death on the High Seas Act of 1920123 or in 13 U.S.C. § 1321(7)(A), which establishes a civil penalty for “owner[s], operator[s] or person[s] in charge of any vessel, onshore facility or offshore facility from which oil or a hazardous substance is discharged in violation of” 13 U.S.C. § 1321(3) that is capped at $25,000 per day of violation for discharges of oil or other hazardous substances or at up to $1,000 per barrel of oil or unit of reportable quantity of hazardous substances discharged.124 In addition, in cases in which the violation “was the result of gross negligence or willful misconduct” of an owner, operator, or person in charge described in 13 U.S.C. § 1321(7)(A), the person is “subject to a civil penalty of not less than $100,000, and not more than $3,000 per barrel of oil unit of reportable quantity of hazardous substance discharged.”125 In addition, the compensation scheme might reward prompt and accurate reporting of the data spill to avoid the obvious temptation to lowball the estimate of damages inflicted. In the Deepwater Horizon incident, for example, there were many reports that BP was under-reporting the discharge from the well so that it could take advantage of the “strict liability” penalties in 13 U.S.C. § 1321(7)(A) and avoid the higher penalties for “gross negligence” provided in 13 U.S.C. § 1321(7(D).126 C. OPERATIONAL RESTRICTIONS MARPOL 73/78 imposes additional operational requirements and some restrictions on tankers and other vessels that do not meet its mandates. For example, just as VISA suspended RBS PayCard’s approved service provider status after its breach revealed that its compliance with PCI DSS was inadequate,127 vessels that do not meet certain criteria under MARPOL may not enter certain waters or ports,128 and may be required to keep expanded records and undergo additional inspections.129 This multi-pronged approach to prevention may be more effective than the single-factor reliance on encryption or double-factor encryption and best 123. 124. 125. 126. Death on the High Seas Act of 1920, 46 U.S.C. §§ 30302–30308 (2006). Clean Water Act, 33 U.S.C. § 1321(7)(A) (2006). Id. § 1321(7)(D). John Schwartz, Liability at Issue in Oil Flow Rate in Gulf, N.Y. TIMES, Jul 19, 2010, at A17; see also Press Release, The Select Committee on Energy, Independence and Global Warming, Markey: Flow Rate Report Shines Light on BP’s Financial Liability, True Size of Spill (May 27, 2010), http://globalwarming.house.gov/mediacenter/pressreleases_2008?id=0255. 127. Ashford, supra note 70. 128. Revised Annex I of MARPOL 73/78, supra note 105, at regulations 20–21. 129. Revised Annex I of MARPOL 73/78, supra note 105. 2010] Payment Data Security Breaches and Oil Spills 131 practices approaches seen in state data security breach laws as well as pending federal legislation.130 D. DOUBLE HULLS AND COMPARABLE SAFE-DESIGN REQUIREMENTS MARPOL 73/78 also requires specific structural defenses to guard against oil spills and other discharges into the sea. For tankers built after 1981, MARPOL requires that construction be double-hulled.131 The convention requires that vessels with large capacities but built before June 1, 1982 or contracted to be built before that year, be retrofitted with double bottoms and structural improvements to their sides.132 Vessels without appropriate structural defenses as required by MARPOL should not expect access to certain ports.133 Similarly, payments systems participants that cannot comply with PCI DSS’s required firewalls and 128-bit encryption security features—or that employ EMV/chip-and-PIN technology instead— might be precluded or suspended from certain payments systems. Such was the fate of Heartland after its breach.134 E. MODEL FOR INTERNATIONAL COOPERATION AND AVOIDANCE OF TRADE-HINDERING NATIONAL LEGISLATION The fifth lesson that MARPOL 73/78 offers to the solution of payments data spills relates to its role as a model for international cooperation in the effort to reduce the temptation to deal with certain issues piecemeal through national legislation. Because of rising evidence that the perpetrators of data security breaches operate internationally,135 and because the threat of transnational criminal prosecution may not deter cyber thieves, international cooperation through private standard setting and international conventions 130. 131. 132. 133. See infra Part IV. Revised Annex I of MARPOL 73/78, supra note 105, at regulation 20. Id. Id. For an analogous situation regarding data breaches, see Ashford, supra note 70 (describing how banks may be removed from Visa’s and Mastercard’s list of validated service providers if they are not compliant with the Payment Card Industry Data Security Standard). 134. E.g., Freed, supra note 92 (reporting the suspension of the Heartland system from VISA participation until it had been recertified); Lemos, supra note 66 (mentioning the use of low-level thieves called “cashers” to withdraw funds from ATMs in Montreal, Moscow, Hong Kong, and other cities in the U.S. and abroad depleting 100 accounts and revealing personal information on 1.5 million cardholders and the social security numbers of 1.1 million of them); Robert McMillan, FTC Says Scammers Stole Millions, Using Virtual Companies, COMPUTER WORLD, Jun. 27, 2010, http://www.computerworld.com/s/article/9178560/FTC_says_scammers_stole_millions_using_vir tual_companies (scammers used U.S. residents to move money to Bulgaria, Cyprus, and Estonia) [hereinafter McMillan, FTC Catches Scammers]. More recently, reports suggest that Russian hackers broke into check image depositary and used information to generate counterfeit checks and stole $9 million. Elinor Mills, Check Counterfeiting Using Botnets and Money Mules, CNET NEWS (July 28, 2010), http://news.cnet.com/8301-27080_3-200111885-245.html. 135. See, e.g., McMillan, FTC Catches Scammers, supra note 134. 132 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 offers an attractive approach for the prevention and resolution of data security incidents. III. HOW DO PAYMENTS DATA SPILLS AND MARITIME SPILLS COMPARE? Part II of this Article focuses on costs associated with the prevention and remediation of spills, both payments data and oil-related. This Part focuses on the causes of spills. In this regard, payments data spills and maritime accidents share things in common. First, both may derive from insiders’ negligence or recklessness, or cost-cutting that affects riskprevention measures.136 Examples of negligence leading to data spills include: Theft of unencrypted information on hard drives stored in an apparently unsecure closet in a training facility of BlueCross BlueShield of Tennessee. These hard drives contained data, as well as photos of the screens on which trainees and operators were working that revealed sensitive personally identifiable information about customers;137 and The spectacular TJX breach affecting 94 million payment records of credit cards and debit cards involving the use of wireless Internet transmissions of data vulnerable to interception in a process known as “war driving” in which thieves use readers to capture transmissions leaving known store locations.138 Maritime examples include: The disarming of one or more warning systems on the Deepwater Horizon oil drilling platform in the days and weeks prior to the explosion and spill, and the failure to heed other signals that important safety features were not functioning as planned;139 The grounding of the Exxon Valdez in the Valdez Inlet near Anchorage, Alaska in 1989. Investigation of the cause of the accident revealed that, despite the known shoal dangers of Prince William Sound through which the Valdez was moving,140 only one officer was on the bridge at the time of the accident and that the 136. For a discussion on oil spills, see Achenbach & Hilzenrath, supra note 39. 137. See McMillan, Data Theft, supra note 35. 138. Byron Acohido, Cyberthieves Find Workplace Networks are Easy Pickings; Simple Hacking Techniques Have Potential to Collect Data From Any Entity Using a Digital Network, USA TODAY, Oct. 9, 2009, at B1 (discussing the TJX and Hannaford data security breaches and the means used to intercept data). 139. David S. Hilzenrath, Alarm System on Rig Was Disabled, Technician Testifies, WASH. POST, July 24, 2010, at A5. 140. See ALASKA OIL SPILL COMMISSION, supra note 38. 2010] Payment Data Security Breaches and Oil Spills 133 pilot had been under the influence of alcohol at the time of the grounding;141 and The Cosco Busan accident that spilled 53,569 gallons of heavy crude into San Francisco Bay on November 7, 2007.142 The United States filed felony and misdemeanor charges against the Cosco Busan’s management and pilot for sailing in fog, travelling at an unsafe speed, failing to make plans or use radar, and falsifying documents.143 Second, the sources of spills may be entirely different. For example, the 1978 wreck of the Amoco Cadiz was caused by the failure of the tanker’s steering mechanism and subsequent rough weather, which in turn caused the tanker to split apart, spilling 68.4 million gallons of oil and despoiling more than 125 miles of the coast of France.144 This tanker was not fitted with a double hull—because MARPOL’s requirement was not in effect at the time—placing its cargo at greater risk in the event of grounding.145 Does the grounding of the Exxon Valdez bear a stronger resemblance to the BlueCross BlueShield of Tennessee spill—which involved unencrypted data in an unguarded location—or the Google spill—which involved the high-tech penetrations of significant firewalls around wire transfer systems?146 While considering the above, it may be helpful to think about the differences between navigating correctly charted waters, on the one hand, and navigating areas in which recent storms or sand accretions may affect the reliability of the charts. Or, in other words, navigating around known rocks is easier because, normally, big rocks do not move often and sand does.147 The chart and, therefore, the charted course should be all right if all one is interested in is avoiding the rocks. But the same won’t work with sand, which is constantly eroding and accreting.148 141. Stephens, supra note 3; see also ALASKA OIL SPILL COMMISSION, supra note 38, at 27. Among other sea and shore life, the oil spill killed 250,000 sea birds and more than twenty orca whales in Prince William Sound, Alaska, alone. Joling & Thiessen supra, note 95. 142. UNITED STATES DEPARTMENT OF HOMELAND SECURITY, INCIDENT SPECIFIC PREPAREDNESS REVIEW (ISPR) M/V COSCO BUSAN OIL SPILL IN SAN FRANCISCO BAY: REPORT ON INITIAL RESPONSE PHASE (2008), available at http://www.uscg.mil/foia/CoscoBuscan/Cosco BusanISPRFinalx.pdf (listing number of birds caught (1,039), cleaned (681), and dead (1,365) due to the Cosco Butan oil spill and discussing origins of the spill). 143. Bob Egelko, Felony Charges for Ship’s Management, S. F. CHRON., July 24, 2008, at B3. 144. Allen Tony, MV Amoco Cadiz, THE WRECKSITE ARCHIVE (June 26, 2007), http://www.wrecksite.eu/wreck.aspx?10339. 145. See Background on Pollution Prevention and MARPOL 73/78, supra note 11. 146. More E-Mail Account Details Leak Online, N.Y. TIMES GADGETWISE BLOG (Oct. 6, 2009, 11:05 PM), http://gadgetwise.blogs.nytimes.com/2009/10/06/more-e-mail-account-details-leakedonline/?scp=3&sq=wire%20transfer&st=cse. 147. Interview with Roland Trope, Esq., Partner, Trope & Schramm, LLP, in Coral Gables, FL (Jan. 25, 2010). 148. Examples of accretions and erosion abound. Storms may cause breaches that radically alter tidal flows in their vicinities and lesser weather changes may cause significant shifts in sand bars 134 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 But, as new operating systems are rushed to market, data security confronts efforts by cyber-thieves that are analogous to movements of both rocks and sand on a constant basis as thieves search for any available vulnerability and seek to penetrate systems that may have been considered impenetrable just prior to the breach. So, in some respects, detecting and preventing risks to data security may be harder than avoiding the aforementioned types of shipping accidents. However, the risks to critical infrastructures and national security are such that stronger incentives for appropriate levels of monitoring and deterrence as well as some legal, centralized, or collective solutions are needed. IV. LEGISLATIVE RESPONSES TO DATA SPILLS AND PROSPECTS—DO PROPOSALS SUFFICIENTLY ADDRESS SPILL PREVENTION AND DATA SPILL REMEDIES FOR BUSINESSES OR CONSUMERS WHOSE SYSTEMS OR PERSONAL INFORMATION IS BREACHED? A. CONGRESSIONAL LEGISLATION Notwithstanding the numerous data spills and the damages resulting from them, the only recent federal law specifically related to data breach notification is the Health Information Technology for Economic and Clinical Health Act of 2009 (HITECH Act).149 The Act expanded the enforcement jurisdiction of the Health Insurance Portability and Accountability Act (HIPAA)150 to allow state attorneys to enforce HIPAA’s provisions and implementing regulations.151 and shoals that affect tides or otherwise threaten maritime safety. See, e.g., Nelson Sigelman, Three Years Later, Norton Point Breach Marches On, MARTHA’S VINEYARD TIMES, Apr. 29, 2010, http://www.mvtimes.com/marthas-vineyard/article.php?id=536; Nelson Sigelman, Ocean Forces Continue to Shape Katama Cut, MARTHA’S VINEYARD TIMES, June 19, 2008, http://www.mvtimes.com/2008/06/19/news/norton-point-breach.php. Studies of sand-bar migration include Edith L. Gallagher, Steve Elgar & R.T. Guza, Nearshore Sandbar Migration, 106 J. GEOPHYSICAL RES. 11,623 (2001); Edith L. Gallagher, Steve Elgar & R.T. Guza, Observations of Sand Bar Evolution on a Natural Beach, 103 J. GEOPHYSICAL RES. 3203 (1998); D.J. Phillips & S.T. Mead, Investigation of a Large Sandbar at Raglan, New Zealand: Project Overview and Preliminary Results, 1 REEF J. 267 (2009). 149. Health Information Technology for Economic and Clinical Health Act, Pub. L. No. 111-5, 123 Stat. 115, 226 (2009) (codified in scattered sections of 42 U.S.C.). 150. Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, 110 Stat. 1936 (codified in scattered sections of 16, 26, 29, 42 U.S.C.). 151. Health Information Technology for Economic and Clinical Health Act § 13410(e). Using this new authority, the State of Connecticut was reported to be investigating the WellPoint data breach. See Joseph Goedert, Conn. AG Probes WellPoint Breach, HEALTH DATA MGMT (July 6, 2010), http://www.healthdatamanagement.com/news/breach-wellpoint-anthem-connecticut-attorn ey-general-40596-1.html. Prior to the HITECH Act, only the Secretary of Health and Human Services could enforce HIPAA’s privacy and security rules. See Priscilla M. Regan, Federal Security Breach Notifications: Politics and Approaches, 24 BERKELEY TECH. L.J. 1103, 1111 n.47 (2009) (citing GINA STEVENS & EDWARD C. LIU, CONG.. RESEARCH SERV., R40546, THE 2010] Payment Data Security Breaches and Oil Spills 135 Congress has been considering additional data security legislation since at least 2005.152 Thus far in the 111th Congress, the House has passed two bills—the Data Accountability and Trust Act153 and the Cybersecurity Enhancement Act of 2010.154 This section looks at those bills, and two Senate bills introduced in the 111th Congress, to consider whether their provisions would help or hinder the deterrence and resolution of payments data spills. It also discusses H.R. 1319, the Informed P2P User Act, and S. 3027, a companion bill to H.R. 1319, which was introduced in the Senate in February 2010. Each of these bills would impose new requirements on the handling of financial account data that is among the most valuable data for data thieves to access. Each bill only attempts to address a segment of a total data security scheme. For example, the Data Accountability and Trust Act directs the Federal Trade Commission to promulgate regulations to require owners and possessors of electronic data containing personal information and engaged in interstate commerce to provide for security procedures, vulnerability testing, and proper disposal of data, and requires notification of data security breaches to the FTC and to affected individuals.155 The Cybersecurity Enhancement Act focuses on the creation of strategic plans and support for research in the data security field, and requires the National Science Foundation to recruit for and fund a scholarship program for professionals in this field.156 As a result, merchants, payments processors, and operators of payments systems will be subject to the Gramm-Leach-Bliley Financial Services Modernization Act of 1999 (GLBA) and the Fair and Accurate Transactions Act (FACTA) requirements, and “data brokers” may be subject to new statutes such as the Data Accountability and Trust Act.157 Of course, providers of consumer financial services and products are already governed PRIVACY AND SECURITY PROVISIONS FOR HEATH INFORMATION IN THE AMERICAN RECOVERY AND REINVESTMENT ACT OF 2009, at 18 (2009)). 152. Beginning in the 109th Congress to early March 2010, numerous bills dealing with data security from different perspectives have been introduced in the House of Representatives. See generally Legislation in Current Congress, LIBRARY OF CONGRESS, www.thomas.gov (last visited Dec. 28, 2010). Among these were Consumer Notification and Financial Data Protection Act of 2005, H.B. 3374, 109th Cong. (2005) and the Consumer Data Security and Notification Act of 2005, H.B. 3140, 109th Cong. (2005), from the Committees on Banking and Financial Services and on the Judiciary, respectively. For an excellent history of Congress’ interest in breach notification legislation, see Regan, supra note 151, at 1112. 153. Data Accountability and Trust Act, H.R. 2221, 111th Cong. (as passed by House, Dec. 8, 2009). 154. Cybersecurity Enhancement Act of 2010, H.R. 4061, 111th Cong. (as passed by House, Feb. 9, 2010). 155. H.R. 2221 §§ 2–3. 156. H.R. 4061 §§ 103, 106. 157. See Gramm-Leach-Bliley Act (GLBA), Pub. L. No. 106-102, 113 Stat. 1338 (1999); Fair and Accurate Credit Transactions Act of 2003, Pub. L. No. 108-159, 117 Stat. 1952 (2003) (codified as amended at 15 U.S.C. § 1601). 136 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 by Title V of the GLBA.158 S. 1490 creates enforcement mechanisms for violations of its own requirements,159 and it authorizes the FTC to promulgate regulations to implement its privacy and data security requirements.160 In addition, the Senate bill confirms the role of the United States Secret Service as the primary federal agency to be notified of data security breaches161 and strengthens the tools that the federal government may use in combating such breaches.162 It does not expand remedies for consumers, largely because error resolution for unauthorized transactions should be covered by rights available to them under laws governing other payments system rules including the Fair Credit Billing Act163 for credit card transactions or the Electronic Fund Transfer Act for debit and payroll card transactions.164 However, it leaves consumers affected by data spills affecting bank and other transaction accounts, including gift cards, without a specific remedy. 1. Bills Passed by the House of Representatives The House of Representatives has passed two data security bills since the beginning of 2009. These bills are: a. H.R. 1319 The House of Representatives passed H.R. 1319 on December 8, 2009; it requires P2P providers to disclose to users which files a P2P program can share and consent of the users before the files can be shared over that program.165 The bill also makes it unlawful for any entity covered by its provisions to prevent an owner or authorized user of a protected computer 158. Personal Data Privacy and Security Act of 2009, S. 1490, 111th Cong. § 301 (as reported by S. Comm., Nov. 5, 2009) (exempting financial institutions regulated under GLBA from S. 1490). S. 1490 also would not apply to entities governed by HIPAA. Id. (exempting HIPAAregulated entities from S. 1490). 159. Id. § 101 (“Organized criminal activity in connection with unauthorized access to personally identifiable information”); id. § 102 (“Concealment of security breaches involving sensitive personally identifiable information”); id. § 104 (“Effects of identity theft on bankruptcy proceedings”); id. § 202 (FTC enforcement powers against data brokers); id. § 303 (FTC enforcement of requirements for privacy and security of personally identifiable information programs); id. §§ 317–18 (enforcement by state and federal Attorney Generals of breach notification requirements). 160. Id. § 202. 161. Id. § 316. 162. Id. §§ 101–02, 202, 302, 317, 318. 163. Fair Credit Billing Act of 1974, Pub. L. No. 93-495, §§ 301–08, 88 Stat. 1500 (codified as amended in scattered sections of 15 U.S.C.). 164. Electronic Fund Transfer Act, Pub. L. No. 95-630, § 2001, 92 Stat. 3728 (codified at 15 U.S.C. §§ 1693–1693r (2006)). 165. Informed P2P User Act, H.R. 1319, 111th Cong. (2009). Section 2’s requirement of notice prior to installation or downloading of a P2P program or activation of a file-sharing function of such a program does not apply to pre-installed software or to software upgrades. Id. § 2(a)(2) (“Non-application to pre-installed software”); id. § 2(a)(3) (“Non-application to software upgrades”). 2010] Payment Data Security Breaches and Oil Spills 137 from: (1) using “reasonable efforts” to block installation of a file-sharing program or function if covered by the bill; and (2) “having a reasonable means to” disable covered file-sharing programs or removing file-sharing programs that the covered entity caused to be installed or induced another person to install.166 The bill grants authority to the FTC to enforce its requirements making failure of the provider to comply the equivalent of a violation of a rule defining unfair or deceptive acts or practices under § 18(a)(1)(B) of the FTC Act.167 The bill also authorizes the FTC to promulgate rules to accomplish its provisions.168 b. H.R. 2221—The Data Accountability and Trust Act Section 2 of the Data Accountability and Trust Act instructs the FTC to promulgate regulations to: [R]equire each person engaged in interstate commerce that owns or possesses data containing personal information, or contracts to have any third party entity maintain such data for such person, to establish and implement policies and procedures regarding information security practices for the treatment and protection of personal information taking into consideration— (A) the size of, and the nature, scope, and complexity of the activities engaged in by, such person; (B) the current state of the art in administrative, technical, and physical safeguards for protecting such information; and (C) the cost of implementing such safeguards.169 One of the problems with H.R. 2221 is its safe harbor from liability for encrypted data because encryption alone170 is unlikely to sufficiently protect data from all hacking. Rather, it is the bundle of physical, administrative, and technical safeguards—which include but are not limited to encryption efforts—that are more likely to yield comprehensive protections. The incident at BlueCross BlueShield of Tennessee discussed supra demonstrates how easily data may be stolen, particularly in large quantities, if more than one of the three forms of protection is not in use. With the enactment of the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010 in July 2010, it is unclear whether the rulemaking authority that H.R. 2221 granted to the FTC will remain there 166. 167. 168. 169. Id. § 2(b). Id. § 3. Id. § 5. Data Accountability and Trust Act, H.R. 2221, 111th Cong. § 2(a)(1) (as passed by House, Dec. 8, 2009). 170. Id. § 3(f)(2)(A). 138 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 or will transfer to the newly created Bureau of Consumer Financial Protection.171 c. The Cybersecurity Enhancement Act of 2010, H.R. 4061 On February 4, 2010, the House of Representatives passed the Cybersecurity Enhancement Act of 2010. The Act, among other things, encourages social and behavioral research in cybersecurity,172 provides for sponsorship of the development of scholarship and funding for training,173 and encourages development and promotion of international cybersecurity technical standards and an “identity management research and development program.”174 If enacted, this bill is likely to encourage, in many respects, new approaches to deterrence and more cooperation on spill prevention. 2. Bills Considered by the Senate The Senate has considered numerous bills since January, 2009. The following sections consider them in detail. a. S. 1490—The Personal Data Privacy and Security Act of 2009 The Senate Committee on the Judiciary found that 9,300,000 individual records pertaining to personal payment transactions were compromised in 2008.175 Based on this finding, the Committee reported out S. 1490, the Personal Data Privacy and Security Act of 2009. Its provisions cover consumer access and correction rights to information held about them by “data brokers.”176 Data brokers are entities that collect and sell commercial data, including personally identifiable information, to others, including governments.177 This bill resolves gaps left between the GLBA and FACTA safeguards and disposal rules178—and indeed by HIPAA179—because entities already subject to those statutes and regulations would not be 171. See Dodd-Frank Wall Street Reform and Consumer Protection Act, Pub. L. No. 111-203, 124 Stat. 1376 (2010). 172. Cybersecurity Enhancement Act of 2010, H.R. 4061, 111th Cong. § 104 (as passed by House, Feb. 4, 2010). 173. Id. § 106 (“Federal Cyber Scholarship for Service Program”); id. § 107 (requiring an analysis of and recommendations for securing an “adequate, well-trained Federal cybersecurity workforce”). 174. Id. § 202 (development and promotion of “International Cybersecurity Technical Standards”); id. § 204 (“Identity Management Research and Development” program). 175. Personal Data Privacy and Security Act of 2009, S. 1490, 111th Cong. § 2 (as reported by S. Comm., Nov. 5, 2009). 176. Id. §§ 201–04. 177. Id. § 3(5) (defining “data broker”). 178. Disposal of Consumer Report Information and Records, 16 C.F.R. 682 (2006). This rule implements provisions of the Fair Credit Reporting Act. See 15 U.S.C. § 1681w (2006). 179. Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, 110 Stat. 1936 (codified in scattered sections of 16, 26, 29, 42 U.S.C.). 2010] Payment Data Security Breaches and Oil Spills 139 governed by S. 1490.180 Three key features of the bill require data brokers who collect or maintain records pertaining to 10,000 or more individuals to: (1) have privacy and security programs;181 (2) audit and update those programs;182 and (3) notify the United States Secret Service in the event of data security breaches if the number of individuals whose personal information is obtained without authorization exceeds 10,000 or if a database or network containing 1 million or more individual records is breached.183 A separate requirement to notify individuals whose personally identifiable information is involved in the breach is excused if the data broker’s risk assessment pertaining to that breach concludes that: (A) there is no significant risk that a security breach has resulted in, or will result in, harm to the individuals whose sensitive personally identifiable information was subject to the security breach, with the encryption of such information establishing a presumption that no significant risk exists, or (B) there is no significant risk that a security breach has resulted in, or will result in, harm to the individuals whose sensitive personally identifiable information was subject to the security breach, with the rendering of such sensitive personally identifiable information indecipherable through the use of best practices or methods, such as redaction, access controls, or other such mechanisms, which are widely accepted as an effective industry practice, or an effective industry standard, establishing a presumption that no significant risk exists[.]184 b. S. 139—The Data Breach Notification Act S. 139, the Data Breach Notification Act, is a narrower bill than S. 1490. It does not impose the same requirements for new privacy and security programs that S. 1490 imposes and its requirements for notification of individuals by “data brokers” after a data breach also are narrower.185 S. 180. 181. 182. 183. S. 1490. Id. § 302. Id. § 302(e). Id. § 316. Notice to the U.S. Secret Service by entities experiencing data security breaches is limited to cases in which 10,000 individual victims may be involved or to cases in which a database or network is involved that contains information about one million individuals or more. Id. 184. Id. § 312(b)(1) (emphasis added). 185. S. 139’s Sections 5 and 6 use a threshold for notices required to cases involving 5,000 or more individuals. Data Breach Notification Act, S. 139, 111th Cong. §§ 5–6 (2009); see also id. § 3(b)–(c) (safe harbor presumptions). However, Section 7 is similar to S. 1490 in that it requires notice to law enforcement only if the Serial Peripheral Interface Bus (SPI) of about 5,000 or more individuals is believed to have been acquired or the affected database or integrated databases contain SPI for one million or more individuals. See id. § 7. For S. 1490, Title II’s provisions on notice to affected consumers in Sections 311 and 312 do not contain the threshold that Sections 5 and 6 of S. 139 do. See id. §§ 311–12. Title III’s Section 316 contains similar threshold to S. 139’s Section 7 on notice to law enforcement—a key weakness in both bills. See id. § 316. However, Title III’s Section 302 contains much stronger 140 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 139 allows a complete defense to liability in enforcement actions brought for violations of its requirements if the data is encrypted or the database follows “best practices.”186 c. S. 773—The Cybersecurity Act S. 773, the Cybersecurity Act of 2009, takes a very different approach from the other bills discussed in this part of the Article. It focuses on the development by the National Institute of Standards and Technology (NIST) of standards for federal government agencies’, government contractors’, and grantees’ “critical infrastructure information systems and networks.”187 It also envisions financial assistance to create and support regional cybersecurity centers to assist small and medium-sized businesses.188 Among many other provisions, it also places NIST in the position of representing the United States in international cybersecurity standards development projects,189 makes the Department of Commerce (Commerce) the clearinghouse for all “cybersecurity threat and vulnerability information,”190 and grants the Secretary access to data regardless of “any provision of law, regulation, rule or policy restricting such access.”191 The bill also authorizes the President to declare a “cybersecurity emergency” and to “‘order the limitation or shutdown of Internet traffic to and from any compromised Federal Government or United States critical infrastructure information system or network.’”192 provisions on the scope, design, assessment of and periodic reassessment of protocols designed to protect SPI, and also on training of personnel to protect SPI. Id. § 302. 186. See S. 139 § 3(b)(2)(A)(B). 187. Cybersecurity Act of 2009, S. 773, 111th Cong. § 6 (2009). 188. Id. § 5. S. 773 does not reach depositary institutions or providers of securities and insurance products. Jurisdiction over depositary institutions is with the Senate Committee on Banking, Housing, and Urban Affairs. Committee Information, U.S. SENATE COMMITTEE ON BANKING, HOUSING & URBAN AFFAIRS, http://banking.senate.gov/public/index.cfm?FuseAction= CommitteeInformation.Jurisdiction (last visited Aug. 27, 2010). 189. S. 773 § 6(a). 190. Id. § 14(a). 191. Id. §§ 6, 14. The breadth of this authority would allow the Secretary of Commerce to avoid the requirements of the Federal Right to Financial Privacy Act, 18 U.S.C. §§ 3401–3422 (2006), and of other federal pro-privacy protections in the Fair Credit Reporting Act, 15 U.S.C. § 1681(u)–(v) (2006), the Electronic Communications Privacy Act, 18 U.S.C. § 2701(a) (2006), and the National Security Act, 50 U.S.C. § 401 (2006). In the absence of restrictions such as these, the government could obtain any information that an individual voluntarily gave to a third-party or that resulted from their transactions. 192. See S.773—Cybersecurity Act of 2009, OPENCONGRESS, http://www.opencongress.org /bill/111-s773/show (last visited Aug. 29, 2010) (citing S. 773 § 18(2)); see also James Corbett, The Rising Tide of Internet Censorship, GLOBAL RESEARCH (Feb. 5, 2010), http://www.globalresearch.ca/index.php?context=va&aid=17433 (reporting, among other things, the finding in conjunction with the bill’s introduction in 2009 that “‘voluntary action is not enough’” to manage cyber security threats) (citation omitted). 2010] Payment Data Security Breaches and Oil Spills 141 d. S. 3027—The P2P Cyber Protection and Informed User Act S. 3027, the P2P Cyber Protection and Informed User Act, is a companion bill to H.R. 1319, which was introduced on February 23, 2010.193 Its substance is identical to that of H.R. 1319, described in Section IV.A.1.a of this Article, supra.194 B. STATE LEGISLATION While the federal government has been trying to enact and consider data security bills, at least forty-six states, and the District of Columbia, Commonwealth of Puerto Rico, and the U.S. Virgin Islands have enacted some form of data security breach notification requirements.195 One state has enacted a provision that requires retailers whose conduct causes payments data spills to compensate the parties with whom they have dealt,196 and a second is considering imposing a statutory contributory negligence standard197 as well as a fund to which merchants would contribute on a per-transaction basis to manage compensation for victims of payments data security breaches.198 1. General Observations on State Data Security Breach Laws State law requirements that make vendors liable to financial institutions for breaches of unencrypted credit and debit card payment transaction data could make a big difference in the overall integrity of the payments system. To date, only Minnesota has enacted legislation that creates incentives to deter breaches in this manner.199 The Minnesota law requires the use of PCI,200 the only state to do so. It also imposes liability on merchants for data security breaches.201 The forty-five other states that have required breach notices to affected consumers create incentives for stronger 193. P2P Cyber Protection and Informed User Act, S. 3027, 111th Cong. (as introduced, Feb. 23, 2010). 194. Id.; see supra Part IV.A.1.a. 195. State Security Breach Notification Laws, NAT’L CONFERENCE OF STATE LEGISLATURES, http://www.ncsl.org/default.aspx?tabid=13489 (last modified Apr. 12, 2010). For an excellent discussion of the variables in state data security laws, see G. Martin Bingisser, Note, Data Privacy and Breach Reporting: Compliance with Various State Laws, 4 SHIDLER J.L. COM. & TECH. 9 (2008), available at http://www.lctjournal.washington.edu/Vol4/a09Bingisser.html (written when about half the states had enacted data security breach notification laws). 196. MINN. STAT. § 325E.64 Subd. 6 (2009); MINN. STAT. § 8.31 Subd. 3 (2009). 197. 2010 H.B. 1149, 2010 Leg., 61st Sess. (Wash. 2010). 198. An earlier version of Wash. 2010 H.B. 1149 contained the authority to collect the two-cent fee to establish the fund. Data Security: Amended Bill Assigning Payment Card Breach Liability Passes Washington House, Banking Rep. (BNA) No. 94, at 429 (Mar. 2, 2010) [hereinafter Amended Bill Passes WA House]. 199. § 325E.64; see also James T. Graves, Note, Minnesota’s PCI Law: A Small Step on the Path to a Statutory Duty of Data Security Due Care, 34 WM. MITCHELL L. REV. 1115, 1117, 1132 (2008). 200. § 325E.64. 201. Id. Subd. 3. 142 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 technical, administrative, and physical safeguards for payments data by requiring notice to all consumers whose personally identifiable information has been released in a security breach.202 But each state’s laws vary slightly, and many employ subjective or objective thresholds before action is required. For example, Washington’s statute relieves an individual or entity from the duty to disclose the breach if the breach “does not seem reasonably likely to subject customers to a risk of criminal activity.”203 Virginia’s standard is both objective and similarly subjective; disclosure of the breach is required if: [I]nformation is accessed and acquired in an unencrypted form, or if the security breach involves a person with access to the encryption key and the individual or entity [suffering the breach] reasonably believes that such a breach has caused or will cause identity theft or other fraud to any resident of the Commonwealth.204 Reliance on the subjective assessments of the entity suffering the breach may be likely to produce too little notification and, therefore, too little customer or public pressure to reform data security practices. State data security breach laws often do not provide much in the way of direct redress for consumers whose payments transaction data is compromised. For example, the Indiana security breach statute does not create a private right of action for consumers.205 Other state proposals use high thresholds, such as the restriction in H.B. 1149 in Washington limiting its application to businesses and government agencies that process 6 million or more payment card transactions in a year,206 and also (perhaps incorrectly) exempts businesses or agencies from liability provisions if they are in compliance with PCI DSS207 (because compliance ends when a breach is demonstrated). The varied requirements of these state laws undoubtedly have contributed to the numbers of data security bills introduced in Congress, as interstate companies work to preempt with inconsistencies across states. 208 State breach notification statutes may be seen by some as comparable to the outbreaks of “domestic legislation” that from time to time propelled 202. 203. 204. 205. See, e.g., id. Subd. 3(5). WASH. REV. CODE ANN. § 19.255.010(d) (West 2010) (emphasis added). VA. CODE ANN. § 18.2-186.6(C) (West 2010). Pisciotta v. Old Nat’l Bancorp, 499 F.3d 629, 637 (7th Cir. 2007) (adding that the Indiana statute “imposes no duty to compensate affected individuals for inconvenience or potential harm to credit that may follow”). 206. See Amended Bill Passes WA House, supra note 198. 207. Id. 208. Thomas M. Lenard & Paul H. Rubin, Much Ado About Notification: Does the Rush to Pass State-Level Data Security Regulations Benefit Consumers?, REGULATION, Spring 2006, at 44, 49– 50, available at http://www.cato.org/pubs/regulation/regv29n1/v29n1-5.pdf. 2010] Payment Data Security Breaches and Oil Spills 143 amendments to MARPOL’s requirements.209 The varying compliance responsibilities of separate state laws and their costs likely draw funds210 and energy away from technical innovations aimed at overall safety goals. In the data security context, however, the willingness of states to enact data security breach laws has had the benefit of “increase[ing] the visibility” of data security.211 C. NOVEL STATE PROPOSALS TO REDRESS OR DETER PAYMENTS DATA SECURITY BREACHES H.B. 1149, the bill that the Washington legislature passed,212 originally suggested two new means of redressing liability. First, it made vendors that sell payment card processing software and equipment contributorily liable for breaches caused by faults in their software or hardware.213 Also, it allowed merchants to charge two cents per transaction to offset the costs of the insurance merchants would have to cover their liability to financial institutions should data that merchants retained be breached.214 Only the former of these made it though Washington’s House of Representatives.215 The bill also prohibits merchants “from retaining credit card security code data, PIN codes or verification numbers, or the full content of ‘magnetic stripe data’ after authorization of a transaction without the express consent of customers.”216 In addition, it makes retailers liable for breaches of retained payment card data if the breach affected 5,000 or more unencrypted individuals’ names or account numbers, as long as the business or agency processes 6 million or more payment card transactions per year.217 This provision is unique in that it limits liability to cases in which the breach reaches a threshold number, as opposed to the more standard numerical trigger for notices of the breach to consumers. If this provision is 209. See, e.g., Maitland, supra note 102, at 52; Senator Lautenberg—Naval Architect?, MARINE LOG, Apr. 2008, at 14 (describing the October 2006 amendments to MARPOL and the notion that if the International Maritime Organization moves in “too ‘reasonable’ [a manner] it may not fend off unilateral action by individual countries”). 210. Caroline Stenman, The Development of the MARPOL and EU Regulations to Phase Out Single Hulled Oil Tankers 8, 23–24 (May 2005) (masters thesis, Goteborg University School of Economics and Commercial Law), available at http://gupea.ub.gu.se/bitstream/2077/1941/1/2005 56.pdf (explaining how unilateral EU action spurred adoption of stricter MARPOL guidelines, phasing out single-hulled ships more quickly); see generally Michael E. Porter & Claas van der Linde, Toward a New Conception of the Environment-Competitiveness Relationship, 9 J. OF ECON PERSP. 97, 113–14 (1995); Roy Rothwell, Industrial Innovation and Government Environmental Regulation: Some Lessons From the Past, 12 TECHNOVATION 447 (1992). 211. Graves, supra note 199, at 1116. 212. 2010 H.B. 1149, 2010 Leg., 61st Sess. (Wash. 2010), amending WASH REV. CODE § 19.225.RCW (2010). 213. Id. § 3(b). 214. Amended Bill Passes WA House, supra note 198. 215. Id. 216. Id. 217. Id. 144 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 enacted, it could establish a precedent of non-liability for breaches affecting only smaller numbers of individuals, which would not create incentives for stronger data security. V. ARE “SAFE HARBORS” OR PRESUMPTIONS BASED ON ENCRYPTION OR OTHER SECURITY METHODS APPROPRIATE? As mentioned above, some of the data security bills pending in Congress provide exemptions from requirements to notify individuals whose personally identifiable information may have been affected by the data security breach if the holder of the information has had the data encrypted or subject to some other security methods. In some cases, exemptions are possible based on encryption alone. This approach is used in Ohio, West Virginia, and Virginia.218 In other cases, use of encryption alone is sufficient to establish a presumption that there is no significant risk that personally identifiable information was exposed in the breach.219 Encryption alone does not prevent attacks: data in the Heartland breach was encrypted at the store, but apparently not in transmission.220 In early 2010, at a lecture on encryption given by Indiana University School for Informatics Professor Steven A. Myers,221 I asked a question about basing a “safe harbor” for data security on encryption alone. The reaction by the Informatics faculty and graduate students in the room was immediate and visceral: their jaws dropped. Their ensuing remarks made it clear their collective belief that encryption alone should not suffice to qualify for a safe harbor. Rather, they preferred a combination of encryption 218. Many states create safe harbors by defining personal information as unencrypted and readable data elements. See, e.g., OHIO REV. CODE ANN. § 1347.12(A)(6)(a) (West 2010). Other states create safe harbors by defining a breach as “unauthorized access and acquisition of unencrypted and unredacted data.” W. VA. CODE ANN. § 46A-2A-101(1) (2010). Others create explicit safe harbors. See, e.g., VA. CODE ANN. § 18.2-186.6(C) (West 2010). An individual or entity shall disclose the breach . . . if encrypted information is accessed and acquired in an unencrypted form, or if the security breach involves a person with access to the encryption key and the individual or entity reasonably believes that such a breach has caused or will cause identity theft or other fraud to any resident of the Commonwealth. VA. CODE ANN. § 18.2-186.6(C). 219. Several states define “significant risk” as excluding the breach of encrypted data. See, e.g., R.I. GEN. LAWS § 11-49.2-3(a) (2010) (“Any state agency or person . . . shall disclose any breach of the security of the system which poses a significant risk of identity theft . . . to any resident of Rhode Island whose unencrypted personal information was [breached] . . . .”). 220. See Heartland Hacker Gonzalez Pleads Guilty to Compromise of Over 170 Million Cards, ATMMARKETPLACE.COM (Sept. 14, 2009), http://atmmarketplace.com/article.php?id=1131 9&na=1 [hereinafter Heartland Hacker Pleads Guilty]. 221. Steven A. Myers, Lecture at the Maurer School of Law, Indiana University: One Bit Encryption (February 16, 2010). For the text of the paper on which this lecture was based, see Steven Myers & Abhi Shelat, Bit Encryption Is Complete (2009) (unpublished manuscript) (on file with author). 2010] Payment Data Security Breaches and Oil Spills 145 and “best practices” involving administrative, technical, and physical safeguards. Dr. Meyers and others in that audience also noted that the value of encryption also depends to some extent on the portions of the data and data transmission to which encryption is applied and the manner through which the data were obtained. For example, the group of thieves responsible for the TJX and Hannaford Brothers data spills were engaged in diverse strategies including one known as “war driving” in which the group intercepted payments data during transmission over wireless Internet connections by positioning themselves close to store locations from which the data were being transmitted.222 VI. ARE RECENT PAYMENTS DATA SECURITY DEVELOPMENTS MOVING CLOSER TO A MARPOL-LIKE REGIME? Data security laws in the United States normally do not mandate that a particular form of data security/anti-fraud process be employed, with Minnesota’s law as the possible vanguard of a new approach.223 Rather, existing state laws impose requirements on the owner of data if a data security breach occurs.224 Thus, the norm is to allow the marketplace to devise means to protect data so as to avoid the expense and reputational risk of revealing that a data security breach occurred. This places the responsibility of protecting data on each entity that holds payments data and related personally identifiable information. One advantage of this approach is that there is no single standard method of protecting payments data; the diversity of approaches serves as a barrier to easier hacking, and there is no static standard that would require legislative action to amend. However, as reports of the “iffy decisions” made by BP and its partners in the drilling of the Deepwater Horizon well show,225 self-driven risk assessments in highly competitive environments may result in the commitment of too few resources to disaster prevention.226 Payments systems and others could create more incentives for users to keep up-to-date in deploying new security. They could, for instance, require software developers to warrant their programs (as discussed in subsection A below) or could push towards adoption of more secure technologies (as discussed in subsection B). 222. Indictment at 4–5, United States v. Albert Gonzalez, No. SBK/EL/2009R00080 (D. N.J. 2009). Gonzalez has since pled guilty to identity theft, wire fraud, computer fraud, and conspiracy in Massachusetts and New York, though charges are still pending in New Jersey. See Heartland Hacker Pleads Guilty, supra note 220. 223. Graves, supra note 199, at 1117. 224. State laws typically impose duties to disclose and/or compensate after a breach has occurred. See, e.g., CAL. CIV. CODE §§ 1785.11.2, 1798.29(a) (West 2007). 225. See Achenbach & Hilzenrath, supra note 39. 226. See Stephens, supra note 3. 146 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 A. SECURITY BASED ON SOFTWARE & WARRANTIES Beyond requirements for prevention of payments data spills that are comparable to MARPOL’s, some commentators have suggested that we should use different methods to make payments systems software less susceptible to hacking, including for example by requiring providers of software and database operators to warrant their products or their services to end users. Two of the proponents of specialty payments data warranties are Roland Trope227 and Professor Juliet Moringiello.228 Warranties are a common way to manage externalities and to overcome asymmetries in information between manufacturers and providers of services and their customers.229 Warranties in sales transactions include express and implied warranties of merchantability and fitness for a particular purpose, as well as warranties of good title and quiet enjoyment, and warranties against infringements of patents and trademarks.230 In the payments data security arena—as in other vertical manufacturing and retailing environments—warranties present some attractive market opportunities for providing remedies if software fail to deliver their promised results or services do not protect data in transmission or storage. In 2004, Roland Trope argued for the creation of a software “limited cyberworthiness warranty” based on the doctrine of seaworthiness.231 He made two observations that bear upon both the focus of this Article and his cyber-worthiness proposal. First, he explained that common law in the United States treats ships as “unseaworthy when [they are] ‘insufficiently or defectively equipped.’”232 He also observed that “[c]ourts have come to regard the seaworthiness of a ship as analogous to a warranty.”233 As Mr. Trope conceives of this new limited warranty, its target is the capacity of a software “application’s capabilities to protect confidential information from unauthorized access from, or disclosure to, cyberspace.”234 He proposes that such a warranty might require that: 227. Roland L. Trope, A Warranty of Cyberworthiness, IEEE SECURITY & PRIVACY, Mar./Apr. 2004, at 73 [hereinafter Cyberworthiness]. 228. See generally Moringiello, supra note 12. 229. See Claire A. Hill, A Comment on Language and Norms in Complex Business Contracting, 77 CHI.-KENT. L. REV. 29, 42 (2001). Contractual provisions, typically representations and warranties, serve to credibly communicate information, chiefly to rebut the presumption of undesirable attributes which divergent interests inspire and information asymmetry makes possible. They provide a means for one party to signal to the other the absence of undesirable attributes and presence of desirable attributes. Id. 230. 231. 232. 233. 234. U.C.C. §§ 2-312–315 (2003). Cyberworthiness, supra note 227, at 73–74. Id. at 74 (citing Waldron v. Moore-McCormack Lines, Inc., 386 U.S. 724, 726 (1967)). Id. at 74 (citing Brister v. A.W.I., Inc., 946 F.2d 350, 355 (5th Cir. 1991)). Id. at 73. 2010] Payment Data Security Breaches and Oil Spills 147 Prior to the software’s release, the maker subjected [the software] to rigorous tests to verify its degree of security against intrusion by unauthorized persons, electronic agents, or code (that is, it verified its cyberworthiness). By the time of release, the maker [should have] removed all known critical security vulnerabilities found in the software. (I define “critical” as any vulnerability that, if exploited, would enable unauthorized access to confidential information or unauthorized control of a user’s computing device.) After release, the maker shall continue to diligently probe the software for security vulnerabilities. When the maker learns of a critical vulnerability, it will immediately email all high-priority customers, describe the problem in detail, and provide suggestions for a temporary solution— disabling features, and so on—to diminish or limit the vulnerability until the maker can provide a patch. (“High-priority customers” are those likely to have valuable confidential information at risk in systems linked to cyberspace. To become such a customer, the party would enter into a written agreement with the software maker that any vulnerabilities disclosed and patches released to it would be kept confidential to prevent hackers from gaining early knowledge of such vulnerabilities. These customers would pay an increased purchase price in exchange for the incremental increase in protection.) The vulnerability notice also would include information that would alert users to take additional precautions to safeguard their confidential information until they had received a security patch. Immediately after creating a vulnerability security patch, the maker would email it first to the high-priority customers and, after an interval, to all registered software users. When distributing a security patch, the software maker shall not attach to it any disclaimer as to the accuracy of information provided with the patch or its fitness for correcting the specified security vulnerability. . . . The software’s warranty will be valid for a period of three years from the release date. (A security patch or newly marketed software should be warranted for a period comparable to that covered by the computing device’s warranty. It should be a period long enough to earn a user’s trust. . . . The warranty would be valid for purchasers who buy directly from the maker and for those who buy from third-party sellers, but [whose purchaser is] still in the direct chain of distribution from the maker. 148 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 The warranty would prescribe precautions to which purchasers must adhere, such as “do not open unknown attached files in emails from unknown senders.” Purchasers who violate the precautions (and suffer or cause harm) void the warranty, and will not be entitled to damages from the maker. If the maker breaches the warranty, the purchaser (buyer or licensee) is entitled to an expeditious remedy of a liquidated damage in an amount and through a procedure specified in the warranty . . . .235 Mr. Trope also proposes that this cyber-warranty be “phased in . . . with the first security-patch release.”236 In addition, he suggests that warrantors “would offer only the portion of the proposed warranty that applies to each patch.”237 Professor Moringiello urges a warranty like the homeowners’ warranty (HOW) that first became popular in the late 1970’s.238 She analogizes to early warranties created by law in which courts were unwilling to allow injured end users no remedy as against a provider with superior knowledge and the ability to control the end product through contract and preventive measures.239 Although courts have been far more reluctant to create warranties in the data security arena, the theories undergirding early common law warranties and the original common law homeowners’ warranties240 may apply with equal force to payments data security. To allay payments-related data security concerns, the United States and others will need to employ both MARPOL-based approaches and warranties such as Trope’s phased-in cyber-worthiness warranty and Moringiello’s HOW-like proposals. PCI DSS—a certification process based on technical standards241—represents a significant advantage in protecting the whole electronic payments data chain, but problems nevertheless have arisen within systems that recently had been judged PCI DSS compliant. For example, Hannaford Brothers apparently met credit card industry security standards prior to breach but was still vulnerable to hacking.242 235. 236. 237. 238. 239. 240. 241. Id. at 73–74. Id. at 74. Id. Moringiello, supra note 12, at 80–82. Id. See id. For a description of the PCI DSS standards as well as the opportunity to download them, see PCI SSC Data Security Standards Overview, PCI SECURITY COUNCIL, https://www.pcisecuritystandards.org/security_standards/pci_dss.shtml (last visited Dec. 30, 2010). 242. See Ross Kerber, Advanced Tactic Targeted Grocer ‘Malware’ Stole Hannaford Data, BOS. GLOBE, Mar. 28, 2008, at 1A (noting that Hannaford met standards set by VISA, Inc. and other card companies but that these were not sufficient to avoid the breach, explaining that the breach was attributable to that which analyst Steve Rowen described as “‘markedly more 2010] Payment Data Security Breaches and Oil Spills 149 B. SECURITY BASED ON THE CARDS THEMSELVES OR ON THE CARD AND THE CARD AUTHENTICATION PROCESS: More recent payments security advances include “chip-and-PIN” systems associated with the Europay, MasterCard, and VISA (EMV) system. EMV generates transaction data from the “card authentication [process] and from the cardholder verification processes” the issuer may employ.243 Deployed in the EU, Canada, and Asia beginning in 2004, and mandatory in the UK beginning in 2005, chip-and-PIN technologies offer more protections against hacking.244 For example, in the first year of its deployment in the UK, chip-and-PIN technology contributed to a 13 percent decline in card fraud in Britain.245 However, as a “skimming” fraud246 aimed at Shell oil stations in the UK in 2006 demonstrated, for cards that contain magnetic stripes as well as EMV/chip-and-PIN technology, even EMV is not fail-safe.247 And, as Jane Adams reports, thieves can still perpetrate “card-not-present” frauds by bypassing the chip or magnetic stripe.248 Despite the issues with these technologies, EMV/chip-and-PIN technologies offer more advanced anti-fraud approaches, including the ability to “identify fraud patterns and credit risk situations” by comparing data gleaned from the current transaction to data from prior transactions.249 However, EMV technology has been slower to gain traction in the United sophisticated,’” and reporting that the hackers “mined a stream of data that merchants and banks were not responsible for protecting under industry rules”). 243. Jane Adams, Dynamic Risk Management with EMV Data, ACI WORLDWIDE, July 2006, at 1, http://surveycenter.tsainc.com/pdfs/3065%20EMV%20flyer.pdf (citing Michael Hendry, a payments consultant who helped implement EMV systems in the EU). 244. See, e.g., Fed Official Warns Card Fraud Threat Growing in U.S., COLLECTIONS & CREDIT RISK (July 27, 2010), http://www.collectionscreditrisk.com/news/fed-official-warns-cardfraud-threat-growing-3002682-1.html (citing Richard Oliver of the Atlanta Federal Reserve Bank’s Retail Payments Risk forum advocating for shift to EMV smart-card technology to thwart fraud rings and criminals used in Europe, Canada, and other regions of the world); Fitzgerald, supra note 41 (describing phase-in deadlines for EMV technology in Canada and liability increases for merchants that have not deployed it on schedule); Brian Ooi, The EMV Migration Path in the Asia Pacific Region, FROST & SULLIVAN (Aug. 25, 2005), http://www.frost.com/prod/ servlet/market-insight-top.pag?docid=46281303; Vijayan, supra note 80. 245. Adams, supra note 243, at 1. 246. See Petrol Station Worker Admits Credit Card Fraud, NORTHAMPTON CHRON. & ECHO (U.K.), Apr. 9, 2009, http://www.northamptonchron.co.uk/news/Petrol-station-worker-admitscredit.5156481.jp. 247. Adams, supra note 243, at 1. 248. Id. 249. Id. at 2. Adams reported that information stored on the card and capable of being passed back through EMV includes information relevant to prior efforts to misappropriate the card and the authorization process such as evidence that data authentication, script processing, or authorization request cryptogram verification has failed. Id. Card data also would show repeated uses at untended terminals. Id. Some of the data that the card can send pertain to offline transactions, which Adams reported are “particularly prone to fraud.” Id. 150 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 States250 than in Europe251 and the absence of EMV chips is an obstacle to U.S.-based consumers using their cards for international travel.252 Among the issues that may work against broader-scale deployment in the U.S. are the costs of the readers253 for EMV cards and concerns that full-deployment of the cards featured could implicate privacy concerns.254 CONCLUSION The cost and extent of payments-related data security breaches have been rising in the United States.255 Legislation to curb data security breaches and to enhance enforcement of federal laws that have emanated recently from the Committee on the Judiciary in the House of Representatives and the Senate Committees on the Judiciary, Homeland Security, and Commerce, Science and Technology offer promise. These bills are steps in the right direction but they still suffer from the jurisdictional limitations under which the Senate Committees in particular 250. See Chips Cards in the U.S., THE NILSON REPORT ISSUE 930, at 6 (July 2009) (explaining most U.S. issuers will have EMV-compliant chip cards available by the end of 2010 with plans to market them to upscale frequent international travelers). The slow adoption of chip-and-PIN technology has made it harder for individuals with credit cards issued in the U.S. to use them abroad. See Michelle Higgins, For Americans, Plastic Buys Less, N.Y. TIMES, Oct. 4, 2009, at TR3 (explaining that 22 countries including “much of Europe, Mexico, Brazil, and Japan, have adopted the technology” and that another 50 countries are “in various stages of migrating to the technology in the next two years, including China, India, and most of Latin America”). In addition, Ms. Higgins reported that as Canada deploys this technology issuers there “plan[] to stop accepting magnetic stripe debit cards at A.T.M.s after 2012 and at point-of-sale terminals after 2015.” Id. For more information on Canada’s movement to chip-and-PIN technology, see Canada’s Migration to Chip, EMV CANADA, http://www.emvcanada.com/merchant_documents/ background.pdf (last visited Dec. 30, 2010). EMVCanada is a web site provided by ACT Canada, a non-profit organization, to provide a neutral forum for consumers, merchants, and the media to learn and share information related to secure payments. Id. 251. See Brandon Glenn, Visa Hopes European Unit Can Give More Flexibility to Customers, IRISH TIMES, May 7, 2004, at 58 (discussing the introduction of chip-and-PIN systems throughout Europe). 252. EMV Chip Cards Expected for Upscale U.S. Cardholders, SMART CARD ALLIANCE, http://www.smartcardalliance.org/resources/pdf/EMV_Cards_Issued_in_US.pdf (last visited Sept. 22, 2010). 253. See Dan Balaban, Turning the Corner, CARD TECH., Nov. 1, 2005, at 42 (reporting on the slow roll-out of readers across Europe). 254. Adams, supra note 243, at 2–3 (discussing the capacity to build a “detailed user profile”). Chipped cards are capable of holding significant amounts of personal data, such as passport and driver’s license information, health records, and medical histories. See Fundamentals of EMV Chip: The Next Revolution: The Payment Environment Is Quickly Changing. Are You Ready to Make Contact in this Brave New World?, INSIGHTS, Winter 2006, at 4, available at http://www.mastercard.com/ca/wce/PDF/14049_Insights2006-Fundamentals-EN.pdf [hereinafter Fundamentals of EMV Chip]. 255. See PONEMON INSTITUTE, supra note 23, at 4. For a more comprehensive discussion of card payment fraud, particularly its potential for damage and increases in fraud, see Richard J. Sullivan, The Changing Nature of U.S. Card Payment Fraud: Industry and Public Policy Options, FED. RESERVE BANK OF KANSAS CITY ECON. REV., 2Q 2010, at 101. 2010] Payment Data Security Breaches and Oil Spills 151 operate.256 These jurisdictional limitations caused the current gaps in data security left by GLBA,257 FACTA,258 and HIPAA.259 Thus, the more recent bills described in this paper—apart from S. 773—focus on “data brokers,” commercial entities whose primary role is to collect and sell posttransaction information including personally identifiable information, as opposed to persons who themselves engaged in transactions with consumers whose personal and account information is the target of thieves or those already are governed as “consumer reporting agencies” by the Fair Credit Reporting Act and FACTA.260 These bills will impose on data brokers particular federal requirements, but will leave them unconnected legally to end users, that is, the consumers or businesses whose transaction information they have obtained will still be without legal recourse against the entity that was holding their data at the time of the breach.261 For this reason, the lack of a unified regulatory regime operating on an end-to-end basis leaves the door open to future database hacking because of decisions such as that by the Supreme Judicial Court of Massachusetts in Cumis Insurance Society, Inc. v. BJ’s Wholesale Club, Inc.262 Moreover, Congressional bills, such as H.R. 2221 and S. 1490, which grant a safe harbor from prosecution for violations of their requirements, including the requirement to notify affected individuals if the data are encrypted or the entity uses other “best practices” to bolster the benefits of encryption, are likely to leave a lot of account data and other personally identifiable information without sufficient protection.263 256. For example, it apparently is much more difficult in the Senate to take up a subject or to propose a law governing an industry that lies partly in the jurisdiction of another committee. Thus, each committee drafts legislation uniquely aimed at solutions to issues within its own purview, often leaving associated issues unresolved for jurisdictional reasons. Senate Committees, U.S. SENATE, http://www.senate.gov/artandhistory/history/common/briefing/Committees.htm (last visited Oct. 2, 2010). 257. Gramm-Leach-Bliley Act, Pub. L. No. 106-102, 113 Stat. 1338 (1999). 258. Fair and Accurate Credit Transactions Act of 2003, Pub. L. No. 108-159, 117 Stat. 1952. 259. Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191, 110 Stat. 1936 (codified in scattered sections of 16, 26, 29, 42 U.S.C.). 260. Fair Credit Reporting Act, 15 U.S.C. § 1681a(f) (2006). The term ‘consumer reporting agency’ means any person which, for monetary fees, dues, or on a cooperative nonprofit basis, regularly engages in whole or in part in the practice of assembling or evaluating consumer credit information or other information on consumers for the purpose of furnishing consumer reports to third parties, and which uses any means or facility of interstate commerce for the purpose of preparing or furnishing consumer reports. Id. 261. See supra text accompanying notes 149–194. 262. Cumis Ins. Soc’y, Inc. v. BJ’s Wholesale Club, Inc. 918 N.E.2d 36, 46–47, 50–51 (Mass. 2009). 263. See Data Accountability and Trust Act, H.R. 2221, 111th Cong. § 3 (as passed by House, Dec. 8, 2009); Personal Data Privacy and Security Act of 2009, S. 1490, 111th Cong. § 311 (as reported by S. Comm., Nov. 5, 2009). 152 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 The current enacted and proposed legislation addresses many of the similarities between data spills and maritime accidents. But, unfortunately, many of our data security efforts to date seem to miss the most critical distinction between legal schemes for the prevention of pollution from maritime accidents and other legal prevention schemes: that paymentsrelated data security breaches are different from the hazards of maritime activities. It is important to remember Roland Trope’s highly useful observation that it is easier for ships to avoid encounters with charted rocks and shallow waters than with shifting sand bars.264 The former do not move. Sand bars move, and their movement may be accelerated by storms and other weather conditions. But even sand bars are better known risks than data-security attacks. Sand bars and other natural maritime risks move much less frequently and normally with more predictability than does the capacity, indeed the determination and artistry, of individuals determined to penetrate databases or to intercept real-time exchanges of payments-related data. Maritime accidents fall into two categories—collisions between two ships, or accidents involving the oil-and-gas exploration or the operation of deepwater ports, which are primarily the result of operator negligence, on the one hand, and groundings or collisions with rocks, sand bars and shoals, and other inherent sea hazards.265 Payments data security breaches seem more closely associated with the former category because cost-cutting and inadequate risk assessments by private actors contribute to disasters with broad-reaching implications, as the Deepwater Horizon explosion and spill tragically demonstrated.266 But payments-related data spills are even harder to prevent because, unlike events caused by storms, negligence, or merely bad choices, data security breaches are perpetrated by determined individuals who are constantly exploring new methods of getting access to data and systems they need to engage in crimes. Thus, in payments-data security, the “terrain”-based threats seem to be subject to even more constant changes than are sand bar risks to maritime activities. Like MARPOL and the associated compensation conventions—such as Civil Liability 1992 and Fund 1992, and their predecessors267—we should make data protection a dynamic process that receives persistent attention, specifically by rethinking and restructuring it as new means of safeguarding against data protection penetration as administrative, technical, and physical safeguards come into being. Encryption is one of the technical safeguards 264. Interview with Roland Trope, supra note 147. 265. See supra text accompanying notes 139–146; see also Graham Mapplebeck, Int’l Mar. Org., Navigational Safety and the Challenges of Electronic Navigation (Feb. 14, 2008) (transcript available at https://www.imo.org/includes/blastDataOnly.asp/data_id%3D21091/Navigation alsafety.pdf). 266. See Achenbach & Hilzenrath, supra note 39. 267. See supra text accompanying notes 98–133. 2010] Payment Data Security Breaches and Oil Spills 153 that should be part of this process, but it alone is insufficient to protect data, counter-parties, or consumers. Moreover, despite traditional and appropriate reluctance in this country to require that certain technologies be employed, developments elsewhere may make the use of specific technologies, comparable to the double-hull requirement in MARPOL,268 mandatory. For example, with EMV increasingly in use in the EU and Canada, it may only be a matter of time before EMV is more widely used here by credit and debit card issuers. However, while EMV technologies can contribute to greater fraud prevention, they do not yield 100% protection from fraud269—and their protection may come at the price of consumer/user privacy.270 Third, despite the widespread damage that a maritime accident may create, the causes and effects of data spills are much less localized than the effects of typical maritime accidents. Data security breaches of a system in one part of the world—such as the penetration of Royal Bank of Scotland’s WorldPay system and the rapid subsequent withdrawals at ATMs in fortynine countries271—affect payments systems in other parts of the world.272 Fourth, Congress and the states have crafted legislation that addresses consumer concerns more than actual prevention of payments data spills. With the exception of S. 773, the other bills discussed in this Article require consumer notification once the spill has occurred if the owners’ assessments of the number of consumers affected exceed specified thresholds and also address certain limited law enforcement concerns.273 But they generally leave risk-assessment and choices of administrative, technical, and physical safeguards for systems and data to the private actors involved. Consumers in a breach-prone environment are a lot like birds, fish, and other animals whose habitats are affected by spills of hazardous substances they did not cause. They often lack the ability to protect themselves. However, in the data security environment, consumers with access to information concerning data spill events may be better able to thwart additional damages to their financial well-being such as identity theft and credit-rating damage. However, at this time in the United States, as 268. 269. 270. 271. Revised Annex 1 of MARPOL 73/78, supra note 105. Adams, supra note 243, at 1. Fundamentals of EMV Chip, supra note 254, at 4. See Part I.A.1; see also Ashford, supra note 70; Espiner, supra note 65; Lemos, supra note 66. 272. Lemos, supra note 66 (persons acting in concert with the hackers were located in fortynine cities around the world and accessed roughly 130 ATM’s in their respective areas to carry out the last phase of this payments fraud). In the longer-standing attack announced by the FTC in February, the perpetrators used multiple command and control centers around the world to manage their money movements. Robert McMillan, SEC, FTC Investigating Heartland After Data Theft, PCWORLD (Feb. 25, 2009, 6:10 PM), http://www.pcworld.com/businesscenter/article /160264/sec_ftc_investigating_heartland_after_data_theft.html. 273. See supra text accompanying notes 163–198. 154 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 described in this Article, there is no standard requirement for disclosure, and in some states disclosure is limited to large-scale data spills, such as the 6-million-payments-card processed-per-year threshold in Washington State’s H. 1149.274 Even consumers who might consider switching to new providers or to other retailers after a data-spill event affected their former provider or favorite grocery chain, there are few guarantees that the security systems that their new providers employ are any less vulnerable to a breach than their former providers’ systems were. Similarly, some data spills cause other providers’ systems to become infected, in a manner like Deep Water Horizon or the Exxon Valdez in which oil spread away from the primary location.275 Accordingly, entities that own or possess payments data should receive legal or other financial incentives to employ ever-strengthening administrative, technical, and physical protections for data related to consumer deposit accounts, credit cards, debit cards, and other prepaid cards, as well as for other types of financial accounts such as insurance and securities. And there should be adequate legal consequences of failing these duties to maintain adequate safeguards beyond those already codified such as the rules implementing GLBA, FACTA, and other federal statutes and rules, including appropriate private rights of action provided by relevant federal statutes or fines as the OPA allows.276 As EMV/chip-and-PIN technologies deploy around us,277 they probably will become the standards for retail payments security. EMV and PCI DSS are different solutions to these issues, employed in different nations, to protect the integrity of card-based payments. EMV and PCI DSS represent different philosophies for providing protection on the order of MARPOL’s double-hulled ship scheme. However, employing some security technology such as EMV imposes a real trade off in the form of privacy, because the technology can retain more information about purchasing habits than other card systems retain on the card itself.278 This does not present the same types of concerns in Canada or the EU as it may in the U.S. because of the restrictions on trading the types of information that EMV technologies and other payment card transactional records may contain. This concern would grow larger if legislation such as S. 773 is enacted because it grants openended access to information to the Secretary of Commerce, without mention of any restrictions on retention or other use of the information unconnected with prosecution and resolution of the data security breach.279 Thus, it could 274. 2010 H.B. 1149, 2010 Leg., 61st Sess. (Wash. 2010), amending WASH REV. CODE § 19.225.RCW (2010). 275. See supra Part III. 276. See supra text accompanying notes 42–55. 277. Deployments in Canada and Mexico are considerably ahead of deployment in the U.S. See EMV Chip Cards Expected for Upscale U.S. Cardholders, supra note 252, at 1 n. 5. 278. Fundamentals of EMV Chip, supra note 254. 279. See Cybersecurity Act of 2009, S. 773, 111th Cong. § 14(b) (2009). 2010] Payment Data Security Breaches and Oil Spills 155 enable a vast warehousing of payments transaction data by Commerce without protections already applicable to other government data requests or collection.280 Among the solutions discussed in this Article, the types of cyber warranties that Mr. Trope and Professor Moringiello have advocated are attractive so long as they cannot be disclaimed, depriving end users and consumers of their protections. New data security warranties could be enacted at the state level, or by Congress, or could form part of a MARPOL-like multilateral approach with its prescriptive regulation of aspects of accident prevention and intentional shipping discharges of oil and other pollutants—such as its double-hull and operational requirements, as well as its additional operational requirements or “penalties” on ships that do not comply.281 MARPOL’s requirement of notice of spills and discharges to a central agency is similar to proposals in Congress that require notice to the U.S. Secret Service.282 Notice allows a government authority to monitor recovery processes and to coordinate law enforcement resources as needed. However, in terms of compensation for victims of shipping spills and discharges and oil-and-gas exploration accidents, neither MARPOL nor the Oil Liability provisions of the Clean Water Act offers optimal solutions for the payments data security breach arena for at least two reasons. First, unlike shipping or exploration events that are unlikely to repeat themselves, payments data breaches may recur or thieves may use and/or resell the information they obtain. Second, once liability limits are enacted in statutes or agreed to in treaties or conventions, they are difficult to raise.283 Enabling stronger deterrence of, and finding means of resolving payments data security breaches when they occur, is vitally important to the integrity of the payments system and to individuals’ trust of it. We should strive for more seamless recovery methods than are currently available in 280. Id. (“The Secretary of Commerce—(1) shall have access to all relevant data . . . without regard to any provision of law, regulation, rule, or policy restricting such access.”). 281. Revised Annex I of MARPOL 73/78, supra note 105. 282. Data Privacy and Security Act of 2009, S. 1490, 111th Cong. § 316 (as reported by S. Comm., Nov. 5, 2009); see also S. REP. NO. 111-110, at 5 (2009) (“[T]he bill also requires that business entities and Federal agencies notify the Secret Service of a data security breach within 14 days of the occurrence of the breach.”). 283. E.g., Mailtland, supra note 102, at 51. As an example of how long a ceiling or floor stays in a federal statute, consider the Truth in Lending Act, 15 U.S.C. §§ 1601–1693r (2006). Since its original enactment in 1968, it has exempted transactions in which the total amount financed exceeds $25,000. Id. § 1603(3); see also id. § 1601. Certainly, $25,000 bought a lot more in 1968 than it would today. In the oil spill context, Senator Lautenberg of New Jersey has introduced legislation that would phase out federal liability limits for oil spills from single-hulled tankers and raise liability limits for oil spills overall. See, e.g., Coast Guard and Maritime Transportation Act of 2006, Pub. L. No. 109-241, 120 Stat. 516, § 603. For additional discussion of Senator Lautenberg’s efforts, see Senator Lautenberg—Naval Architect?, supra note 209. 156 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 the U.S., through regulatory or private litigation.284 The movement from a private claims process conducted by BP for persons whose employment was adversely affected as a result of the Deepwater Horizon oil spill to a federal claims czar overseeing the claims—such as Kenneth Feinberg’s Deepwater Horizon and 9/11 Claims processes285—suggests a model for claims resolution outside the court system at the election of the claimant.286 Such claims processes are particularly important in cases in which there may be thousands of similarly situated claimants as well as those cases in which the claimant is unlikely to be able to access the technical expertise necessary to pursue his claims apart from the option of class actions. A rigorous claims procedure also would protect the entity experiencing the breach in the same manner that the alleged tortfeasor is protected by the “economic loss doctrine” barring recovery to claimants that cannot demonstrate actual damages.287 Payments data security is increasingly vital to the economy and to national security. After the 2010 Cyber Shock Wave simulation,288 the former director of the National Security Agency during the Clinton Administration argued that the government needs more capacity to deal with cyber security events and strategies as well as the ability to work cooperatively with the private sector.289 Only two of the federal bills analyzed in this Article—H.R. 2221 and S. 773—address strategic payments and non-payments security issues, such as malicious and strategic cyber attacks on infrastructure in the payments, utilities, and telecommunications areas in the U.S. This is accomplished through their grants of authority to order sequestration of systems that are compromised or that threaten other systems and infrastructures.290 We also may need to impose stronger requirements on companies who have had more than one data security breach, such as ChoicePoint. And, finally, we can hope that 284. See, e.g., Pisciotta v. Old Nat’l Bancorp, 499 F.3d 629, 637 (7th Cir. 2007); Cumis Ins. Soc’y, Inc. v. BJ’s Wholesale Club, Inc., 918 N.E.2d 36, 46–47, 50–51 (Mass. 2009) (denying recovery on a third-party beneficiary basis). 285. See Matthew Jaffe, Ken Feinberg Named BP Oil Spill Escrow Pay Czar, ABC NEWS, June 17, 2010, http://abcnews.go.com/Business/bp-gulf-oil-spill-ken-feinberg-appointedhead/story ?id=10933766; see also Laurel Brubaker Calkins, BP Spill Claims Process Inadequate, Too Slow, Fishermen Tell Federal Judge, BLOOMBERG NEWS, May 21, 2010, http://www.bloomberg.com/ news/2010-05-21/bp-spill-claims-process-inadequate-too-slow-fishermen-tell-federal-judge.html; Leigh Coleman, BP Stalls Payments to Oil Spill Victims: Feinberg, REUTERS, July 24, 2010, available at http://www.reuters.com/article/idUSTRE66N15020100724. 286. See, e.g., Mireya Navarro, Deal is Reached on Health Care Costs of 9/11 Workers, N.Y. TIMES, Mar. 12, 2010, at A1 (describing option to pursue individual claims in court, which few heirs of the victims of the 9/11 attacks took). 287. See, e.g., In re TJX Cos. Retail Sec. Breach Litig., 564 F.3d 489, 498–99 (1st Cir. 2009); Banknorth, N.A., v. BJ’s Wholesale Club, Inc., 394 F. Supp. 2d 283, 286–87 (D. Me. 2005). 288. See Mike McConnell, To Win the Cyber-War, Look to the Cold War, WASH. POST, Feb. 28, 2010, at B1. 289. Id. 290. Cybersecurity Act of 2009, S. 773, 111th Cong. § 18(2), (6) (2009). 2010] Payment Data Security Breaches and Oil Spills 157 multilateral organizations in the payments industry can play a stronger role than they have so far in framing for payments data protection functional equivalents of MARPOL’s double-hulled vessels and other operational restrictions. With the growing evidence of the cross-border implications of data spills, we would also do well to consider the benefits of international cooperation—recognizing, as Melissa Hathaway, former acting senior director for cyberspace for the National Security and Homeland Security Councils did, that the U.S. “‘cannot succeed in securing cyberspace if it works in isolation.’”291 291. Steve Rangor, Cyber Security: War Games or Mission Impossible?, ZDNet (Apr. 27, 2009), http://www.zdnetasia.com/cybersecurity-war-games-or-mission-impossible-62053582.htm (quoting Hathaway’s speech at the 2009 RSA Conference in San Francisco). NOTES CREDIT CARD ACCOUNTABILITY, RESPONSIBILITY AND DISCLOSURE ACT OF 2009: PROTECTING YOUNG CONSUMERS OR IMPINGING ON THEIR FINANCIAL FREEDOM? INTRODUCTION There are an estimated 1.22 billion credit cards in the United States.1 The average adult has about five credit cards.2 This increased use of credit has led to substantial debt and an increase in bankruptcy filings across the nation.3 College students are not immune to this trend.4 Although reports vary on the number of college students with credit cards, students are a well known market for credit card issuers.5 According to a 2001 Government Accountability Office (GAO) Report, almost “two-thirds of all college students had at least one credit card . . . .”6 In fact, of the nearly 9.9 million students currently enrolled at four-year colleges, each has an average of 2.8 cards.7 Estimates of credit card debt upon graduation range from $2,2008 to 1. Press Release, Wisconsin Public Interest Research Group, Sen. Kohl et al., WISPIRG Advocate Student Credit Card Reform Proposals (Apr. 7, 2009), http://www.wispirg.org/newsreleases/consumer-protection/consumer-protection-news/sen.-kohl-reps.-hintz-and-hixson-wispirg -advocate-student-credit-card-reform-proposals (citing CardTrack.com) [hereinafter WISPIRG]. 2. U.S. PUB. INTEREST RESEARCH GROUP EDUC. FUND, THE CAMPUS CREDIT CARD TRAP: A SURVEY OF COLLEGE STUDENTS AND CREDIT CARD MARKETING 1 (Mar. 2008), available at http://cdn.publicinterestnetwork.org/assets/x-3Q-0RsKNbZtwOKzK1-dA/AZ-Campus-CreditCard-Trap-Report.pdf (citing THE FEDERAL RESERVE BOARD OF GOVERNORS, REPORT TO THE CONGRESS ON THE PROFITABILITY OF CREDIT CARD OPERATIONS OF DEPOSITORY INSTITUTIONS (July 2007)) [hereinafter CAMPUS CREDIT CARD TRAP]. 3. Wayne Jekot, Note, Over the Limit: The Case for Increased Regulation of Credit Cards for College Students, 5 CONN. PUB. INT. L.J. 109, 113–14 (2005). 4. In the time between initially writing this note and its subsequent publication, Regina L. Hinson published Credit Card Reform Goes to College in the North Carolina Banking Institute. Regina L. Hinson, Note, Credit Card Reform Goes to College, 14 N.C. BANKING INST. 287 (2010). While both notes discuss flaws in the Act, the theses and approaches to the material differ in salient ways. Hinson addresses, among other things, the Act’s failure to regulate underage consumers’ spending habits (such as maximum credit limit and number of cards issued) and discusses how earlier versions of the Act would have required underage consumers to attend a financial literacy course prior to obtaining a credit card. Id. at 303–08. This note, rather, focuses on the general lack of protections for student data, discusses the impact on the rights of young consumers in depth, and suggests potential alternatives for dealing with the underlying issues facing young consumers. See infra Part III–IV. 5. Jekot, supra note 4, at 112–13. 6. U.S. GOV’T ACCOUNTABILITY OFFICE, GAO-01-773, CONSUMER FINANCE: COLLEGE STUDENTS AND CREDIT CARDS 17 (June 2001), available at http://www.gao.gov/new.items/ d01773.pdf [hereinafter GAO REPORT]. 7. College Credit Card Statistics, U.C.M.S.COM, http://www.ucms.com/college-credit-cardstatistics.htm (last visited Nov. 20, 2010) (listing statistics on college marketing). 8. WISPIRG, supra note 1. 160 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 $4,100.9 It is no wonder that credit solicitors aggressively target this market. As Senator Tom Carper (D-DE) stated, “[t]hey wallpaper all of those college hallways with credit cards because if you can get someone at that age to start using credit cards with your company, then you have got them for a long period of time.”10 In fact, more than 70% of students keep their first credit card.11 This provides a powerful incentive for the credit card industry. There have been several attempts by colleges and universities,12 state attorneys general,13 and state legislators to address this issue.14 However, only recently did Congress pass reform legislation that targets credit card marketing on college campuses and offers protections for students. The Credit Card Accountability, Responsibility and Disclosure Act of 2009 (Credit CARD Act or the Act)15 was intended as general credit reform legislation geared toward assisting those in debt and stopping abusive tactics of the credit card industry.16 The Act also specifically addresses young consumers. In Title III, the Act places a number of restrictions on extending credit to consumers under twenty-one, limits the ability of credit card issuers to solicit students, and adds protections for students from prescreened offers.17 The Act also places heavy disclosure requirements on institutions of higher education.18 This note argues that Title III is a huge step toward protecting young consumers and reigning in the credit card industry. The Act puts an end to a number of coercive and deceptive practices of credit issuers19 while pressuring universities to be more open and forthcoming regarding their 9. Anne Flaherty, Credit Reform Means New Era for College Students, ASSOCIATED PRESS, May 21, 2009, available at http://www.signonsandiego.com/news/2009/may/21/us-congresscredit-cards-052109/?education; Joshua Heckathorn, Credit CARD Act of 2009 Restricts Credit for Students, BROKEGRADSTUDENT.COM (Aug. 4, 2009), http://www.brokegradstudent.com/ credit-card-act-of-2009-restricts-credit-for-students. 10. Connie Prater & Tyler Metzger, A Guide to the Credit CARD Act of 2009, CREDITCARDS.COM (July 30, 2009), http://www.creditcards.com/credit-card-news/credit-cardlaw-interactive-1282.php (follow “Youth and credit” hyperlink; then follow “Under-21 college students” hyperlink) (quoting Senator Tom Carper). 11. College Credit Card Statistics, supra note 7. 12. Jonathan D. Glater, Extra Credit, N.Y. TIMES, Jan. 1, 2009, at B1. 13. CAMPUS CREDIT CARD TRAP, supra note 2, at 10. 14. Creola Johnson, Maxed Out College Students: A Call to Limit Credit Card Solicitations on College Campuses, 8 N.Y.U. J. LEGIS. & PUB. POL’Y 191, 255 (2004). 15. Credit CARD Act of 2009, Pub. L. No. 111-24, 123 Stat. 1734 (codified as amended in scattered sections of 15 U.S.C.). 16. See Ben Rooney, Credit Card Relief: Phase one: The First Part of Obama’s Crackdown on the Credit Card Industry Will Give Consumers More Notice When Contracts are Changed and the Option to Reject Rate Increases, CNNMONEY.COM, Aug. 20, 2009, http://money.cnn.com/ 2009/08/19/news/economy/credit_card_reform/?postversion=2009082004. 17. 15 U.S.C.A. §§ 1637(c), (p), (r), 1650(f), 1681b(c)(1)(B) (West 2010). 18. Id. § 1650(f). 19. See id. §§ 1637(p), 1650(f). 2010] Protecting Young Consumers 161 participation in the problem.20 However, this note will assert that Title III also creates several legal and policy problems in how it restricts young consumers and how alternative solutions may have provided more efficient and impactful ways of addressing the underlying problems. Part I of this note provides a brief overview of the marketing, soliciting, and lending practices of credit card companies on college campuses, the ramifications of student credit card debt, past attempts at reform, and the movement that led to the passing of the Credit CARD Act. Part II breaks down Title III of the Act and examines the rules and protections placed on young consumers and the institutions of higher education that they attend. Part III discusses the legal and policy ramifications of the Act, arguing that Title III severely curtails the financial autonomy of eighteen- to twenty-oneyear-olds, and falls short in protecting students from coercive marketing practices. Finally, Part IV suggests that the Act fails to solve the documented problems, and proposes alternative solutions that might better address the underlying issues. I. THE PROBLEM OF SOLICITING AND MARKETING PRACTICES BY CREDIT ISSUERS ON U.S. CAMPUSES Credit issuers flood college students with brochures, applications, advertisements, and freebies.21 As a result, 56% of students have their first card at age eighteen.22 By their final year, 91% have at least one credit card and 56% carry four or more cards.23 Credit issuers set up tables on campuses and outside school events in order to sell their products.24 This practice is so rampant that 76% of students have reported stopping at such tables to consider applying for credit cards.25 Most of the time students are enticed to stop at these tables by the offer of free gifts.26 The gifts are conditioned, however, on applications for cards.27 Once the cards are in the 20. See id. §§ 1637(r), 1650(f). 21. CAMPUS CREDIT CARD TRAP, supra note 2, at 2–4. 22. Jessica Dickler, Credit Card Debt on Campus: Unprepared Students Have Been Increasingly Targeted by Card Issuers, and Some Lawmakers are Taking Notice, CNNMONEY.COM, July 14, 2008, http://money.cnn.com/2008/07/10/pf/credit_cards_college/? postversion=2008071413 (citing data from Nellie Mae). 23. Id. 24. Lucy Lazarony, Marketing Plastic to Students Causes Lawmakers, Educators to Melt Down, BANKRATE.COM (June 21, 1999), http://www.bankrate.com/brm/news/cc/19990621.asp. 25. CAMPUS CREDIT CARD TRAP, supra note 2, at 3. 26. Id. at 3–4. 27. Id. Of the 76% of students who stop, 31% report being offered a free gift. Most common gifts are t-shirts (50%), other (40%), frisbee or sports toy (20%), and mug or water bottle (18%). The “other” was most commonly food. Id.; see also Amy Johannas, College Bound: Marketers Welcome, But Credit Card Companies Get a Warning Signal, PROMO (Aug. 1, 2008, 12:00 PM), http://promomagazine.com/eventmarketing/0801-companies-college-campaigns. ‘There is just this kind of crazy marketing atmosphere on campuses,’ [says Christine Lindstrom, the higher education program director for U.S. PIRG]. ‘It’s pretty easy 162 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 hands of the students, the issuers continually increase interest rates and employ high penalties, exacerbating the consequences of the original misguided judgment.28 The scene that awaits students is not a product of chance, nor is it solely due to credit issuers’ initiative. Indeed, universities have a stake in these exchanges and actively facilitate the marketers’ access to their students.29 Universities have multimillion-dollar deals with credit card companies.30 For example, “Michigan State [University] had a seven-year, $8.4 million contract with Bank of America during which MSU gave the bank information on students, alumni, sports ticket holders and employees.”31 In addition, many universities have affinity card agreements that allow the credit issuer to use the university’s name to market its cards.32 In exchange, the university receives a share of the profits from new accounts.33 This incentivizes the university to entice and indebt students with credit cards.34 Some, however, see the agreements between universities and credit card issuers as a win-win situation.35 Banks get ideal marketing opportunities, students get help paying the bills, and universities get an additional revenue source.36 when facing [a gift of] free pizza for a student to say, ‘Oh, I’ll just go ahead and get the card.’ That is a big problem.’ Id. 28. See WISPIRG, supra note 1. 29. Glater, supra note 12. 30. Flaherty, supra note 9. Bank of America is one of the biggest credit card issuers on college campuses. Glater, supra note 12. As of January 2009, the bank has agreements with about 700 colleges and alumni associations. Id. 31. Susan Tompor, Credit Cards to be Curbed at Colleges, DETROIT FREE PRESS, Aug. 27, 2009, http://www.freep.com/article/20090827/COL07/908270447/Credit-cards-to-be-curbed-atcolleges. Michigan State University even stands to receive additional money if the students who sign up carry a balance. Glater, supra note 12. According to the New York Times, Michigan State University gets “$3 for every card whose holder pays an annual fee, and a payment of a half percent of the amount of all retail purchases using the cards,” and “$3 if the holder has a balance at the end of the 12th month after opening an account.” Id. Additionally, the “alumni association of the University of Michigan is guaranteed $25.5 million” in exchange for “lists of names and addresses of students, faculty, alumni and holders of season tickets to athletic events” over an 11 year agreement with Bank of America. Id. 32. GAO REPORT, supra note 6, at 7. 33. E.g., Tompor, supra note 31. The profit from these contacts with credit issuers is so important to many universities that they have fought legislative reform. See, e.g., Joseph Kenny, College Fights to Preserve Student Credit Card Marketing, JSNET.ORG (Apr. 10, 2009), http://www.jsnet.org/news-article/college-fights-to-preserve-student-credit-card-marketing (describing Ohio State University’s fight against legislation that would limit their agreements with credit issuers). 34. See Ben Protess & Jeannette Neumann, As Student Credit Card Debt Rises, Banks Quietly Reward Schools, HUFFINGTON POST INVESTIGATIVE FUND (June 8, 2010, 8:01 AM), http://huffpostfund.org/stories/2010/06/student-credit-card-debt-rises-banks-quietly-rewardschools. 35. See Glater, supra note 12. 36. Id. 2010] Protecting Young Consumers 163 There are several reasons why the university campus is an ideal marketing setting for banks and credit card companies. First, most students are first time credit card users, making them a fresh market.37 Second, they constitute an isolated and easily identifiable market.38 Most college students live on or commute to a campus.39 Third, because they are relatively new consumers, they are more likely to be naïve to the practices of the credit card industry.40 Most students realize that they must build their credit because it will be a useful tool for future purchases.41 At the same time, they may not be educated in the nuances of how credit works.42 For example, a student may realize that he must pay the credit card company every month but may not understand what an annual percentage rate (APR) is or how it will affect his balance.43 Credit card issuers rely on this naiveté when they raise interest rates to increase their profits. Lastly, many students, like other consumers, keep and continue to use their first credit card.44 These factors lead to heavy soliciting of, and marketing to, college students on or near campuses.45 This heavy marketing is demonstrated by the twenty-five to fifty credit card solicitations students receive per semester.46 The solicitations take various forms, including tabling at school events, direct mail solicitations, and brochures in a variety of campus locations.47 A study conducted by the U.S. Public Interest Research Group reported that 80% of respondent students had received mail solicitations from credit card issuers and 22% “reported receiving an average of nearly four (3.6) [solicitation] phone calls per month . . . .”48 In a 2005 report, Ohio State University’s Creola Johnson described the scene set by credit card companies that awaits incoming freshmen as “a ‘carnival atmosphere’ of blaring music and free food . . . with glossy promotional brochures and loaded with free T-shirts, Frisbees and other 37. 38. 39. 40. Dickler, supra note 22. See CAMPUS CREDIT CARD TRAP, supra note 2, at 1. Id. See Laurie A. Lucas, Integrative Social Contracts Theory: Ethical Implications of Marketing Credit Cards to U.S. College Students, 38 AM. BUS. L.J. 413, 414–16, 422–24 (2001). 41. CAMPUS CREDIT CARD TRAP, supra note 2, at 1. 42. Lucas, supra note 40, at 414–16. 43. See generally Basic Facts About Credit Card Rates: Key Information Every Cardholder Should Know, BANK OF AMERICA, http://learn.bankofamerica.com/articles/managing-credit/ basic-facts-about-credit-card-rates.html (last visited Nov. 20, 2010) (describing the complexities in applying APR rates to credit card balances). 44. See CAMPUS CREDIT CARD TRAP, supra note 2, at 7 (detailing how credit card companies compete for college students to become their “first-in-the-wallet, top-of-the-wallet” card). 45. See id. at 2–4. 46. College Credit Card Statistics, supra note 7. 47. CAMPUS CREDIT CARD TRAP, supra note 2, at 2–4. 48. Id. at 4. 164 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 gifts to lure students into applying for credit cards.”49 Johnson goes on to explain that, “[c]ompany representatives do not talk about the interest rates or fees associated with the cards. Presumably, that information is contained in the brochures. Instead, the credit card vendors emphasize the free items and an easy way to buy clothes and books or pay for spring break vacations.”50 These practices have contributed to a documented increase in student credit card debt and financial management problems.51 Many critics also cite excessive credit lines for those who do not necessarily qualify as an additional source of the problem.52 Although introductory credit limits may be low, they can quickly rise to $2,000 or $4,000.53 In response, some universities are starting to rethink their policies and agreements with credit issuers.54 In recent years, there has been a big push from students and public advocates who oppose such aggressive marketing techniques on college campuses.55 Some universities have banned or greatly restricted the practice of soliciting on campus altogether56 while others have limited its scope and frequency.57 Along with the push for change from within the university, some state legislators are stepping in and trying to set limits on these practices. However, while statistics vary on the number of states with legislation specifically restricting marketing on campus, the number remains generally low.58 Texas, California, New York, and Oklahoma are among the few 49. Martin Merzer, Student Credit Card Issuers Losing Their Welcome on Campus: Relationship Between Banks, Colleges is Complex, CREDITCARDS.COM (Dec. 8, 2008), http://www.creditcards.com/credit-card-news/student-credit-card-issuers-losing-welcome-oncampus-1279.php. 50. Id. 51. See SALLIE MAE, HOW UNDERGRADUATE STUDENTS USE CREDIT CARDS: SALLIE MAE’S NATIONAL STUDY OF USAGE RATES AND TRENDS 2009, at 3 (Apr. 2009), available at http://www.salliemae.com/NR/rdonlyres/0BD600F1-9377-46EA-AB1F-6061FC763246/10744/ SLMCreditCardUsageStudy41309FINAL2.pdf [hereinafter SALLIE MAE STUDY]; see also Jekot, supra note 3, at 113–14; Johnson, supra note 14, at 206–19. 52. See, e.g., Tompor, supra note 31 (citing as an example a student who was given $25,000 even though he did not have a full-time job). 53. Jeanne Sahadi, Dad, Will You Pay My Visa?; That’s One Question Facing Parents of College Students Who’ve Racked Up Credit Card Debt, CNNMONEY.COM, Dec. 12, 2002, http://money.cnn.com/2002/12/10/commentary/everyday/sahadi (citing Robert Manning during his testimony before the U.S. Senate Committee on Banking, Housing and Urban Affairs). 54. GAO REPORT, supra note 6, at 25–29. 55. See generally id. at 27–29. 56. Id. at 25–27. 57. Id.; Johnson, supra note 14, at 195–96. For example, Ball State University, whose alumni association had a contract with a credit issuer, does not give out student information to marketers. Glater, supra note 12. Likewise, University of Oregon has a similar policy. Id. 58. Editorial, The College Credit Card Trap, N.Y. TIMES, Oct. 18, 2008, at A22 (“A halfdozen states have placed restrictions on how credit cards can be marketed at public colleges.”); Jon Chavez, Card Firms Lure Students; Experts Urge Crackdown, TOLEDO BLADE, Oct. 14, 2007, http://toledoblade.com/apps/pbcs.dll/article?AID=/20071014/BUSINESS04/71013025 (“About 15 states restrict or ban credit-card marketing to students on campus . . . .”); see also 2010] Protecting Young Consumers 165 states that have passed such laws.59 For example, the California law, passed in 2007, prohibits the exchange of gifts for applications.60 The New York statute (part of New York’s Education Law) is much broader.61 It prohibits marketing altogether, except as allowed by university policy.62 The law also makes suggestions for fair policies that schools could adopt.63 In addition to these state legislative reforms, several attorneys general have tried to initiate reform in credit marketing to college students. Several have opened investigations into the practices of credit card issuers on campuses.64 For example, in 2008, former New York Attorney General Andrew Cuomo investigated whether credit card marketers had offered money to universities in exchange for access and information on students.65 Likewise, the Ohio Attorney General sued Citibank, a credit card marketing company, and a sandwich shop over their alleged deceptive marketing to college students.66 On the federal level, there have been a number of congressional attempts to add protections for college students wishing to obtain credit.67 For example, the Consumer Credit Card Protection Amendments of 1999 (CCCPA) was introduced in the Senate and in the House of Representatives Tyler Metzger, Campus Credit Card Regulation Brewing . . . Again, CREDITCARDS.COM (Feb. 3, 2009), http://blogs.creditcards.com/2009/02/campus-credit-card-regulation-brewing.php (detailing proposed New Jersey bill). 59. Merzer, supra note 49. Maryland also passed legislation which “requires higher education institutions to develop practices regarding credit card marketing and the use of free gifts on campus.” Johannas, supra note 27. If the universities allow these practices, they must also provide additional educational credit information. Id. Another example is Tennessee, where state legislators passed a law that prohibits credit issuers from using student organizations or facilities in order to recruit applicants. Id. They are, however, allowed to do so at athletic events, but are banned from giving gifts in exchange for applications. Id. 60. College Student Credit Protection Act of 2007, Ch. 679, 2007 Cal. Stat. 262; Ashley Geren, Credit Card Death: Students Might Want to Think Twice Before Getting a Credit Card, THEROUNDUPNEWS.COM (Sept. 16, 2009), http://www.therounduponline.net/features/credit-carddeath-1.1878895. 61. See N.Y. EDUC. § 6437 (McKinney 2010). 62. Id. 63. Id. 64. CAMPUS CREDIT CARD TRAP, supra note 2, at 10. 65. Id. 66. Id. The Ohio Attorney General sued Citibank, Elite Marketing, and Potbelly Sandwiches for “‘unfair and deceptive’ marketing practices.” Johannas, supra note 27. The Attorney General alleged that “students visited local restaurants for free food, only to find out they had to apply for a credit card to receive it.” Id. The case has been partially settled. Id. As part of the settlement, Potbelly agreed to give out coupons for its products as an incentive to get students to watch a documentary on the credit industry. Id. 67. See Student Credit Card Protection Act of 2007, S. 1925, 110th Cong. (2007); College Student Credit Card Protection Act, H.R. 1208, 109th Cong. (2005); Credit Card Accountability Responsibility and Disclosure Act of 2004, S. 2755, 108th Cong. (2004); College Student Credit Card Protection Act, H.R. 184, 107th Cong. (2001); Credit Card Protection Amendments of 1999, S. 787, 106th Cong. (1999); Consumer Credit Card Protection Amendments of 1999, H.R. 900, 106th Cong. (1999). 166 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 in April and May of 1999, respectively.68 Like the Credit CARD Act of 2009, the CCCPA contained a provision mandating a consumer under twenty-one have a parent or guardian co-signer or to have an independent means of repaying their credit card debt.69 Despite several attempts in both the House and Senate, including the CCCPA, credit reform for college students had not passed into law.70 However, things in Washington changed with the 2008 election.71 President Obama made consumer protection a part of his campaign.72 Amid a climate of foreclosures and high debt, Obama pushed for reform in several industries, including the credit card sector.73 In the White House press release announcing the Credit CARD Act, President Obama tied the new law into his larger economic recovery plans.74 With the turbulent changes in the economy, the shift in Washington, and new support for major credit reform, the Credit CARD Act survived the legislative process and passed into law.75 II. PROTECTIONS PROVIDED BY THE CREDIT CARD ACT In January 2009, Representative Carolyn B. Maloney (D-NY) introduced H.R. 627, which would later form the basis for the Credit CARD Act.76 H.R. 627 was intended to amend the Truth in Lending Act77 and the Fair Credit Reporting Act (FRCA)78 in order to “establish fair and transparent practices relating to the extension of credit under an open end 68. Todd Starr Palmer, Mary Beth Pinto & Diane H. Parente, College Students’ Credit Card Debt and the Role of Parental Involvement: Implications for Public Policy, 20 J. PUB. POL’Y & MARKETING 105, 106 (Spring 2001). 69. H. R. 900 § 7; S. 787 § 7; 15 U.S.C.A. 1637(c) (West 2010). 70. Kimberly Gartner & Elizabeth Schiltz, What’s Your Score? Educating College Students About Credit Card Debt, 24 ST. LOUIS U. PUB. L. REV. 401, 408–09 (2005); see also Johnson, supra note 14, at 254–56. 71. See Philip Elliott, Obama Signs Law Curbing Surprise Credit Card Fees, ASSOCIATED PRESS, May 22, 2009, available at http://www.huffingtonpost.com/2009/05/22/obama-signs-lawcurbing-s_n_206944.html. 72. Press Release, The White House, Fact Sheet: Reforms to Protect American Credit Card Holders (May 22, 2009), http://www.whitehouse.gov/the_press_office/Fact-Sheet-Reforms-toProtect-American-Credit-Card-Holders [hereinafter White House Press Release]. 73. See Elliott, supra note 71. 74. See White House Press Release, supra note 72 (“‘With this new law, consumers will have the strong and reliable protections they deserve. We will continue to press for reform that is built on transparency, accountability, and mutual responsibility—values fundamental to the new foundation we seek to build for our economy.’”). 75. See id. 76. Bill Summary & Status: 111th Congress (2009-2010): H.R. 627: All Congressional Actions with Amendments, LIBRARY OF CONGRESS, http://thomas.loc.gov/cgi-bin/bdquery/ z?d111:HR00627:@@@S (listing Rep. Maloney as the sponsor of the bill H.R. 627 that ultimately became the Credit CARD Act). 77. Truth in Lending Act, 15 U.S.C. §§ 1601–1667f (2006). 78. Fair Credit Reporting Act, 15 U.S.C. §§ 1681–1681x (2006). 2010] Protecting Young Consumers 167 consumer credit plan, and for other purposes.”79 It became public law on May 22, 2009 when President Obama, in a Rose Garden ceremony, signed the bill.80 The Act covers general consumer protection, enhanced consumer disclosures, protection of young consumers, gift cards, and other miscellaneous items.81 Title III of the Act is devoted exclusively to protecting young consumers and is broken down into five sections. The first section of Title III amends the Truth in Lending Act by limiting the “extension of credit to underage consumers.”82 Section 301 prohibits the issuance of a credit card or open end credit plan to a consumer under the age twenty-one83 unless the application for that consumer contains a signature of a co-signer84 or financial information indicating means of repayment.85 According to the Act, the co-signer can be a “parent, legal guardian, spouse, or any other individual” twenty-one-years-of-age or older.86 The co-signer must have the “means to repay the debts” of the consumer and will be considered jointly liable for that debt.87 However, the co-signer is only liable for the debt incurred before the consumer has reached the age of twenty-one.88 Alternatively, absent a viable co-signer, a credit card applicant under the age of twenty-one may demonstrate an “independent means of repaying any obligation arising from the proposed extension of credit . . . .”89 The text does not give much explanation as to what “means” would qualify under this provision. It only requires that the consumer submit such financial information through the application or otherwise.90 Section 301(C) tasks the Board of Governors of the Federal Reserve System (the Board) with issuing regulations outlining the standards required to satisfy subparagraph (B)(ii).91 The Board usually issues clarifications on 79. 80. 81. 82. Credit CARD Act of 2009, H.R. 627, 111th Cong. (2009). Elliott, supra note 71. Credit CARD Act of 2009, Pub. L. No.111-24, 123 Stat. 1734 (2009). 15 U.S.C.A. § 1637(c) (West 2010) (implying that the use of the word “underage” applies to consumers under the age of twenty-one). 83. Id. § 1637(c)(8)(A). 84. Id. § 1637(c)(8)(B)(i). 85. Id. § 1637(c)(8)(B)(ii). 86. Id. § 1637(c)(8)(B)(i). 87. Id. 88. Id. 89. Id. § 1637(c)(8)(B)(ii). 90. Id. 91. Id. § 1637(c)(8)(C). The regulations, over 800 pages, detail what credit card issuers must do to grant or extend credit to all consumers covered under the Act. Connie Prater, Fed: Want a Credit Card? Prove You Can Pay the Bill, CREDITCARDS.COM (Sept. 30, 2009), http://www.creditcards.com/credit-card-news/credit-card-act-fed-income-rules-1282.php. The regulations also clarify several vague terms in the provisions dealing with young consumers, including “prohibited inducements,” “near campus,” “independent means of paying,” and cosigner requirements. Jay MacDonald, Fed: Credit Card Issuers, Stay Far Away From College Campus: Stay At Least 1,000 Feet Away, New Regulations State, CREDITCARDS.COM (Sept. 30, 168 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 the terms of a newly issued law,92 and it did so on September 28, 2009, providing examples of the type of information that would qualify as proof of an independent means of repaying.93 This included “expected salary, wages, bonus pay, tips and commissions” for any type of employment, “interest or dividends, retirement benefits, public assistance, alimony, child support, or separate maintenance payments,” or “savings accounts or investments that the consumer can or will be able to use.”94 These provisions likely limit the number of college students under age twenty-one who could qualify.95 It is unclear, however, how strictly credit issuers must adhere to this “proof” standard.96 The Act further provides that even once a student has been issued a credit card, the co-signer, if jointly liable for a consumer under twenty-one, must approve any increase to the credit line for that consumer.97 By amending § 127 of the Truth in Lending Act,98 § 303 of the Credit CARD Act restricts young consumers beyond the application process.99 It places an additional hurdle for eighteen- to twenty-one-year-olds to obtain and manage their credit by requiring that the co-signer approve the credit increase. To stem the flow of solicitations on college campuses, Congress included protections from prescreened offers as well as restrictions on the distribution of promotional items. Title III, § 302 amends § 604(c)(1)(B) of the FRCA100 to include restrictions on prescreened credit offers to consumers under twenty-one.101 This section provides that credit reporting agencies can furnish credit reports for offers of credit only if the consumer is over twenty-one or has consented to the disclosure.102 In other words, except for eighteen- to twenty-one-year-olds who have consented to the 2009), http://www.creditcards.com/credit-card-news/student-credit-card-rules-1279.php. This is discussed infra Part III. 92. MacDonald, supra note 91. 93. Truth in Lending Proposed Rule, 74 Fed. Reg. 54,125, 54,313 (Oct. 21, 2009) (to be codified at 12 C.F.R. pt. 226). 94. Id. 95. See generally Prater, supra note 91. See also Brian Burnsed, New Rules Place Barriers Between Students, Credit Card Issuers, US NEWS & WORLD REP., Feb. 19, 2010, http://www.usnews.com/articles/education/best-colleges/2010/02/19/new-rules-place-barriersbetween-students-credit-card-issuers.html. 96. See generally MacDonald, supra note 91 (explaining the Federal Reserve’s clarifications but noting the failure to clarify certain aspects of the Act); see also Prater, supra note 91 (failing to specify what reasonable policy or procedure might entail). 97. 15 U.S.C.A. § 1637(p) (West 2010). 98. Truth in Lending Act § 127, 15 U.S.C. § 1637(c) (2006). 99. 15 U.S.C.A. § 1637(p). 100. Fair Credit Reporting Act § 604, 15 U.S.C. § 1681b(c)(1)(B) (2006). 101. 15 U.S.C.A § 1681b(c)(1)(B)(2)(iv) (West 2010). 102. Id. 2010] Protecting Young Consumers 169 disclosure of their credit report for offers of credit, the automatic flood of mailings that bombard college freshman should theoretically start to ebb.103 The Act also adds protection from solicitations by proscribing physical inducements in exchange for applications.104 Section 304(f)(2) prohibits creditors from offering “tangible item[s]” to college students in exchange for a credit card application.105 However, this prohibition is limited to offers made on or near campus or at a school-sponsored event.106 In its clarifications of the Act, the Board gave examples of what types of inducements would be prohibited.107 The Act proscribes the use of tangible items, such as a “gift card, a T-shirt, or magazine subscription” in exchange for filled applications, but does not prohibit “non-physical items” like “discounts, reward points, or promotional credit terms.”108 Not only is the type of item an important distinguishing factor in determining the legality of a practice, but the agreement must indeed be a quid pro quo.109 If the items are given out freely regardless of whether applications are in fact being filled out, then it would seem the Act does not apply.110 The Board’s regulations also specify that “near campus” is defined as “within 1,000 feet of the border of the campus of an institution of higher education . . . .”111 The borders should be determined by the institution.112 The prohibition against promotions near campus also extends to related events, including any event in which the institution’s name or logo is used in connection with the event so as to imply the institution’s sponsorship.113 In this way, § 304 potentially covers an expansive area on or near campus. Besides the limitations specifically outlined in § 304, Congress also recommends that institutions of higher education adopt their own policies to help monitor and limit credit card marketing.114 It recommends that these institutions instruct credit issuers to notify them of the locations where marketing of credit cards will occur.115 Section 304 also recommends that schools limit the number of locations for marketing116 and offer debt counseling and education to new students.117 103. 104. 105. 106. 107. 108. See 15 U.S.C. § 1681b(c)(1)(B); see also Heckathorn, supra note 9. 15 U.S.C.A. § 1650(f)(2) (West 2010). Id. Id. MacDonald, supra note 91. Truth in Lending Proposed Rule, 74 Fed. Reg. 54,123, 54,127 (Oct. 21, 2009) (to be codified at 12 C.F.R. pt. 226). 109. See id. at 54,328. 110. MacDonald, supra note 91. 111. Truth in Lending Proposed Rule, 74 Fed. Reg. at 54,328; MacDonald, supra note 91. 112. Truth in Lending, 74 Fed. Reg. at 54,328; MacDonald, supra note 91. 113. Truth in Lending, 74 Fed. Reg. at 54,328; MacDonald, supra note 91. 114. 15 U.S.C.A. § 1650(f)(3) (West 2010). 115. Id. § 1650(f)(3)(A). 116. Id. § 1650(f)(3)(B). 117. Id. § 1650(f)(3)(C). 170 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 The final protection Title III provides is required disclosure of the contracts between universities and creditors.118 Institutions of higher education must “publicly disclose any contract or other agreement made with a card issuer or creditor for the purpose of marketing a credit card.”119 Likewise, the Act mandates reporting by each creditor who has any “business, marketing, and promotional agreements and college affinity card120 agreements with an institution of higher education.”121 The report must include the terms and conditions of any agreements between creditors and universities, including memoranda of understanding, amounts of payments between them, and the number of accounts covered by the agreement.122 Once creditors have submitted the reports to the Board, the Board will review them and submit an annual report to Congress and the public.123 Additionally, from time to time the Comptroller General of the United States is to review the Board’s reports, determine the impact of creditor agreements, and write a report recommending any needed action.124 The passage of Title III is a tacit recognition of the need to protect young consumers against the aggressive and deceptive practices of credit issuers. The Act finally puts an end to the exchange of gifts for applications.125 Prohibiting tangible inducements will limit the ability of marketers to get the attention of college students.126 In turn, only those truly interested in obtaining a credit card will likely approach a promotional table. Furthermore, the Act protects students from insidious pre-screened offers with which they are consistently bombarded.127 118. Id. §§ 1650(f)(1), 1637(r)(2)(A). 119. Id. § 1650(f)(1). 120. The Act defines college affinity card as a: [C]redit card issued by a credit card issuer under an open end consumer credit plan in conjunction with an agreement between the issuer and an institution of higher education, or an alumni organization or foundation affiliated with or related to such institution, under which such cards are issued to college students who have an affinity with the institution, organization and— (i) the creditor has agreed to donate a portion of the proceeds of the credit card to the institution . . . ; (ii) the creditor has agreed to offer discounted terms to the consumer; or (iii) the credit card bears the name, emblem, mascot, or logo of such institution . . . or other words, pictures, or symbols readily identifies with such institution, organization, or foundation. Id. § 1637(r)(1)(A). 121. Id. § 1637(r)(2)(A). 122. Id. § 1637(r)(2)(B)(i)–(iii). 123. Id. § 1637(r)(3). 124. Id. § 1637(r)(3)(B)(1)–(2). 125. Id. § 1650(f)(2). 126. See generally CAMPUS CREDIT CARD TRAP, supra note 2, at 13 (proposing “prohibit[ing] use of gifts in marketing on campus” as part of “fair campus credit card marketing principles”). 127. 15 U.S.C.A. 1681b(c)(1)(B) (West 2010). 2010] Protecting Young Consumers 171 Finally, forcing the universities to disclose their contracts with credit issuers will provide a new level of transparency and accountability. Most students are unaware of the benefits the university is gaining through credit marketing on campus.128 With every application and subsequent account, the university usually makes a profit.129 These deals may stipulate when and how marketing can be done, provide unlimited access to student registration data, or even allow for use of the university name in connection with the credit cards.130 Exposing the agreements will not only increase public awareness about these practices but may also deter the more unconscionable aspects of these agreements.131 Although the Act has the potential to provide significant protection for young consumers, it also implicates several legal and policy issues. The Act discriminates on the basis of age by imposing additional requirements on consumers under twenty-one132 and disproportionately impacts specific segments of the young adult population.133 The Act also does not go far enough in protecting students from solicitations on campus134 and fails to solve the underlying problems that originally created the need for reform.135 III. LEGAL AND POLICY RAMIFICATIONS OF THE ACT A. RIGHTS OF YOUNG CONSUMERS Title III of the Act creates different contractual standards for consumers between the ages of eighteen and twenty-one.136 Placing additional restrictions on this specific age group is both discriminatory and ineffective.137 In addition, the all-inclusive restrictions freeze out many young consumers who would benefit from a credit card and are capable of handling credit responsibly but who cannot meet the heightened standards.138 Lastly, the restrictions disproportionately affect lower income students as well as eighteen- to twenty-one-year-old non-students.139 128. 129. 130. 131. See Glater, supra note 12. Id. Id. See, e.g., Ylan Q. Mui, Credit Reforms Reach Campuses, WASH. POST., Aug. 27, 2010, at A14 (describing some of the contracts between credit card issuers and universities and the hope that the contract disclosure requirement will increase transparency); Protess & Neumann, supra note 34 (describing the millions of dollars and secrecy surrounding agreements between universities and credit card companies). 132. See Palmer et al., supra note 68 (discussing similar objections to a bill introduced in 1999). 133. See infra Part III.A. 134. See infra Part III.B. 135. See infra Part IV. 136. 15 U.S.C.A. §§ 1637(c)(8), 1637(p) (West 2010). 137. See discussion infra Part III. 138. See discussion infra Part III. 139. See discussion infra Part III. 172 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Young consumers are a vital and important part of the economic marketplace.140 They often lead the way in consumer trends and shape certain markets.141 Although most people enter the marketplace at a young age under the purchases of their parents, once they reach the age of majority—eighteen in most states142—they can be considered financially independent consumers.143 At the age of majority, consumers gain the right to enter into binding economic contracts, along with the right to vote and join the military without parental consent.144 Parents’ legal duty of support ends when offspring reach this age, as does parental authority.145 Although many parents may continue to support their children, they are not legally required to do so.146 Although a child under eighteen may enter into a contract, the child retains the right to disaffirm any contract before she reaches the age of majority.147 The right of disaffirmance is meant to protect children from careless financial decisions and reduce the incentive for adults to enter into contracts with children.148 At the age of majority, however, young adults lose this right and are bound by their contractual obligations.149 Because they are responsible for their contractual agreements, young adults at the age of majority should therefore be given full control over their contractual decisions.150 Despite the full responsibility young adults assume for their contractual obligations, Title III of the Act places limitations on their ability to enter into contractual agreements with credit card companies.151 These limits are 140. “Teenagers spend billions of dollars annually on clothing, video games, CD players, stereos, and cars.” ROBERT H. MNOOKIN & D. KELLY WEISBERG, CHILD, FAMILY, AND THE STATE: PROBLEMS AND MATERIALS ON CHILDREN AND THE LAW 675 (Wolters Kluwer 6th ed. 2009) (citation omitted). 141. See id. 142. LAUREN KROHN ARNEST, CHILDREN, YOUNG ADULTS, AND THE LAW: A DICTIONARY 199–200 (1998). 143. See generally id. 144. See generally ARNEST, supra note 142, at 84–85, 199; 10 U.S.C. § 505 (2006). A few rights, such as buying alcohol, are withheld from eighteen year olds; however, these are the exceptions rather than the rule. See James Mosher, The History of Youthful-Drinking Laws: Implications for Public Policy, in MINIMUM-DRINKING-AGE LAWS: AN EVALUATION 26–31 (Henry Wechsler ed., 1980), reprinted in MNOOKIN & WEISBERG, supra note 140, at 682. 145. ARNEST, supra note 142, at 199. 146. See id. 147. Id. at 84–85. 148. See, e.g., McGuckian v. Carpenter, 110 A. 402 (R.I. 1920); see also ARNEST, supra note 142, at 84–85. 149. ARNEST, supra note 142, at 84–85. 150. See generally Ashley Goetz, Editorial, Credit Card Act Treats Adults as Children, MINN. DAILY, June 9, 2009, http://www.mndaily.com/2009/06/09/credit-card-act-treats-adults-children (“Congress is saying that college-aged people aren’t really adults yet.”). 151. 15 U.S.C.A. § 1637(c)(8)(B) (West 2010). 2010] Protecting Young Consumers 173 stricter than those placed on adults over the age of twenty-one.152 Section 301(B) requires an eighteen- to twenty-one-year-old applicant without a cosigner to indicate through financial information that he or she has the ability to repay any obligation under the account.153 In contrast, § 109 of Title I of the Act, which applies to consumers over twenty-one, states that in order to open an open-end consumer credit plan, the card issuer must consider “the ability of the consumer to make the required payments under the terms of such account.”154 Section 109 provides a much easier standard to qualify for a credit card than § 304. First, it only applies to open-end consumer credit plans, rather than any credit card application.155 Second, the issuer must only consider the consumer’s ability to make required payments, as compared to requiring an ability to repay any obligation.156 In other words, under § 109, the card issuer must consider only whether the consumer over twenty-one is able to make minimum monthly payments, while § 304 requires that the consumer under twenty-one be able to repay any debt incurred. The tougher standards for consumers eighteen- to twenty-one years old discriminate against this group solely on the basis of their age.157 Despite the fact that eighteen-year-olds are considered adults and bound by their contractual obligations, the Act treats them as a separate and distinct group—different from children but not yet having full financial rights. The arguably arbitrary restrictions on eighteen- to twenty-one-year-olds also freeze out many young adult consumers who want and would benefit from credit. In an attempt to protect young consumers, Congress has “limited the ability of their more responsible peers to build up credit histories they’ll need when they graduate.”158 It is wise for many young consumers to build such histories. Credit reports are being used more and more for a variety of purposes including renting apartments, loan rates, job 152. Compare id. § 1665e (describing the requirements necessary for individuals over twentyone years of age to qualify for credit cards), with id. § 1637(c)(8)(A)–(B) (describing the requirements necessary for those under twenty-one years of age to qualify for credit cards). 153. Id. § 1637(c)(8)(B). 154. Id. § 1665e. 155. Compare id. § 1665e (applying new regulation to “open end consumer credit plans” only), with id. § 1637(c)(8)(B) (applying restrictions to anyone who chooses “to open a credit card account”). 156. Compare id. § 1665e (requiring credit card companies to “consider[] the ability of the consumer to make the required payments under the terms of such account”), with id. § 1637(c)(8)(B) (applying restrictions in regards to “any obligation arising from the proposed extension of credit in connection with the account”). 157. Consider if the Act made tougher restrictions for adults over sixty-five than for those under sixty-five. The issue of age discrimination would be central in the debate. However, when it comes to discrimination based on age against the young, most commentators dismiss it as necessary and miss the inherent paternalism and prejudice. See Goetz, supra note 150. 158. William P. Barrett, College Students Face New Credit Card Cut-Off, FORBES.COM (Aug. 4, 2009, 12:20 PM), http://www.forbes.com/2009/08/04/credit-card-reform-bill-college-studentspersonal-finance-collegecredit.html; see also Burnsed, supra note 95. 174 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 hiring, and insurance.159 However, many students who need and are capable of handling credit would not qualify under the new rules. First, because the co-signer will incur any of the obligations and suffer any damages that result from the student’s use of the card, few students are likely to obtain a potential co-signer other than a parent.160 Second, without co-signers, it may be difficult for young consumers who actually need and will use credit cards responsibly to provide enough documentation to demonstrate that they are financially stable, even to issuers who require the bare minimum.161 “Many—especially college students and lower-income young adults—don’t have easy access to a financially stable co-signer, [or] a full bank account . . . .”162 Not only will these restrictions limit students’ ability to build credit histories, but it will also hamper their ability to finance important purchases, like books or health insurance.163 Many students are no longer financially supported by their parents.164 They may be unable to pay for expensive textbooks all at once, and would rather finance the purchase and make payments over a few months.165 By restricting their ability to get credit, the Act is especially harmful to responsible students working to put themselves through school.166 In the same way the Act hurts responsible young adults wishing to build their credit, it also has a disproportionate effect on lower income students. These students may have little or no financial support from their parents.167 Likewise, they or their parents may not be able to provide proof of their ability to repay.168 So while these lower income students may be able to make minimum monthly payments and repay their obligation over time, they may not be able to prove that to a credit issuer. Another group adversely affected by the Act is non-students. Although many sections of Title III are aimed at protecting students from aggressive solicitations, it also has a significant impact on young non-student consumers.169 Many young adults do not continue on to college after high 159. 160. 161. 162. 163. Barrett, supra note 158. For example, late payments will show up on their credit history. Tompor, supra note 31. Goetz, supra note 150. Id. Ninety-two percent of undergraduates with credit cards report using the card for an education related expense, such as textbooks, fees, or general school supplies. SALLIE MAE STUDY, supra note 51, at 3. 164. Scott Jaschik, Understanding Independent Students, INSIDE HIGHER ED (Oct. 24, 2005), http://www.insidehighered.com/news/2005/10/24/independent. 165. See SALLIE MAE STUDY, supra note 51, at 3. 166. Heckathorn, supra note 9. 167. See Jekot, supra note 3, at 126. 168. See id. 169. See Press Release, Office of Senator Chris Dodd, Senate Approves Dodd’s Bill to Protect Consumers from Abusive Credit Card Practices (May 19, 2009), http://dodd.senate.gov/?q= node/4968; see also White House Press Release, supra note 72; Ashley Goetz, Credit CARD Act Impacts College Students: The Act Has Received Mixed Reactions, MINN. DAILY, June 2, 2009, 2010] Protecting Young Consumers 175 school graduation, often opting to work or go to a vocational training program.170 According to the National Center for Education Statistics, compared with the sixty-three million students in elementary and secondary school, only twenty-one million are in post-secondary degree granting institutions.171 These eighteen- to twenty-one-year-old young adults are especially vulnerable to the new restrictions. Often independent from their parents and building a life of their own, they may need to make significant purchases such as a car, furniture, insurance, or even a house.172 Obtaining credit in order to finance such purchases and build a credit history is vital in establishing financial independence.173 By placing heavier restrictions on acquiring credit, the Act hampers the ability of these eighteen- to twentyone-year-olds to become fully independent adult consumers despite the fact that they function as such in every other aspect.174 Although the Act frames the issue as one of protectionism, its restrictions on the financial freedom of young adults is saturated with paternalism. At a certain point, society must stop placing restrictions on the autonomy of young adults.175 Usually this point comes at the age of majority when children are considered legal adults, independent from their parents and subject to the same rights and responsibilities as other adults.176 By restricting the ability of eighteen- to twenty-one-year-olds to get a credit card like any other adult, the Act merely delays full financial freedom and tramples on the autonomy of young consumers. The Act also only delays and does not solve the youthful misjudgments its proponents were originally concerned about. In passing the Act, many legislators and advocates justified the provisions with the idea that young consumers were getting buried in debt because they did not know how to manage and build responsible credit.177 Those young adults who now cannot get a credit card under Title III will be no better equipped with the skills and knowledge necessary to manage credit upon their twenty-first birthday.178 By failing to mandate credit education or provide any additional http://www.mndaily.com/2009/06/02/credit-card-act-impacts-college-students (noting that the Act “has certain rules and restrictions designed to protect college-age students”). 170. Projected Number of Participants in Educational Institutions, by Level and Control of Institution: Fall 2008, NATIONAL CENTER FOR EDUCATION STATISTICS, http://nces.ed.gov/ programs/digest/d08/tables/dt08_001.asp (last visited Nov. 21, 2010). 171. Id. 172. See Barrett, supra note 158. 173. Id. 174. See Goetz, supra note 150. 175. See generally Gary B. Melton, Decision Making by Children: Psychological Risks and Benefits, in CHILDREN’S COMPETENCE TO CONSENT 21–37 (Melton, Koocher, & Saks eds., 1983) (discussing the psychological aspects of decision making by young adults); Goetz, supra note 150; Geren, supra note 60. 176. See ARNEST, supra note 142, at 199. 177. See WISPIRG, supra note 1. 178. See generally Johnson, supra note 14, at 269–76. 176 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 resources to teach young consumers these skills, Title III does not get to the heart of the underlying problem.179 On the contrary, the financial independence of young consumers is merely delayed, specific groups are disproportionately impacted, and the autonomy of young adults is hampered without adequately addressing the issues that form the basis of the problem. B. NOT FAR ENOUGH: CONTRACT AGREEMENTS AND LIMITATIONS ON MARKETING While the Act’s limitations on marketing and its requirements of university contract disclosures contribute to solving the problem of predatory solicitation on college campuses, these limitations do not go far enough. Contract disclosures will not prevent universities from providing student data to credit card issuers.180 At the same time, the disclosures may violate confidentiality provisions and impinge on contractual privacy.181 In addition, Title III’s limits on marketing merely prevent the distribution of pre-screened offers and tangible gifts,182 leaving large loopholes for solicitors to continue to take advantage of students on campus. Forcing universities to disclose their contracts with credit issuers183 may have some beneficial effects. For one, it may deter universities from using blatantly unconscionable contract provisions.184 However, it will not likely deter universities from freely giving out student data in exchange for a portion of the profits issuers realize from student credit accounts.185 The sharing of student information provides creditors with the ability to target the student market and provides the essential means for the tactics the Act is trying to stop.186 By failing to limit student data disclosure, the Act does not go far enough in addressing contractual agreements between universities and credit card issuers. 179. See id. 180. See CAMPUS CREDIT CARD TRAP, supra note 2, at 9. 181. Memorandum from Bond, Schoeneck & King, Higher Education Law Information Memo: Federal Credit CARD Act Regulates College and University Relationships with Credit Card Issuers (Aug. 2009), available at http://www.bondschoeneckking.com/pdfinfomemos/08-2009 %20im%20higher%20ed.pdf. 182. 15 U.S.C.A. §§ 1650(f)l, 1681b(c)(1)(B) (West 2010). 183. Id. § 1637(r). 184. See Protess & Neumann, supra note 34 (describing provisions that allow universities to “receive bonuses when students incur debt” and when students carry a balance from one year to the next); see also Glater, supra note 12. 185. See Glater, supra note 12 (discussing the practice of using revenue from credit card issuers to fund “scholarships and other programs”). In a separate survey earlier this year, USA Today found that “two-thirds of the nation’s largest 15 universities either partner with banks to promote debit cards or are looking to do so.” Kathy Chu, Credit Cards Go After College Students; Banks Increase Efforts to Forge Relationships with Attractive Demographic, USA TODAY, Mar. 31, 2008, at B6. 186. See Glater, supra note 12. However, many students are unaware of this information sharing. Id. 2010] Protecting Young Consumers 177 The Act also insufficiently limits marketing on campus. Although it prohibits giving out tangible items in exchange for credit card application, the Act does not prohibit issuers from providing these gifts for free.187 Under Title III, credit card marketers are still able to give out free items to entice students to come over to a table and speak with representatives. The items simply cannot be conditioned on a filled out application.188 In other words, before the Act the marketers had tables giving out free pizza in exchange for a filled out application, and now the marketers can still have tables with pizza and applications but just no quid pro quo exchange.189 There is no doubt that students will still be enticed by the smell of free pizza and fall into the same traps laid by the solicitors.190 While the elimination of the quid pro quo exchange is an important and crucial step in reforming credit card marketing practices on college campuses, it is not enough. IV. THE ACT’S FLAWS PREVENT IT FROM ADDRESSING SOME OF THE UNDERLYING ISSUES FACING YOUNG CONSUMERS WHILE OTHER ALTERNATIVES MAY PROVIDE MORE FUNDAMENTAL SOLUTIONS Although the Act may bring about some important changes in the predatory lending practices of credit card issuers on college campuses, it does not solve some core problems. Reform that does not directly restrict student access would likely prove a better solution.191 A combination of stronger protections for student data, increased marketing limitations on credit card issuers, and student credit education would inform and empower students to take responsibility for their own finances while still protecting them from the most deceptive and coercive practices. Protecting student data would force universities to be more honest and accountable to their students.192 Placing further limitations on marketing on campuses would decrease the availability of credit cards and therefore force responsible students to more actively seek out credit information on their own.193 187. 188. 189. 190. See MacDonald, supra note 91. 15 U.S.C.A. § 1650(f) (West 2010). See MacDonald, supra note 91. See generally id. (stating that if the gift is given to students regardless of whether they fill out an application it is not an inducement under the Act). 191. See Heckathorn, supra note 9. 192. See U.S. PUB. INTEREST RESEARCH GROUP EDUC. FUND, IMPROVING THE CREDIT CARD ACT’S BENEFITS TO STUDENTS AND OTHER YOUNG PEOPLE: A GUIDE FOR COLLEGES AND POLICYMAKERS 7–8 (Aug. 2010), available at http://www.studentpirgs.org/uploads/ 0b/3a/0b3a756061e78f775da9c1dd228bf0f4/CreditCARDACTissuebrief_Aug2010.pdf [hereinafter PIRG GUIDE FOR COLLEGES]. 193. See Johnson, supra note 14, at 267–68. 178 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Finally, better credit education would inform and empower students rather than suppress their financial freedom.194 A. STRONGER PROTECTIONS FOR STUDENT DATA Student data is already partially protected by the Family Educational Rights and Privacy Act (FERPA).195 FERPA was enacted in order to protect student privacy and educational records.196 It includes a general prohibition against releasing information from a student’s educational record without written permission.197 However, there is an exception for student directory information198—the exact type of information institutions of higher education provide to credit issuers.199 Further, FERPA only applies to schools receiving Department of Education funds.200 The exception for student directory information does, however, include the requirement that the school have an opt-out provision.201 Therefore, schools may release student directory information but must allow students to opt-out of the disclosure. For example, at the University of Michigan students are generally told how they can opt-out of having their information publicly displayed in directories or provided in response to a request.202 The policy is not specific to credit card companies.203 However, opt-out systems are problematic because they require an affirmative step by the individual student before her information is protected.204 In addition to placing the burden on the student, universities may also fail to widely publicize the option.205 In order to truly protect student data, this FERPA exception must be changed to require an opt-in for disclosure. An opt-in privacy policy is one in which students would have to expressly give permission before their information may be shared with 194. See id. at 269–77. 195. See 20 U.S.C. § 1232g (2006). 196. Federal Education Rights and Privacy Act (FERPA), U.S. DEPT. OF ED., http://www.ed.gov/policy/gen/guid/fpco/ferpa/index.html (last modified 6/16/09). 197. 20 U.S.C. § 1232g(b). 198. Id. 199. See id. at 1232g(a)(5)(A) (defining “directory information” as “the student’s name, address, telephone listing, date and place of birth, major field of study . . . .”); see also Glater, supra note 12 (“‘Students are generally told how they can opt out of having their information publically displayed in directories . . . .’”). 200. 20 U.S.C. § 1232g(a)(3) 201. Id. § 1232g(a)(5)(B). 202. Glater, supra note 12. 203. Id. 204. Jeff Sovern, Opting In, Opting Out, Or No Options At All: The Fight For Control of Personal Information, 74 WASH. L. REV. 1033, 1071–91 (1999). 205. See Glater, supra note 12 (discussing the lack of awareness by students to agreements between universities and credit card companies); see also Eric Goldman, On My Mind: The Privacy Hoax, FORBES.COM (Oct. 14, 2002), http://www.forbes.com/forbes/2002/1014/042.html. Goldman argues that the “cost-benefit ratio [of protecting privacy/information] is titled too high for consumers.” Id. A similar argument can be made for students opt-out provisions. 2010] Protecting Young Consumers 179 credit card marketers.206 By requiring this affirmative step, the opt-in policy would decrease available member lists.207 In this way, opt-in regimes would slow, if not end, direct marketing to college students by limiting the amount of information shared with credit issuers.208 The decision between opt-out and opt-in policies comes down to who should internalize the costs of protecting student information—the university or the student. Universities may not want opt-in policies because they will incur the costs when students opt-out while getting very few benefits in return.209 When students fail to opt-in, the university has less information to sell and therefore will receive less money in exchange for student directories.210 They will also incur costs from disseminating opt-in information to students, persuading them to act, and sorting through requests received.211 Due to the low benefit and high cost to the universities, legislation may be required in order to ensure the use of opt-in policies.212 Opt-out policies, on the other hand, are better for universities but worse for the protection of students. They provide for some student control while eliminating the cost of permission seeking.213 The efficiency of the opt-out system assumes that the student has full information and can easily and readily regain control over her personal information.214 Students often do not receive, read, or understand the implications of university policies on the use and sharing of their information.215 As a result, students will internalize the costs of the information sharing.216 Opt-out policies diminish student power and make it substantially more difficult for students to secure their personal data.217 As a result, they provide little protection of student information. A default opt-in policy—or any default rule in which the individual retains control over her information even after she provides it freely to one 206. See Sovern, supra note 204, at 1103. 207. See Michael E. Staten & Fred H. Cate, The Impact of Opt-In Privacy Rules on Retail Credit Markets: A Case Study of MBNA, 52 DUKE L.J. 745, 770 (2003). 208. See id. 209. Sovern, supra note 204, at 1106. 210. See id. at 1106–13. 211. See Staten & Cate, supra note 207, at 767 (discussing the costs of opt-in policies for particular credit issuers). 212. See generally Sovern, supra note 204, at 1081–83 (discussing how businesses may adopt opt-out systems to preempt government regulation). 213. See generally id. at 1099–1100. 214. See id. 215. See generally Goldman, supra note 205. 216. See Sovern, supra note 204, at 1106; see also Paul M. Schwartz, Property, Privacy, and Personal Data, 117 HARV. L. REV. 2056, 2076–84 (2004). 217. See Sovern, supra note 204, at 1072–78; see also Paul M. Schwartz, Privacy and the Economics of Personal Health Care Information, 76 TEX. L. REV. 1, 49 (1997) (discussing how information shortfalls in the health care context lead to a “monopoly equilibrium” that is maintained through a shallow consent process that does not provide consumers with the information they need and therefore makes it more difficult for them to retain any real control over their data). 180 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 entity—would provide for more protection of student data than an opt-out system. Professor Jerry Kang points out that a default rule placing power in the student’s hands would eliminate inefficiencies common to the contrary approach.218 If the default rule leaves the use of students’ personal information to the university’s discretion, a single student would face considerable difficulties in determining what information is collected and how it is used or distributed.219 With a default rule reserving student control over her information, these information costs would be greatly decreased; students would know how their information is being used because the university would be required to seek their permission to use it.220 This type of default rule or opt-in to university disclosure of student directory information is necessary to protect students’ data privacy.221 Amending FERPA to include such a rule would provide a more comprehensive solution to the endless flow of credit offers that bombard college students by addressing the problem at its source.222 B. STRONGER MARKETING LIMITATIONS ON CREDIT CARD ISSUERS In order to truly address the problem of predatory solicitations on college campuses, the loopholes in § 304 of the Act must be closed.223 Although these provisions ostensibly provide protections from some of the more coercive marketing practices, they may be easily navigated around.224 Credit issuers will likely only have to change their behavior slightly in order to legally continue the same practices.225 Credit issuers should be prohibited from providing free gifts on campus. Under Title III, credit card marketers may technically still be able to give out free items to entice students to come over and speak with them.226 However, they cannot provide the items as a quid pro quo exchange for a filled-out credit card application.227 Students will likely still be unduly enticed by the offer of free gifts.228 This is a deceptive practice 218. See Jerry Kang, Information Privacy in Cyberspace Transactions, 50 STAN. L. REV. 1193, 1253–57 (1998). 219. See id. 220. See id. 221. See PIRG GUIDE FOR COLLEGES, supra note 18, at 3. Some universities are already putting these types of policies in place. See Grant McCool, NY AG Cuomo Strikes Student Credit-Card Reform Agreement, REUTERS, Sept. 7, 2010, available at http://www.reuters.com/article/ idUSTRE6863S020100907. 222. See PIRG GUIDE FOR COLLEGES, supra note 192, at 3. 223. See supra Part III.B. 224. See MacDonald, supra note 91 (describing the opportunity for credit card issuers to avoid the restrictions of the Act by offering items without requiring that students apply for the card). 225. See id. 226. See id. 227. 15 U.S.C.A. § 1650(f) (West 2010). 228. See MacDonald, supra note 91. 2010] Protecting Young Consumers 181 that the Act should have completely eliminated.229 Title III should have required that only information be provided at tables.230 This would provide a balance between allowing credit issuers access to students while prohibiting any undue influence.231 The information would be there for those students who wish to seek it out. This convenience will still likely pull in many new customers for the credit issuers, but the new customers would not have been enticed by the usual traps.232 C. CREDIT EDUCATION With 39% of students arriving on campus with a credit card233 and 84% of the overall student population having credit cards,234 credit education is more important than ever. In general, college students may lack the financial knowledge and skills necessary to successfully manage their credit.235 This ignorance of basic credit management information makes credit education an essential element in solving underlying credit misuse by undergraduates.236 Financial education can be successful for many vulnerable groups, including those new to credit.237 Using guidance from students on how to provide the information, universities should be required to implement programs that actively educate students on the proper and responsible use of credit.238 More and more freshman students are carrying credit cards. A study conducted by Sallie Mae reported a 60% increase—from the Fall of 2004 to the Spring of 2008—in the percentage of first-year students carrying credit cards.239 At the same time, a large percentage of these students have reported being “surprised” by their credit balance.240 Fully 38% have at some point expressed surprise at their credit card balance and 22% report being frequently surprised.241 Although the feeling of “surprise” may be attributed to a number of factors, including failure to account for all 229. 230. 231. 232. 233. 234. 235. 236. 237. See CAMPUS CREDIT CARD TRAP, supra note 2, at 13. See supra Part III.B. See supra Part III.B. Johnson, supra note 14, at 266–68. SALLIE MAE STUDY, supra note 51, at 6. Id. at 5. Johnson, supra note 14, at 268–76. Id. at 269; see also CAMPUS CREDIT CARD TRAP, supra note 2, at 13. See Gartner & Schiltz, supra note 70, at 419–20 (discussing a project that brought all stakeholders in the credit debate together for educational purposes and conducted a study that determined that new credit users are “especially vulnerable” and “could benefit from initiatives designed to help consumers manage credit cards successfully”). 238. SALLIE MAE STUDY, supra note 51, at 16 (reporting that students are “interested in pursuing some areas of education to increase financial literacy” and presenting data collected regarding how and when students would like to receive such information). 239. Id. at 6. 240. Id. at 11. 241. Id. 182 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 purchases or how they will add up,242 it is difficult to imagine that a student would be frequently surprised if they completely understood the way credit works. In fact, 84% of undergraduates admitted the need for more financial management information.243 Credit education could be used to limit the likelihood of surprise based on such lack of knowledge. Financial literacy can be gained through credit education.244 Credit education provides basic information about terms and conditions, how to avoid and manage debt, and how interest rates and penalties work.245 Increasing awareness of credit issues through education could influence how young consumers view and use credit cards.246 At a time when they are being bombarded with credit offers, credit education is particularly vital to stemming the flood of poor credit decisions.247 Students appear to agree with this idea. In all, 84% of undergraduate students indicated that they would like more education on financial management.248 Many students are not receiving this information.249 Furthermore, 64% indicated that they would like to receive information in high school and 40% as college freshman.250 In addition to providing a positive response to the idea of credit education, the Sallie Mae study also asked students about the best way to provide such information.251 Students reported wanting financial management information provided in person, preferably “in the classroom” or “through one-on-one meetings.”252 With students willing to participate in educational programs and providing the roadmap on how best to do it, credit education programs should be relatively easy to implement. In fact, many credit issuers already provide financial education to undergraduate students.253 Likewise, some universities offer financial 242. See id. 243. Id. at 16; see also Johnson, supra note 14, 227–28 (citing 2002 survey of 401 students at The Ohio State University that found that less than half of the freshman understood that missed payments will negatively affect their credit). 244. See U.S. FIN. LITERACY & EDUC. COMM’N, TAKING OWNERSHIP OF THE FUTURE: THE NATIONAL STRATEGY FOR FINANCIAL LITERACY xi–xii (2006), available at http://205.168.45.52/sites/default/files/downloads/ownership.pdf [hereinafter LITERACY STUDY]. 245. Johnson, supra note 14, at 268–76; CAMPUS CREDIT CARD TRAP, supra note 2, at 13. 246. Gartner & Schiltz, supra note 70, at 423 (“[T]he results of one issuer demonstrate that credit education works for people who are new to credit, especially college students.”); Johnson, supra note 14, at 268–69. 247. Johnson, supra note 14, at 268–76. 248. SALLIE MAE STUDY, supra note 51, at 16. 249. Id. A third of respondents for the Sallie Mae study reported that they had never or rarely discussed credit cards with their parents. Id. 250. Id. 251. Id. 252. Id. 253. Jessica Silver-Greenberg, Majoring in Credit-card Debt, BLOOMBERG BUSINESSWEEK, Sept. 5, 2007, http://www.msnbc.msn.com/id/20607411/ns/business-businessweekcom/. 2010] Protecting Young Consumers 183 literacy and credit education.254 The Credit CARD Act could have taken credit education a step further by mandating it in universities.255 In the alternative, the Act could have required credit education only when the university had a contract with a credit issuer.256 Either way, this would go further in addressing the underlying dearth of knowledge that can lead to credit mismanagement by young consumers.257 As it is, the Act’s limits on eighteen- to twenty-one-year-olds merely delay the potential problem instead of providing the fundamental education needed to solve it. CONCLUSION Title III of the Credit CARD Act is a huge step toward providing better protection for young consumers. The aggressive solicitation and marketing practices by credit issuers on college campuses made change necessary. Although the Act gets it right when it comes to banning the quid pro quo exchange of tangible items, prohibiting pre-screened offers, and mandating contract disclosures, it leaves open many loopholes and fails to address some fundamental problems. Restricting young adult ownership of credit cards only delays credit misuse; it does not solve it. The Act should not be aimed at discouraging all use, but rather encouraging responsible use. A combination of stronger protection of student data, increased marketing limitations on credit card issuers, and credit education would create a solution where informed and empowered students could take responsibility for their own finances and still be protected from the most deceptive and coercive practices. Kathryn A. Wood Bank of America, Citibank, JPMorgan Chase, American Express, and others say they are providing a valuable service to students and they work hard to ensure that their credit cards are used responsibly. Citibank and JPMorgan both offer extensive financial literacy materials for college students. Citibank, for instance, says it distributed more than 5 million credit-education pieces to students, parents, and administrators last year for free. Id. 254. LITERACY STUDY, supra note 244, at 93–94 (discussing examples and the importance of “higher education institutions . . . providing financial literacy opportunities to students”); Grant McCool, supra note 221 (discussing N.Y. Attorney General’s negotiations with the State University of New York System to adopt practices like financial literacy programs to educate students, as well as an opt-in system for sharing students’ personal information with credit card companies). 255. See 15 U.S.C.A. § 1650(f) (West 2010). 256. See Johnson, supra note 14, at 268–76. 257. See generally id. at 224–27. B.S., New York University, 2005; J.D. candidate, Brooklyn Law School, 2011. I would like to thank my family for their constant love and support, as well as the editing staff of the Journal for their assistance with this note. Most importantly, I want to thank my inspiration, Adam, for his unwavering support, patience, and encouragement through all my endeavors. WHO’S THE BOSS? THE NEED FOR REGULATION OF THE TICKETING INDUSTRY INTRODUCTION To many music fans, the chance to see their favorite performers live is a rare and special experience. Given the infrequency of such events, consumers are often willing to spend large sums of money to obtain tickets to attend these shows. However, these consumers may be unaware that they are regularly being misled by the largely unregulated ticketing industry into overpaying for their tickets. On Monday, February 2, 2009, at 10 a.m., tickets to Bruce Springsteen and the E Street Band’s “Working on a Dream” tour1 went on sale to the public through Ticketmaster.com2 for the May 21, 2009 and May 23, 2009, shows at the Izod Center at the New Jersey Meadowlands, in East Rutherford, New Jersey.3 Because Springsteen hails from New Jersey,4 “[h]undreds of thousands of local Springsteen fans were” seeking tickets to these shows.5 Within minutes of the commencement of the sale, consumers were met with error messages and were redirected6 to TicketsNow.com,7 a wholly-owned subsidiary of Ticketmaster, Inc. (Ticketmaster) and the second largest secondary ticketer in the world.8 There, some tickets were sold at prices four times greater than their actual face value.9 This was done despite the fact that original tickets to the shows were still available on Ticketmaster.com.10 Instead of offering tickets at face value on its primary 1. Daniel Kreps, Bruce Springsteen Announces “Working on a Dream” Tour, ROLLING STONE MUSIC (Jan. 27, 2009), http://www.rollingstone.com/music/news/15765/91347 (announcing a 26-show U.S. concert tour that followed the band’s late January 2009 release of their album Working on a Dream). 2. Ticketmaster is a leader in “e-commerce and ticketing sites online, operating in 18 global markets, and with 19 worldwide call centers.” About Ticketmaster, http://www.ticketmaster.com/ h/about_us.html?tm_link=tm_homeA_i_abouttm (last visited Sept. 20, 2010). “Ticketmaster has been connecting fans to live entertainment since 1976, and is a Live Nation Entertainment, Inc. company.” Id. 3. Peggy McGlone, Ticketmaster Reveals Details of Rapid Sales: There are 38,778 Tickets for Two N.J. Concerts by Bruce Springsteen. You’re Chances of Getting One? ABOUT ZERO, STAR-LEDGER (Newark, N.J.), May 21, 2009, at 1 [hereinafter McGlone, Ticketmaster Springsteen Concert]. 4. DAVE MARSH, BRUCE SPRINGSTEEN: TWO HEARTS: THE DEFINITIVE BIOGRAPHY, 19722003, at 278 (2004). 5. McGlone, Ticketmaster Springsteen Concert, supra note 3. 6. Id.; see also Ben Sisario, Ticketmaster Reaches Settlement on Complaints of Deceptive Sales, N.Y. TIMES, Feb.19, 2010, at B3 (describing the details of a settlement between the Federal Trade Commission and Ticketmaster stemming from complaints from “thousands of customers [that claimed that] Ticketmaster’s Web site . . . pointed [them] to TicketNow.com . . . [and] offered similar tickets at inflated prices”). 7. Ticketmaster purchased TicketNow in January 2008 for $265 million. Jon Hood, TicketsNow Once Again in Hot Water, CONSUMER AFFAIRS (May 21, 2009), http://www.consumeraffairs.com/news04/2009/05/ticketsnow.html. 8. Id. 9. Id. 10. Id. 186 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 ticketing site, Ticketmaster blocked those primary sales and immediately sent consumers to its secondary ticketing Web site, TicketsNow.com, without warning, to purchase more expensive tickets.11 Almost immediately, deceived consumers began filing complaints with the New Jersey Attorney General’s (Attorney General) Office and the New Jersey Division of Consumer Affairs.12 During the course of the investigation, Ticketmaster revealed that a software glitch was the official source of the problem.13 However, in response to an open letter posted by Springsteen to his fans on his Web site blaming Ticketmaster for the mishandling of his concert ticket sales,14 Ticketmaster CEO Irving Azoff acknowledged that in certain circumstances the company did intentionally direct consumers to TicketsNow.com.15 Ticketmaster and the Attorney General’s Office eventually reached a settlement in which the company agreed to provide for consumers who overpaid for their tickets and to change its business practices in order to better protect and inform its customers.16 This incident is not an isolated occurrence, but exemplifies a much bigger problem in the largely unregulated ticketing industry.17 In both the primary18 and secondary19 ticketing markets, companies are engaging in predatory practices that adversely affect consumers.20 In the primary 11. See id. 12. See Press Release, New Jersey Division of Consumer Affairs, Attorney General Announces Settlement with Ticketmaster on Sale of Springsteen Tickets (Feb. 26, 2009), http://www.state.nj.us/lps/ca/press/brucefinal.htm [hereinafter N.J. AG Settlement Press Release]. 13. Ticketmaster Changes Sales Practices After Springsteen Flap, CBC NEWS (Feb. 23, 2009), http://www.cbc.ca/consumer/story/2009/02/23/ticketmaster-settlement.html. 14. Bruce Springsteen Ticketmaster Controversy! Letters from the Boss, a Congressman & CEO + Live Nation, TicketsNow, BROOKLYN VEGAN (Feb. 5, 2009, 11:13 AM), http://www.brooklynvegan.com/archives/2009/02/bruce_springste_17.html. 15. Ray Waddell, Ticketmaster Responds to Springsteen, Fans, BILLBOARD.COM (Feb. 5, 2009, 12:37 PM), http://www.billboard.com/bbcom/news/ticketmaster-responds-to-springsteenfans-1003938632.story#/bbcom/news/ticketmaster-responds-to-springsteen-fans1003938632.story. In Azoff’s defense, he stated that “‘[t]his redirection only occurred as a choice when we could not satisfy fans’ specific search request for primary ticket inventory.’” Id. 16. N.J. AG Settlement Press Release, supra note 12. The settlement terms included: a series of concessions towards consumers directly affected by the Springsteen ticket fiasco; “a wall between Ticketmaster and its ticket re-selling subsidiary TicketsNow.com for at least a year”; “approval from the [N.J.] Attorney General for any links between [Ticketmaster’s] ‘No Tickets Found’ Internet page to its TicketsNow re-sale website”; no “paid Internet search advertising that would lead consumers searching for ‘Ticketmaster’ on Internet search engines to its TicketsNow re-sale site”; a guarantee that all tickets “it receives for sale to the general public will be sold on its primary market website”; and no sale or offer of sale of “any tickets on the TicketsNow.com reselling website until the initial sale begins on its primary website.” Id. 17. See Hood, supra note 7 (indicating online ticket market problems for recent Hannah Montana and Phish shows). 18. See discussion infra Part I.A. 19. See discussion infra Part I.B. 20. See Competition in the Ticketing and Promotion Industry: Hearing Before the Subcomm. on Courts and Competition Policy of the H. Comm. on the Judiciary, 111th Cong. 5–7 (2009) (statement of N.J. Rep. Pascrell, Jr.). 2010] Who's the Boss? 187 ticketing market such predatory practices include diverting tickets to secondary ticket sellers,21 and having a limited, unknown number of tickets available for public sale,22 which are often the result of limited ticket presale events.23 In the secondary market, predatory practices include exorbitant markups on ticket prices,24 the sale of tickets before the initial primary ticket release,25 and the sale of “phantom tickets.”26 Regulation is necessary to combat these predatory practices, protect the consumer, and rectify the ills that currently exist. Representative Bill Pascrell, Jr.27 has proposed federal legislation; the Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009 (the BOSS ACT, or the Act),28 which seeks to “overhaul the concert ticket industry and improve fans’ chances of scoring tickets to their favorite acts.”29 This note explores the need for regulation of the primary and secondary ticketing markets and suggests that the passage of federal legislation is the solution. In light of the recent and repeated problems affecting the ticketing industry, and the prevalence of predatory practices adverse to consumer interests, congressional action is necessary. The BOSS ACT will protect consumers and rectify predatory practices throughout the primary and secondary ticketing markets; it will make the ticketing industry more reliable and transparent, and afford regular fans a fair chance to attend their favorite events. Part I of this note presents an overview of the ticketing industry as a largely unregulated trade consisting of distinct primary and secondary markets, and identifies the major players in each segment of the industry. Part II examines the predatory practices currently being employed and the adverse effect such practices are having on consumers. Part III analyzes the proposed BOSS ACT and the effect it could have on the industry, and advocates that Congress swiftly pass this legislation. Finally, Part IV proposes additional rules the Federal Trade Commission (FTC) should 21. Hood, supra note 7. 22. See McGlone, Ticketmaster Springsteen Concert, supra note 3. 23. See Clark P. Kirkman, Note, WHO NEEDS TICKETS? Examining Problems in the Growing Online Ticket Resale Industry, 61 FED. COMM. L.J. 739, 751 (2009) (describing the anger of parents who received no ticket purchasing privileges despite paying membership fees to have access to ticket presales). 24. See, e.g., Ethan Smith, Concert Tickets Get Set Aside, Marked Up by Artists, Managers, WALL ST. J., Mar. 11, 2009, at B1. 25. See, e.g., Editorial, Who Can Tame the Scalpers?, N.Y. TIMES, June 1, 2009, at A20. 26. Id. (describing phantom tickets as the sale of tickets that do not exist). 27. Representative Pascrell, Jr. is a Democrat representing the 8th Congressional District of New Jersey. Biography of Bill Pascrell, Jr., HOUSE.GOV, http://pascrell.house.gov/news/ biography.shtml (last visited Sept. 24, 2010). 28. Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009, H.R. 2669, 111th Cong. (2009). 29. Peggy McGlone, The BOSS ACT Rewrites Rules on Ticket Sales, STAR-LEDGER (Newark, N.J.), June 1, 2009, at 1 [hereinafter McGlone, The BOSS ACT Rewrites]. 188 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 promulgate upon the passage of the BOSS ACT to facilitate the regulation of the ticketing industry. I. OVERVIEW OF THE MARKETS FOR TICKETS The ticketing industry emerged out of necessity for commercial entertainment.30 According to several historians, “commercial entertainment began in sixteenth century England with the introduction of for-profit theatres.”31 At that time, theaters were divided into sections and consumers were charged incrementally differing amounts to access more exclusive sections.32 From what was once a simple ticketless process, ticketing has developed into a thriving, multi-billion dollar industry consisting of many buyers and many sellers in two distinct markets: the primary ticketing market and the secondary ticketing market.33 A. PRIMARY TICKETING MARKET A ticket,34 which entitles the bearer the right to enter a particular event, is first sold in a primary sale35 in the primary market.36 To understand how the primary market works, consider the typical organization of a concert. A promoter will hire an act, book a venue, and all parties involved will negotiate a plan to divide potential profits.37 The promoter will generally set the ticket price and determine when the “advertising and selling” of the tickets should begin.38 The venue will make some tickets available “through the box office39 where the event will be held and the promoter (or the venue) [will] also contract[] with a ticketing agency,” such as Ticketmaster, to facilitate the majority of the ticket sales.40 Tickets issued by the venue are placed on the market, and the venue is considered the “primary ticket 30. 31. 32. 33. 34. See Pascal Courty, Some Economics of Ticket Resale, 17(2) J. ECON. PERSP. 85, 90 (2003). Id. Id. See id. at 87–89. “The term ‘ticket’ means a ticket of admission to a sporting event, theater, musical performance, or place of public amusement of any kind.” Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009, H.R. 2669, 111th Cong. § 6(10) (2009). The definitions adopted throughout this note are the definitions utilized in the pending BOSS ACT legislation. 35. See Courty, supra note 30, at 87 (describing the general mechanics of a primary sale). Additionally, “[t]he term ‘primary sale,’ with regards to a ticket, means the initial sale of a ticket that has not been sold previous to such sale, by a primary ticket seller to the general public on or after the date advertised such sale.” H.R. 2669 § 6(7). 36. OFFICE OF N.Y. ATTORNEY GEN., "WHY CAN'T I GET TICKETS?": REPORT ON TICKET DISTRIBUTION PRACTICES 16 (1999) [hereinafter SPITZER REPORT]. 37. Courty, supra note 30, at 87. 38. Id. 39. “The term ‘box office’ means a physical location where tickets are offered for primary sale.” H.R. 2669 § 6(3). 40. Courty, supra note 30, at 87. 2010] Who's the Boss? 189 seller”41 or “original ticket seller.”42 The “face value”43 of the ticket is printed on the ticket and is comprised of the “base price”44 as well as some of the “ancillary charges”45 the ticketing agency, and sometimes the box office, adds on.46 Despite the fact that ticketing agencies charge additional fees on top of the base price, most tickets are typically sold through them because agencies can reach a significantly larger audience than the box office.47 Estimates of the total value of tickets sold per year vary greatly. In 2008, Ticketmaster sold nearly 142 million tickets valued at over $8.9 billion.48 According to Forrester Research, the primary ticketing sales market in the U.S. for live music and sporting events approximates $22 billion per year.49 Other studies, from the late 1990s to the early 2000s, “estimate[] [that the] total primary market tickets vary in range from $7 to $60 billion, with that range depending on the set of events” that were considered.50 Although Ticketmaster dominates the primary ticket market, 41. H.R. 2669 § 6(8). The term ‘primary ticket seller’ means an owner or operator of a venue or a sports team, a manager or provider of an event, or a provider of ticketing services (or an agent of such owner, operator, manager, or provider) that engages in the primary sale of tickets for an event or retains the authority to otherwise distribute tickets. Id. 42. SPITZER REPORT, supra note 36, at 16. 43. “The term ‘face value’ means the total price of a ticket including both the base price and any ancillary charges.” H.R. 2669 § 6(6). 44. “The term ‘base price’ means the price charged for a ticket other than any ancillary charges.” Id. § 6(2). 45. “The term ‘ancillary charges’ means service fees, convenience charges, parking fees, and other charges associated with the purchase of a ticket and not included in the base price of the ticket.” Id. § 6(1). 46. Courty, supra note 30, at 87. 47. Id. 48. Press Release, Sen. Kohl, Kohl Urges Department of Justice to Closely Scrutinize Ticketmaster/Live Nation Merger (July 27, 2009), http://kohl.senate.gov/newsroom/pressrelease. cfm?customel_dataPageID_1464=2986. 49. Press Release, TicketNetwork.com, Ticket Resale Industry Protects Consumers With Fair Market Prices and Secure Transactions (Feb. 4, 2009) (on file with author) [hereinafter Consumer Protection Press Release]. 50. Courty, supra note 30, at 87; Stephen K. Happel & Marianne M. Jennings, Creating A Futures Market for Major Event Tickets: Problems and Prospects, 21 CATO J. 443, 448–49 (2002), available at http://www.cato.org/pubs/journal/cj21n3/cj21n3-6.pdf. Using data from U.S. Statistical Abstracts, Variety, Newsday, Amusement Business, Team Marketing Report, and the League of American Theaters and Productions, TicketAmerica (1998) derived an estimate of $7.2 billion spent through primary ticket channels in 1997. The Kelsey Group (1999) gives estimates and forecasts of total ticket sales from 1999 to 2004 as $14.5 billion, $16.25 billion, $18.1 billion, $19.9 billion, $21.9 billion, and $24.4 billion, respectively. LiquidSeats (2001) estimates the face value of all tickets sold in the United States for live events and attractions in 1999 to be $16.7 billion. In contrast, TickAuction.com (2000) finds the primary ticket market to be over $41 billion in 2002, and EventTixx finds the “Tier 1 Event Marketplace” (major 190 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Live Nation,51 TeleCharge,52 and TicketWeb53 are other significant players.54 B. SECONDARY TICKETING MARKET Once a ticket has been sold in the primary ticket market a ticket “resale” or “secondary sale”55 by a secondary ticket seller56 can occur in the secondary market.57 This process is generally referred to as “ticket league sports, college football and basketball, concerts, Broadway theater, select golf and tennis tournaments, etc.) to have ticket sales in excess of $60 billion in 2000. Happell & Jennings, supra at 448–49. 51. Live Nation About Us, http://www.livenation.com/company/getCompanyInfo (last visited Sept. 24, 2010). Live Nation Entertainment (NYSE-LYV) is the largest live entertainment company in the world, consisting of five businesses: concert promotion and venue operations, sponsorship, ticketing solutions, e-commerce and artist management. Live Nation seeks to innovate and enhance the live entertainment experience for artists and fans: before, during and after the show. In 2009, Live Nation sold 140 million tickets, promoted 21,000 concerts, partnered with 850 sponsors and averaged 25 million unique monthly users of its e-commerce sites. Id. Merger talks between Live Nation and Ticketmaster became public in February 2009. See Ethan Smith, Ticketmaster, Live Nation Near Merger, WALL ST. J., Feb 4, 2009, at A1. The merger was completed in January 2010, after the Justice Department announced conditions that had to be met before they would accept the merger. Ben Sisario, Justice Dept. Clears Ticketmaster Deal, N.Y. TIMES, Jan. 26, 2010, at B4. Both parties agreed to the conditions which included Ticketmaster selling off one of its ticketing divisions and licensing its software to a competitor, as well as 10 years of “tough antiretalitation provisions” to prevent monopolistic control of the industry. Id. 52. About Telecharge.com, http://www.telecharge.com/aboutUs.aspx (last visited Dec. 21, 2009) (describing Telecharge.com as the “official ticketing agency for most of New York City’s theatres” and as a division of The Shubert Organization Inc.). 53. About TicketWeb, http://event.ticketweb.com/about/index.html (last visited Dec. 21, 2009). TicketWeb is a self-service online ticketing and event marketing application operated by Ticketmaster, the world’s leading ticketing company. The proprietary system allows venues and event providers of any size to manage the full range of box office operations on the Web, with the added value of integration and distribution through Ticketmaster.com. Id. 54. Press Release, Ticket News, Ticket News Announces Top Ticket Sellers for Week Ending October 10, 2009 (Oct. 16, 2009), http://www.ticketnews.com/Ticket-News-Announces-TopTicket-Sellers-for-Week-Ending-October-10-2009. 55. “The terms ‘resale’ or ‘secondary sale,’ with regards to a ticket, mean any sale of a ticket that occurs after the initial sale of the ticket.” Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009, H.R. 2669, 111th Cong. § 6(9) (2009). 56. “The term ‘secondary ticket seller’ means a person engaged in reselling tickets for an event and who charges a premium in excess of the face value. Such term does not include an individual who resells fewer than 25 tickets during any 1-year period.” Id. § 6(12). 57. SPITZER REPORT, supra note 36, at 17. 2010] Who's the Boss? 191 scalping.”58 Institutional secondary ticket sellers are considered either ticket scalpers or ticket brokers.59 Ticket scalpers first emerged in the late nineteenth and early twentieth century as unauthorized sellers of the unused portions of long-distance railroad tickets.60 Today, ticket speculators are more generally known as scalpers; a ticket speculator is “[a] person who buys tickets and then resells them for more than their face value; in slang, a [ticket] scalper.”61 Ticket scalping is broadly defined as the reselling of tickets to entertainment or sporting events at a price that is dictated by the marketplace.62 The more popular the event, the more likely it is that ticket scalping will occur and the higher the price at which the tickets will be sold.63 However, scalping, at face value or even for below face value, will often still occur when an event “is in low demand or not sold out.”64 In contrast to ticket scalpers, ticket brokers are formal businesses that engage in the buying and selling of tickets.65 Ticket brokers have been around since the turn of the twentieth century, at which time they served as “remote sales outlets for theatres and ballparks,” where customers could purchase tickets without having to travel long distances.66 Today, companies such as Ticketmaster have replaced that primary ticketing function, relegating ticket brokers into the secondary ticketing market.67 58. See Jonathan C. Benitah, Note, Anti-Scalping Laws: Should They Be Forgotten?, 6 TEX. REV. ENT. & SPORTS L. 55, 57 (2005). 59. See id. at 5759 (describing the history of ticket scalpers and ticket brokers). 60. See generally Burdick v. People, 36 N.E. 948 (Ill. 1894); Fry v. State, 63 Ind. 552 (Ind. 1878). The railroad would offer discounts on round trip tickets, so scalpers would purchase these “deals” and resell the unused portions to other customers. See Ill. Cent. R.R. Co. v. Caffrey, 128 F. 770, 77071 (C.C.E.D. Mo. 1904). Soon thereafter, similar scalping enterprises sprang up with regards to theater tickets, in which “ticket speculators,” as they were known, would buy large batches of tickets from the box office and attempt to sell them outside of the venue above face value. See William O. Logan, Ticket Scalpers Arrested, THE BUFFALONIAN, http://www.buffalonian.com/history/articles/1851-1900/1899TICKETSCALPERS.html (last visited Sept. 9, 2010) (quoting Ticket Speculators, BUFFALO EXPRESS, Dec. 26, 1899). 61. BLACK’S LAW DICTIONARY 1520 (8th ed. 2004). 62. Thomas A. Diamond, Ticket Scalping: A New Look at an Old Problem, 37 U. MIAMI L. REV. 71, 71 (1982). 63. Jonathan Bell, Note, Ticket Scalping: Same Old Problem with a Brand New Twist, 18 LOY. CONSUMER L. REV. 435, 438 (2006). Additionally, the unique quality of each event makes tickets desirable whether the ticket price is high or low. See Stephen K. Happel & Marianne M. Jennings, The Folly of Anti-Scalping Laws, 15 CATO. J. 65, 66–67 (1995), available at http://www.cato.org/ pubs/journal/cj15n1-4.html. 64. Bell, supra note 63, at 438 n.16. 65. TicketLiquidator Glossary Page, TICKETLIQUIDATOR, http://www.ticketliquidator.com/ dictionary.aspx (last visited Dec. 21, 2009). 66. Scott D. Simon, Note, If You Can’t Beat ‘em, Join ‘em: Implications for New York’s Scalping Law in Light of Recent Developments in the Ticket Business, 72 FORDHAM L. REV. 1171, 1172 (2004). 67. Id. at 1172–73. Furthermore, ticket brokers are typically small firms with only a few employees and $3-4 million in revenue per year. Happel & Jennings, supra note 50, at 449. For the purposes of this article, ticket scalping will be used to reference both ticket scalpers and ticket brokers. 192 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 The ticket scalping process typically begins with the purchase of tickets from the promoter, venue, or ticketing agency of the event, usually in bulk, and then waiting for the ticket supply to sell out.68 The scalper then offers the tickets to consumers at the marketplace price.69 This process of consumers purchasing tickets from the scalper, a secondary seller, rather than the venue or ticketing agency, the primary seller, creates the secondary market for tickets.70 Ticket scalping is derived, in part, by the common practice of promoters selling tickets at below market prices.71 The rules of supply and demand justify this practice as lower prices will create a higher demand,72 resulting in more tickets sold, and the higher probability of a sellout, the promoters’ ultimate goal.73 This practice creates an ideal situation for ticket scalpers, but also for the average ticket holder who either cannot or no longer wants to attend the event.74 Because many consumers are willing to pay more than the advertised prices in the primary market for high demand tickets, scalpers can purchase premium tickets at face value and sell them to the highest bidder, confident that they will not be stuck with the tickets.75 The Internet has revolutionized the ticketing industry. A process that once required going in person to purchase tickets or speaking with a ticketing agent on the phone can now be completed almost instantaneously, twenty-four hours a day, in the comfort of one’s own home.76 This has been especially beneficial to the secondary ticketing market.77 Scalpers may— through the use of an “online resale marketplace,”78 such as StubHub,79 68. Diamond, supra note 62, at 72. 69. See id. 70. See Jasmin Yang, Note, A Whole Different Ballgame: Ticket Scalping Legislation and Behavioral Economics?, 7 VAND. J. ENT. L. & PRAC. 111, 111 (2004). 71. Phyllis L. Zankel, Wanted: Tickets-A Reassessment of Current Ticket Scalping Legislation and the Controversy Surrounding Its Enforcement, 2 SETON HALL J. SPORT L. 129, 144 (1992). Promoters engage in this practice to promote good will among their followers, which they hope will yield greater long-term profits. Id. 72. Simon, supra note 66, at 1176. 73. See id. By pricing tickets below what the average consumer would spend for the ticket, the likelihood of shortage of tickets is increased. See id. 74. See id. The ticket scalper can step in as a middleman and purchase the tickets from the original ticket holder who no longer desires to attend above face value at a profit to that individual and then turn around and sell them at still a higher price to another consumer who desires entry into the event, creating a profit for both. Id. 75. See Robert E. Freeman & Daniel Gati, Internet Ticket Scalping: If You Can’t Beat ‘em, Join ‘em, 21 ENT. & SPORTS LAW. 6, 6 (2003). 76. See Benitah, supra note 58, at 74–75; see also Bruce Orwall, Online: Ticket Scalpers Find a Home on the Web, WALL ST. J., Feb. 4, 1999, at B1. 77. See Kirkman, supra note 23, at 741. 78. “The term ‘online resale marketplace’ means an Internet website—(A) that facilitates or enables the resale of tickets by secondary ticket sellers; or (B) on which secondary ticket sellers offer tickets for resale.” Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009, H.R. 2669, 111th Cong. § 6(11) (2009). 79. “StubHub is the world’s largest ticket resale marketplace, enabling fans to buy and sell tickets to tens of thousands of sports, concert, theater and other live entertainment events.” 2010] Who's the Boss? 193 eBay,80 Craigslist,81 RazorGator,82 and TicketsNow—be able to offer their inventory to the widest array of consumers and collect substantial returns.83 The estimate of the value of tickets sold in the secondary market varies. While scalping was once an illicit, cash-only practice that took place outside of event venues, secondary ticket reselling over the Internet can provide a more readily analyzable source of industry activity data.84 Forrester Research estimates that “U.S. online secondary ticket sales will grow at a 12% [rate] over the next five years, reaching $4.5 billion by 2012.”85 Other sources indicate that the U.S. resale market is a $10 billion business, with online sales accounting for $3 billion per year, and rising.86 Another figure cited estimates of secondary ticketing sales to be between $2 and $14 billion.87 Regardless of the most precise number, the secondary market now comprises a substantial portion of the ticket industry. II. PREDATORY PRACTICES OF THE TICKETING INDUSTRY The primary and secondary ticketing markets have been actively working together for several years. The first time two major primary and secondary ticketing companies worked together to cross-promote and sell tickets was in 2007.88 By blurring the line between primary and secondary StubHub is the Fan’s Ticket Marketplace, STUBHUB!, http://www.stubhub.com/about-us/ (last visited Sept. 29, 2010). StubHub was acquired by eBay in January 2007. eBay Inc., Current Report (Form 8-K) (Jan. 10, 2007). 80. “With more than 90 million active users globally, eBay is the world's largest online marketplace, where practically anyone can buy and sell practically anything.” Who We Are— eBay Inc., http://www.ebayinc.com/who (last visited Dec. 21, 2009). 81. Craigslist is a centralized network of online communities, featuring free online classified advertisements—with sections devoted to jobs, housing, personals, for sale, services, community, and discussion forums. See Craigslist Factsheet, CRAIGSLIST.ORG, http://www.craigslist.org/ about/factsheet (last visited Sept. 29, 2010). 82. RazorGator is a ticket resale marketplace that empowers its clients by providing them a connection to buy or sell “Hard-to-Get®” tickets to any event on the planet. RazorGator—About Us, http://www.razorgator.com/tickets/about-us (last visited Sept. 29, 2010). 83. See Kirkman, supra note 23, at 740 (describing industry returns of $3 billion in 2006). 84. See, e.g., Courty, supra note 30, at 88 (citing the total number of tickets available for sale, for a certain number of events, along with the auction prices, for a given day in August 2002 on eBay). 85. Consumer Protection Press Release, supra note 49. 86. Julie Gibson, Hot Tickets: The Move From Streetside Scalping to Online Ticket Speculation, THE LAWYERS WEEKLY (May 9, 2008), http://www.lawyersweekly.ca/index.php? section=article&articleid=676. 87. Happel & Jennings, supra note 50, at 448–49 (citing estimates that made different assumptions as to the percentage of primary sale tickets brokers would resell in the secondary market). 88. Alfred Branch Jr., Tickets.com and RazorGator: Blurring the Lines Between Primary and Secondary, TICKETNEWS.COM (Jun. 26, 2007), http://www.ticketnews.com/Tickets.com-andRazorGator-Blurring-the-Lines-Between-Primary-and-Secondary27266. RazorGator and Major League Baseball’s Tickets.com used “Tickets.com customer database to promote events where Tickets.com [was] not the primary seller.” Id. Tickets.com decided to send a RazorGator newsletter to the Tickets.com customer database advertising an upcoming Dave Matthews Band 194 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 markets, primary ticket sellers are able to evade public scrutiny and appear to “distance themselves from the secondary market,” while maintaining significant control of that market.89 Although the outsourcing of tickets by primary ticketing companies to the secondary ticketing market may appear to be an innocent practice,90 such cooperation between the two ticketing markets fosters rampant predatory practices that deceive the public.91 Predatory practices are widespread in both the primary and secondary ticketing markets. In the primary market, such practices include diverting tickets to secondary ticketing market sellers,92 having a limited, unknown number of tickets available for public sale,93 and ticket presale events that are available to only a select group of consumers thereby limiting the number of tickets available to the public at large.94 Predatory practices in the secondary market include the use of exorbitant ticket price markups,95 the sale of tickets before the initial primary release,96 and the sale of “phantom tickets.”97 All of these practices adversely affect the consumers who are forced to pay higher prices for fewer available tickets, resulting in an economic loss to consumers.98 The predatory practices and their effect on consumers will be analyzed in turn. A. BAIT-AND-SWITCH: DIVERTING TICKETS TO AFFILIATED SECONDARY MARKET SELLERS Although the primary ticketing market is considerably larger than the secondary market in terms of the number of ticket sales and value of the industry as a whole,99 primary sellers face a limitation that does not affect their secondary market counterparts: primary ticketers are limited in what they may charge per ticket to the base value plus ancillary charges.100 In an tour, in which Tickets.com was not the primary seller, and RazorGator was selling tickets only as a secondary seller. Id. 89. Id. 90. Id. (noting legitimate aspects of the cooperation between the primary and secondary markets, such as the reality that “‘it’s more profitable to outsource secondary marketing sales then [sic] do it internally’”). 91. See, e.g., Hood, supra note 7 (citing several examples of predatory practices when the primary and secondary ticket markets work together). 92. Id. 93. See, e.g., McGlone, Ticketmaster Springsteen Concert, supra note 3. 94. See id. 95. See, e.g., Smith, supra note 24. 96. See, e.g., Who Can Tame the Scalpers?, supra note 25. 97. Id. Phantom tickets refer to the sale of tickets that do not exist, including sales for nonexistent sections. See id. 98. See Simon, supra note 66, at 1176–77 (discussing the economic transfer that occurs as a result of ticket purchaser’s willingness to pay higher amounts than charged by the box office, thereby allowing the “consumer surplus” to be transferred to secondary sellers). 99. See discussion supra Part I.A–B. 100. See Courty, supra note 30, at 87. Secondary ticket sellers face no such price limitation since they exist in a market of supply and demand in which the sale will occur at whatever price the market will bear. See Simon, supra note 66, at 1177. 2010] Who's the Boss? 195 effort to capitalize on marked-up prices, primary ticket sellers—particularly Ticketmaster101—who have close connections with secondary sellers, are engaging in a bait-and-switch practice with consumers.102 Often without the consumers’ knowledge, the primary sellers direct consumers to their affiliated secondary sellers to complete the transactions, thereby causing consumers to purchase tickets at higher prices than the face value offered directly by the primary seller.103 At other times, this bait-and-switch happens after face value tickets are no longer available, but still without a clear indication to the consumer that she has been redirected from a primary ticket seller to a secondary one.104 While this practice came to light out of the Ticketmaster sale of Bruce Springsteen tickets for the “Working on a Dream” tour,105 it is hardly the only reported instance of such conduct. Allegations of bait-and-switch practices have also been claimed with ticket sales for Britney Spears,106 The Dead,107 Fleetwood Mac,108 Phish,109 and the Wizard of Oz Broadway performance.110 A class action lawsuit filed in the United States District Court in Trenton, N.J., states that consumers seeking tickets to the aforementioned shows as well as those for “Radiohead . . . Hannah Montana and numerous others” have been subjected to bait-and-switch practice by being redirected from Ticketmaster to its subsidiary resellers.111 101. See supra Introduction and accompanying Bruce Springsteen discussion. 102. See, e.g., Hood, supra note 7. 103. Id. Such conduct is occurring even while tickets still exist through the primary ticket seller at face value. Id. 104. See Waddell, supra note 15 and accompanying text. 105. See discussion supra Introduction. 106. On Jan. 25, 2009, purchaser bought Britney Spears tickets for $150 after Ticketmaster automatically redirected them to TicketsNow. Elise Young, Lawsuit Challenges Ticket Site’s Markups: Class-Action Filing Takes on Ticketmaster, STAR-LEDGER (Newark, N.J.), May 7, 2009, at 13. It was not until the tickets were delivered that purchaser realized the seats only had a face value of $30. Id. 107. Purchaser bought tickets to the April 22, 2009 concert of The Dead from TicketsNow, spending $348.50 without ever knowing that TicketsNow was a ticket reseller, or how TicketsNow obtained her credit card information that she had saved into her Ticketmaster account. Peggy McGlone, More Music Fans Claim Scalpings by Ticketmaster, STAR-LEDGER (Newark, N.J.), Feb. 9, 2009, at 1 [hereinafter McGlone, Scalping by Ticketmaster]. 108. Purchaser bought two tickets to the March 21, 2009 Fleetwood Mac concert for $606.50 from what they thought was Ticketmaster. Id. However, the transaction was processed through TicketsNow only hours after the tickets went on sale, with “thousands of unsold tickets to the Fleetwood Mac show” still available at their face value. Id. 109. A lawsuit was filed in Federal Court in Massachusetts claiming that when a purchaser logged in to Ticketmaster seeking tickets to a Phish show, he was immediately told tickets were sold out and “immediately rerouted to TicketsNow,” where he bought nine tickets for $2,064, although the face value was only $60 per ticket. Hood, supra note 7. 110. On Feb. 18, 2009, purchaser bought four “Wizard of Oz” performance tickets for about $65 each, when the face value was only $35, after being automatically redirected from Ticketmaster to TicketsNow. Young, supra note 106. 111. Class Action Complaint and Jury Demand at 10, Vining v. Ticketmaster Entm’t, Inc., No. 09-cv-02096 (D. N.J. filed May 5, 2009), 2009 WL 1344722. 196 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 There have been additional reports of the same tactics being used for AC/DC and 3 Doors Down shows.112 Such predatory conduct extends to sales outside the United States as well.113 Although many consumers may have been unaware that they were deceived until reports surfaced regarding the Bruce Springsteen show, ticket diversion adversely affects consumer interests.114 Consumers are directed to a secondary ticket seller without warning.115 This leads them to believe they are paying the face value of tickets when, in fact, they are paying much higher prices that are dictated by the marketplace, rather than the show’s management.116 Consumers are therefore purchasing tickets from secondary sellers at marked-up prices, even while face value tickets remain available from primary sellers.117 The settlement reached in February 2009 between Ticketmaster and the Attorney General’s Office resulting from the Bruce Springsteen investigation sought to remedy this practice, in addition to compensating the aggrieved parties;118 however, further regulation is needed. Diversionary redirection is detrimental to consumers who are tricked into purchasing tickets in the secondary market,119 while primary ticket sellers who are affiliated with these secondary market sellers collect consumer surplus.120 B. UNKNOWN NUMBER OF TICKETS AVAILABLE FOR PUBLIC SALE The number of tickets that will be available for public sale depends on several factors. The size of the venue will determine the maximum number 112. McGlone, Scalping by Ticketmaster, supra note 107. 113. Ticketmaster Changes Sales Practices After Springsteen Flap, supra note 13. In Canada, a class action lawsuit was filed against Ticketmaster resulting from a purchaser attempting to buy Toby Keith tickets for the Oct. 8, 2008 performance at the Rexall Place in Edmonton, Alberta. Press Release, Sutts, Strosberg LLP, Class Action Lawsuit Commenced in Alberta Against Ticketmaster Entertainment, Inc., Ticketmaster Canada Ltd., TNOW Entertainment Group, Inc. and Premium Inventory, Inc. (Feb. 23, 2009), http://www.newswire.ca/en/releases/archive/ February2009/23/c3133.html. After accessing Ticketmaster Canada’s Web site, the purchaser was automatically redirected to TicketsNow, where she purchased one ticket for $219.15 and was never told the face value of the ticket before the transaction was completed. Id. When she received her ticket, she discovered the face value of the ticket was only $79.95. Id. 114. See McGlone, Scalping by Ticketmaster, supra note 107. 115. See, e.g., id. (noting that this automatic redirection misleads consumers to believe they are buying from the primary seller, when they are actually purchasing tickets in the secondary market). 116. See, e.g., id. 117. See id. (describing how thousands of unsold tickets, both better and cheaper, to the Fleetwood Mac show were still available at time of purchaser’s purchase from TicketsNow); Hood, supra note 7 (describing how tickets were still available for purchase to the Bruce Springsteen shows on Ticketmaster when consumers were directed to TicketsNow to purchase tickets in the secondary market). 118. N.J. AG Settlement Press Release, supra note 12 and accompanying text. 119. See Hood, supra note 7. 120. See Simon, supra note 66, at 1202 (discussing a 20% markup that is collected in large part by secondary market sellers). 2010] Who's the Boss? 197 of tickets that could be made available for sale.121 However, most consumers are unaware that the “house” holds back many of those potentially available tickets.122 Furthermore, instead of returning unused house tickets to public sale, these tickets often find their way to the scalpers and ticket brokers who sell them in the secondary ticket market.123 Moreover, tickets that are held for performers and managers are often sold directly by them in the secondary market to consumers.124 An additional subset of tickets is sold through various pre-sale events, such as fan clubs and other groups, further limiting the number of tickets available for public sale.125 With such practices largely unknown to the public, consumers often have unrealistic expectations of their chances of obtaining their desired tickets through a general public sale.126 The two Bruce Springsteen shows at the center of the Ticketmaster controversy demonstrate the false perceptions eager fans may have regarding their chances of getting tickets to a show. The total capacity for both shows was 38,778; however, only 28,284 tickets were made available for public sale—a little more than 14,000 per show.127 Tickets were held back for a variety of groups that included the media, the sponsors, the record label, and the band, among others.128 “In total, about 5,200 seats were excluded from the Ticketmaster sale for each show.”129 Had the public been made aware of the number of tickets being withheld, perhaps 121. See McGlone, Ticketmaster Springsteen Concert, supra note 3. 122. SPITZER REPORT, supra note 36, at 5. The house consists of “the producer, the promoter, the record company, the performer or other such individuals.” Id. 123. Id. at 42. 124. Smith, supra note 24. 125. SPITZER REPORT, supra note 36, at 46–47. 126. See id. at 5. 127. McGlone, Ticketmaster Springsteen Concert, supra note 3. 128. Id. The Izod Center held back more than 1,600 tickets for each concert for sponsors, media members and prospective sponsors, arena suite owners and the disabled. In addition, 1,098 tickets were held back because of technical demands: the size of the stage and its exact sound and lighting equipment hadn’t been decided before the sale, so the tour kept back seats that may have limited sightlines. Just under 2,000 tickets for each concert—almost 10 percent—were held back for Springsteen and the [New Jersey Sports and Exposition Authority], which sponsored the show. . . ... An additional 550 tickets for each show were reserved for the band’s record label, Sony, and the booking agent, Creative Arts Agency. Id. 129. Id. For an exact breakdown of tickets sold to the May 21, 2009 and May 23, 2009 shows and to see what happened to the withheld tickets, see links provided in Peggy McGlone, Getting Into a N.J. Bruce Springsteen Concert is Harder Than Imagined, NJ.COM (May 20, 2009, 9:40 PM), http://www.nj.com/news/index.ssf/2009/05/getting_into_a_nj_bruce_spring.html. 198 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 customers could have appropriately adjusted their expectations of obtaining tickets.130 A large number of tickets are often held back by the house.131 Generally, house seats that are not sold or used within forty-eight hours of the show are supposed to be returned to the box office for public sale.132 However, experienced box office employees who have become familiar with this release schedule often sell these premium seats to ticket brokers just before the scheduled release,133 resulting in a loss to the general consumer of a chance to purchase the best seats at face value.134 Ticketing employees also take tickets that are intended for public sale “out of the system just prior to public sale,” decreasing the public’s allotment, and instead sell those tickets to secondary market outlets.135 Improperly regulated and supervised, house tickets often feed directly into the secondary ticketing market. Tickets that have been withheld from public sale frequently make their way into the secondary market through the conduct of performers and management themselves. Although most consumers believe the primary sellers in the secondary market are ticket brokers or fans who are unable to use their tickets, the premium tickets offered for sale on Ticketmaster’s TicketExchange136 are not being sold by typical fans, but by the artists themselves.137 In fact, the transactions that occur in the TicketExchange 130. SPITZER REPORT, supra note 36, at 5. 131. Id. These “tickets are almost always the best seats in the house,” further depriving the public of a fair chance for the quality seats. Id. The sheer number of tickets withheld from public sale creates the opportunity for manipulation and abuse. See id. The release of house seats is actually on a “time-release” schedule such that some tickets “are released 72 hours before the performance, 48 hours before the performance, and 24 hours before the performance,” with some tickets held for last minute emergencies and VIPs. Id. at 43 n.46. 132. Id. at 43. 133. Id. 134. See id. at 5. Between April 1994 and July 1994, almost 1,000 house seats for the “Beauty and the Beast” and “Grease” shows were sold to ticket brokers just before their scheduled release for public sale. Id. at 43–44. 135. Id. at 45. For six concerts held at Madison Square Garden in 1998, 452 seats that were supposed to be designated for public sale were withheld last minute in a “management hold status,” and sold at the box office by box office employees. Id. Engaging in a similar scheme, for the Hootie and the Blowfish shows at Jones Beach Marine Theater in 1996, the box office treasurer and assistant treasurer withheld tickets valued at $300,000 to the first ten rows for 37 shows, selling them to ticket brokers instead. Id. at 46. Consequently, the treasurer pled guilty to a series of felony charges. Id. 136. TicketExchange is Ticketmaster’s online service that supposedly enables “fan-to-fan transactions,” by serving as the middleman between buyer and seller, authenticating tickets when fans are connected to Ticketmaster’s ticketing systems. About TicketExchange, http://www.ticketmaster.com/h/te/about.html (last visited Oct. 1, 2010). 137. Smith, supra note 24. In an effort to recapture the profits lost when tickets are sold by ticket brokers, Ticketmaster works with artists and managers to list “hundreds of the best tickets per concert” with its affiliated secondary sellers and divides the extra revenue, “which can amount to more than $2 million on a major tour,” with artists and management. Id. Ticketmaster CEO Azoff argued “that when ticket brokers resell tickets without permission from artists or promoters, 2010] Who's the Boss? 199 “Marketplace” pages rarely list tickets offered by fans, and whenever Ticketmaster lists so-called “platinum seats,” the marketplace is selling only artist-sanctioned seats.138 Reports claim that almost every major concert tour today involves the sale of withheld tickets being sold by artists and promoters in the secondary market.139 Professional sports teams have been selling their own tickets in the secondary market as well.140 Because artists and management profit from the secondary market, ticket brokers should not take all of the blame; regulation is needed to limit and protect all parties involved. The sale of tickets to the public is further limited by the existence of various presales such as those for fan clubs and certain credit card holders.141 However, even these fan club members have also been the victims of predatory practices of the ticketing industry.142 The existence of these presales can severely limit the number of tickets available for public sale, further distorting the public’s perception of total ticket availability.143 The predatory practice of very limited disclosure regarding the number of tickets available for public sale for any given event impairs the general consumer by diverting a large number of tickets away from public sale and creating an unrealistic expectation of her chance of acquiring her desired ticket.144 Should more information be made available—as regulation of the it ‘drives up prices to fans, without putting any money in the pockets of artists or rights holders.’” Id. 138. Id. Tickets for a Britney Spears concert in March 2009 had a link from Ticketmaster to TicketExchange accompanied by the message “[b]rowse premium seats plus tickets posted by fans.” Id. However, after inquiry by The Wall Street Journal, the “tickets posted by fans” part of the message was removed. Id. 139. Id. (listing as examples recent tours by Bon Jovi, Celine Dion, Van Halen and Billy Joel). 140. See, e.g., Benitah, supra note 58, at 75–77. For example, the Chicago Cubs set up a ticket brokerage called Wrigley Field Premium Ticket Services and the Seattle Mariners established the Ticket Marketplace to serve as a middleman between buyers and sellers and collect a commission for completed transactions. Id. at 75. 141. Event presales refer to special offerings of tickets available to select groups before the tickets are made available for public sale. TicketLiquidator Glossary Page, supra note 65. Fan clubs provide unrivaled access to their favorite artists and often club members are able to secure tickets to an event before those tickets are made available to the public by virtue of their participation, often a paid subscription, to the fan club. See Hood, supra note 7 (describing a Hannah Montana fan club). Additionally, presales often occur as a bonus for being a member of a certain group. SPITZER REPORT, supra note 36, at 41 (describing special ticketing benefits available to a member of a theater party or of a large group); Ellen Rosen, In the Race to Buy Concert Tickets, Fans Keep Losing, N.Y. TIMES, Oct. 6, 2007, at C6 (discussing ticket purchasing advantages provided for being an American Express or Visa card holder). 142. Hood, supra note 7. A Hannah Montana—the persona of child star Miley Cyrus—Web site offered $30 memberships to its fan club that included early access to concert tickets; however, the “website failed to inform club members that the sales went public within fifteen minutes of first being offered to members.” Id. Additionally, the site offered early access “pre-sale codes” after the shows had already been sold out. Id. 143. Rosen, supra note 141. Of 11,000 seats available for a Hannah Montana concert, Ticketmaster was allocated 8,400 tickets by the promoter, with half going to the fan club and the other half going to the general public. Id. 144. See McGlone, Ticketmaster Springsteen Concert, supra note 3. 200 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 industry would require—the consumer would be better equipped to assess her chance of acquiring tickets; she would also better understand that additional tickets may be made available closer to show time,145 and could therefore avoid overpaying for tickets in the secondary market. C. EXORBITANT MARKUPS In the secondary market, the marketplace often dictates ticket resale prices.146 However, the price of tickets in the secondary market is also distorted by the below-market price maintained in the primary market147 as well as the excessive mark-ups that some ticket resellers add to the ticket price.148 One primary reason for this large mark-up is that ticket resellers often have to recover the costs of illegal payments that are used to acquire the tickets.149 This practice, known as “‘ice’ is money paid, in the form of a gratuity, premium or bribe, in excess of the printed box office price of a ticket, to an operator of any ‘place of entertainment’ or their agent, representative or employee” for withholding the best seats from the public.150 By selling tickets at below the market-clearing price, the primary market participants enable this illegal practice because brokers and other individuals are willing to bribe the ticketing agents knowing they will be able to recoup their costs in the secondary market.151 Thus, the predatory practice of marking-up tickets to exorbitant prices that often occurs in the secondary market is the direct result of the illegal—and often clandestine—relationship between ticket resellers and ticket agents through which the secondary market sellers acquire their tickets.152 Regulation of this practice is necessary to protect consumers from excessive prices and rectify the illegal ticket exchanges that exist between ticket agents and secondary sellers. 145. 146. 147. 148. SPITZER REPORT, supra note 36, at 56–57. See Diamond, supra note 62, at 73. See Benitah, supra note 58, at 71–72; see also discussion supra Part I.B. See Kirkman, supra note 23, at 746 (describing the common practice employed by promoters where they charge lower face value rates because of the awareness that extra fees will be generated through the secondary market). For example, an average seat to a Broadway musical in New York City during the 1990s costing $75 or $80 would be sold for between $100 and $175 and sometimes more. See SPITZER REPORT, supra note 36, at 14. 149. See Simon, supra note 66, at 1180. 150. Andrew Kandel & Elizabeth Block, The “De-Icing” of Ticket Prices: A Proposal Addressing the Problem of Commercial Bribery in the New York Ticket Industry, 5 J.L. & POL’Y 489, 489–90 (1997). 151. Simon, supra note 66, at 1180. 152. See SPITZER REPORT, supra note 36, at 19 (concluding that “one of the primary reasons for the inflated prices on the resale market is that certain brokers have to cover the cost of payments of ice”). 2010] Who's the Boss? 201 D. SECONDARY SALE OF TICKETS AT OR BEFORE INITIAL PRIMARY TICKET RELEASE Typically, a show’s promoter determines when the sale of tickets is to begin.153 However, since the Internet has taken over the secondary market,154 ticket resellers often engage in the predatory practice of listing tickets for sale before or at roughly the same moment of the primary market’s initial ticket release.155 Because secondary retailers should not have the actual tickets before the original sale, some consumers believe the system constitutes a scam.156 The 2007 Hannah Montana “Best of Both Worlds Tour,” is illustrative of this systemic problem. Tickets to this fifty-four-date, nationwide concert tour went on sale at 10 a.m., and were sold out by 10:05 a.m.157 However, by 10:05 a.m. several secondary ticketing sites already had many tickets available, but at much higher prices.158 Similarly, tickets for the final Bruce Springsteen shows at Giants Stadium for September 30, 2009 and October 2 and 3, 2009—officially priced between $33 to $98159—appeared on Web sites such as ebay.com, cheaptickets.com,160 and selectaticket.com161 up to a week before the official ticket release,162 with prices up to $1,300 a ticket.163 The same phenomenon plagued the 2007 reunion tours of The Police and Van Halen.164 The sale of tickets in the secondary market before or at the same time as an original ticket release is a predatory practice that hurts the consumer. It limits the number of consumers who are able to purchase tickets in the primary market,165 and is indicative of the dubious means by which 153. 154. 155. 156. Courty, supra note 30, at 87. See Kirkman, supra note 23, at 741. See id. at 750. See Peggy McGlone, ‘Banned’ Ticket Sale Practice Persists: Jacked-up Prices for the Boss’ Shows, STAR-LEDGER (Newark, N.J.), May 27, 2009, at 1 [hereinafter McGlone, Jacked-up Prices for the Boss’ Shows]. Certain consumers are convinced that secondary brokers are either promised tickets beforehand, purchase tickets from individuals who had access to an event presale, or engage in other dubious conduct to acquire tickets. Id. 157. Randall Stross, Hannah Montana Tickets on Sale! Oops, They’re Gone, N.Y. TIMES, Dec. 16, 2007, at 34. 158. Id. Tickets that had a face value of between $21 and $66 were listed almost instantaneously on Web sites like StubHub, for many times the face value. See id. 159. McGlone, Jacked-up Prices for the Boss’ Shows, supra note 156. 160. CheapTickets.com is a secondary market ticket reseller affiliated with Orbitz.com. About Orbitz Worldwide, http://corp.orbitz.com/about (last visited Oct. 2, 2010). “Orbitz Worldwide is a leading global online travel company that uses innovative technology to enable leisure and business travelers to research, plan and book a broad range of travel products.” Id. 161. Select-A-Ticket is a New Jersey ticket broker that has been buying and selling tickets to and from customers for over 30 years. About Select-A-Ticket, http://www.selectaticket.com/ About-Us (last visited July 28, 2010). 162. McGlone, Jacked-up Prices for the Boss’ Shows, supra note 156. 163. Who Can Tame the Scalpers?, supra note 25. 164. Rosen, supra note 141. 165. See id. 202 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 secondary sellers obtain their tickets through illegal practices.166 Increased regulation is necessary not only to prevent the secondary sale of tickets before the primary ticket release and to prevent secondary sellers from obtaining the tickets before the original sale, but also to maximize the number of tickets in the primary market and thereby increase the chances for regular consumers to obtain them.167 E. SALE OF “PHANTOM TICKETS” Another practice plaguing the secondary market is the sale of tickets that do not actually exist.168 In yet another Bruce Springsteen tour ticketing gaffe, TicketsNow oversold the May 18, 2009 Washington D.C. show by selling “phantom tickets”169 to several hundreds of consumers.170 This practice has been called “plain fraud” by New Jersey Attorney General Anne Milgram,171 and despite the efforts to rectify the problem for those 300 consumers who purchased the phantom tickets, regulation is required to prevent similar occurrences in the future.172 Greater transparency is necessary so that such frauds may be spotted more easily by consumers who can then find legitimate sources for tickets. III. PROPOSED REGULATION OF THE TICKETING INDUSTRY In response to the predatory practices currently plaguing the primary and secondary ticket markets, the federal government has taken the first steps towards rectifying this largely unregulated industry. On June 2, 2009, Representative Bill Pascrell, Jr. introduced a bill in the House of Representatives—the Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009173—“to direct the Federal Trade Commission [FTC] to prescribe rules to protect consumers from unfair and deceptive acts and practices in connection with primary and 166. See, e.g., Kandel & Block, supra note 150, at 489–90 (discussing secondary ticket brokers obtaining tickets through illegal payments to ticketing agents). 167. See McGlone, Jacked-up Prices for the Boss’ Shows, supra note 156; see also SPITZER REPORT, supra note 36, at 56 (“Any amendment to the current law should control the supply of tickets in the secondary or resale market.”). 168. See Hood, supra note 7. 169. Who Can Tame the Scalpers?, supra note 25. Phantom tickets refer to the sale of tickets that do not exist, including sales for non-existent sections. See id. 170. Mark Mueller, Ticketmaster Takes Heat For Another Springsteen Snag: Pascrell Promises a New Law After Finding Subsidiary Sold Nonexistent Tickets, STAR-LEDGER (Newark, N.J.), May 14, 2009, at 13. 171. Peggy McGlone, AG Sues Resellers on Boss Tickets They Don't Have, STAR-LEDGER (Newark, N.J.), May 28, 2009, at 1. 172. Hood, supra note 7. 173. The title of the bill is in reference to Bruce Springsteen, whose shows were at the center of the ticketing controversy described throughout this note. McGlone, The BOSS ACT Rewrites, supra note 29. 2010] Who's the Boss? 203 secondary ticket sales.”174 The bill is currently stalled in the House Committee on Energy and Commerce, where it has been referred.175 However, the BOSS ACT effectively combats many of the deceptive practices in the industry and its immediate passage is necessary to protect consumers. The Act is substantively divided into four sections: 1) Rules on Transparency of Ticket Marketing, Distribution, and Pricing by Primary Ticket Sellers; 2) Rules for Secondary Ticket Sellers; 3) Registration of Secondary Ticket Sellers and Online Retail Marketplaces; and 4) Enforcement.176 Each of these sections will be analyzed. A. RULES ON TRANSPARENCY OF TICKET MARKETING, DISTRIBUTION, AND PRICING BY PRIMARY TICKET SELLERS With regard to the primary sale, distribution, and pricing of tickets, the BOSS ACT instructs the FTC to promulgate rules that require the disclosure of general information to the public before tickets go on sale.177 First, the Act requires primary sellers disclose the total number of tickets that a seller has available for public sale.178 Next, primary sellers must disclose the “total number and the distribution method of all tickets” that are not available for public sale.179 Additionally, the Act requires the “distribution method and the date and time of the primary sale be printed on each such ticket.”180 Furthermore, the Act calls for primary sellers to list, in addition to the total cost, all of the ancillary charges associated with the ticket in all advertising or ticket listings.181 Finally, the Act mandates that a ticket refund include all ancillary charges.182 The BOSS ACT requires primary sellers to disclose the total number of tickets they will have available for primary sale for each show or event.183 This provision combats the well-documented predatory practice of withholding the number of tickets that are actually available for public sale.184 While consumers attempting to obtain tickets to performances and 174. Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009, H.R. 2669, 111th Cong. (2009). The bill is co-sponsored by 17 other representatives. H.R. 2669 Cosponsors, LIBRARY OF CONGRESS, http://thomas.loc.gov/cgi-bin/bdquery/z?d111:HR026 69:@@@P (last visited July 10, 2010). 175. H.R. 2669 CRS Summary, LIBRARY OF CONGRESS, http://thomas.loc.gov/cgi-bin/ bdquery/z?d111:HR02669:@@@D&summ2=m& (last visited July 10, 2010). 176. H.R. 2669. 177. Id. § 2. 178. Id. § 2(1). 179. Id. § 2(2). 180. Id. § 2(3). 181. Id. § 2(4). 182. Id. § 2(5). 183. Id. § 2(1) (including “[a] requirement that a primary ticket seller disclose and display on the Web site of such primary ticket seller the total number of tickets offered for sale by such primary ticket seller not less than 7 days before the date on which tickets shall be available for primary sale”). 184. See SPITZER REPORT, supra note 36, at 5. 204 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 events frequently understand that not every ticket is available for public sale, they often do not know whether it is 500 tickets being withheld or 5,000.185 Accordingly, consumers are unable to develop appropriate expectations with regard to their chances of acquiring tickets.186 By mandating the release of this information to the public, the BOSS ACT will help consumers to accurately assess their chances of getting tickets, thus rectifying a deceptive practice and major source of malcontent among consumers. This legislation also requires primary ticket sellers to make known the number of tickets and method of distribution for tickets they are responsible for that are not available for general sale.187 The disclosure of this information to the public will serve two main functions. First, in conjunction with the disclosure of the number of tickets that are available for public sale, consumers will be better equipped to have realistic expectations with regard to their ability to obtain tickets.188 Second, consumers who particularly desire tickets to a given show will be aware of presale events available only to certain groups of people and may be afforded the opportunity to join these groups in anticipation of the presales.189 The ultimate effect will provide greater transparency so members of the public who covet tickets can more effectively strategize and navigate the market than they can under the current system. The BOSS ACT will require that the “distribution method . . . and date and time of the primary sale be printed on each [] ticket.”190 This will combat several predatory practices. First, it will deter primary ticket sellers from diverting tickets to their wholly owned subsidiaries, as the source of the tickets will be more easily discernable.191 Second, it will diminish the sale of tickets in the secondary market before the primary ticket sale because it will make it more obvious when tickets were obtained through illicit means.192 Finally, the existence of these identification marks on the 185. See McGlone, Ticketmaster Springsteen Concert, supra note 3. 186. SPITZER REPORT, supra note 36, at 5. 187. H.R. 2669 § 2(2). The bill has: A requirement that a primary ticket seller make publicly available, not less than 7 days before the day on which tickets shall be available for primary sale, the total number and distribution method of all tickets not made available for sale to the general public, the distribution of which is the responsibility of that primary ticket seller. Id. 188. 189. 190. 191. See Rosen, supra note 141. See TicketLiquidator Glossary Page, supra note 65. H.R. 2669 § 2(3). See Hood, supra note 7 (requiring tickets to contain the distribution method and the date and time will deter primary sellers like Ticketmaster because any improper transfer to secondary sellers will be transparent to consumers when they receive their tickets). 192. Id.; see also McGlone, Jacked-up Prices for the Boss’ Shows, supra note 156 (discussing how consumers purchasing a ticket in the secondary market prior to the printed date of the 2010] Who's the Boss? 205 tickets will ease the enforcement costs for the FTC, as, barring fraud, it will be immediately apparent the route the tickets have taken through the market. This information will better protect consumers and deter the dubious business practices that currently run rampant throughout the ticketing industry. To ensure that consumers are aware of the full price of the tickets they purchase, the BOSS ACT will also require that primary sellers list the final face value of the ticket, including all ancillary charges, on both the ticket itself and in any advertising or marketing.193 This provision serves to protect consumers from being deceived with regard to the ticket price, as many purchasers do not factor in or notice the ancillary charges—which can reach up to 50%—that primary ticket sellers add on as convenience or service fees.194 Additionally, this will allow secondary purchasers to understand the true cost of the ticket and to accurately compare the prices offered between the primary and secondary ticket sellers.195 The requirement that the face value of the ticket, including ancillary charges, not only be on the ticket, but in all advertising and listings as well, will ensure that consumers are not “accidently” charged more than they expect when they complete their transactions. The BOSS ACT will change the refund policy of many primary sellers by requiring that they “include all ancillary charges in any refund of a ticket” that is subject to a refund.196 Most refund policies currently offer to refund the base ticket price plus some of the ancillary charges.197 However, this regulation will broadly define ancillary charges to include charges associated with a ticket “not included in the base price.”198 While it may be argued that a delivery fee is a charge associated with the purchase of a primary sale will be better equipped to expose any improper diversions by primary sellers to secondary sellers). 193. H.R. 2669 § 2(4). The bill requires that: [T]he primary ticket seller include, with any listing of the price of a ticket on the primary ticket seller’s website or in any promotional material where the ticket price is listed, all ancillary charges related to the purchase of a ticket, and include such charges and the total cost to the consumer on each individual ticket. Id. 194. Don Oldenburg, The Ticketmaster Fee-nomenon, WASH. POST, June 29, 2004, at C10. 195. See Kirkman, supra note 23, at 746 (announcing the difference between primary and secondary prices will shine light on the common practice of “the secondary market dress[ing] up as a genuine supply-and-demand-based free market, [and will expose] . . . that the market is instead based on bribery”). 196. H.R. 2669 § 2(5). 197. See, e.g., Ticketmaster Purchase Policy, http://www.ticketmaster.com/h/purchase.html? tm_link=help_nav_4_purchase (last visited Oct. 23, 2010) (noting that Ticketmaster “will issue a refund of the ticket's face value paid (or, if a discounted ticket, then instead the discounted ticket price paid), all service fees and any convenience charge . . . .” but “[i]n no event will delivery charges or any other amounts [including processing fee] be refunded”). 198. H.R. 2669 § 6(1). 206 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 ticket, delivery fees are explicitly exempted from many primary ticket seller refund policies.199 The Act will require that primary ticket sellers change their refund policies, affording consumers a refund of the full amount they spend on tickets, rather than just the portion of the ticket price the primary ticket seller is willing to return. B. RULES FOR SECONDARY TICKET SELLERS The BOSS ACT mandates that the FTC adopt regulations affecting the secondary ticket market to protect consumers and eliminate the deceptive practices that currently exist.200 When secondary ticket sellers do not have possession of the ticket at the time of the sale, the Act requires such sellers to clearly state they do not currently possess the ticket, and outline the procedure for a refund if the ticket received does match what was advertised.201 Next, the Act prohibits the purchase of tickets by secondary ticket sellers in the primary market during the first forty-eight hours of the sale.202 The legislation also requires secondary ticket sellers to disclose “the distribution method and face value of each ticket,” the seat location, the date and time of purchase if acquired through primary sale, and “the number or identifier assigned to them.”203 Furthermore, the BOSS ACT requires that online resale marketplaces clearly post on their Web sites a disclaimer that they are secondary ticket sellers and users must confirm seeing the disclaimer.204 The Act also prohibits employees of any entity involved with the sale of primary tickets to resell tickets for higher than face value or to resell them to any person who the employees know or should reasonably know intends to sell the ticket for more than face value.205 Finally, online resale marketplaces are required to disclose when the seller is the “primary ticket seller, venue, or artist associated with the event to which the ticket relates.”206 The BOSS ACT requires full disclosure of secondary ticket sellers when they do not possess a ticket at the time of the ticket resale and the procedures by which purchasers may obtain a refund if the tickets they receive do not match what was advertised.207 Initially, such disclosure will 199. 200. 201. 202. 203. 204. 205. 206. 207. See, e.g., Ticketmaster Purchase Policy, supra note 197. See H.R. 2669 § 3. Id. § 3(1). Id. § 3(2). Id. § 3(3). Id. § 3(4). Id. § 3(5). Id. § 3(6). Id. § 3(1). The bill states the following: A requirement that if the secondary ticket seller does not possess the ticket at the time of the sale that such secondary ticket seller provide— (A) a clear statement that the secondary ticket seller does not possess the ticket; and 2010] Who's the Boss? 207 make consumers more aware of the potential risks associated with transacting business with a particular secondary ticket seller.208 This allows consumers to weigh the risks and gives them the information they need to decide to purchase their tickets from a party who actually has them in hand. Additionally, the overall risk of dealing with these secondary ticket sellers will be reduced because, in the event there is a ticket discrepancy, the refund policy will have been disclosed. Thus, the disclosure of this information to the public will help to give fans a better chance of obtaining tickets to their favorite performances and events by increasing their knowledge of the ticket resale situation and lessen the risks associated with dealing with secondary ticket sellers.209 The Act will prohibit a secondary ticket seller from purchasing tickets in the primary ticket market within forty-eight hours of the primary ticket sale.210 This provision will both limit the initial stock of tickets that brokers have available for resale and maximize the number of tickets that are available for primary sale to eager fans. It will limit the use of automated and computerized programs that secondary ticket sellers employ to beat the security mechanisms in place on ticket Web sites that are designed to prevent the sale of large blocks of tickets at once.211 Furthermore, the prohibition will lessen the bait-and-switch practice employed throughout the industry during the first forty-eight hours of a primary sale—at least with respect to in-hand ticket transactions—as secondary ticket sellers will be unable to instantaneously offer tickets to sold-out events and performances.212 Accordingly, the ultimate goal of this legislation will be (B) an explanation of procedures to be followed by the purchaser to obtain a refund from the secondary ticket seller if the ticket the purchaser ultimately receives does not match the description of the ticket by the secondary ticket seller. Id. 208. See Hood, supra note 7 (discussing the future prevention of predatory practices that were orchestrated by Ticketmaster during the Bruce Springsteen primary ticket offering). Some of the warnings may include a disclaimer that the tickets received may be different than what is advertised or what they purchased, the seller may be unable to deliver on the sale if the seller’s ticket source does not come through, or these tickets might not exist at all. See id. For example, this could have possibly prevented TicketsNow’s practice of overselling the Bruce Springsteen show when they sold tickets that did not exist to over 300 consumers. See id. 209. Press Release, Rep. Pascrell, Jr., Pascrell Unveils “BOSS ACT” to Make Ticket Sales Transparent; Reel in Secondary Ticket Market (June 1, 2009), http://www.house.gov/apps/list/ press/nj08_pascrell/pr612009.shtml [hereinafter Pascrell BOSS ACT Press Release]. 210. H.R. 2669 § 3(2). An exception exists making this provision inapplicable with respect to the sale of “season tickets or bundled series tickets.” Id. 211. See Kirkman, supra note 23, at 753–57. The practice of ticket brokers purchasing large ticket volumes during primary offerings was the issue at the heart of the lawsuit between Ticketmaster and RMG Technologies in 2007. Ticketmaster, L.L.C. v. RMG Technologies, Inc., 507 F. Supp. 2d 1096 (C.D. Cal. 2007). 212. See Hood, supra note 7. 208 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 achieved by giving the regular fan a better opportunity to purchase reasonably priced tickets in the primary market.213 The BOSS ACT imposes a series of additional disclosure requirements on secondary ticket sellers. First, they must disclose “the distribution method and face value of each ticket.”214 This combats predatory bait-andswitch practices by ensuring that purchasers are aware of the primary sale face value of the ticket, and are thus informed about the markup they are paying for tickets in the secondary market.215 Secondary ticket sellers must also make known the seat locations of the tickets they offer for sale.216 This disclosure will enable purchasers to accurately assess the worth of the tickets, and prevent advertisers from deceptively drawing in consumers with claims of “premium” tickets that are actually located in the least desirable sections.217 Additionally, if secondary sellers acquired their tickets through primary sales, the date and time of the purchases must be disclosed.218 This should help combat the illegal practices by which secondary sellers acquire their tickets as most tickets are released through public sale, and there are only limited legal means by which to get tickets through presale events.219 Thus, the failure of a secondary ticket seller to list the date and time of purchase could be a sign that illegal conduct is occurring. Finally, the Act requires that secondary ticket sellers disclose the “number or identifier assigned to them” as part of a system of mandated federal registration.220 Collectively, these disclosures will increase the available information to the public about ticket resale and about the secondary ticket sellers themselves, and provide some protection to consumers from deceptive market practices. The BOSS ACT requires that online resale marketplaces post a “clear and conspicuous notice” on their Web sites that they are secondary ticket sellers and requires that the “user confirm having read such notice before starting any transaction.”221 This provision was drafted to ensure that 213. See Pascrell BOSS ACT Press Release, supra note 209. 214. H.R. 2669 § 3(3)(A). 215. See, e.g., Young, supra note 106 (purchaser who bought Britney Spears tickets did not know the face value of the ticket they purchased for $150 was only $30 until the tickets arrived in the mail). See also discussion supra Part II.A. 216. H.R. 2669 § 3(3)(B). The bill requires disclosure of the following: the precise location of the seat or space to which the ticket would entitle the bearer, or, . . . descriptive information about the location of the seat or space, such as a description of a section or other area within the venue where the seat or space is located . . . . Id. 217. See Help—Contact Us—Why Aren’t Seat Numbers Provided?, STUBHUB!, http://www.stubhub.com/help/?searchKeyword=top-questions-buyer (last visited Oct. 2, 2010) (describing the current policy of StubHub with regards to disclosing seat information). 218. H.R. 2669 § 3(3)(C). 219. SPITZER REPORT, supra note 36, at 47. 220. H.R. 2669 § 3(3)(D). See also discussion infra Part III.C. 221. H.R. 2669 § 3(4). 2010] Who's the Boss? 209 consumers are aware of when they are exploring the secondary marketplace for tickets.222 It is designed to combat the bait-and-switch practices that led to the outcry for regulation of the ticketing industry in February 2009.223 The regulation will make it more difficult to trick consumers into purchasing tickets in the secondary market when under a false belief that they are buying from a primary seller. The Act also endeavors to combat the illegal procedures by which secondary ticket sellers acquire their inventory of tickets. Specifically, it prohibits any employee of a group that is involved with the event to resell a ticket for more than face value or to resell to any other party who will sell the ticket for more than face value.224 This provision serves to eliminate illegal payments in two ways. First, it makes it unlawful for someone to make a payment of “ice”225 or any money above the face value of a ticket to a person involved in the event or performance in some way.226 Second, it prohibits the sale of tickets to a person who intends to sell the tickets for a profit in the secondary market. This will effectively eliminate the principal source of tickets for secondary ticket sellers.227 Accordingly, by making this conduct illegal, the BOSS ACT will ensure that tickets are sold in the primary market rather than illegally diverted into the secondary market. The BOSS ACT also requires that online resale marketplaces disclose those instances when the “secondary ticket seller of a ticket is the primary ticket seller, venue, or artist associated with the event to which the ticket relates.”228 This provision uses disclosure requirements to inform consumers when the insiders of a given performance or event are diverting tickets away from the primary market and into the secondary market to collect higher profits.229 In doing so, the Act both discourages this practice 222. See Hood, supra note 7 (unlike during the Springsteen primary ticket offering, where consumers had no idea they were transferred to a secondary seller). 223. See id. 224. H.R. 2669 § 3(5). The bill states the following: [a] prohibition on the resale of a ticket by an individual employee of any venue, primary ticket seller, artist, online resale marketplace, or box office that is involved in hosting, promoting, performing in, or selling tickets if such resale— (A) is for a higher price than face value of the ticket; or (B) is made to any third party and the employee has actual knowledge, or knowledge fairly implied on the basis of objective circumstances, that the third party intends to sell the ticket for a higher price than face value of the ticket. Id. 225. See discussion supra Part II.C. 226. See Simon, supra note 66, at 1180. 227. See id. (since primary ticket sellers will no longer be provided with a bribe, they will no longer be willing to favor secondary ticket brokers in selling their allotments). 228. H.R. 2669 § 3(6). 229. See Smith, supra note 24; see also discussion supra Part II.B. 210 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 by artists and management,230 and gives consumers the choice whether to reward such behavior by purchasing those tickets. This provision, like the others, is intended to maximize the number of tickets available for public sale in the primary market to provide regular fans with a fair chance to attend their desired performances and events.231 C. REGISTRATION OF SECONDARY TICKET SELLERS AND ONLINE RETAIL MARKETPLACES In an effort to provide better oversight of the secondary ticketing market, the BOSS ACT would require the FTC to implement registration requirements for all secondary ticket sellers and online resale marketplaces.232 First, this legislation calls for every secondary ticket seller and online resale marketplace to register with the FTC.233 The registration must include a “viable street address, telephone number, and email address . . . ,” and this information must be verified annually.234 Additionally, the FTC will assign a unique “identification number or other identifier” to each registered secondary ticket seller or online resale marketplace; this information must be disclosed upon offering any tickets for sale.235 Collectively, these requirements will provide greater oversight of the secondary market. Without this legislation, the secondary ticket market will continue to function as a largely unregulated industry. Ticket brokers have attempted self-regulation in an effort to appear as reputable businesses236 rather than unscrupulous ticket hoarders—an image currently shared by many.237 In 1994, the National Association of Ticket Brokers (NATB) was formed as a voluntary trade organization for ticket brokers.238 Although the NATB includes a code of ethics and uniform complaint procedures by which every member must abide,239 voluntary membership prevents the organization from binding the actions of all secondary market sellers on the national 230. 231. 232. 233. 234. 235. 236. See Smith, supra note 24. See Pascrell BOSS ACT Press Release, supra note 209. H.R. 2669 § 4. Id. § 4(a)(1). Id. § 4(a)(2)–(3). Id. § 4(b). See National Association of Ticket Brokers, http://www.natb.org/ (last visited Oct. 2, 2010). 237. See generally Daniel McGinn, The Biggest Game in Town: A Single Seat for $35,000? How Does This Happen, and Does It Hurt the Fan? Inside the High-stakes, High-stress World of Ticket Brokers, BOS. GLOBE SUNDAY MAG., Sept. 21, 2008, at 22. 238. National Association of Ticket Brokers, supra note 236. The NATB’s stated mission is “to establish an industry-wide standard of conduct and to create ethical rules and procedures to protect the public and foster a positive perception of the industry.” Id. 239. Id. 2010] Who's the Boss? 211 scale.240 Thus, the BOSS ACT is necessary to require uniform oversight over all secondary market sellers, not just those choosing to abide by established trade association rules. The mandatory registration requirement will allow the FTC to track secondary ticket sellers and ensure that they operate in accordance with FTC guidelines.241 As it will be unlawful for secondary ticket sellers to operate without registering with the FTC, the BOSS ACT will enable consumers to assess the reputability of their operations.242 By maintaining contact information for secondary ticket sellers on file, the FTC will be better able to locate and enforce regulations, rather than wasting resources searching for entities that exist solely on the Internet without a fixed location.243 Additionally, the existence of “centralized registration” will help ensure that secondary ticket sellers can be identified for the payment of appropriate taxes.244 Furthermore, requiring secondary ticket sellers to post their identification number when engaging in the resale of tickets will provide consumers a viable avenue of recourse against those who do not transact business according to federal regulations; it will enable consumers to file complaints with the FTC or obtain the seller’s contact information from the FTC in order to seek private legal remedies.245 The BOSS ACT will build upon the mission of the NATB, elevating its optional standards to industry-wide requirements by which all secondary ticket sellers and online resale marketplaces must abide. D. ENFORCEMENT The BOSS ACT contains a strong enforcement clause that gives some teeth to the substantive regulations and oversight encompassed in the legislation. The enforcement provision states that a violation will be treated as an unfair or deceptive act and that the FTC will enforce the Act.246 In 240. Membership in the NATB is not required for ticket brokers. See id. (listing no mandatory requirement that a secondary market ticket seller be a member of NATB). 241. See Better Oversight of Secondary Sales and Accountability in Concert Ticketing Act of 2009, H.R. 2669, 111th Cong. § 4(a) (2009). 242. By requiring that secondary ticket sellers disclose their unique registration number assigned by the FTC when offering tickets for sale, the absence of such a registration number will signal to consumers that something is not right with this secondary seller. See id. § 3(3)(D). 243. See id. § 4(a)(2). 244. Daniel J. Glantz, Note, For-Bid Scalping Online?: Anti-Scalping Legislation in an Internet Society, 23 CARDOZO ARTS & ENT. L.J. 261, 299–300 (2005). 245. See id. at 301 (describing centralized identification as the “necessary reporting and security mechanism . . . in place for the collection of taxes [and] private enforcement”). 246. H.R. 2669 § 5(a). The bill states the following: A violation of a rule prescribed pursuant to section 2 or 3 or a violation of section 4(a)(1) shall be treated as a violation of a rule defining an unfair or deceptive act or practice prescribed under section 18(a)(1)(B) of the Federal Trade Commission Act (15 U.S.C. 57a(a)(1)(B)). The Federal Trade Commission shall enforce this Act in the same manner, by the same means, and with the same jurisdiction as though all applicable 212 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 addition, the Act provides State Attorneys General the power to bring civil actions on behalf of the residents of that State for violations of the rules.247 Furthermore, the FTC, upon receiving appropriate notice of civil action brought by a State on matters related to the BOSS ACT, may intervene and “be heard on all matters arising in such civil action.”248 Additionally, should the FTC file a civil or administrative action, a State may not pursue a civil suit until the completion of the FTC’s action.249 Finally, a State may “recover reasonable costs and attorney fees from the lender or related party” if it prevails in a civil action.250 An established enforcement mechanism will provide this federal legislation with the muscle to effectively regulate the ticketing industry. The problem facing voluntary associations and other forms of selfregulation, such as the NATB, is that there is little effective enforcement, besides being removed from the group.251 However, voluntary selfregulation is often an insufficient deterrent to predatory practices affecting an industry.252 The BOSS ACT, conversely, provides strong means to enforce its provisions. It allows for enforcement by both the FTC, under its general enforcement powers, and the respective State Attorneys General, who are charged with protecting the residents of their state.253 The opportunity for these groups to seek both injunctive and monetary relief— in addition to individual consumers’ ability to pursue independent legal action254—will effectively enforce the BOSS ACT and ensure appropriate compliance throughout the ticketing industry. terms and provisions of the Federal Trade Commission Act were incorporated into and made a part of this Act. Id. 247. 248. 249. 250. 251. Id. § 5(b)(1). Id. § 5(b)(3). Id. § 5(b)(6). Id. § 5(b)(7). National Association of Ticket Brokers Code of Ethics, http://www.natb.org/consumer/ index.cfm?pg=code.cfm (last visited Oct. 2, 2010). 252. Since the NATB is a voluntary organization, and many consumers are probably unaware of its existence to begin with, membership in the organization may be of little concern to many potential members, especially those engaging in predatory practices. See Neil Gunningham & Joseph Rees, Industry Self-Regulation: An Institutional Perspective, 19 LAW & POL. 363, 366–70 (1997) (describing self-regulation as “a cynical attempt by self-interested parties to give the appearance of regulation (thereby warding off more direct and effective government intervention) while serving private interests at the expense of the public.”). 253. H.R. 2669 §§ 5(a), 5(b). 254. Although individuals can pursue remedies under standard state fraud theories, there is no private cause of action for violations of the FTC Act. E.g., R.T. Vanderbilt Co. v. Occ. Saf. & H. Rev. Com'n, 708 F.2d 570, 574–75 n. 5 (11th Cir. 1983); Fulton v. Hecht, 580 F.2d 1243, 1248– 49 n. 2 (5th Cir. 1978); Alfred Dunhill Ltd. v. Interstate Cigar Co., Inc., 499 F.2d 232 (2d Cir. 1974); Holloway v. Bristol-Myers Corp., 485 F.2d 986, 1002 (D.C. Cir. 1973); Carlson v. CocaCola Co., 483 F.2d 279 (9th Cir. 1973). Additionally, at least one circuit has said a state common law fraud claim is not supportable by a knowing violation of the FTC Act. Morrison v. Back Yard Burgers, Inc., 91 F.3d 1184 (8th Cir. 1996). 2010] Who's the Boss? 213 IV. RECOMMENDATION OF RULES FOR THE FTC TO PROMULGATE IN ACCORDANCE WITH THE BOSS ACT The BOSS ACT requires that the FTC promulgate rules in accordance with the provisions that appear throughout the Act.255 However, it does not limit the FTC to only adopting rules in accordance with those provisions. Rather, the FTC is free to adopt, as part of its rulemaking authority, more exhaustive rules or even include rules that have not been explicitly contemplated by the BOSS ACT.256 While the Act seeks to remedy many of the problems that exist throughout the ticketing industry, some additional regulations should be established to further protect consumers and to better regulate the industry. The FTC should adopt a rule that protects primary ticket seller Web sites from being hacked by professional computer programmers and computer software.257 Although the forty-eight-hour prohibition on the purchase of tickets in the primary market by ticket brokers may reduce the incentive to obtain tickets in this manner,258 the FTC should prohibit the conduct explicitly and at all times. Computer programs or other automated devices that are designed to circumvent copy protection systems of ticketing Web sites and to access many tickets at once—practices which the courts have held constitutes copyright infringement and are considered an illicit industry practice—will be more directly regulated through such a rule.259 Furthermore, the explicit prohibition of this practice will provide regulators with more avenues by which to pursue violators, and will hopefully make more tickets available to the general public through initial public sales. The FTC should also require that online resale marketplaces maintain records of user activity for at least two years.260 This rule can be modeled after New Jersey Statute 56:8:27(d) that requires licensed brokers to “maintain[] records of ticket sales, deposits and refunds for a period of not less than two years.”261 Such a rule will ensure that if consumer problems arise there will be ample records to appropriately resolve the matter. Additionally, the FTC could utilize the records during investigations, most likely through subpoenas, into alleged illegal sales that may be occurring throughout the online resale marketplaces from secondary ticket sellers who 255. See generally H.R. 2669. 256. Under Section 18 of the Federal Trade Commission Act, 15 U.S.C. § 57a (2006), the FTC is authorized to prescribe “rules which define with specificity acts or practices which are unfair or deceptive acts or practices in or affecting commerce.” 15 U.S.C. § 57a(a)(1)(B). 257. See Kirkman, supra note 23, at 761–63. 258. See H.R. 2669 § 3(2). 259. Press Release, Ticketmaster, Default Judgment and Permanent Injunction Against RMG Technologies, Inc. Entered in U.S. District Court (June 25, 2008), http://iac.mediaroom.com/ index.php?s=43&item=1542. 260. See Glantz, supra note 244, at 301. 261. Id. (citing N.J. STAT. ANN. § 56:8:27(d) (2005)). 214 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 are not complying with the FTC regulations.262 This recording requirement would further serve to protect consumers in the secondary ticket market and facilitate complete compliance with the regulations that govern the ticketing industry. CONCLUSION Recently, it has become clear that the continued operation of the primary and secondary ticketing markets as a largely unregulated industry is adversely affecting consumers. Because regular fans deserve the maximum opportunity to purchase tickets to events at face value in the primary market or through controlled means in the secondary market, federal legislation is necessary to protect consumers and prevent predatory practices from continuing to occur. The BOSS ACT, currently pending in Congress, is precisely the type of legislation that is necessary to combat the problems that exist throughout the industry to ensure that consumers receive the protection they deserve. The Act will effectively maximize the number of tickets for public sale to consumers in the primary market, equip consumers with more information about the numbers of tickets available and from whom they are purchasing tickets, and establish uniform procedures for the secondary market. The BOSS ACT will make the ticketing industry a more reliable and honest practice and will afford regular fans a fair chance to attend their favorite events. Zachary H. Klein 262. See H.R. 2669 § 4(a). B.A., New York University, 2008; J.D. candidate, Brooklyn Law School, 2011. I would like to thank my parents and family for all of their love and support, and for the story that led to selecting this topic. I am also grateful for the work of Steven Bentsianov, Robert Marko, Christopher Vidiksis, and the entire staff of the Brooklyn Journal of Corporate, Financial & Commercial Law for their hard work and editing. Finally, to Hila, thank you for your encouragement, patience, and support. PROTECTING THE UNDERSERVED: EXTENDING THE ELECTRONIC FUND TRANSFER ACT AND REGULATION E TO PREPAID DEBIT CARDS INTRODUCTION Millions of lowand moderate-income Americans—the “underserved”—have no traditional bank accounts or financial services.1 The underserved, comprised of the “unbanked”—individuals and families without checking or savings accounts2—and the “underbanked”—those that utilize non-traditional banking3—rely heavily on alternative financial service providers, such as check cashing services, payday lenders, and money transmitters,4 for most of their financial needs. These individuals and families pay high premiums for performing “basic” financial transactions in the alternative sector.5 In recent years, the prepaid debit card6 has emerged as a new payment application marketed to underserved consumers who lack access to traditional banking institutions.7 Conveniently, prepaid debit cards can be purchased at retail locations, and money can be instantaneously loaded onto the card, giving underserved consumers an account substitute that allows 1. Michael S. Barr, Banking the Poor, 21 YALE J. ON REG. 121, 123 (2004) (citing studies that approximate that 8.4 million “low-income families” lacked a bank account as early as 1998). 2. FEDERAL DEPOSIT INSURANCE CORP., NATIONAL SURVEY OF UNBANKED AND UNDERBANKED HOUSEHOLDS 16 (2009), available at http://www.fdic.gov/householdsurvey/Full _Report.pdf [hereinafter FDIC HOUSEHOLD SURVEY]. 3. Id. at 32. 4. See JULIA S. CHENEY, FEDERAL RESERVE BANK OF PHILADELPHIA PAYMENT CARDS CENTER, CONFERENCE SUMMARY: PAYMENTS CARDS AND THE UNBANKED: PROSPECTS AND CHALLENGE 8 (2005), available at http://www.phil.frb.org/payment-cards-center/events/ conferences/2005/PaymentCardsandtheUnbankedSummary.pdf [hereinafter CHENEY, PAYMENT CARDS AND THE UNBANKED]. [T]he underserved often rely on check cashing outlets to effect certain types of transactions. In addition to cashing checks, for which they may charge from 1.5 percent to 3.5 percent of face value, these services also give underserved customers a way to transmit funds and pay bills. . . . To access a form of credit and to manage liquidity needs, the underserved often rely on payday lenders and may take out refund anticipation loans (RAL) at tax time. Id. (summarizing “Keynote Address” by Michael S. Barr). 5. See Barr, supra note 1, at 123–24 (describing the reality that most alternative banking services “come at a high cost to low-and-moderate income borrowers”). 6. Various names have been attributed to the prepaid debit card. For clarity and uniformity, the term “prepaid debit card” will be adopted for use in this note, except as otherwise discussed or quoted. 7. Rob Walker, Social Currency: Prepaid Cards That Cash In on the Status of Plastic, N.Y. TIMES MAG., Nov. 9, 2008, at 26. 216 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 them to make purchases, pay bills, and withdraw cash from ATMs.8 The appeal and convenience of prepaid debit cards is clear, but users must weigh these benefits against the risks and problems incurred with their use.9 In particular, prepaid debit card users are susceptible to complicated fee structures and security issues.10 As the popularity of prepaid debit cards increases among the underserved, particularly in this economic climate,11 it is important that cardholders are protected by the security of federal law. In light of the increasing use of prepaid debit cards as an account substitute for the underserved,12 this note calls for the extension of current federal laws, including the Electronic Fund Transfer Act (EFTA)13 and its regulatory companion, Regulation E,14 to this prepaid payment method. Part I of this note describes the underserved market and the obstacles to obtaining conventional banking products. Part II details the rise of the prepaid card industry and the numerous prepaid products currently available to consumers, including, among others, the prepaid debit cards, gift cards, payroll cards, and electronic benefit transfer (EBT) devices. The advantages of the prepaid debit card as an alternative to traditional financial services and as a vehicle for financially empowering the underserved, as well as the common risks incurred through use of these cards are explored in Part III. Part IV untangles the web of federal laws that currently apply to payment methods, including debit and several prepaid products. Finally, this note proposes the extension of Regulation E and the EFTA to the prepaid debit card industry to protect the financial well-being of underserved consumers who place their trust and personal finances in this payment product. I. THE UNDERSERVED A. WHO ARE THE UNDERSERVED? Although “economic self-sufficiency” demands “[a]ccess to a bank account and [traditional] financial services,”15 millions of Americans lack 8. Stored Value Cards: An Alternative for the Unbanked?, FED. RESERVE BANK OF N.Y. (July 2004), http://www.ny.frb.org/regional/stored_value_cards.html [hereinafter FED. RES. BANK OF N.Y., Stored Value Cards]. 9. Id. 10. See id. 11. See Walker, supra note 7. 12. See James Flanigan, As Credit Cards Falter, the Cash Variety Gains Popularity, N.Y. TIMES, Mar. 19, 2009, at B9 (describing the rise in popularity of “the business of prepaid cash cards”). 13. Electronic Fund Transfer Act of 1978, Pub. L. No. 95-630, 92 Stat. 3728 (1978) (codified as amended at 15 U.S.C.). 14. Electronic Fund Transfers (Regulation E), 12 C.F.R. §§ 205.1–205.18 (2009). 15. FEDERAL DEPOSIT INSURANCE CORP., FDIC SURVEY OF BANKS’ EFFORTS TO SERVE THE UNBANKED AND UNDERBANKED: EXECUTIVE SUMMARY OF FINDINGS AND RECOMMENDATIONS 3 (2009), available at http://www.fdic.gov/unbankedsurveys/unbankedstudy/FDICBankSurvey _ExecSummary.pdf [hereinafter FDIC BANK SURVEY]. 2010] Protecting the Underserved 217 access to checking or savings accounts or do not fully participate in the financial system.16 Few statistics accurately represent the number of unbanked and underbanked families in the United States; however, one recent study estimates that more than seven percent—or approximately nine million—of U.S. households are unbanked,17 and at least 21 million households are underbanked.18 “[R]easons [that] the underserved do not or cannot use traditional banking [methods]” can generally be categorized as “demand-based” and “supply-based.”19 Demand-based factors encompass the “preferences and needs” of the underserved.20 There are several reasons the unbanked may believe they are ill-suited for conventional banking.21 Regular checking accounts may not be sensible for those that cannot afford “high overdraft . . . [and] maintenance fees, prohibitive minimum balances . . . . [or] delays associated with having deposited checks credited.”22 Despite increased flexibility offered by banks, documentation requirements pose barriers to account ownership for the working poor and immigrants.23 Physical inaccessibility also poses an obstacle to account ownership, as banking institutions are not as readily accessible in lower-income communities as more affluent ones.24 The unbanked may also be barred from establishing bank accounts due to unfavorable credit histories or prior failures in managing bank accounts.25 Finally, a “lack of financial education” also affects the demand for conventional banking among the unbanked.26 Conversely, supply-based factors, such as “cost or marketing considerations,” have affected the way financial institutions engage the 16. Id.; see also CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 6; Walker, supra note 7. 17. FDIC HOUSEHOLD SURVEY, supra note 2, at 10. 18. Id. at 10. 19. CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 7. 20. Id. 21. See Barr, supra note 1, at 124–25, 177–84 (listing a laundry list of factors that hinder the underserved from obtaining bank accounts); see also CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 7–8 (describing the difference between demand-based and supplybased barriers to banking access for the underserved). 22. CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 7; see also Barr, supra note 1, at 177–81 (identifying “high minimum balances, monthly fees and the risk of bouncing checks” as major reasons why banking accounts make little “economic sense” for low-income families). 23. Barr, supra note 1, at 184. Fears that poorly documented immigrants would be unable to access banking systems have led to various accommodations. Id. “[M]atricula consular cards are widely accepted as a suitable form of identification for opening noninterest-bearing . . . checking account[s]”; however, an “IRS-issued . . . taxpayer ID number or Social Security number is required to open an interest-bearing account.” CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 7 (citations omitted). 24. Barr, supra note 1, at 182–83; CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 7. 25. Barr, supra note 1, at 181. 26. Id. at 183–84. 218 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 unbanked market.27 Because banking the poor is unlikely to produce high returns,28 financial institutions may be reluctant—despite improvements in technology that make it more affordable to offer “meaningful banking products” to the poor29—to make the initial investments, such as “product development, . . . marketing and [financial] education,” required to enter the market. 30 As a result of these circumstances, an overwhelming number of Americans have turned to the alternative financial sector and prepaid products as substitutes for account ownership.31 II. THE PROLIFERATION OF THE PREPAID CARD INDUSTRY A. WHAT IS A PREPAID CARD? A prepaid card is a “credit-card sized” product that represents an amount of “pre-loaded value.”32 Prepaid cards differ from credit cards “which draw their value from a line of credit, [and] debit cards, which draw their value from a [personal] checking account, [because] the value on a prepaid card” is derived from funds that have been pre-loaded.33 Transactions involving prepaid cards require accessing a remote database for account information and payment authorization.34 Prepaid cards employ “magnetic stripe” technology and have a card number associated with an 27. CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 7. 28. Michael S. Barr, Banking the Poor: Policies to Bring Low-Income Americans Into the Financial Mainstream 4 (Univ. of Michigan Law Sch. Law & Economics Working Paper Series, Paper No. 48, 2004), available at http://law.bepress.com/cgi/viewcontent.cgi?article=1048& context=umichlwps. 29. See CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 7–8. 30. Barr, supra note 1, at 183. 31. See Walker, supra note 7; see also Barr, supra note 1, at 177. 32. Mark Furletti, Prepaid Card Markets & Regulation 2 (Fed. Reserve Bank of Phila. Payment Card Center, Discussion Paper No. DP04-01, 2004), available at http://www.phil.frb.org/payment-cards-center/publications/discussion-papers/2004/Prepaid_0220 04.pdf [hereinafter Furletti, Prepaid Card Markets]; Mark Furletti & Stephen Smith, The Law, Regulations, and Industry Practices That Protect Consumers Who Use Electronic Payment Systems: ACH E-Checks & Prepaid Cards 13 (Fed. Reserve Bank of Phila. Payment Cards Center, Discussion Paper No. DR05-04, 2005), available at http://www.phil.frb.org/paymentcards-center/publications/discussion-papers/2005/ConsumerProtection.pdf. Although most sources use the terms “prepaid cards” and “stored-value cards,” interchangeably, the Federal Reserve Board has distinguished these terms. A Summary of the Roundtable Discussion on Stored-Value Cards and Other Prepaid Products, FED. RESERVE BOARD OF PHILA., http://federalreserve.gov/paymentsystems/storedvalue/#fn3r (last visited Oct. 24, 2009) [hereinafter Summary of Roundtable Discussion]. The Board associates the term “stored-value” with “products for which prefunded value is recorded on the payment instrument.” Id. These cards typically have an embedded microchip that stores information about the card’s value on the card. Furletti, Prepaid Card Markets, supra at 2 n. 2. The Board associates the term “prepaid” with “products for which the prefunded value is recorded on a remote database, which must be accessed for payment authorization.” Summary of Roundtable Discussion, supra. The term stored-value card will not be used in this note. 33. Furletti, Prepaid Card Markets, supra note 32, at 2. 34. Summary of Roundtable Discussion, supra note 32. 2010] Protecting the Underserved 219 account maintained by the issuing financial institution.35 The card, therefore, functions as an access device to the consumer’s funds.36 “[P]repaid describes most of the products on the market today.”37 The prepaid card industry provides an array of products.38 Prepaid cards, however, can generally be divided into two categories: closed-loop and open-loop cards.39 Closed-loop cards, such as prepaid gift, phone, or transit cards, can be used only for the particular merchant’s or issuer’s products.40 Open-loop cards, on the other hand, can be used for multiple purposes and at multiple points of sale.41 These cards can be used for making purchases, paying bills, or making ATM withdrawals, and some, including prepaid debit cards, have the ability to be reloaded.42 Open-loop cards include payroll, government benefit, and prepaid debit cards.43 B. HISTORY OF THE PREPAID CARD INDUSTRY Compared with traditional payment methods, “the prepaid card industry is still in [its] early stages of development.”44 Historically, prepaid cards emerged as a replacement for “paper-based” and related payment devices, such as gift certificate and transit tokens.45 Closed-loop prepaid products were first introduced by transit systems and college campuses in the 35. 36. 37. 38. See Furletti, Prepaid Card Markets, supra note 32, at 2 n. 2. Id. at 2. See Summary of Roundtable Discussion, supra note 32. While prepaid cards are often referred to, interchangeably, as stored-value cards, these terms can be distinguished. See Summary of Roundtable Discussion, supra note 32 (distinguishing between the two terms by indicating that unlike stored-value cards, that the value of prepaid cards is recorded “on a remote database”). “Stored value cards are a form of prepaid card . . . .” NATIONAL COMMUNITY INVESTMENT FUND, DEMYSTIFYING PREPAID CARDS: AN OPPORTUNITY FOR THE COMMUNITY DEVELOPMENT BANKING INSTITUTION SECTOR 1 (2009), available at http://www.ncif.org/images/uploads/20090921_NCIF_DemystifyingPrePaidCards.pdf [hereinafter DEMYSTIFYING PREPAID CARDS]. 39. See, e.g., FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8; Furletti, Prepaid Card Markets, supra note 32, at 2 (listing prepaid card systems into “closed, semi-closed, semiopen, and open” categories); Julia S. Cheney & Sherrie L.W. Rhine, Prepaid Cards: An Important Innovation in Financial Services 2 (Fed. Reserve Bank of Phila. Payments Cards Center, Discussion Paper No. DP06-07, 2006), available at http://www.phil.frb.org/payment-cardscenter/publications/discussion-papers/2006/D2006JulyPrepaidCardsACCIcover.pdf. 40. FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8; Furletti, Prepaid Card Markets, supra note 32, at 2. 41. FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8; Furletti, Prepaid Card Markets, supra note 32, at 2. 42. FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8; Furletti, Prepaid Card Markets, supra note 32, at 8. 43. Summary of Roundtable Discussion, supra note 32; Furletti, Prepaid Card Markets, supra note 32, at 8. 44. DOVE CONSULTING, FED. RESERVE SYSTEM, THE ELECTRONIC PAYMENTS STUDY: A SURVEY OF ELECTRONIC PAYMENTS FOR THE 2007 FEDERAL RESERVE PAYMENTS STUDY 28 (2008) [hereinafter DOVE CONSULTING, ELECTRONIC PAYMENTS STUDY]. 45. Summary of Roundtable Discussion, supra note 32. 220 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 1970s.46 In the 1980s, prepaid telephone cards emerged in the prepaid market.47 The prepaid industry expanded exponentially in the mid-1990s when national retailers introduced closed-loop gift cards to replace gift certificates.48 In the early-1990s, EBT cards became the first open-loop cards introduced to replace paper-based food stamps.49 Since the mid1990s, a number of open-loop prepaid cards have been introduced to consumers.50 Today, prepaid cards have a wide range of purposes. Anyone calling family abroad with a prepaid phone card, purchasing clothing at a retailer with a gift card, or buying groceries and paying monthly bills with a prepaid debit card is taking advantage of the variety of prepaid products now available to consumers.51 Prepaid cards have become one of the fastest growing products in the financial industry.52 As a result of the industry’s continuous growth and ever-changing prepaid product applications, the size of the prepaid market is unclear.53 However, the most recent study performed by the Federal Reserve Board estimated that prepaid transactions in 2006 totaled about $49.9 billion, including $13.3 billion in open-loop transactions.54 C. TYPES OF PREPAID CARDS 1. Prepaid Debit Cards Like other forms of prepaid cards, prepaid debit cards differ from traditional card-based products in that they require users to pay early for purchases that will be made in the future rather than paying at the time or after purchases are made.55 Prepaid debit cards are, however, similar to traditional credit and debit cards in that both allow customers to “withdraw funds from ATMs . . . [and] . . . make retail purchases or pay bills, in person, online or over the phone.”56 The cards can also be reloaded with additional funds in a variety of ways, including “direct deposit, money wire transfer, money order,” or by paying cash at retail locations.57 Typically, the 46. Kathleen L. DiSanto, Down the Rabbit Hole: An Adventure in the Wonderland of StoredValue Card Regulation, 12 J. CONSUMER & COM. L. 22, 23 (2008). 47. Id. 48. See Summary of Roundtable Discussion, supra note 32; DiSanto, supra note 46, at 23. National retailers such as Blockbuster and Kmart are credited with introducing these cards. Cheney & Rhine, supra note 39, at 2. 49. Summary of Roundtable Discussion, supra note 32. 50. See id. 51. See, e.g., FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8; Summary of Roundtable Discussion, supra note 32. 52. See FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 53. See DOVE CONSULTING, ELECTRONIC PAYMENTS STUDY, supra note 44, at 27–30. 54. Id. at 39; DEMYSTIFYING PREPAID CARDS, supra note 38, at 1. 55. Cheney & Rhine, supra note 39, at 2. 56. CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 5. 57. FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 2010] Protecting the Underserved 221 consumer’s pre-loaded funds are stored in and drawn from a “pooled account” or “cardholder sub-account” held by the issuing financial institution.58 The infrastructure that makes prepaid debit cards available and functional for consumers is immense. The industry’s hierarchy is comprised of issuers, providers, processors, brand networks, debit networks, ATM networks, reload networks, and retailers.59 Recognizing the potential of the underserved market, financial institutions have integrated prepaid debit cards into their product lines, serving as issuers and providers of cards as well as holders of pre-loaded fund accounts.60 However, retailers are increasingly competing against banks as providers of prepaid debit cards.61 For example, Wal-Mart has been rather successful in the market since it began selling prepaid debit cards in June 2007.62 The growing number of retailers that provide such cards—coupled with their ability to conduct financial transactions in their stores—has blurred the line, particularly for the underserved, as to what constitutes traditional banking.63 Processors authorize payments, clear transactions, and provide a variety of services for financial institutions that issue prepaid cards.64 Brand networks, such as Visa, MasterCard, Discover, and American Express, “provide connections between the merchant’s bank and the issuing financial [institution].”65 Debit networks “allow PIN Debit transactions [to take place] at the point of sale,” and ATM transactions are made possible by ATM networks.66 Reload networks, such as Green Dot, MasterCard repower, MoneyGram, Visa ReadyLink, NetSpend, and nFinanSe, provide the computer servers, software, and customer service that allow prepaid debit cardholders to reload money at a growing network of retail locations.67 Prepaid debit cards can be obtained in numerous retail locations, including convenience, drug and grocery stores, via phone or Internet, and at check cashing services.68 58. Cheney & Rhine, supra note 39, at 8. 59. DEMYSTIFYING PREPAID CARDS, supra note 38, at 4. 60. See id. at 1. Banks that are interested in offering prepaid debit cards can choose from three models: hire companies to develop a prepaid card program, build a program in-house or outsource some functions while retaining control of others. Id. at 6. 61. Id. at 2. 62. Id. (quoting Ann Zimmerman, Wal-Mart User Fees for its Prepaid Visa Debit card, WALL. ST. J., Feb. 18, 2009, http://online.wsj.com/article/SB123496685897511383.html). 63. CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 18. 64. DEMYSTIFYING PREPAID CARDS, supra note 38, at 4. 65. Id. 66. Id. 67. Id. at 4; James Flanigan, supra note 12. 68. SHERRIE L. W. RHINE ET AL., THE CENTER FOR FINANCIAL SERVICES INNOVATION, CARDHOLDER USE OF GENERAL SPENDING PREPAID CARDS: A CLOSER LOOK AT THE MARKET 5 (2007), available at http://cfsinnovation.com/system/files/imported/managed_documents/general _spending_prepaid_cards.pdf. 222 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Issuers of prepaid debit cards have developed a “two-step process for distributing prepaid general spend cards.”69 “[C]onsumers purchase temporary, instant issue [] cards [that provide] immediate access to their funds.”70 Consumers are then issued a permanent card bearing the same account number and often embossed with the card bearer’s name, only after the temporary card has been loaded and additional personal information provided to the issuing institution.71 These days, access to prepaid debit cards is as easy as shopping for groceries.72 In 2008, transactions on prepaid debit cards totaled more than $4 billion.73 This number was expected to increase to $7.2 billion in 2009 and $10.8 billion in 2010.74 Prepaid debit cards have become one of the fastest growing products in the consumer banking industry.75 2. Gift Cards A gift card—the modern incarnation of paper-based gift certificates— can be used to purchase goods or services from merchants. Although gift cards represent the majority of prepaid products issued, they actually “account for proportionately less of the total value loaded onto [prepaid] cards.”76 Currently, two types of gift cards dominate the market: closedloop, merchant issued gift cards and branded or open-system gift cards.77 Merchant issued gift cards—those that can be used only at the merchant’s locations78—were the first widely distributed prepaid product.79 Branded gift cards, on the other hand, are “redeemable . . . anywhere the network brand on the card is accepted.”80 Recently, a competitive struggle has 69. 70. 71. 72. Id. Id. Id. See Andrew Martin, Prepaid, but Not Prepared for Debit Card Fees, N.Y. TIMES, Oct. 6, 2009, at A1. 73. Flanigan, supra note 12. 74. Id. 75. Martin, supra note 72. 76. Julia S. Cheney, Prepaid Card Models: A Study in Diversity 6 (Fed. Reserve Bank of Phila. Payments Card Center, Discussion Draft No. DP05-04, 2005), available at http://www.phil.frb.org/payment-cards-center/publications/discussion-papers/2005/PrepaidCard Models_Palmer_FINAL.pdf [hereinafter Cheney, Prepaid Card Models]. 77. See MARK FURLETTI, FED. RESERVE BANK OF PHILA. PAYMENT CARDS CENTER, CONFERENCE SUMMARY: PREPAID CARDS: HOW DO THEY FUNCTION? HOW ARE THEY REGULATED? 7, 14 (2004), available at http://www.phil.frb.org/payment-cardscenter/events/conferences/2004/PrepaidCards_062004.pdf [hereinafter FURLETTI, HOW DO THEY FUNCTION?]. 78. Id. at 7. 79. See DOVE CONSULTING, ELECTRONIC PAYMENTS STUDY, supra note 44, at 28 (citing Blockbuster and Kmart as the pioneers in developing prepaid gift certificates). 80. Cheney, Prepaid Card Models, supra note 76, at 5–6. 2010] Protecting the Underserved 223 ensued between these two products;81 however, closed-loop gift cards still continue to dominate the overall prepaid card market.82 3. Payroll Cards Payroll card programs are a cost-saving replacement to paper payroll checks, allowing employers to translate paychecks into card-based value.83 Similar to the process of direct deposit, the value loaded onto payroll cards is done automatically by transferring the payroll amount from the employer’s account to the employee’s payroll card account.84 Like prepaid debit cards, payroll card accounts are usually managed via a “third-party processor.”85 Payroll cards are similar to debit cards linked to a checking account and provide many similar functions, including ATM functionality, the ability to purchase goods and services and receive cash back from a transaction, and access to “real-time balance information.”86 Payroll cards have become quite attractive to the underserved population. In 2004, payroll cards were issued to at least 1.8 million unbanked households,87 and many expect significant growth within the underserved market.88 Payroll cards appeal to underserved consumers because they eliminate check cashing lines and fees, “offer immediate access to pay,” and provide consumers with the ability to withdraw as much money as desired.89 The increase in the popularity of payroll cards is also, in large part, attributable to the branding of payroll cards by Visa and MasterCard.90 The Visa or MasterCard brand provides payroll cards with debit card-like functionality and prestige.91 4. Electronic Benefit Transfers “Electronic benefit transfer (EBT) programs are designed to deliver government benefits such as food stamps, supplemental security income (SSI), and social security.”92 EBT programs function similarly to payroll cards; “[e]ligible recipients receive magnetic-stripe cards and personal 81. FURLETTI, HOW DO THEY FUNCTION?, supra note 77, at 7. 82. DOVE CONSULTING, ELECTRONIC PAYMENTS STUDY, supra note 44, at 30. 83. See Payroll Cards: An Innovative Product for Reaching the Unbanked and Underbanked, COMMUNITY DEVELOPMENTS (Comptroller for the Currency, Washington, D.C.), June 2005, at 1, available at http://www.occ.gov/static/community-affairs/insights/payrollcards.pdf [hereinafter Payroll Cards: An Innovative Product]. 84. Cheney, Prepaid Card Models, supra note 76, at 7. 85. Id. 86. Id. 87. Payroll Cards: An Innovative Product, supra note 83, at 2. 88. See id. at 10 (discussing bankers who recommend payroll cards to employers). 89. Id. at 4. 90. Id. 91. See id. 92. Electronic Fund Transfers, 62 Fed. Reg. 43,467, 43,467 (Aug. 14, 1997) (to be codified at 12 C.F.R. pt. 205). 224 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 identification numbers” that access their benefits electronically.93 In recent years, government use of EBT programs has become increasingly popular, as states embrace the cost-effectiveness and speed of electronic disbursement of benefit funds.94 “Currently all states use EBT cards to [dispense] food stamps and TANF program benefits,” and many states have started issuing child support payments and unemployment benefits through prepaid cards.95 In early 2008, the Treasury Department announced that it would begin issuing Social Security benefits through prepaid cards.96 III. THE ADVANTAGES AND DISADVANTAGES TO PREPAID DEBIT CARD USE Prepaid debit cards have been heavily marketed to the underserved for a variety of reasons.97 Prepaid cards provide the underserved with a more convenient way of accessing funds and making transactions without the obstacles of account ownership.98 Despite notable conveniences, however, underserved consumers are often uneducated about the array of features, fee structures, and lack of protections attributed to prepaid debit cards.99 A. WHY THE UNDERSERVED USE PREPAID DEBIT CARDS Prepaid debit cards can be “irresistible” to the underserved for many reasons.100 First, prepaid debit cards provide a limited form of safety and security compared to other alternative financial products,101 because they allow consumers to make purchases and pay bills without carrying cash.102 Second, prepaid debit cards offer immediate liquidity, making loaded funds available instantaneously, rather than the delays associated with traditional 93. 94. 95. 96. Id. DOVE CONSULTING, ELECTRONIC PAYMENTS STUDY, supra note 44, at 31. Id. Eleanor Laise, Treasury Plans Social Security Debit Card; A Bid for Payments to Become Cheaper and More Secure, WALL ST. J., Jan. 4, 2008, at A4. 97. FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 98. CENTER FOR FINANCIAL SERVICES INNOVATION, PREPAID CARD VS. CHECKING ACCOUNT PREFERENCES (2008), http://cfsinnovation.com/system/files/imported/managed_documents/pre paid_sept9_0001.pdf. 99. See FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 100. See MICHAEL J. HERMANN & RACHEL SCHNEIDER, CENTER FOR FINANCIAL SERVICES INNOVATION, NONPROFIT DISTRIBUTION OF PREPAID CARDS 5–6 (n.d), available at http://cfsinnovation.com/system/files/imported/managed_documents/cfsi_nonprdistprepaid_mar08 .pdf. 101. Alternative financial service providers include check cashing outlets, payday lenders, money transmitters, and pawnshops. Financial Access Options for the Underserved, FED. RESERVE BANK OF DALLAS BANKING & COMMUNITY PERSP., no. 3, 2009 at 2, available at http://www.dallasfed.org/ca/bcp/2009/bcp0903.pdf. 102. SARAH GORDON, ET. AL., CENTER FOR FINANCIAL SERVICES INNOVATION, A TOOL FOR GETTING BY OR GETTING AHEAD? CONSUMERS’ VIEWS ON PREPAID CARDS 6 (n.d), available at http://cfsinnovation.com/system/files/imported/managed_documents/voc-prepaidfinal.pdf. 2010] Protecting the Underserved 225 check cashing.103 Furthermore, unlike traditional bank accounts, prepaid debit cards are easily accessible and impose no identification or credit history requirements.104 For example, one card advertises, “‘No Credit Check. Safer Than Cash. No Bank Account Needed.’”105 Consumers can simply purchase a prepaid debit card at a checkout register and begin performing transactions.106 An indirect advantage to prepaid debit card use is that other options in the alternative financial sector are extremely costly. The underserved rely heavily on check cashing outlets, which often charge between 1.5 and 3.5 percent of face value.107 It has been estimated that the check cashing industry earns about $1.5 billion in fees each year processing 180 million checks with a face value of $55 billion.108 These fees are extraordinarily high “both in absolute terms and relative to the customer’s income.”109 B. POTENTIAL OF PREPAID DEBIT CARDS TO FINANCIALLY EMPOWER THE UNDERSERVED Many industry participants acknowledge that prepaid debit cards can serve as a vehicle towards greater financial empowerment of the underserved.110 Russell Simmons, a contributing creator of the Prepaid Visa RushCard, was inspired by his belief that prepaid debit cards can provide the underserved with “access to the American dream.”111 Despite the alarming number of Americans that remain unbanked or underbanked,112 research shows that the underserved are not opposed to using banks.113 Rather, these individuals have been unable to overcome an “intimidation factor” to gain access.114 Prepaid debit cards, however, are widely believed to be the entry-level products that can help the underserved overcome this fear.115 Recognizing this potential, banks are beginning to adapt cards and practices to meet the needs of the underserved, offering credit-building features116 and developing distribution relationships with third-party 103. 104. 105. 106. 107. 108. 109. 110. 111. 112. 113. 114. 115. 116. See HERMANN & SCHNEIDER, supra note 100, at 5. Id. at 6. See Martin, supra note 72 (quoting language from Visa’Green Dot Prepaid Card). Id. CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 8. Id. Id. See id. at 15–16. Walker, supra note 7. See FDIC HOUSEHOLD SURVEY, supra note 2. CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 15. Id. See FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. Id. 226 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 providers connected to underserved communities.117 Financial institutions have seized the opportunity to use prepaid debit cards as an opening to the underserved market,118 and the results could be significant for banks and the underserved. C. THE RISKS ASSOCIATED WITH PREPAID DEBIT CARDS Despite their convenience and appeal, financially uneducated consumers are often unaware of the risks associated with the use of prepaid debit cards. First, users are susceptible to an array of hidden fees generated through the cards’ use.119 Banks that offer prepaid debit cards to consumers make money from a number of fees that are commonly incurred with card usage, including entrance or activation fees, maintenance fees, point of sale fees, and ATM transaction fees.120 Potential additional fees include transaction limit fees, bill payment fees, phone or online transaction fees, reload fees, inactivity fees, overdraft and overdraft protection fees, and even fees to call customer service.121 For consumers, this astounding range of fees122 only serves to increase the complexity of the fee structure for each 117. See CHENEY, PAYMENT CARDS AND THE UNBANKED, supra note 4, at 16 (advancing the “need to develop distribution relationships with third-party providers that have direct relationships with [the underserved]”). 118. See DEMYSTIFYING PREPAID CARDS, supra note 38, at 1. 119. See, e.g., Martin, supra note 72. 120. FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 121. Id. Fees vary widely among the numerous cards marketed to consumers. For example, the MiCash Prepaid MasterCard charges a $9.95 activation fee, $1.75 for ATM withdrawals, $1 for ATM balance inquiries, $0.50 for purchases, $4 for monthly maintenance, $2 for inactivity over 60 days, and $1 for calls placed to customer service. See Walker, supra note 7. The Millennium Advantage Prepaid MasterCard requires an application fee up to $99. Id. “The Silver Prepaid Mastercard . . . [has] the option of charging a $25 shortage fee if customers exceed their balance,” despite advertising that it does not charge for overdrafts. Id. The Prepaid Visa RushCard costs $19.99, charges $1 per transaction, has ATM fees of $1.95 plus fees charged by the ATM’s owner, and charges fees to add money in the form of cash. Id. 122. The following chart displays the relevant fee categories and ranges of fees associated with prepaid debit cards: Fee Type Fee Range Entrance/Activation $0 to $39.95 Maintenance Monthly $0 to $9.95 Annual $0 to $99.95 Point of Sale $0 to $2.00 2010] Protecting the Underserved 227 card,123 leaving one spokesman for a consumer advocacy group asking, “[h]ow are consumers supposed to keep the fees straight if the companies can’t?”124 The costs make prepaid debit cards “a very expensive way to bank,” causing some to question whether it is right to give “people their pay on a card that has fees on it.”125 Second, prepaid debit cards lack some of the basic legislative and regulatory protections extended to other payment devices.126 Only recently have fee limitations been imposed,127 but these laws do not apply to prepaid debit cards.128 Presently, there is no legislatively mandated error resolution procedure when funds are stolen from the card’s account or unauthorized charges are made.129 Unlike credit and debit cards, prepaid debit cards are not protected by consumer liability caps130 or a right of recredit.131 Nor do prepaid debit cards have a statutory chargeback right, which allows a consumer to reverse a payment when the goods ordered are not delivered.132 Finally, not all prepaid debit cards may have federal deposit insurance to protect funds in the event of bank failure.133 IV. FEDERAL LAWS CURRENTLY APPLYING TO THE PREPAID INDUSTRY The myriad of products and laws in the payment products market is complex and confusing.134 The EFTA and Regulation E provide the legal Domestic ATM Transaction (within network) $0 to $2.50 FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 123. See id. 124. Martin, supra note 72. 125. Id. 126. See generally Gail Hillebrand, Before the Grand Rethinking: Five Things to do Today with Payments Law and Ten Principles to Guide New Payments Products and New Payments Law, 83 CHI.-KENT L. REV. 769 (2008). 127. See Credit CARD Act of 2009 § 102, 15 U.S.C.A. §§ 1637(j)–(k), 1661 (West 2010). 128. Philip Keitel, The Credit CARD Act of 2009 and Prepaid Cards, FED. RESERVE BANK OF PHILA. PCC NOTE PAYMENT CARDS CENTER, (Aug. 2009), http://www.philadelphiafed.org/ payment-cards-center/publications/pcc-note/2009/pcc-note_credit-card-act-2009.pdf. 129. See Hillebrand, supra note 126, at 772 (“[A] consumer who pays by debit card . . . does not have a statutory right to reverse the charge.”). 130. Id. at 775–77. When money is taken from an account or an unauthorized charge is made to a payment device, a consumer liability cap provides a limit on the amount of money a cardholder can lose before the problem is discovered and reported. Id. at 775. 131. Id. at 779. A right of prompt recredit protects cardholders by returning money to their account after money has been unlawfully taken or the card has been charged without the account holder’s consent. Id. 132. Id. at 781. 133. See FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 134. Mark Furletti, Payment System Regulation and How it Causes Consumer Confusion 1 (Fed. Reserve Bank of Phila. Payment Cards Center, Discussion Paper No. DP04-05, 2004), available at http://www.phil.frb.org/payment-cards-center/publications/discussion-papers/2004/ 228 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 framework governing the movement of electronic funds, including debit and several prepaid products.135 For simplicity’s sake, uniformity would be beneficial to all market participants—consumers, the card industry, and regulators.136 A. EFTA AND REGULATION E In 1978, Congress passed the EFTA to “provide a basic framework establishing the rights, liabilities, and responsibilities of participants in electronic fund transfer systems,” with the “provision of individual consumer rights” as the primary objective.137 The EFTA requires “financial institutions to send consumers monthly statements [detailing] transaction activity,” implement procedures to resolve erroneous transfers, and “limit consumer liability for unauthorized transfers.”138 In the EFTA, Congress delegated to the Board of Governors of the Federal Reserve System (the Board) the responsibility for promulgating regulations to carry out its purposes.139 Regulation E was originally enacted by the Board in part to extend the protections of the EFTA to debit cards.140 Today, the protections of the EFTA and Regulation E apply to several prepaid payment methods, including government benefits141 and payroll cards,142 and were most recently expanded to gift cards and general-purpose prepaid cards.143 1. Protections of the EFTA and Regulation E The EFTA and Regulation E provide important protections for consumers who use electronic fund transfer services, 144 which include debit and some prepaid card users. These protections include a liability cap and the right to prompt recredit when money is taken out of an account or a charge is made without the account holder’s authorization,145 limitations on financial institutions’ ability to assess overdraft fees,146 and disclosure PaymentSystemRegulation_112004.pdf (last visited Oct. 24, 2009) [hereinafter Furletti, Payment System Regulation]. 135. Furletti, Prepaid Card Markets, supra note 32, at 13–14. 136. Furletti, Payment System Regulation, supra note 134, at 7. 137. Electronic Fund Transfer Act of 1978, Pub. L. No. 95-630, § 902, 92 Stat. 3728, 3728 (1978). 138. Christopher B. Woods, Update on Prepaid Cards Laws and Regulations, 61 CONSUMER FIN. L. Q. REP. 815, 815 (2007). 139. 15 U.S.C. § 1693b(a) (2006). 140. See Electronic Fund Transfers (Regulation E), 12 C.F.R. §§ 205.1(a)–(b) (2009). 141. Id. § 205.15. 142. Id. § 205.18. 143. Credit CARD Act of 2009 § 401, 15 U.S.C.A. § 1693l (West 2010). 144. 15 U.S.C. § 1693b(a); 12 C.F.R. § 205.1(b). 145. 15 U.S.C. §§ 1693f–1693g; 12 C.F.R. § 205.6 (2009). 146. In November 2009, the Board announced final rules that prohibit financial institutions from charging overdraft fees on ATM or one-time debit transactions unless a consumer consents. Press Release, Board of Governors of the Federal Reserve System, Federal Reserve Announces Final Rules Prohibiting Institutions from Charging Fees for Overdrafts on ATM and One-Time 2010] Protecting the Underserved 229 requirements that inform consumers about how these protections apply.147 However, consumers purchasing cards that have the appearance of debit cards may be surprised to discover that these look-a-likes are treated rather differently.148 The EFTA and Regulation E provide two protections for consumers whose accounts are victimized by unauthorized electronic fund transfers (i.e., withdrawals or charges against the account “initiated by a person other than the consumer without actual authority to initiate the transfer and from which the consumer receives no benefit.”)149 First, the laws provide a liability cap that sets the amount a consumer can be held responsible for to $50, $500, or unlimited liability depending upon when the consumer discovers and reports the loss or theft.150 The laws also require that financial institutions investigate an alleged error or unauthorized transaction and promptly recredit a consumer’s account if the investigation reveals an error.151 Brand networks, like Visa and MasterCard, also provide “additional voluntary protection, with significant loopholes in coverage.”152 A recent development was the Board’s announcement that Regulation E will limit financial institutions’ ability to charge overdraft fees for ATM transactions and one-time transactions that overdraw a consumer’s account unless the consumer consents to these fees.153 This amendment, which took effect in summer 2010, will undoubtedly curb the growth of overdraft fees, which cost consumers $23.7 billion in 2008.154 Not surprisingly, lowerincome Americans pay the majority of these fees.155 Overdraft fees, however, are not the only type of fees targeted by Congress and the Board; the Credit Card Accountability Responsibility and Disclosure Act of 2009 (Credit CARD Act) prohibits the assessment of dormancy fees, inactivity charges, or service fees with respect to the covered forms of payment.156 The EFTA and Regulation E also require a financial institution to make disclosures when the “consumer contracts for the electronic fund transfer service”157 or “before the first electronic fund transfer is made involving the Debit Card Transactions (Nov. 12, 2009), http://www.federalreserve.gov/newsevents/press/bcreg/ 20091112a.htm [hereinafter Overdraft Fees Press Release]. 147. 12 C.F.R § 205.7(b) (2009). 148. Anita Ramasastry, Confusion and Convergence in Consumer Payments: Is Coherence in Error Resolution Appropriate?, 83 CHI.-KENT L. REV. 813, 836 (2008). 149. 15 U.S.C. § 1693a(11) (2006); 12 C.F.R. § 205.2(m) (2009). 150. 15 U.S.C. § 1693g(a). 151. Id. § 1693f(a)–(b). 152. Hillebrand, supra note 126, at 777. 153. Overdraft Fees Press Release, supra note 146. 154. The Overdraft Protection Act of 2009: Hearing on H.R. 3904 Before the H. Comm. on Financial Services, 111th Cong. 136 (2009) (statement of Eric Halperin, Director, Center for Responsible Lending). 155. Id. at 137 (citation omitted). 156. Credit CARD Act of 2009, 15 U.S.C.A. § 1693l-l(b)(1) (West 2010). 157. 15 U.S.C. § 1693c(a)(1) (2006). 230 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 consumer’s account.”158 These disclosures include, among other things, a summary of the consumer’s liability for unauthorized fund transfers,159 “the consumer’s right to stop payment of a preauthorized electronic fund transfer,”160 “[a]ny fees imposed by the financial institution for electronic fund transfers or for the right to make transfers,”161 “notice that a fee may be imposed by an [ATM] operator”—and “any network used to complete the transaction”—when the consumer makes an ATM withdrawal or a balance inquiry.162 2. Prepaid Payment Methods Protected by the EFTA and Regulation E The protections of the EFTA and Regulation E apply only to “account[s]” as defined therein. Regulation E defines an “account” as “a demand deposit (checking), savings, or other consumer asset . . . held directly or indirectly by a financial institution and established primarily for personal, family, or household purposes.”163 As one author has noted, the scope of this definition and the implications it has on protecting prepaid debit cards are quite unclear.164 The Board has added to this confusion by expressing its own uncertainty as to whether prepaid debit cards fall within the definition of a consumer asset account.165 However, the historical development of congressional and Board efforts to regulate the prepaid industry is rather convincing evidence that neither the EFTA nor Regulation E currently regulate prepaid debit cards.166 a. Electronic Benefits There have been several attempts to expand the coverage of Regulation E. In 1994, the Board amended the regulation to bring EBT programs within its coverage.167 These provisions applied many of Regulation E’s 158. 159. 160. 161. 162. 163. 164. Electronic Fund Transfers (Regulation E), 12 C.F.R. § 205.7(a) (2009). Id. § 205.7(b)(1). Id. § 205.7(b)(7). Id. § 205.7(b)(5). Id. § 205.7(b)(11). Id. § 205.2(b)(1). Hillebrand, supra note 126, at 790 (maintaining that it is unclear whether the EFTA currently applies to prepaid debit cards); but see Ramasastry, supra note 148, at 836 (“At present, if a consumer uses a prepaid or stored-value card, there is no legislatively-mandated error resolution procedure (with the exception of payroll cards).”); Martin, supra note 72 (stating that “prepaid cards have not undergone . . . Congressional and regulatory scrutiny”). 165. See Electronic Fund Transfers, 61 Fed. Reg. 19,696, 19,698–99 (May 2, 1996) (to be codified at 12 C.F.R. pt. 205). 166. See supra Part IV.A.1–2. For example, the Board explicitly expanded Regulation E only to payroll cards in 2007, and Congress specifically exempted prepaid debit cards from the Credit CARD Act of 2009. See 15 U.S.C.A. § 1693l-1(a)(2)(D) (West 2010); 12 C.F.R. § 205.18 (2006). 167. Electronic Fund Transfers, 59 Fed. Reg. 10,768, 10,768 (Mar. 7, 1994). 2010] Protecting the Underserved 231 protections, including a liability cap168 and error resolution procedures.169 The Board, however, exempted government agencies from furnishing periodic statements of account activity if the agency made recipients’ account balances available via telephone and electronic terminals and provided written account histories upon request.170 The Board’s rationale for these amendments was that all consumers using EFT services should uniformly receive the protections under the EFTA and Regulation E.171 b. Consideration of Prepaid Cards, in General In 1994, the Board also first considered whether all prepaid cards should receive the protections of Regulation E.172 After receiving comments, the Board proposed amendments to Regulation E in May 1996.173 These proposed rules would have imposed modified requirements on three classes of prepaid products: “off-line accountable stored-value systems,” “off-line unaccountable stored-value systems, and “on-line stored-value systems.”174 The Board defined “on-line stored-value systems” as the following: [B]alance of funds that may be accessed only through the use of a card that a consumer may use at electronic terminals to obtain cash or purchase goods or services, where the record of such balance is maintained on a separate database, and not on the card, and where on-line authorization of transactions is required to access the funds.175 This category of prepaid cards, which the Board considered to be “the functional equivalent of a deposit account accessed by a debit card,” closely resembles the prepaid debit card; however, the Board recognized that not all on-line stored-value cards are reloadable.176 Therefore, this definition presumably included products such as branded or open-looped gift cards in addition to prepaid debit cards. The proposed rule would have applied to several prepaid products that were not exempted by a de minimis exception for cards issued for below $100.177 However, the prepaid industry protested that these protections would stifle product development,178 and, in response, Congress directed 168. 169. 170. 171. Electronic Fund Transfers (Regulation E), 12 C.F.R. § 205.15(d)(3) (2009). Id. § 205.15(d)(4). Id. § 205.15(c). Electronic Fund Transfers, 62 Fed. Reg. 43,467, 43,467 (August 14, 1997) (codified at 12 C.F.R. pt. 205). 172. Ramasastry, supra note 148, at 835. 173. Id. (citations omitted); Electronic Fund Transfers, 61 Fed. Reg. 19,696, 19,696 (May 2, 1996) (codified at 12 C.F.R. pt. 205). 174. Electronic Fund Transfers, 61 Fed. Reg. at 19,699 (emphasis in the original). 175. Id. at 19,704. 176. Id. at 19,702. 177. Id. at 19,703 (emphasis in the original). 178. Furletti, Prepaid Card Markets, supra note 32, at 11. 232 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 the Board to evaluate whether the EFTA or Regulation E “could be applied to electronic stored-value products without adversely affecting the cost, development, and operation of such products.”179 The Board issued its response in 1997, concluding that these regulations might suppress innovation and development of prepaid products.180 Nevertheless, the Board conceded that compliance with Regulation E requirements would not be “a significant problem” for these cards.181 c. Payroll Cards The Board’s stance on prepaid cards remained stagnant until September 2004, when it published proposed rules to extend Regulation E to payroll cards.182 The Board’s primary justification for this expansion was the acknowledgment that payroll cardholders needed basic legal protections because their livelihoods depended on the funds loaded on to such cards.183 This proposal was followed by an announcement of the approval of a final rule extending Regulation E to payroll cards in August 2006.184 This extension was implemented by amending the definition of “account” to include “payroll card account[s],” defined as: An account that is directly or indirectly established through an employer and to which electronic fund transfers of the consumer’s wages, salary, or other employee compensation . . . are made on a recurring basis, whether the account is operated or managed by the employer, a third-party payroll processor, a depository institution or any other person.185 The Board modified the requirements for furnishing periodic statements for payroll card accounts—similar to those modifications for electronic benefits186—by exempting financial institutions from providing account transaction information to card users as long as it makes available the 179. BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM, REPORT TO THE CONGRESS ON THE APPLICATION OF THE ELECTRONIC FUND TRANSFER ACT TO ELECTRONIC STOREDVALUE PRODUCTS 1 (1997), available at http://www.federalreserve.gov/boardDocs/rptcongress/ efta_rpt.pdf. 180. Ramasastry, supra note 148, at 836. 181. Electronic Fund Transfers, 61 Fed. Reg. at 19,699, 19,702. The Board recognized that “because [this] system operate[s] on-line,” the system was already “designed to [protect] against unauthorized access, and compliance with limitations on consumer liability” would be similar to those for “traditional deposit account[s] accessed by debit card[s].” Id. 182. Woods, supra note 138, at 815–16. 183. Mark E. Budnitz, Developments in Payments Law 2008: Creative Consumer Lawsuits and Robust Government Enforcement, 12 J. CONSUMER & COM. L. 2, 4 (2008). 184. Press Release, Board of Governors of Federal Reserve System, Approval of Final Rule Covering Payroll Card Accounts Under Regulation E and a Request for Public Comment on an Interim Final Rule (Aug. 24, 2006), http://www.federalreserve.gov/newsevents/press/bcreg/ 20060824a.htm. “According to the [Board], ‘[t]he broad characteristics of payroll card accounts led the FRB to conclude that payroll card accounts are appropriately classified as [deposit] accounts.’” Woods, supra note 138, at 815. 185. Electronic Fund Transfers (Regulation E), 12 C.F.R. § 205.2(b)(2) (2009). 186. 12 C.F.R. § 205.15(c) (2009). 2010] Protecting the Underserved 233 consumer’s account balance via telephone, a 60-day electronic history of account transactions, and a 60-day written history of the consumer’s transactions upon the consumer’s request.187 B. THE CREDIT CARD ACT AND REGULATION E SECTION 205.20 In May 2009, President Barack Obama signed the Credit CARD Act into law.188 Although primarily aimed at regulation of credit card issuing practices, several provisions focus on prepaid cards.189 Title IV of the Credit CARD Act, titled “Gift Cards,” amended the EFTA.190 When the Act took effect in early 2010, it significantly impacted segments of the prepaid card industry, notably those that fell within the “[A]ct’s definition of ‘generaluse prepaid card,’ ‘gift certificate,’ and ‘store gift card.’”191 The Act defines “general-use prepaid card” as a: [C]ard or other payment code or device issued by any person that is – (i) redeemable at multiple, unaffiliated merchants or service providers, or automatic teller machines; (ii) issued in a requested amount, whether or not that amount may, at the option of the issuer, be increased in value or reloaded if requested by the holder; (iii) purchased or loaded on a prepaid basis; (iv) and honored, upon presentation, by merchants for goods and services, or at automated teller machines.192 The Act, however, specifically exempts prepaid debit cards.193 Section 915(a)(2)(D) provides “the term[] ‘general-use prepaid card’ . . . do[es] not include an electronic promise, plastic card, or payment code or device that 187. Id. § 205.18(b)(1). 188. Credit CARD Act of 2009, Pub. L. No. 111-24, 123 Stat. 1734 (codified as amended in scattered sections of 15 U.S.C.). 189. Keitel, supra note 128. 190. 15 U.S.C.A. § 1693l-1 (West 2010). 191. Keitel, supra note 128. 192. 15 U.S.C.A. § 1693l-1(a)(2)(A). A store gift card was further defined as: [A]n electronic promise, plastic card, or other payment code or device that is— (i) redeemable at a single merchant or an affiliated group of merchants that share the same name, mark, or logo; (ii) issues in a specified amount, whether or not that amount may be increased in value or reloaded at the request of the holder; (iii) purchased on a prepaid basis in exchange for payment; and (iv) honored upon presentation by such single merchant or affiliated group of merchants for goods or services. Id. § 16931l-1(a)(2)(C). 193. See id. § 1693l-1(a)(2)(D). 234 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 is . . . (ii) reloadable and not marketed or labeled as a gift card or gift certificate.”194 Furthermore, the corresponding amendments to Regulation E issued by the Board in April 2010,195 also make clear that prepaid debit cards are not protected by these changes.196 Section 205.20(b)(2) states “[t]he terms ‘gift certificate,’ ‘store gift card,’ and ‘general-use prepaid card’ . . . do not include any card, code, or other device that is . . . reloadable and not marketed or labeled as a gift card or gift certificate.”197 Nevertheless, Title IV and Regulation E now provide several important protections for general-use prepaid cards and gift cards, including limitations on fees and expiration and disclosure requirements.198 The Act makes it unlawful, except as otherwise provided, to impose “a dormancy fee, an inactivity charge or fee, or a service fee with respect to [covered forms of payment].”199 The Act also requires disclosure, demanding that the certificate or card clearly and conspicuously inform consumers of applicable fees and how and when these fees will apply.200 The Credit CARD Act and the amendments to Regulation E are the most recent actions taken to protect consumer rights in the prepaid card industry,201 but as prepaid debit cards become increasingly popular,202 Congress and the Board must consider extending protections further. V. ENSURING THE FINANCIAL SECURITY OF UNDERSERVED PREPAID DEBIT CARD USERS THROUGH UNIFORM FEDERAL REGULATION Congress passed the EFTA after determining that a major void existed in consumer protection laws covering electronic fund transfers, “leaving the rights and liabilities of consumers, financial institutions, and intermediaries in electronic fund transfers undefined.”203 The intent of Congress was exceptionally clear; its primary objective was the “provision of individual consumer rights” for Americans who had placed their trust in electronic 194. Id. 195. Electronic Funds Transfer, 75 Fed. Reg. 16,580, 16,582 (Apr. 1, 2010) (codified at 12 C.F.R. § 205.20) (2010) (amending Regulation E to adopt reforms made to gift cards, gift certificates, and general-use prepaid card under the Credit CARD Act). 196. See id. at 16,592–94. 197. Id. at 16,614. 198. See 15 U.S.C.A. § 1693l-1(b)–(c); see also Electronic Funds Transfer, 75 Fed. Reg. at 16,614–15 (codified at 12 C.F.R. § 205.20(c), (d), (f)). 199. 15 U.S.C.A. § 1693l-1(b)(1); Electronic Funds Transfer, 75 Fed. Reg. at 16,614–15 (codified at 12 C.F.R. § 205.20(d)) (disallowing dormancy, inactivity, and service fees under certain conditions). 200. 15 U.S.C.A. § 1693l-1(b)(3); Electronic Funds Transfer, 75 Fed. Reg. at 16,614–15 (codified at 12 C.F.R. § 205.20(c)–(d)). 201. Keitel, supra note 128. 202. See Walker, supra note 7. 203. Electronic Fund Transfer Act of 1978 § 902, 15 U.S.C. § 1693(a) (2006). 2010] Protecting the Underserved 235 fund transactions.204 In setting out to achieve this goal, Congress granted the Board comprehensive regulatory authority.205 Over the last several years, Congress and the Board have taken notice of the growing popularity and practicality of the prepaid industry as a modern payment method for the underserved and population at large.206 In response, Congress and the Board have regulated several popular prepaid products, including EBT transfers,207 payroll card accounts,208 and gift cards.209 However, uncertainty about whether the EFTA and Regulation E currently apply to prepaid debit cards has caused considerable confusion.210 In fact, the Board has even suggested that prepaid debit cards may already fall within the purview of Regulation E.211 To ensure the security and support the legitimacy of this growing financial industry, the Board must provide clarification. The most effective way to achieve this result is to explicitly extend Regulation E to prepaid debit cards. Specifically, the Board should amend the definition of “account,” as was most recently done to incorporate payroll accounts, and adopt a new section to Regulation E that specifies the protections and modified requirements for prepaid debit cards. A. EXTENDING REGULATION E TO PREPAID DEBIT CARDS Amending Regulation E to redefine “account” to include “prepaid debit account” would provide much needed clarity as to how prepaid debit cards are protected by Regulation E and the EFTA.212 Gail Hillebrand has suggested amending the definition of “account” to include: [A] ‘spending account,’ which is an account that is directly or indirectly established by the consumer and to which prepayments on behalf of the consumer by the consumer or by others, including but not limited to loan 204. Id. § 1693(b). 205. See id. § 1693b. The Board has determined that the legislative history of the EFTA provides broad guidance as to the Board’s regulatory authority for determining issues of coverage of prepaid cards. See Electronic Fund Transfers, 61 Fed. Reg. 19,696, 19,696 (May 2, 1996). 206. Woods, supra note 138, at 815. 207. Electronic Fund Transfers (Regulation E), 12 C.F.R. § 205.15 (2009). 208. Id. § 205.18. 209. Credit CARD Act of 2009, 15 U.S.C.A. § 1693l-1 (West 2010); 12 C.F.R. §§ 205.15, 205.18. 210. Ramasastry, supra note 148, at 815–16. 211. See Electronic Fund Transfers, 61 Fed. Reg. at 19,699. In proposed rules issued in 1996, the Board considered extending Regulation E to three categories of prepaid cards, including “online” stored value cards, which operate through on-line access to a remote database to access account data and authorize transactions. Id. At that time, the Board believed that these cards “me[t] the definition of a consumer asset account, and thus [were] covered by Regulation E.” Id. Nevertheless, the Board proposed modified rules for these cards that were never adopted. Id. at 19,702. 212. Hillebrand, supra note 126, at 795. 236 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 proceeds or tax refunds, of an amount greater than $250 in any calendar year may be made or to which recurring electronic fund transfers may be made by or at the discretion of the consumer, or from which electronic fund transfers may be made at the discretion of the consumer. . . . This definition shall include all accounts into which funds are placed at the discretion of the consumer that meet the conditions of this definition, whether or not the account is held in the name of the consumer or the name of another entity. For purposes of this definition, a spending account is an account that holds funds that are transferred into the account by the consumer or by an entity who owes those funds to the consumer, even if the funds in the account are held in a pooled fashion in the name of another.213 Ms. Hillebrand’s proposal is closely based on the amendment to Regulation E incorporating payroll accounts.214 This hypothetical definition extends the protections of Regulation E to a broad range of “prepaid storedvalue cards.”215 However, a narrower definition of account—focused specifically on prepaid debit card accounts—is more likely to win the support of the Board. First, the Board has regularly chosen to make incremental modifications to Regulation E rather than comprehensive changes.216 Second, regulation of prepaid debit cards is more urgent as the industry continues to grow, particularly among underserved users.217 Finally, discretion should be left to the Board to determine the dollar threshold that triggers the protections of Regulation E. Accordingly, the proposed amendment to the definition of “account” in hypothetical 12 C.F.R. § 205.2(b)(4) should be: The term ‘account’ includes a ‘prepaid debit card account’ which is an account that is established by a consumer and to which electronic fund transfers, constituting prefunded value, are made on a recurring basis by or on behalf of the consumer that may be accessed only through use of a card at the discretion of the consumer, whether the account is held directly or indirectly by a financial institution. The Board should also amend the definition of “financial institution” to include “any person that, directly or indirectly, holds a [prepaid debit account], or that issues a card to a consumer for use in obtaining cash or purchasing goods or services by accessing such an account.”218 213. 214. 215. 216. 217. 218. Id. at 796. Id.; see also 12 C.F.R. § 205.2(b)(2) (2009). Hillebrand, supra note 126, at 795. See supra Part IV (discussing amendments made by the Board to other prepaid products). See Walker, supra note 7. Electronic Fund Transfers, 61 Fed. Reg. 19,696, 19,704 (May 2, 1996). 2010] Protecting the Underserved 237 Certain fee limitations, similar to those that now cover gift cards, gift certificates, and general-use prepaid cards,219 should also be adopted by the Board and applied to prepaid debit cards. Furthermore, issuing financial institutions should be permitted to provide modified disclosures, similar to exceptions adopted for EBT transfers, payroll card accounts, and gift cards, gift certificates, and generaluse prepaid cards, including account information disclosure and error resolution notice.220 Finally, in adopting a new section of Regulation E, the Board should exempt prepaid debit cards from particular compliance requirements to address concerns about the economic costs of regulatory compliance.221 Rather than requiring periodic statements that detail account activity, an issuer should be required to provide account balances and account histories online or by telephone, and provide written histories only upon consumers’ request.222 B. OPPOSITION TO BOARD ACTION The Board has been reluctant to extend the protections of Regulation E to prepaid debit cards despite considering action several times.223 Rather, the Board has acceded to the opposition of issuers, brand networks, and other industry participants—those profiting from prepaid debit cards rather than those consuming them.224 Today’s arguments against regulating prepaid debit cards are not novel. In fact, these arguments have been raised 219. See 12 C.F.R. § 205.2(d). 220. See id. §§ 205.15(d), 205.18(c), Appendix A-7(a)–(b). 221. See Ramasastry, supra note 148, at 842. In the 1996 proposed rules, the Board recommended to exempt on-line stored value systems completely from coverage if the maximum amount that could be prefunded on the card was limited to $100. Electronic Fund Transfers, 61 Fed. Reg. at 19,703. The justification for this de minimis exemption was quite practical. If the value associated with a card is limited to a small amount, the cost of Regulation E compliance would be disproportionately greater. See id. at 19,701 (“For a stored value product limited to a relatively small amount of funds, the amount at risk would be sufficiently minimal that application of even modified Regulation E prosecutions appears unnecessary.”). However, this proposal was based upon the Board’s determination that on-line stored value systems included non-reloadable products. Id. at 19,702 (“In some on-line stored-value systems, cards are not reloadable. . . .”). Since it would be an impossibility to determine whether a consumer would, over the course of a prepaid debit cards use, pre-load at least $100 on the card, it is impractical to apply this de minimis exemption for prepaid debit cards. 222. The Board proposed an exemption from the periodic statement requirement for all reloadable on-line stored-value cards based on the assumption that since the value is only accessible through the card itself, period statements are not necessary because the consumer will receive a receipt for each transaction. Electronic Fund Transfers, 61 Fed. Reg. at 19,702. A similar modification has been adopted for EBT transfers and payroll card accounts, and therefore, seems appropriate and not unduly burdensome for issuers of prepaid debit cards as well. See 12 C.F.R. § 205.15. 223. Ramasastry, supra note 148, at 835–36. 224. See Furletti, Prepaid Card Markets, supra note 32, at 14. 238 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 for over a decade, since the Board first considered widespread regulation of the prepaid industry.225 The linchpin of the prepaid industry’s argument against extending federal regulation has been on the grounds that compliance with Regulation E will be too costly and will stifle product development.226 In particular, issuers are concerned that Regulation E’s account balance and history statements requirements are unduly burdensome.227 However, issuers’ fears may be quelled by the fact that any previous extensions implemented by the Board applied modified disclosure requirements.228 In addition to concerns about cost, the industry has voiced strong opposition on the grounds that regulation will curb development of this relatively young product.229 This argument is enhanced by a belief that regulations developed in a different time and context cannot be appropriately applied to regulate prepaid debit cards.230 Nevertheless, regulation is crucial at this time. Although prepaid debit cards are considered to be in their infancy—particularly when compared to closed-loop systems, which date back to the 1970s231 and the initial openloop systems introduced in the mid-1990s232—the prepaid debit card industry has flourished, and according to industry researchers, will have more than doubled in volume in 2010 from 2008 totals.233 The industry is ripe for regulation. Issuers and providers also often assert that regulation is unnecessary because the brand networks, like Visa and MasterCard, have “voluntarily” adopted “zero liability” policies and error resolution procedures that protect prepaid debit card consumers.234 However, these voluntary policies are arbitrarily applied, limited in scope, and provide less than adequate 225. See id. 226. See FURLETTI, HOW DO THEY FUNCTION?, supra note 77, at 16 (“The industry argued against the proposal for fear that it would halt the development of prepaid products.”). 227. See Furletti, Prepaid Card Markets, supra note 32, at 14 (“If issuers were forced to adhere to certain sections of Regulation E and . . . mail monthly statements to prepaid card customers and provide liability protections . . . [then] many current prepaid business models [might not] be profitable.”). 228. See 12 C.F.R § 205.15(d) (applying modified disclosure requirements to EBT transfers of government benefits); 12 C.F.R. § 205.18(b) (2009) (applying modified disclosure requirements to Payroll Accounts). 229. See Consumer Advisory Council, Transcript of the Consumer Advisory Council Meeting 48 (Mar. 30, 2006), available at http://www.federalreserve.gov/aboutthefed/cac/cac_2006033 0.htm#efta (testimony of member Joshua Peirez). 230. See id. (“[T]aking regulation set that’s developed in one context and applying it wholesale to brand new products that were not even envisioned at the time that the regulation was written is not always the best way to go.”). 231. DiSanto, supra note 46, at 23. 232. Id. 233. Flanigan, supra note 12. 234. See Letter from Gail Hillebrand et al., Consumer Union, to Jennifer L. Johnson, Sec’y, Bd. of Governors of the Fed. Reserve Sys. (Oct. 28, 2004), available at http://www.consumers union.org/pdf/payroll1004.pdf. 2010] Protecting the Underserved 239 protection for consumers affected by lost or stolen cards and unauthorized use.235 Along a similar vein, some industry officials have argued that fees have been declining.236 A recent industry-sponsored study found that some cards, including those marketed by Green Dot, Wal-Mart, and NetSpend, compare favorably against the costs of traditional checking accounts, defying many of the negative misconceptions associated with prepaid debit cards.237 Nevertheless, a failure to regulate has left consumers paying arbitrary and egregious fees that they neither expect nor understand.238 C. CONGRESSIONAL ACTION: AMENDING THE EFTA Despite the Board’s powerful grant of regulatory authority, it has continued to succumb to industry pressures,239 taking a piecemeal approach to regulating the prepaid card industry.240 Therefore, it may become necessary for Congress to reconsider its original objective in passing the EFTA—protecting consumer rights241—and take matters into its own hands. This is a course of action it recently followed in passing the Credit CARD Act. Congressional reluctance to regulate some forms of prepaid payment methods may be clear from the narrow definition attributed to “general-use prepaid cards” in the Credit CARD Act.242 However, Congress may still determine that prepaid debit cards must be regulated, particularly in light of their increasing popularity and attention. Congressional action should come in the form of amending the EFTA’s definition of “account.” Under this amendment, “account” should include “all methods of holding funds that a consumer has provided, or directed to be provided, for the purpose of funding a card or other payment device similar in function to a debit card.”243 Congress has clearly indicated its concern for the protection of consumers’ use of electronic fund transfer system.244 If Congress takes this 235. Id. For example, MasterCard’s policy limits protections only to customers who have an account in good standing, “have exercised reasonable care in safeguarding [their] card [against] any unauthorized use,” and it does not apply if there are more than two instances of theft or unauthorized use of a card in one year. MasterCard Zero Liability: Zero Liability Protection for Lost & Stolen Cards, MASTERCARD.COM, http://www.mastercard.com/us/personal/en/cardholder services/zeroliability.html (last visited Dec. 19, 2009). 236. Martin, supra note 72. 237. BRETTON WOODS, INC., PAYMENT SYSTEMS EVOLUTION AND BRANDED PREPAID CARD ANALYSIS © 5 (2009), available at http://wenku.baidu.com/view/a4ad971ec5da50e2524d7ff 9.html. 238. See FED. RES. BANK OF N.Y., Stored Value Cards, supra note 8. 239. See Furletti, Prepaid Card Markets, supra note 32, at 14. 240. See supra Part IV (discussing current regulatory approaches to regulating the prepaid card industry). 241. Electronic Fund Transfer Act of 1978, 15 U.S.C. 1693(a) (2006). 242. See Credit Card Act of 2009, 15 U.S.C.A. § 1693l-1(a)(2)(A) (West 2010). 243. Hillebrand, supra note 126, at 796. 244. See 15 U.S.C. § 1693(a). 240 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 action, the Board will be forced, under the EFTA, to comply and issue conforming amendments to Regulation E. VII. CONCLUSION The prepaid debit card industry is “at an inflection point.”245 Unfortunately, consumers—particularly the underserved—who purchase such cards as an account substitute remain unaware that this “prepaid product may be distinctly second rate in terms of the clarity, and perhaps the existence, of [] essential consumer protections.”246 As the underserved population multiplies in the current economic crisis and the marketplace for prepaid debit cards continues to reflect this growth, the need for consumer protection resounds even more. In light of the increasing popularity of prepaid debit cards, federal laws and regulations must be extended to protect the nation’s most vulnerable consumers. Ari M. Cohen 245. Flanigan, supra note 12 (quoting Mark Troughton, President of Cards and Networks at Green Dot). 246. Hillebrand, supra note 126, at 794. B.A., University of Michigan, 2005; J.D., Candidate, Brooklyn Law School, 2011; Executive Notes and Comments Editor, Brooklyn Journal of Corporate, Financial & Commercial Law. I am grateful to the members of the Brooklyn Journal of Corporate, Financial & Commercial Law, particularly Robert Marko and Steven Bentsianov for their work on this note. I wish to thank Angie for her support and patience throughout this process and law school. Finally, I wish to thank my parents, Alan and Joni Cohen, for their love, encouragement, and inspiration. BANKRUPTCY SECTION 363(b) SALES: MARKET TEST PROCEDURES AND HEIGHTENED SCRUTINY OF EXPEDITED SALES MAY PREVENT ABUSES AND SAFEGUARD CREDITORS WITHOUT LIMITING THE POWER OF THE COURTS INTRODUCTION On April 30, 2009, Chrysler LLC filed for Chapter 11 bankruptcy protection after failing to reach an agreement with lenders to restructure its debt.1 President Barack H. Obama promised a quick bankruptcy process, with one senior official predicting that the process could be completed within thirty to sixty days.2 The government’s promises were fulfilled on May 31, 2009, when Southern District of New York Bankruptcy Court Judge Arthur Gonzalez issued a decision approving a sale of the corporation’s main business assets to a newly formed entity, “New Chrysler.”3 After an expedited appeal, the Second Circuit Court of Appeals issued a bench decision affirming the Bankruptcy Court on June 5, 2009, and released a full written decision two months later.4 Later that year, Chrysler’s “Big Three”5 brother, General Motors, Corp., filed for Chapter 11.6 Similar to Chrysler, General Motor’s path through bankruptcy took approximately one month.7 As was the case in Chrysler,8 the debtor in General Motors, with the approval and order of the Court, used Bankruptcy Code (the Code) § 363(b)9 to sell the General Motors assets to a new entity, “New General Motors.”10 Further, in both cases, the federal government was highly involved, with the Treasury Department (Treasury) providing financing for the bankruptcies and the government—along with the United Auto Workers Union—acquiring ownership of a large portion of the new entities.11 1. See In re Chrysler LLC (Chrysler I), 405 B.R. 84, 87–88 (Bankr. S.D.N.Y. 2009). 2. Chris Isidore, Chrysler Files For Bankruptcy, CNNMONEY.com, May 1, 2009, http://money.cnn.com/2009/04/30/news/companies/chrysler_bankruptcy/index.html. 3. In re Chrysler I, 405 B.R. at 84–92, 113. 4. In re Chrysler LLC (Chrysler II), 576 F.3d 108, 109, 127 (2d Cir. 2009). 5. The “Big Three” refers to the three major American automotive companies: General Motors, Ford, and Chrysler. 6. In re General Motors Corp., 407 B.R. 463, 479 (Bankr. S.D.N.Y. 2009) (“On June 1, 2009 . . . GM filed its chapter 11 petition in this court.”). 7. See id. at 520 (approving the 363(b) sale of the assets of General Motors to a purchaser “New GM” on Sunday, July 5, 2009). 8. See Chrysler I, 405 B.R. at 87. 9. 11 U.S.C. § 363(b) (2006); discussion infra Part II. 10. In re General Motors, 407 B.R. at 473. 11. Mike Ramsey & Lizzie O’Leary, Fiat Said to Buy Chrysler Assets Today to Form New Automaker, BLOOMBERG.COM, June 10, 2009, http://www.bloomberg.com/apps/news?pid=news archive&sid=aAB9jCmPBUQU (“Chrysler Group LLC, will be owned 20 percent by Turin, Italy- 242 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 In all likelihood, neither General Motors nor Chrysler could have survived a long, drawn-out bankruptcy process.12 Some commentators argue the short processes and use of § 363(b) sales were vital to prevent the companies’ collapse and a resulting loss of the production, jobs, and stability that they provide.13 However, even if the quick sale of the two auto giants was the correct and legal course of action, questions remain as to whether the Chrysler and General Motors cases will serve as precedent for a more liberal use of these expedited sales procedures.14 Further, if the use of § 363(b) sales does increase, what consequences await? And if these consequences are negative or undesirable, can anything be done to mitigate them while preserving the flexibility and benefits the use of such sales provides bankruptcy judges and filers alike? Despite the many conveniences and benefits of § 363(b) sales, additional procedural safeguards should be put in place to prevent abuses from occurring. This note proposes a robust market test for § 363(b) sales that requires: 1) disclosure of sales terms; 2) adequate time for market based Fiat, 9.85 percent by the U.S., 2.46 percent by Canada and 67.69 percent by a United Auto Workers union retiree health care trust fund. The U.S. and Canadian governments financed the sale with $2 billion.”); Emily Chasan & Phil Wahba, GM Asks for Bankruptcy Sale in 30 Days, REUTERS, June 1, 2009, available at http://www.reuters.com/article/businessNews/idUSTRE 5507X420090601 (“Under a government-backed restructuring plan, the Obama administration would take a 60 percent stake in the newly-formed company made up of GM’s most profitable assets. The UAW would have a 17.5 percent stake, the Canadian government would own about 12 percent and GM bondholders would receive about 10 percent.”). 12. See generally Stephen J. Lubben, No Big Deal: The GM and Chrysler Cases in Context, 83 AM. BANKR. L.J. 531, 544 (2009) (noting that “liquidating a company the size of Chrysler would have cost millions of dollars”). The U.S. Treasury and Canadian government officials also wanted an “expedited” process to “preserve the value of the business, restore consumer confidences, and avoid the costs of a lengthy chapter 11 process.” Id. at 536–37. 13. See A. Joseph Warburton, Understanding the Bankruptcies of Chrysler and General Motors: a Primer, 60 SYRACUSE L. REV. 531, 567–68 (2010) (discussing the rapid erosion of assets and “going concern value” of Chrysler LLC in the Chrysler case). As of early 2009, “General Motors employed approximately 235,000 employees worldwide” and had assets of $82 billion. In re General Motors, 407 B.R. at 475. Chrysler employed approximately 55,000 employees and had revenue of nearly $50 billion for the year prior to its bankruptcy petition. In re Chrysler LLC (Chrysler I), 405 B.R. 84, 88–89 (Bankr. S.D.N.Y. 2009). 14. Multiple commentators have questioned the state of bankruptcy law after General Motors and Chrysler. See, e.g., Barry E. Adler, A Reassessment of Bankruptcy Reorganization After Chrysler and General Motors, 18 AM. BANKR. INST. L. REV. 305, 305 (2010). The recent bankruptcy cases of Chrysler and General Motors were successful in that they quickly removed assets from the burden of unmanageable debt amidst a global recession, but the price of this achievement was unnecessarily high because the cases established or buttressed precedent for the disregard of creditor rights. As a result, the automaker bankruptcies may usher in a period where the threat of insolvency will increase the cost of capital in an economy where affordable credit is sorely needed. Id.; Robert M. Fishman & Gordon E. Gouveia, What's Driving Section 363 Sales After Chrysler and General Motors?, 19 NORTON. J. BANKR. L. & PRAC. 4, Art. 2 (2010) (“Do the Chrysler and General Motors cases represent a new paradigm in which preserving going concern value and jobs take precedence over the protections that Chapter 11 has traditionally afforded to creditors?”) (citations omitted). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 243 players to bid on the asset; and 3) centralized review of competing bids. Additionally, where “time is of the essence” and a market test is either impossible or impractical, heightened judicial review should substitute for such a test. Part I of this note provides the history of pre-confirmation asset sales in bankruptcy proceedings. Part II compares § 363(b) sales with bankruptcy reorganization plan confirmations and analyzes the benefits and detriments of each. Part III proposes a robust market test procedure to be implemented in § 363(b) sales and heightened scrutiny for “time is of the essence” sales, where a robust market test is impossible. The note concludes by explaining the significance and drawbacks of this proposal and what future problems may arise in § 363(b) sales. I. HISTORY OF THE BANKRUPTCY PRE-CONFIRMATION ASSET SALE Section 363(b), used in both Chrysler and General Motors, provides a means by which a bankruptcy judge can order a company to sell assets before a bankruptcy plan confirmation is reached.15 The procedure involves a showing of cause for the sale and courts allow creditors the opportunity to object.16 The use of these pre-confirmation sales is expressly provided for in 11 U.S.C. § 363(b), enacted in 1978.17 The provisions of this section of the Code apply equally to a debtor in possession (DIP or debtor) as they do to a trustee.18 Additionally, the “other than in the ordinary course of business” clause has been read broadly to allow sales of entire business entities.19 Section 363(b) sales have been used in some of the largest and most well-known bankruptcies, including those of Enron and the two recent 15. 11 U.S.C. § 363(b) (2006). 16. Id. 17. 11 U.S.C. § 363(b)(1) states the following: (b)(1) The trustee, after notice and a hearing, may use, sell, or lease, other than in the ordinary course of business, property of the estate, . . . (B) after appointment of a consumer privacy ombudsman in accordance with section 332, and after notice and a hearing, the court approves such sale or such lease— (i) giving due consideration to the facts, circumstances, and conditions of such sale or such lease; and (ii) finding that no showing was made that such sale or such lease would violate applicable nonbankruptcy law. Id. 18. For the purposes of § 363, the debtor in possession enjoys the same rights and benefits under the Code as those prescribed to the trustee. See 11 U.S.C. §§ 363, 1107, 1108 (2006). 19. See, e.g., In re General Motors Corp., 407 B.R. 463, 489–90 (Bankr. S.D.N.Y. 2009); In re Chrysler LLC (Chrysler I), 405 B.R. 84, 94 (Bankr. S.D.N.Y. 2009); In re Torch Offshore, Inc., 327 B.R. 254 (E.D. La 2005). 244 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 automotive manufacturer bankruptcies.20 Academic appraisal of § 363(b) sales has varied, with some advocating for their use as a model to which all large bankruptcies should aspire,21 while others have criticized the use of such sales, claiming that they subvert the bankruptcy system and are ripe for abuse.22 Expedited pre-confirmation sales procedures have a long history in American bankruptcy law, with statutory authority for such sales enacted as early as 1867.23 The evolution of § 363(b) sales since that time provides meaningful insight into the drafters’ purpose and intent in crafting the procedures for these sales. A. PRE-CONFIRMATION SALE OF ASSETS IN BANKRUPTCY PRIOR TO THE 1978 BANKRUPTCY CODE The Bankruptcy Act of 1867 provided that the court may order the sale of the estate of the debtor if it finds that it “is of a perishable nature, or liable to deteriorate in value . . . .”24 The Second Circuit, in 1913, held that the concept of “perishable” was not only limited to the physical nature of the object but also to the price of the object.25 The Ninth Circuit, using as a standard for determining the validity of a sale the deterioration of monetary value as well as physical deterioration, reached the same result twenty years later in Hill v. Douglas, upholding the sale of road-making equipment to prevent repossession.26 20. See, e.g., Chrysler I, 405 B.R. at 113, In re General Motors, 407 B.R. at 520, In re Enron Corp., 291 B.R. 39, 40 (S.D.N.Y. 2003); see also The 10 Largest U.S. Bankruptcies, http://money.cnn.com/galleries/2009/fortune/0905/gallery.largest_bankrup CNNMONEY.COM, tcies.fortune/index.html (last visited Dec. 30, 2010). 21. See, e.g., Harvey R. Miller & Shai Y. Waisman, Does Chapter 11 Reorganization Remain a Viable Option for Distressed Businesses for the Twenty-First Century?, 78 AM. BANKR. L.J. 153 (2004); Bryant P. Lee, Note, Chapter 18? Imagining Future Uses of 11 U.S.C. § 363 to Accomplish Chapter 7 Liquidation Goals in Chapter 11 Reorganizations, 2009 COLUM. BUS. L. REV. 520. 22. E.g., Lynn M. LoPucki & Joseph W. Doherty, Bankruptcy Fire Sales, 106 MICH. L. REV. 1, 13 (2007); Chad P. Pugatch, Craig A. Pugatch & Travis Vaughan, The Lost Art of Chapter 11 Reorganization, 19 U. FLA. J.L. & PUB. POL’Y 39, 58 (2008); Craig A. Sloane, The Sub Rosa Plan of Reorganization: Side-Stepping Creditor Protections in Chapter 11, 16 BANKR. DEV. J 37, 63 (1999); Elizabeth B. Rose, Note, Chocolate, Flowers, and § 363(b): The Opportunity for Sweetheart Deals Without Chapter 11 Protections, 23 EMORY BANKR. DEV. J. 249, 249 (2006) (citing Administration of Large Business Bankruptcy Reorganizations: Has Competition for Big Cases Corrupted the Bankruptcy System?: Hearing Before the Subcomm. on Commercial and Admin. Law of the H. Comm. on the Judiciary, 108th Cong. 15 (2004) (statement of Lynn M. LoPucki)). 23. See Bankruptcy Act of 1867, ch. 176, 14 Stat. 517, 528 (1867). 24. Id. 25. In re Pedlow, 209 F. 841, 842 (2d Cir. 1913). 26. Hill v. Douglass, 78 F.2d 851, 854 (9th Cir. 1935). It will be conceded that road-making equipment is not within the ordinary concept of perishable property. Yet the courts have been liberal in their construction of this term 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 245 In the Chandler Act of 1938 (the Chandler Act), the immediate precursor to the current Code, § 116(3) provided that a sale could be ordered “upon cause shown.”27 This standard was generally read as an extension of the “perishable” concept that existed prior to the Chandler Act and pre-confirmation sales persisted as the exceptional remedy.28 The circuit courts split in their approach to the validity of sales pursuant to § 116(3) of the Chandler Act.29 The Second Circuit took a broad view of the statute and, in Frank v. Drinc-O-Matic, Inc., gave the bankruptcy judge wide discretion in ordering such sales by adopting an abuse of discretion standard.30 In subsequent cases, the court found that varying conditions such as inability of a debtor to redeem property, failure to pass a plan of reorganization, and the wasting away of an asset were appropriate conditions for the ordering of a pre-confirmation sale.31 Not all circuits liberally interpreted the Chandler Act.32 The Third Circuit, in In re Solar Mfg. Corp., limited the use of § 116(3) procedures to “emergency” situations, involving an “imminent” loss of assets.33 That reasoning was even adopted, albeit for only a short period of time, by the Second Circuit in In re Pure Penn Petroleum Co., where the court required a showing of imminent loss to effectuate a sale.34 However, from the 1950s and have held it to include not only that which may deteriorate physically, but that which is liable to deteriorate in price and value. Id. (citing In re Pedlow, 209 F. 841 (2d Cir. 1913); In re Inter-City Trust, 295 F. 495, 497 (9th Cir. 1924)). 27. See In re Lionel Corp., 722 F.2d 1063, 1067–68 (2d Cir. 1983) (citing the Chandler Act of 1938, ch. 575, 52 Stat. 883 (1938)). 28. See id. at 1066–67. 29. Compare In re Sire Plan Inc., 332 F.2d 497, 499 (2d Cir. 1964) (approving a sale where the hotel, at the time a skeletal frame, was wasting away), In re Marathon Foundry and Machine Co., 228 F.2d 594, 598 (7th Cir. 1955) (approving the sale of stock where trustee had insufficient assets to redeem the stock), and Frank v. Drinc-O-Matic, 136 F.2d 906, 906 (2d Cir. 1943) (approving sale of vending machines where machines were encumbered by liens and trustee had insufficient funds to redeem machines), with In re Solar Mfg. Corp., 176 F.2d 493, 494 (3d Cir. 1949) (denying the sale of business despite record losses and deterioration of real estate values because the sale did not meet “emergency” requirements). 30. See Frank, 136 F.2d at 906. 31. See In re Equity Funding Corp. of America, 492 F.2d 793, 794 (9th Cir. 1974) (“[T]he market value of Liberty was likely to deteriorate in the near future . . . .”); In re Sire, 332 F.2d at 499 (“[T]he Trustees’ evidence demonstrated at hearing [that] the partially constructed building is a ‘wasting asset.’”); In re Marathon, 228 F.2d at 594 (“The trustees had not sufficient funds with which to redeem the pledged stock.”); Frank, 136 F.2d at 906 (“The trustee had no funds with which to redeem the machines, and after six months no plan of reorganization had been proposed.”). 32. See, e.g., Solar Mfg., 176 F.2d at 494–95. 33. Id. 34. In re Pure Penn Petroleum Co., 188 F.2d 851, 854 (2d Cir. 1951) (“The debtor here, therefore, was obliged to allege and had the burden of proving the existence of an emergency involving imminent danger of loss of the assets if they were not promptly sold.”). The emergency requirement was then replaced only thirteen years later by the “best interest” test. In re Sire, 332 F.2d at 497. 246 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 on, courts began to uphold more sales in which the sale was justified as in the “best interest of the [] estate”;35 circumstances that warranted the order of a sale included a likely fall in market value, heavy interest charges and deteriorating stock value.36 Despite the removal of the “perishability” term from the Bankruptcy Act, the circumstances of the above cases indicated that the “perishability” standard remained in place after the adoption of the Chandler Act, whether through the “emergency” or “best interest of the estate” standards.37 B. 1978 BANKRUPTCY CODE, SECTION 363(b) SALES PROCEDURES The current Bankruptcy Code was enacted in 1978 and became effective for all cases filed after October 1, 1979.38 The Code amended and replaced the Bankruptcy Act.39 The Code provided a bankruptcy judge with the power to order a sale of the debtor’s assets under §§ 363(b) and 363(f).40 Section 363(b) gave statutory strength to the use of such sales without the “perishable” standard of the 1867 act or the “upon cause shown” standard of the Chandler Act, requiring only “notice and a hearing” to effectuate a sale.41 This language, which was more relaxed than the prior enactments, provided little guidance as to the circumstances under which a sale may be approved, or what the procedural safeguards of “notice and a hearing” provided for creditors opposed to the sale actually required.42 C. IN RE WHITE MOTOR CREDIT CORP. AND THE “EMERGENCY” DOCTRINE In In re White Motor Credit Corp., the bankruptcy court interpreted the newly promulgated Code43 as not authorizing a “sale of all or substantially all assets of the estate.”44 However, the court “left the [former] ‘emergency’ 35. See, e.g., In re Equity Funding, 492 F.2d at 794 (“[T]he proposed sale would be in the best interest of the bankrupt estate. Based upon these findings, which are not clearly erroneous, the trial court could properly conclude that there was ‘cause shown’ for the approval pursuant to 11 U.S.C. § 516(3).”); Frank, 136 F.2d at 906 (approving sales after concluding that it was “desirable for debtor”). 36. See In re Sire, 332 F.2d at 499 (wasting asset likely to deteriorate in value); In re Equity Funding, 492 F.2d at 794 (declining value of stock held by trustee); In re Marathon, 228 F.2d at 598–99 (discussing how interest charges prevented debtor from being able to redeem stock). 37. In re Lionel Corp., 722 F.2d 1063, 1069 (2d Cir. 1983). 38. Bankruptcy Reform Act of 1978, Pub. L. No. 95-598, 92 Stat. 2549 (codified as amended at 11 U.S.C.). 39. See id. 40. See 11 U.S.C. § 363(b), (f) (2006). 41. Id. 42. See, e.g., In re Lionel, 722 F.2d at 1069; In re Braniff Airways, Inc., 700 F.2d 935, 940 (5th Cir. 1983). 43. See 11 U.S.C. § 363(b). 44. In re White Motor Credit Corp., 14 B.R. 584, 590 (Bankr. N.D. Ohio 1981). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 247 exception45 in tact . . . .”46 The court concluded that an imminent loss of $40 million in the value of assets of the estate provided the necessary showing of an “emergency” to approve a sale of the assets.47 This decision appeared to severely limit courts’ ability to order pre-confirmation sales and to undermine the broad language of the Code.48 However, subsequent opinions would expand and more clearly define the extent to which bankruptcy courts could approve pre-confirmation sales.49 D. IN RE LIONEL CORP. AND THE “GOOD BUSINESS REASON” STANDARD Despite the absence of guiding language in § 363(b), the Second Circuit, in In re Lionel Corp., found that the Code’s legislative history suggested that the framers intended to require a trustee or debtor to justify the use of a pre-confirmation sale.50 However, the court stated that the “perishability” and “emergency” standards that were formerly employed were no longer required.51 The court held that to properly order a sale pursuant to § 363(b), a “good business reason” for such an order must be provided before the confirmation of a plan of reorganization.52 The court listed the following factors as persuasive in finding a business justification for the sale of assets: [T]he proportionate value of the asset to the estate as a whole, the amount of elapsed time since the filing, the likelihood that a plan of reorganization will be proposed and confirmed in the near future, the effect of the proposed disposition on future plans of reorganization, the proceeds to be obtained from the disposition vis-a-vis any appraisals of the property, which of the alternatives of use, sale or lease the proposal envisions and, most importantly perhaps, whether the asset is increasing or decreasing in value.53 The court found that the underlying asset in the case—stock owned by the corporation—was not wasting, nor was there an “emergency” requiring its sale.54 The panel held the sale improper, even though it applied the 45. 46. 47. 48. 49. See discussion supra Part I.A. See In re White Motor, 14 B.R. at 590. See id. See generally In re White Motor, 14 B.R. 584; see also 11 U.S.C. § 363(b). See In re Lionel Corp., 722 F.2d 1063, 1071 (2d Cir. 1983); In re Braniff Airways, Inc., 700 F.2d 935, 940 (5th Cir. 1983). 50. See In re Lionel, 722 F.2d at 1069 (“the statute requires notice and a hearing, and these procedural safeguards would be meaningless absent a further requirement that reasons be given for whatever determination is made . . . .”). 51. See id. 52. Id. at 1071. 53. Id. 54. See id. at 1071–72. 248 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 highly deferential abuse of discretion standard.55 The court continued that although it sympathized with the bankruptcy court’s desire to expedite the proceedings, “‘[t]he need for expedition, however, is not a justification for abandoning proper standards.’”56 Although the Lionel court found no business justification in the case, the decision’s central holding—that a debtor or trustee attempting to use a § 363(b) sale must provide business justification for the sale57—has provided precedential support for a broadening of the bankruptcy courts’ power to authorize such sales.58 Lionel is currently the standard under which proposed § 363(b) sales are judged. In the Chrysler bankruptcy, the court justified the § 363(b) sale by finding that Chrysler was an asset wasting away in bankruptcy.59 Chrysler was shutting down factories and required immense funding merely to sustain operations, and Fiat—the only available purchaser for Chrysler— insisted that the sale be completed within a certain period of time.60 In General Motors, the fact that the government predicated its financing on the consummation of a quick § 363(b) sale provided a sufficiently “good business reason” to justify the sale.61 This type of “time is of the essence” justification may be invoked by a debtor requesting that the court approve a sale before the purchaser is able to pull out of the agreement.62 55. See id. 56. Id. at 1071 (quoting Protective Comm. for Indep. Stockholders of TMT Trailer Ferry, Inc. v. Anderson, 390 U.S. 414, 450 (1968)). 57. Id. 58. See, e.g., In re General Motors, 407 B.R. 463 (Bankr. S.D.N.Y. 2009); In re Chrysler LLC (Chrysler I), 405 B.R. 84 (Bankr. S.D.N.Y. 2009); In re Global Crossing Ltd., 295 B.R. 726 (Bankr. S.D.N.Y. 2003); In re Medical Software Solutions, 286 B.R. 431 (Bankr. S.D.N.Y. 2002). 59. See Chrysler I, 405 B.R. at 96. 60. See id. at 96–97. The Governmental Entities, the funding sources for the Fiat Transaction, have emphasized that the financing offered is contingent upon a sale closing quickly. Moreover, if a sale has not closed by June 15th, Fiat could withdraw its commitment. Thus, the Debtors were confronted with either (a) a potential liquidation of their assets which would result in closing of plants and layoffs, impacting suppliers, dealers, workers and retirees, or (b) a government-backed purchase of the sale of their assets which allowed the purchaser to negotiate terms with suppliers, vendors, dealerships and workers to satisfy whatever obligations were owed to these constituencies. Id. 61. See In re General Motors, 407 B.R. at 480. To facilitate the process, the U.S. Treasury and the governments of Canada and Ontario (through their Export Development Canada (‘EDC’)) agreed to provide DIP financing for GM through the chapter 11 process. But they would provide the DIP financing only if the sale of the purchased assets occurred on an expedited basis. Id. (emphasis in original). 62. See Michael J. de la Merced, U.S. Court of Appeals Upholds Chrysler Sale to Fiat, N.Y. TIMES, June 6, 2009, at B2 (“Lawyers for Chrysler and the government argued that the sale to Fiat needed to be completed as quickly as possible to preserve its viability and to save thousands of jobs. Fiat can walk away if no agreement is struck by June 15.”). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 249 E. IN RE BRANIFF AIRWAYS, INC. AND THE SUB ROSA OBJECTION Decided the same year as Lionel, In re Braniff provided that a § 363(b) sale that distributes assets among creditors was inappropriate and constituted a sub rosa plan that attempted to bypass the protections of Chapter 11 plan confirmation proceedings.63 In Braniff, the debtor attempted to sell its property—which included airplane leases, equipment, terminal leases, airport slots, and other assets—to a new entity, PSA,64 in exchange for right to travel on PSA that would be allocated to former creditors, employees, and shareholders.65 Of particular importance, the Braniff court held that a release of claims or payment of prepetition debts is not a “‘use, sale or lease’ and is not authorized by § 363(b).”66 The court did state that “certain adjustments in the rights of creditors” are permitted in § 363(e) “to assure ‘adequate protection’” of the interests of secured creditors.67 The court went on to hold that “[i]n any future attempts to specify the terms whereby a reorganization plan is to be adopted, the parties and the district court must scale the hurdles erected in Chapter 11.”68 This ban on sub rosa plans has been extended from § 363(b) sales to settlement agreements in which assets of the estate are distributed.69 In In re Iridium, the Second Circuit held that a settlement in the course of the bankruptcy proceeding was inappropriate because it distributed assets to prepetition creditors as part of the agreement.70 The court found that the settlement allowed the negotiating parties to sidestep the “fair and equitable” standard as well as the “absolute priority rule” of bankruptcy plan confirmations.71 Although the Iridium court did not label the settlement as a sub rosa plan, it stated that a settlement cannot be offered to avoid the “strictures of the Bankruptcy Code.”72 63. See In re Braniff Airways, Inc., 700 F.2d 935, 940 (5th Cir. 1983) (“The debtor and the Bankruptcy Court should not be able to short circuit the requirements of Chapter 11 for confirmation of a reorganization plan by establishing the terms of the plan sub rosa in connection with a sale of assets.”) (emphasis in the original). Many courts find that the use of such tools is improper. See In re Westpoint Stevens Inc., 333 B.R. 30, 51–52 (S.D.N.Y. 2005). 64. See In re Braniff, 700 F.2d at 939. The PSA was an entity formed as part of the Braniff Bankruptcy that took possession of the Braniff Airway’s assets in exchange for payoff of debts and allocation of rights to travel on the new airline. See id. 65. Id. at 939–40. 66. See id. at 940. 67. Id. at 940 n.2. (“[The court] is aware that the Code provides for certain adjustments pursuant to a valid § 363 transaction in order to provide ‘adequate protection’ to secured creditors.”) (citing 11 U.S.C. §§ 361; 363(e) (1982)). 68. Id. at 940 (listing the applicable hurdles as “disclosure requirements” in 11 U.S.C. § 1125, “voting” in 11 U.S.C. § 1126, “best interest of creditors test” in 11 U.S.C. § 1129(a)(7), and the “absolute priority rule” in 11 U.S.C. § 1129(b)(2)(B)). 69. See In re Iridium Operating LLC, 478 F.3d 452 (2d Cir. 2007). 70. See id. at 464. 71. Id. at 462–65. 72. Id. at 464. 250 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 In both the General Motors and Chrysler bankruptcies, payouts to prepetition creditors were part of the § 363(b) sales.73 In both cases, the unions received significant shares of the “new” corporations without providing new capital input.74 These actions were justified in both cases because the workforce was necessary for the businesses to succeed and the unions would provide significant value to the new corporations.75 However, the payouts to the former pension funds in Chrysler and General Motors, and the shares of the new enterprises given before other creditors were paid out in both cases,76 could be interpreted as hallmarks of a sub rosa plan, in which the unions, capable of scuttling the new businesses, gained preferential treatment.77 In fact, in the Chrysler case, this was one basis upon which the Indiana pension fund creditors challenged the propriety of the sale.78 73. See In re General Motors, 407 B.R. 463, 484 (Bankr. S.D.N.Y. 2009) (discussing the fact that as part of § 363 sale, “New GM” infused capital into retirement fund of union auto workers); In re Chrysler LLC (Chrysler I), 405 B.R. 84, 92 (Bankr. S.D.N.Y. 2009) (discussing how the U.S. government provided funding for workers’ pension fund through infusion of capital and equity in reorganized company). 74. See In re General Motors, 407 B.R. at 497–98; Chrysler I, 405 B.R. at 99–100. 75. See Adler, supra note 14, at 310 (“[T]he payment to VEBA was . . . a prospective expense that assured the company a needed supply of UAW workers, with the union thus portrayed as a critical vendor of labor.”). 76. See id. [In Chrysler,] the purchaser, “New Chrysler”—an affiliation of Fiat, the U.S. and Canadian governments, and the United Auto Workers (“UAW”)—took the assets subject to specified liabilities and interests. More specifically, New Chrysler assumed about $4.5 billion of Chrysler's obligations to, and distributed 55% of its equity to, the UAW's voluntary beneficiary employee association (“VEBA”) in satisfaction of old Chrysler's approximately $10 billion unsecured obligation to the VEBA (which is a retired workers benefit fund) . . . . Id. at 306. In General Motors' case, the purchaser, “New GM,” owned largely by the United States Treasury, agreed to satisfy General Motors' approximately $20 billion pre-bankruptcy obligation to the VEBA with a new $2.5 billion note as well as $6.5 billion of the new entity's preferred stock, 17.5% of its common stock, and a warrant to purchase up to an additional 2.5% of the equity; depending on the success of New GM, the VEBA claim could be paid in full. As in Chrysler, the sale was to take place quickly, within weeks, and the sale procedures required that, absent special exemption, any bidder who wished to compete with government-financed entity was to assume liabilities to the UAW as a condition of the purchase. Id. at 312. 77. See id. at 313–15 (sale of underlying assets and distribution to unions deprived creditors of the protections that they enjoy in a traditional reorganization). 78. See Chrysler I, 405 B.R. at 97–100. 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 251 II. SECTION 363(b) COMPARED TO BANKRUPTCY PLAN CONFIRMATION A. BANKRUPTCY PLAN CONFIRMATIONS A Chapter 11 plan confirmation is a relatively democratic process, requiring a debtor to propose a reorganization/distribution plan and work with creditors to obtain their willing approval.79 Sales of the entire business or sales of major business units may be part of the proposed plan.80 The debtor has a period of exclusivity during which it alone may propose plans to the creditors,81 and this period may be extended by petition to the trial judge.82 During the plan confirmation period, the debtor may obtain exit financing83 or an alternative to financing,84 divide creditors into classes,85 propose a viable post-bankruptcy business organization,86 and endeavor to achieve consensus among creditors to support the plan.87 Through this process, the debtor attempts to propose a plan that will satisfy the creditors while providing the emerging business with an opportunity for a healthy start.88 One path through which a plan may be confirmed is by having a majority—defined as greater than half in number and two thirds in value of all classes—approve it.89 The debtor is required to submit extensive 79. See 11 U.S.C. § 1129 (2006). 80. Id. § 1129(a)(11) (“Confirmation of the plan is not likely to be followed by the liquidation, or the need for further financial reorganization, of the debtor or any successor to the debtor under the plan, unless such liquidation or reorganization is proposed in the plan.”). 81. Id. § 1121(b) (“Except as otherwise provided in this section, only the debtor may file a plan until after 120 days after the date of the order for relief under this chapter.”). 82. Id. § 1121(d)(1) (“[O]n request of a party in interest made within the respective periods specified in subsections (b) and (c) of this section and after notice and a hearing, the court may for cause reduce or increase the 120-day period or the 180-day period referred to in this section.”). 83. See id. § 1129(a)(11) (requiring the reorganization to be viable, which in turn requires that a reorganizing business in need of capital secure financing in order to have the plan confirmed). 84. See supra note 80 and accompanying text. A debtor may thus propose a sale of the business entity as part of the reorganization, eliminating the need for further financing. See supra note 80 and accompanying text. 85. 11 U.S.C. § 1122 (2006). 86. Id. § 1129(a)(11). 87. Id. § 1129(a). 88. Williams v. U.S. Fidelity & Guaranty Co., 236 U.S. 549, 555 (1915). It is the purpose of the bankrupt act to convert the assets of the bankrupt into cash for distribution among creditors, and then to relieve the honest debtor from the weight of oppressive indebtedness, and permit him to start afresh free from the obligations and responsibilities consequent upon business misfortunes. Id. 89. 11 U.S.C. § 1126(c) (2006). Classes are defined by the debtor in the plan proposal. See id. § 1122. However, creditors may object to these classifications if they are not related to business differences among the creditors. See, e.g., In re Briscoe Enterprises, Ltd., 994 F.2d 1160, 1166–67 (5th Cir. 1991). Differentiation among creditors has been held appropriate based on how the claims were incurred, the ongoing business relationships between the creditors, and the post- 252 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 documentation about the business, its valuation, and its prospects to the creditors before a vote is taken on the plan.90 If the debtor is unable to achieve a consensual plan, it may force a “cramdown” plan confirmation.91 A cramdown must meet all the requirements of a consensual plan—absent the agreement of all classes— and at least one impaired class must consent to the plan.92 Further, the plan must be “fair and equitable”93 and abide by the “absolute priority rule.”94 The “fair and equitable” and “absolute priority rule” standards require that the plan pay secured creditors for the full value of their collateral and market interest before unsecured creditors receive any value.95 Unsecured creditors, generally, must also be paid in full before equity holders receive anything.96 These requirements assure that equity holders will receive no value unless the higher priority credit classes are paid in full.97 confirmation relationships between the creditors. See, e.g., id. at 1167 (concluding that separation of unsecured claims is permitted for a “good business reason”). 90. See 11 U.S.C. § 1125 (2006); see also In re Malek, 35 B.R. 443 (Bankr. E.D. Mich. 1983) (outlining the requirements of adequate disclosure as part of a plan confirmation including “financial information,” “liquidation analysis,” and “transactions with insiders”). 91. See, e.g., In re Briscoe, 994 F.2d at 1168–70 (describing a “cramdown” as a plan confirmation under 11 U.S.C. § 1129(b) where a plan is ordered despite a lack of approval by all impaired classes). 92. 11 U.S.C. § 1129(a)(10) (2006) (“If a class of claims is impaired under the plan, at least one class of claims that is impaired under the plan has accepted the plan, determined without including any acceptance of the plan by any insider.”). 93. Id. § 1129(b)(1). [T]he court, on request of the proponent of the plan, shall confirm the plan notwithstanding the requirements of such paragraph if the plan does not discriminate unfairly, and is fair and equitable, with respect to each class of claims or interests that is impaired under, and has not accepted, the plan. Id. 94. 95. 96. 97. Id. § 1129(b)(2)(A)–(C). See id. Id. § 1129(b)(2)(B). See Peter C.L. Roth, Comment, Bankruptcy Law—The Absolute Priority Rule Reasserted—No Equity Participation Without Tangible Capital Contribution, 23 SUFFOLK U. L. REV. 857, 861 (1989) (citing Northern Pac. R.R., v. Boyd, 228 U.S. 482, 501–04 (1913) (“One of the original purposes of the [absolute priority] rule was to prevent senior secured creditors from entering into collusive arrangements with friendly management to squeeze out the unsecured debt.”)). However, there remains a way for “old equity” to become “new equity”: an old equity holder may give an infusion of new capital and receive a payout less than or equal to that value in equity in the reorganized business. See Bank of America Nat’l Trust and Sav. Ass’n v. 203 N. LaSalle St. P’ship, 526 U.S. 434, 453–54 (1999) (“A truly full value transaction, on the other hand, would pose no threat to the bankruptcy estate not posed by any reorganization, provided of course that the contribution be in cash or be realizable money’s worth . . . .”). However, strong limitations have been placed on this “new equity” exception including that the new ownership cannot be “on account of” the antecedent debt. See id. at 451–53. Also, new capital, and not a promise to work, must be infused into the business. Norwest Bank Worthington v. Ahlers, 485 U.S. 197, 203–05 (1988) (holding that debtor farmer’s promise to work on farm and provide “labor, experience, and expertise” in exchange for equity in reorganized entity was inappropriate). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 253 Regardless of whether a plan’s confirmation is consensual or a cramdown, any non-consenting creditor may object that the plan is either not in her best interest98 or is unfeasible.99 For a plan to be in her “best interest,” the creditor must receive at least as much as she would have in a Chapter 7 liquidation.100 For example, if a fully secured creditor objects, she must receive the full value of her claim with market interest rates applied. Second, for a plan to be feasible, its proponent must show that the business will remain viable and will not be liquidated shortly after confirmation— unless that is part of the plan.101 The proponent must show this with reasonable likelihood, though it need not be a certainty;102 however, inadequate capitalization, and lack of a viable business plan are grounds upon which a plan may be rejected as unfeasible.103 These elements demonstrate that the plan confirmation process gives a much greater level of participation and protection to creditors than does a § 363(b) sale.104 Even though both processes will likely involve negotiations between the debtor and creditors—and a resolution may be achieved over the objections of certain creditors—the plan confirmation process provides many avenues for a creditor to object and encourages consensus among parties.105 Although having a plan confirmation does not ensure absolutely against abuse or self-dealing, the definitive nature of the “absolute priority rule” and the extensive required disclosures are likely to reduce the possibility of insiders or equity holders receiving a payout at the expense of creditors.106 However, there are certain indelible drawbacks of a plan confirmation. First, the debtor will likely require exit financing in order for the business to be viable post-bankruptcy—a problem that may be especially acute in markets, such as the current one, in which credit is tight.107 The plan 98. 11 U.S.C. § 1129(a)(7) (2006). 99. See id. § 1129(a)(11). Feasibility may be raised by any non-consenting creditor or the court may analyze it sua sponte. See In re Malkus, Inc., No. 03-07711-GLP, 2004 WL 3202212, at *4 (Bankr. M.D. Fla. Nov. 15, 2004). 100. 11 U.S.C. § 1129(a)(7) (2006). 101. Id. § 1129(a)(11); see In re Malkus, 2004 WL 3202212, at *4. 102. See Malkus, 2004 WL 3202212, at *4 (“Pursuant to § 1129(a)(11) a plan of reorganization must be feasible. ‘Although success does not have to be guaranteed, the Court is obligated to scrutinize a plan carefully to determine whether it offers a reasonable prospect of success and is workable.’”) (quoting In re Yates Development, 258 B.R. 36, 44 (Bankr. M.D. Fla. 2000)). 103. See, e.g., id. 104. See Rose, supra note 22, at 256–58 (discussing the voting, classification and good faith requirements as hallmarks of the Bankruptcy Code’s protection of creditors). 105. See discussion supra Part II.A. 106. See Sloane, supra note 22, at 39–45. 107. See Melvin Richardson, How Does a Tight Credit Market Affect the Economy?, ASSOCIATED CONTENT FROM YAHOO (Oct. 30, 2008), http://www.associatedcontent.com/ article/1138008/how_does_a_tight_credit_market_affect.html. 254 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 confirmation period may take an inconveniently long time.108 During this period, the debtor’s business, being tied up in court proceedings,109 may suffer significant reputational damage.110 This reputational damage, coupled with the debtor’s inability to obtain financing and the costs of running the bankruptcy itself—including legal fees—may strain the business to the point of collapse, causing the case to be converted to Chapter 7111 and the creditors to lose the “going concern value” that Chapter 11 is intended to preserve.112 B. SCHOLARLY DEBATE OVER § 363(b) SALES: PANACEA FOR LARGE BUSINESS REORGANIZATIONS OR AN ALTERNATIVE VULNERABLE TO ABUSE? Many academics have supported the use of § 363(b) sales.113 One argument is that they insulate the sales of going concern businesses, whereby sums of money are guaranteed and parties will determine distributions after the sale from long confirmation processes.114 In a plan reorganization, the business entity is kept within the bankruptcy estate for a substantial period of time, where it incurs significant legal and administrative costs, must secure operating capital, and suffers reputational damage.115 In a § 363(b) sale, the debtor need not obtain DIP financing,116 108. See generally Miller & Waisman, supra note 21. Bankruptcy cases may take years to complete whereas a § 363(b) sale may be consummated in a few months, or even significantly less. See generally id. 109. Id. at 187–89 (arguing that bankruptcy proceedings may evolve into a confrontation of wills, where a creditor may prolong the process in hopes of forcing a concession). 110. Lynn M. LoPucki & Sara D. Kalin, The Failure of Public Company Bankruptcies in Delaware and New York: Empirical Evidence of a “Race to the Bottom”, 54 VAND. L. REV. 231, 235–36 (2001) (describing reputation damage along with other distractions that companies suffer from bankruptcies, which leads to reorganized public companies filing repeatedly for bankruptcy protection). 111. 11 U.S.C. § 1112 (2006) (listing the requirements that allow a party of interest, “after notice and a hearing,” to petition the court for conversion of the case to a chapter 7 liquidation). 112. See In re 15375 Memorial Corp., 400 B.R. 420, 427 (D. Del. 2009) (“preserving a going concern” or “maximizing the value of the debtor’s estate” are goals of filing for bankruptcy protection) (citation omitted). 113. See, e.g., Lee, supra note 21; Miller & Waisman, supra note 21; Paul N. Silverstein & Harold Jones, The Evolving Role of Bankruptcy Judges Under the Bankruptcy Code, 51 BROOK. L. REV. 555 (1985). 114. See generally Miller & Waisman, supra note 21 (discussing the many obstacles that have entered the reorganization plan confirmation process, including strategic objections, employee and key vendor benefits and greater costs). 115. See generally id. Greater sophistication by creditors and an increasingly service based economy has turned the Chapter 11 landscape into a more contentious process that may no longer yield the “going concern” premium that formerly existed in the railroad bankruptcies. See id. at 182 (“[D]istressed debt traders' entry into the reorganization paradigm has transformed Chapter 11 reorganizations from primarily rehabilitative processes to dual-purpose processes that stress maximum enhancement of creditor recovery in addition to rehabilitation of the debtor entity.”). 116. See generally David A. Skeel, Jr., The Past, Present and Future of Debtor-In-Possession Financing, 25 CARDOZO L. REV. 1905 (2004) (describing the history and current use of “DIP 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 255 which may be unavailable or only available at a substantial rate.117 The sale, it is argued, provides a level of certainty that a plan confirmation cannot: it ensures that a level of assets that will be split among creditors and obviates the need for a time-consuming and expensive valuation finding during plan confirmation.118 Creditors also need not focus on the workings of the business or fear that the business will leak losses, implode, and require liquidation.119 The sale of the assets, if performed correctly, would also likely yield a more reliable price than expert valuations presented to a bankruptcy judge,120 a result in line with the Code’s policy of preferring market valuation when possible.121 financing”). DIP financing refers to financing made available to a debtor during the course of its bankruptcy proceedings in order to finance the ongoing restructuring as well as a viable reorganization. See generally id.; see also 11 U.S.C. § 364 (2006) (providing courts with power to approve financing for the debtor in possession). 117. See Lee, supra note 21, at 546. A quick sale of assets may be necessary where a business runs out of cash collateral financing and DIP financing is unavailable. See id. 118. See George W. Kuney, Let's Make It Official: Adding an Explicit Preplan Sale Process as an Alternative Exit From Bankruptcy, 40 HOUS. L. REV. 1265, 1270 (2004) (“[T]he insolvency community has embraced the nonplan sale of substantially all the assets of a debtor's business as an efficient alternative to the costly and lengthy plan confirmation process.”) (internal citations omitted). 363(b) sales secure a price for a firm’s assets and allow creditors to focus on achieving a plan to distribute assets. See id. Further, by reducing the assets of the estate to cash, a note secured by the assets sold, the stock of the purchaser, or some other similar form of fungible valuable consideration, the tasks and costs of postsale management and administration of a debtor and its estate can be dramatically reduced. Id. at 1270–71 (internal citations omitted). This will reduce monitoring cost as the creditors no longer must analyze market conditions or the managerial decisions of the debtor. See id. In turn, this allows for a reduction in the amount of a debtor's value that is redistributed from prepetition creditors to postpetition administrative claimants as a case drags on. It takes little in the way of a management team to preside over an estate comprised solely of liquid assets. Id. at 1271 (internal citations omitted). 119. See 11 U.S.C. § 1112 (2006) (requiring that a company that is unable to emerge from chapter 11 as a viable entity will either be converted to chapter 7 liquidation or the bankruptcy case will be dismissed). 120. See Barry E. Adler & Ian Ayres, A Dilution Mechanism for Valuing Corporations in Bankruptcy, 111 YALE L.J. 83, 90 (2001) (“Not only do judges lack the business expertise of individual capital investors, but also a judicial valuation cannot benefit from the collective wisdom of market investors in the aggregate. As a result, even unbiased judges make mistakes that a market process would not permit.”). An open and populated market should yield efficient outcomes, demonstrating the true value of the asset. See Oversight of TARP Assistance to the Automobile Industry: Field Hearing Before the Congressional Oversight Panel, 111th Cong. 97– 108 (2009) (statement of Barry E. Adler, Professor of Law, New York University School of Law) (advocating putting all large § 363(b) sales through a stringent market test to ensure fair price and prevent abuses) [hereinafter Automotive Field Hearings Memorandum]. 121. See In re Iridium Operating LLC, 373 B.R. 283, 293 (Bankr. S.D.N.Y. 2007) (“[T]he public trading market constitutes an impartial gauge of investor confidence and remains the best and most unbiased measure of fair market value and, when available to the Court, is the preferred standard of valuation.”) (citing VFB LLC v. Campbell Soup Co., 482 F.3d 624 (3d Cir. 2007)). 256 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 Looking at these benefits—including shorter time in bankruptcy, certainty, fewer resources used—as a whole, it may be difficult to dispute the use of these sales procedures. In fact, some academics believe that the § 363(b) sale is the future of bankruptcy and that few if any large bankruptcies benefit from a drawn out confirmation plan.122 Others, while not ruling out the usefulness of the plan confirmation process, contend that the process is no longer viable for large distressed businesses and that, absent major revisions to the Code, the § 363(b) sale may be, in certain circumstances, a useful and prudent solution.123 While there is major support for the use of § 363(b) sales, there are critics who argue that the procedure is fraught with possibilities for abuse and enables parties to effectuate sweetheart deals.124 These critics argue that the use of § 363(b) sales increases the ability of insiders to engage in selfdealing, given the lighter scrutiny to which the sales are subjected.125 They argue further that benefits to insiders such as continued employment, assignment of liability, and even payment may be provided by the purchaser in exchange for the debtor supporting and obtaining approval of the sale, and that this may be particularly true in § 363(b) sales in which a parent company or former equity holders acquire the business.126 Imperfections in valuation and the auction procedures used by various bankruptcy courts may allow a creditor or third party to purchase a business at well below value.127 Commentators argue that because insiders do not usually gain in the distribution of assets, it may be worthwhile for them to sell to a third party at below market value while receiving an outside benefit, such as those described in the previous paragraph.128 Further, if the debtor has special knowledge about the business and is in the best position to value the company, she may also be in the best position to argue for a low valuation and provide the benefit to a purchaser at the cost of creditors.129 Commentators have responded differently to this problem of valuation. Some have responded by arguing for a market test, whereby market forces will dictate the fair price for the asset and prevent abuses that stem from undervaluation.130 Other commentators argue that a market test 122. 123. 124. 125. See, e.g., Lee, supra note 21, at 562. See Miller & Waisman, supra note 21, at 199–200. See generally Rose, supra note 22. See id. at 277–80 (arguing that the debtor in possession may have conflicts of interest that encourage selling to insiders or affiliated companies and may yield deals that provide a windfall for third parties at the expense of creditors). 126. See id. 127. See id. at 277–78 (discussing how manipulation of valuations and auction procedures can lead to depressed pricing). 128. See LoPucki & Doherty, supra note 22, at 30–31. 129. See Rose, supra note 22, at 277–78 (describing how insiders profited when Polaroid was sold for $465 million despite $1.8 billion in assets). 130. See Automotive Field Hearings Memorandum, supra note 120 (discussing how open auctions will reveal when parties are receiving unduly favorable terms). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 257 cannot cure the abuses and inappropriate outcomes that flow from the speed and absence of disclosure in § 363(b) sales.131 There also exists the possibility that a § 363(b) sale will be used to effectuate a sub rosa plan in which the purchaser can gain significant returns at the expense of other creditors.132 As part of a sale, ownership of the traded asset may be distributed; in General Motors, for example, both the employee pension fund and the union received significant portions of the new company without a commensurate contribution of capital.133 Although such transactions meet the technical definition of a sub rosa plan, they are not always labeled as such, effectively allowing the debtor to distribute assets without complying with the plan confirmation requirements of § 1129 of the Code.134 Commentators have been especially wary of these kinds of sales, as creditors will not only lose in their payout but are also locked out of the process.135 Those opposing the current proliferation of § 363(b) sales do not necessarily contest its use in all circumstances or deny its appeal; instead, they argue for increased procedural safeguards or limitations.136 They claim that these procedures should be subject to a more stringent inquiry into whether the plan does, in fact, constitute a sub rosa plan bypassing the safeguards of a plan confirmation process.137 Additionally, some commentators argue for a market test for § 363(b) sales so as to ensure that insiders are not effecting “sweetheart deals,”138 whereas others argue for a heightened “business justification” standard.139 These concerns highlight the procedural disadvantages of § 363(b) sales despite acknowledging the great benefits that may accrue from their use. From this, it becomes clear that availability of § 363(b) sales procedures should be preserved—and possibly encouraged—but that precautions must be taken to prevent the types of abuses to which they are currently susceptible. III. PROPOSED SOLUTION This note has focused on two areas of abuse that exist in § 363(b) sales: 1) the ability of insiders or other parties to purchase the company at below 131. 132. 133. 134. See, e.g., LoPucki & Doherty, supra note 22, at 40–45. See Sloane, supra note 22, at 60–63. In re General Motors Corp., 407 B.R. 463, 482–83 (Bankr. S.D.N.Y. 2009). See Sloane, supra note 22, at 51 (discussing how decisions applying Braniff have generally allowed § 363(b) sales to go through, which alleviates the debtor’s need to make disclosure or gather consenting creditor votes). 135. See id. at 62. 136. See, e.g., Automotive Field Hearings Memorandum, supra note 120, at 106–08; LoPucki & Doherty, supra note 22, at 44–45; Rose, supra note 22, at 283–84. 137. See Sloane, supra note 22, at 62. 138. See Automotive Field Hearings, supra note 120 (advocating for a true market test to ensure that sale value is maximized and that the sale does not deprive creditors’ of the safeguards that the Bankruptcy Code provides them). 139. See Rose, supra note 22, at 283–84. 258 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 market value; and 2) the ability of the debtor or insiders to compel a sale in order to secure a benefit for themselves at the expense of creditors. These abuses can be significantly reduced by employing a robust market test that includes disclosure of all terms of the sale, adequate time for bidders to respond, and a centralized forum to receive—and notify all affected parties of—purchase bids.140 Additionally, where a quick sale is required and a meaningful market test cannot be implemented, the standard for justifying the sale should be heightened.141 These changes will provide fairness and credibility, and will limit uses of § 363(b) sales to subvert the Code’s protection of creditors.142 A. A ROBUST MARKET TEST Academics and practitioners have proposed that § 363(b) sales should require a market test to ensure that the price paid for assets in the sale is fair, and to provide interested bidders with a forum to purchase the property.143 Proponents of a market test argue that it provides safeguards necessary to ensure fairness and prevent abuse.144 First—assuming the existence of an efficient and populated market—arbitrageurs, speculators, and other participants should theoretically raise the company’s value to its “market price.”145 This would prevent insiders from colluding with a purchaser to sell the company at an artificially low price in exchange for side benefit.146 Similarly, the market test may attract purchasers who can significantly raise the returns of the company, possibly through synergies or economies of scale.147 If details of the sale are made public and scrutinized, 140. See generally Adler, supra note 14, at 317–18 (proposing the “sort of process that state law would provide shareholders of a solvent firm”). 141. See Rose, supra note 22, at 283 (“The complexities of a § 363 sale require intensified scrutiny because of the dangers of debtor manipulation of market forces.”). 142. See discussion supra Part II.A (detailing the protections afforded to creditors in a bankruptcy plan reorganization). 143. See generally Rachael M. Jackson, Note, Responding to Threats of Bankruptcy Abuse in a Post-Enron World: Trusting the Bankruptcy Judge as the Guardian of Debtor Estates, 2005 COLUM. BUS. L. REV. 451; see also, Rose, supra note 22. 144. See Douglas G. Baird & Robert K. Rasmussen, The End of Bankruptcy, 55 STAN. L. REV. 751, 786–88 (2002); Lee, supra note 21, at 536–37. 145. See Daniel R. Fischel, Market Evidence in Corporate Law, 69 U. CHI. L. REV. 941, 942 (2002) (“The fair market value of an asset is generally defined as the price at which the asset would change hands in a transaction between a willing buyer and a willing seller when neither is under any compulsion to buy or sell and both are reasonably informed.”). 146. See id. at 947 (acknowledging that a price below fair value will attract other purchasers). 147. See Bernard S. Black, Bidder Overpayment in Takeovers, 41 STAN. L. REV. 598, 608 (1989). An important source of potential gain from takeovers is synergy between buyer and seller that permits the merged company to be run more efficiently. Three sources of synergy can be distinguished: (i) operating synergy resulting from economies of scale or scope; (ii) improved management of the target; and (iii) financial or managerial synergy due to more efficient use of capital or management talent. 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 259 proponents of the sale will, in theory, be deterred from engaging in fraud or side deals. Thus, the market test may also provide a level of certainty and fairness simply from its procedure.148 This model of market arbitrage and an effective market test may be criticized as simple and overly optimistic as it assumes a populated market, low transaction costs, and complete information.149 Although such conditions, or even conditions approaching these, are unlikely, bankruptcy courts may foster a more favorable environment for bidders to produce a populated auction and thereby increase possible revenue.150 To emulate such optimal market conditions, a robust effective market test should require: 1) full disclosure of proposed bids; 2) adequate time to respond to the bids by all parties and purchasers; and 3) creditor and judicial review of competing bids. 1. FULL DISCLOSURE OF SALE TERMS A debtor loses many privacy protections that it had outside of bankruptcy, including required post-petition disclosure when proposing the confirmation plan.151 Also, a debtor is required to accept better bids, if offered, in a § 363(b) sale.152 However, these alone may be insufficient to ensure an effective market test. Under the current regime, the complete details of a sale are not always provided, made public, or even available.153 While requiring a purchasing company to reveal all elements of its purchase and act as a “stalking horse” may be harsh, the protections that the bankruptcy sale will provide them— including the ability to purchase “free and clear” of encumbrances154 and the limited appealability of § 363(b) sales155—should make for a fair Id. 148. See Rose, supra note 22, at 277–83. 149. See Fischel, supra note 145, at 944–47 (discussing unrealistic assumptions underlying analysis of fair market price). 150. See generally Steven B. Katz, Note, Designing and Executing a “Fair” Revlon Auction, 17 FORDHAM URB. L.J. 163, 183 (1989) (“[I]ncreasing the number of bidders in an auction increases the probability of a particular bidder having the highest valuation, thereby usually raising the seller's revenue.”). 151. See 11 U.S.C. § 1125 (2006). 152. See In re Gulf States Steel, Inc. of Ala., 285 B.R. 497, 517 (Bankr. N.D. Ala. 2002) (citing In re Lionel, 722 F.2d 1063 (2d Cir. 1983)) (“In a liquidation case it is ‘legally essential’ to approve the highest offer . . . .”); see generally Revlon Inc. v. MacAndrews & Forbes Holdings, Inc., 506 A.2d 173 (Del. 1986) (requiring the Board of Directors, in a sale of control context, to maximize shareholder’s equity). 153. See Rose, supra note 22, at 260 (“With a § 363 sale, fewer people receive less information, and the lack of a disclosure requirement weakens creditor leverage . . . .”). 154. 11 U.S.C. § 363(f) (2006). 155. Id. § 363(m). The reversal or modification on appeal of an authorization under subsection (b) or (c) of this section of a sale or lease of property does not affect the validity of a sale or lease under such authorization to an entity that purchased or leased such property in good 260 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 tradeoff. By making details of the transaction and proposals public, potential purchasers will be able to assess the fairness of current proposals, and may outbid current offers that undervalue the company, in an attempt to receive a profit.156 Additionally, companies do not necessarily submit bids that only differ in price or in a limited number of provisions; quite the opposite, bids for distressed companies often vary widely.157 One purchaser may provide a higher price but will dismantle the company for its assets and consumer base,158 while another plan may infuse capital and expertise into expanding the business but at a lower price.159 Depending on the particular circumstances of the distressed business, either plan may prove to be a better solution for the creditors and for the public at large. Only by making full disclosure of the bids submitted can interested and official parties effectively evaluate which of multiple proposals to accept.160 Increasing the availability of information will serve two purposes for potential purchasers. First, it will lower transaction costs to bidders, enabling them to base their offers on a better evaluation of the company.161 Second, because an offer will serve as an indicator of the selling company’s value,162 hesitant market participants may be reassured of the soundness of an investment in the company, thus increasing the likelihood of a competitive auction.163 faith, whether or not such entity knew of the pendency of the appeal, unless such authorization and such sale or lease were stayed pending appeal. Id. 156. See generally Katz, supra note 150, at 184–85 (describing “Revlon” type auctions where “[b]y increasing his bid, the bidder decreases his potential profit, but increases his probability of winning. . . . [which forces the bidder to] close the gap between his bid and his honest valuation”). 157. Compare In re Chrysler LLC (Chrysler I), 405 B.R. 84 (Bankr. S.D.N.Y. 2009) (approving a sale of a business for ownership and infusion of capital and expertise in a transaction between Fiat and Chrysler); with In re Enron Corp., 291 B.R. 39, 40 (S.D.N.Y. 2003) (approving a straight sale of a business entity for cash or its equivalent). 158. See, e.g., Enron, 291 B.R. at 40 (approving the sale of Enron Wind Corp., a subsidiary of Enron Corp., to General Electric Co. for a combination of cash and assumption of liabilities). 159. See, e.g., Chrysler I, 405 B.R. at 96 (approving the sale following consideration the synergies that Fiat could provide Chrysler, including new technologies and an international network, in ordering the § 363(b) sale). 160. Theodore N. Mirvis & Andrew J. Nussbaum, Mergers and Acquisitions and Takeover Preparedness, 907 PLI/CORP. HANDBOOK SERIES 501, 536–37(1995) (the board of directors in a change of control context must analyze all factors of a bid including price, feasibility and identity of the bidder in calculating the “best value” for its shareholders). 161. See generally David E. Van Zandt, The Market as a Property Institution: Rules for the Trading of Financial Assets, 32 B.C. L. REV. 967, 985–86 (1991). 162. See generally id. 163. See Katz, supra note 150, at 187–88 (“[An] advantage of the seller publicizing information is that the cost of preparing a bid is lowered. Lower bid preparation costs may entice additional bidders to enter the auction, thereby creating a more competitive auction and increasing the seller's expected return.”). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 261 Full disclosure would also reveal and deter fraud or insider dealing as it does in federal securities law.164 There are three categories of entities that have an incentive to find self-dealing, fraud, or other problems in the plan. Official entities, such as the court or a United States trustee, will be attentive to these problems as part of their official duty.165 Second, creditors that stand to be impaired by the sale have the incentive to scrutinize and oppose it for such imperfections.166 Finally, competing purchasers are also in a position to analyze the plan for faults and may profit by outbidding for what they deem to be an undervalued asset.167 Full disclosure will provide all of these parties the means to analyze bids and ferret out abuse. Requiring the parties proposing a § 363(b) sale to make full disclosure should encourage market participants to bid on the asset in question.168 Competitive bids such as these are more likely to result in a fair market valuation of the sale asset.169 Ultimately, disclosure is beneficial because it disincentivizes the proposing parties from engaging in fraud, self-dealing, or other abuses that they would not want exposed to the public. 2. ADEQUATE TIME FOR MARKET PLAYERS TO RESPOND TO THE SALE. In addition to requiring disclosure of the details of the § 363(b) sales, the court should provide sufficient time to market players to respond to the test and bid on the company. In order for a market test to reveal whether a price is fair or if other purchasers can provide better terms, there needs to be a sufficient opportunity for bidders to research, plan, and draft competing proposals.170 Potential purchasers must be provided with enough time to formulate bids and be assured that their bids will be given proper 164. See generally Richard E. Mendales, Looking Under the Rock: Disclosure of Bankruptcy Issues Under the Securities Laws, 57 OHIO ST. L.J. 731, 738–39 (1996) (explaining how disclosure in securities law serves a regulatory purpose allowing interested private parties to monitor themselves). 165. U.S. Trustee Program, Strategic Plan & Mission, U.S. DEP’T OF JUSTICE, http://www.justice.gov/ust/eo/ust_org/mission.htm (“The USTP's mission is to promote integrity and efficiency in the nation’s bankruptcy system by enforcing bankruptcy laws, providing oversight of private trustees, and maintaining operational excellence.”). 166. See Barry L. Zaretsky, Fraudulent Transfer Law as the Arbiter of Unreasonable Risk, 46 S.C. L. REV. 1165, 1172–73 (1995) (arguing that “impaired debtors who receive less than reasonably equivalent value may unfairly or improperly harm creditors even when the debtor did not have intention to cause harm to its creditors[,]” thereby incentivizing creditors to scrutinize debtor activities). 167. See generally Katz, supra note 150, at 181–88. 168. See id. at 187. 169. See id. 170. See LoPucki & Doherty, supra note 22, at 25–26, 41–42 (finding that there were significant costs, in the range of $5 million, in formulating a bid in a § 363(b) sale and recovery rates in such sales increased with the length of the market test). 262 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 attention.171 A sale that does not provide sufficient time for market players to respond to proposals will be ineffective and merely pro forma.172 To ensure that adequate notice for market participation exists, the court can publish the terms of the sale and an invitation for competing bids. This type of publication should be tailored to the target audience and costs can vary with the value of the asset being sold.173 Thus, while taking out a newspaper ad for a large corporation—such as General Motors or Chrysler—is worthwhile, it would be unreasonable to require it for a small asset, as the cost of publication would significantly reduce payouts to creditors.174 This notice should provide a timeline in which offers will be accepted and evaluated.175 The period must be clear as the parties that will expend resources on preparing and submitting a bid will need assurance that their bids will be adequately reviewed and considered against the current sale agreement.176 It is reasonable for investors to be wary of participating in a market test. The drafters of the sale may argue that losing their initial agreement may cause uncertainty, and that subsequent bids may change terms that have already been considered and accepted.177 However, for the market test to be effective, new bids must be evaluated on equal footing with the proposed agreement.178 A period in which all proposals are considered—along with the requirement that bids be considered by both the court and impaired creditors179—is a proper solution to this problem because it ensures that if a new and better offer is proposed with a reasonable time frame, it may replace the agreed upon sale. 171. See id. at 26 (finding that although “the recovery ratio for a reorganized company decreases with time in bankruptcy[,] . . . the recovery ratio of a sold company increases with time in bankruptcy”). 172. Publication and adequate time to formulate a bid are factors that should foster greater bidder participation in order to maximize price. See generally Katz, supra note 150, at 183, 187. 173. See Automotive Field Hearings Memorandum, supra note 120, at 107 (proposing that auction procedures should not apply to small businesses as they would be unable to recoup the costs). 174. See id. (arguing that publication of terms and market tests may not be feasible for smaller assets). 175. But see id. 176. Proponents of a § 363(b) sale are however reluctant to entertain competing offers and stifle true bidding through selecting a “stalking horse” and implementing short bidding periods once the “stalking horse” has been selected. See LoPucki & Doherty, supra note 22, at 35–36. 177. See Mark J. Roe & David Skeel, Assessing the Chrysler Bankruptcy, 108 MICH. L. REV. 727, 747–51 (2010) (describing the bidding process in Chrysler and how there was a requirement that new bids be approved by multiple committees and conform to standards enacted by the proponent, which demonstrates a sale proponent’s desire to consummate an existing offer so as not to lose its proverbial “bird in the hand”). 178. See Katz, supra note 150, at 175 (arguing that sellers need to be committed to the auction process for bidders to put forth their best offers). 179. See discussion infra Part III.A.3. 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 263 Finally, the adequate time provision must give investors sufficient time to formulate and propose a competing bid.180 The amount of time necessary should depend on the size of the asset, current market conditions, liquidity of the asset, and prior shopping for purchasers, among other factors.181 For example, a large asset such as an automotive manufacturer may require that purchasing companies seek outside funding, thus raising the time necessary to form a bid. Similarly, in tight capital conditions, such as those of the current economy, bidders may require more time to secure the capital for the purchase. A court implementing a market test must be cognizant of these factors to ensure that the market test is an effective one. 3. CREDITOR AND JUDICIAL REVIEW OF COMPETING BIDS A third requirement that will provide for an effective market test is review of competing bids by the court and by impaired creditors. This requirement is important because: 1) it will provide for impartial review of bids that benefit creditors as a class and incentivize the bidding process;182 2) it will deter insiders from proposing “sweetheart” or self-interested deals;183 and 3) it will create a centralized forum to receive and evaluate bids. The first benefit of requiring review by parties other than the proponent of the § 363(b) sale184 is that potential bidders will have more confidence that their bids will be reviewed and that their diligence will not go to waste.185 As with the adequate time provision, this element facilitates the environment necessary for a competitive bidding process.186 180. See Warburton, supra note 13, at 567. 363 sales proceeded at an unnecessarily fast pace. The bankruptcy courts in each case required that any competing bid be submitted within a matter of days. Critics cite the short amount of time permitted for competing 363 bids as an additional constraint imposed on the bidding process. In other words, the speed of the process purportedly discouraged the submission of competing bids, impeding a true market valuation of the assets. Id. 181. See Automotive Field Hearings Memorandum, supra note 120, at 107 (advocating for market test to conform to state law requirements and provide bidders with adequate time to formulate their bids). 182. See Katz, supra note 150, at 178 (describing how bidders will be disincentivized from participating in an auction if there is a significant risk that their bid will fail). 183. See Rose, supra note 22, at 272–83. 184. This could include either the creditors, perhaps through a committee of unsecured creditors, or by the court. 185. See generally Robert U. Sattin, Finality in Auction Sales: It Ain't Over Till It's Over, 23 AM. BANKR. INST. J., 52, 53 (2004) (describing the finality of auctions as a necessary element that ensures that bidders are confident that their bids will receive due consideration and will not be upset by subsequent events); see also generally Katz, supra note 150. 186. See generally Katz, supra note 150 (creating an auction that entices bidders will draw more bidders and in turn increase the probability of obtaining a higher bid price). 264 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 The second benefit of third party review of competing bids is that it should deter proponents from proposing plans with an unfairly low price or that retain benefits to themselves.187 If a party realizes that its attempt at deceiving the system will likely be caught, it is less likely to engage in the devious conduct.188 The test will also provide a centralized forum for the receipt of bids, affording some measure of assurance and cost savings to bidding parties.189 Although not as significant as the other elements described, requiring creditors and the court to consider all bids will provide an auction atmosphere in which parties may compete with each other in the open. This will ensure that the debtor cannot unfairly discriminate among purchasers and will also lower the transaction costs for bidding parties of obtaining information.190 Finally, and optimistically, such a centralized forum may facilitate a bidding war that will increase the purchase price to the benefit of all creditors.191 The elements of the robust market test are designed to mimic a competitive market and provide the protections similar to those of a reorganization plan confirmation. They are also meant to ensure a proper review of the sale, and to give outsiders and creditors leverage over a selfinterested sale proponent as well as provide them with more satisfaction from the process. 4. A ROBUST MARKET TEST CAN BE EFFECTIVE Some current commentary contends that market sales are either ineffective, difficult to implement, cost prohibitive, or some combination of all three.192 While it is not argued that the steps outlined above will provide an optimal solution, this note’s proposal takes these arguments into account. It is conceded that a market test may not be possible under all circumstances, nor is it feasible that all market tests should be equally 187. See generally LoPucki & Doherty, supra note 22 (discussing the side dealings and abuses that occur in an undervalued § 363(b) sale); see also Rose, supra note 22. 188. See generally Gary S. Becker, Crime and Punishment: an Economic Approach, 76 J. POL. ECON. 169, 176–78 (1968) (outlining the deterrence effect and arguing that criminals take costs of their actions into account when committing crimes, that costs are measured by the sanction for the act, and are multiplied by the chance of being caught). Under the deterrence theory, raising either the sanction or the probability of being caught makes the action less valuable and hence deters a potential actor from engaging in the act. Id. 189. See LoPucki & Doherty, supra note 22, at 5 (“[T]he high costs of evaluating companies, combined with the low probability of success for competing bidders, discourages competitive bids.”). 190. See Katz, supra note 150, at 187–88. 191. See id. at 183. 192. See, e.g., LoPucki & Doherty, supra note 22, at 41–45 (reporting results from a study of recent § 363(b) sales that yielded results that found that sales undervalue the company as compared to a plan reorganization and failed to bring in competing bids). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 265 stringent.193 The type and duration of the market test, the form of marketing devices to be used, and the choice between a formal bidding process and an auction, should all be determined on a case-by-case basis.194 Criticisms that a market test would prove ineffective are based on faults with the procedures currently in use, not with the market test concept itself.195 It has been argued that market tests fail to bring in bidders and do little to no good in raising § 363(b) sale prices or deterring abuse.196 However, the three elements of the proposed robust market test would alleviate such problems. First, requiring greater disclosure would give potential bidders greater access to the information they need to formulate a bid that they believe will be successful.197 Second, an adequate period of time would allow more players to enter the bidding process and provide them with more incentive to prepare and submit bids.198 Third, an impartial weighing of bids would provide outside bidders a greater opportunity to present their case and have their bids considered.199 While this may not entirely eliminate the problems of the current § 363(b) market test, they will make the market tests more effective and provide greater certainty as to adequacy of price while deterring abuse. B. HEIGHTENED SCRUTINY OF THE “TIME IS OF THE ESSENCE” SALE One important and controversial justification for the use of § 363(b) sales and their quick implementation is the “time is of the essence” rationale.200 This justification relies on an extrinsic factor—usually a backout date in a sale agreement—to require the quick ordering of a sale before the purchaser pulls out and/or the business implodes.201 Both the Chrysler and General Motors cases employed this justification for their expedited 193. See Automotive Field Hearings Memorandum, supra note 120, at 107. 194. See id. A market test must be tailored to the asset being sold as well as the prospective market. See id. Particularly, the cost of the auction must not be so large in comparison with projected proceeds as to make the auction unreasonable. See id. 195. See, e.g., LoPucki & Doherty, supra note 22, at 41 (debtors often offer bid incentives to the stalking horse making subsequent offers harder to obtain); Rose, supra note 22, at 282 (“The market cannot correct deal protection fees, credit bidding, and disparity in bidders' information. Additionally, the debtor's ability to limit participants even with open auctions makes the courts' use of market exposure as an objective standard insufficient as well.”). 196. LoPucki & Doherty, supra note 22, at 41–42. 197. See discussion supra Part III.A.1. 198. See discussion supra Part III.A.2. 199. See discussion supra Part III.A.3. 200. See, e.g., In re Thomson McKinnon Sec., Inc., 120 B.R. 301, 307 (Bankr. S.D.N.Y. 1990). 201. See, e.g., In re General Motors Corp., 407 B.R. 463, 480 (Bankr. S.D.N.Y. 2009); In re Titusville Country Club, 128 B.R. 396, 397 (Bankr. W.D. Pa. 1991); Equity Funding Corp. of Am. v. Financial Assocs., 492 F.2d 793, 793 (9th Cir. 1974). 266 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 sales202 and it has been established as a valid justification in a variety of circumstances.203 “Time is of the essence” has been criticized by certain academics. One argument against the justification is that it is difficult, if not impossible, to determine whether the purchaser will actually back out of the deal204 or if the back-out date is being used to subvert the bankruptcy process and avoid scrutiny.205 Another argument is that it provides perverse incentives to the management of an ailing business to only declare bankruptcy when a “drop dead date” is imminent and the business is unable to withstand a lengthy bankruptcy.206 A solution must deter purchasers from abusing the bankruptcy system while providing the court with the flexibility needed to address novel and drastic situations. Because a quick sale will preclude an effective market test and the safeguards that the test ensures, courts should require the proponents of a “time is of the essence” § 363(b) sale to face heightened scrutiny.207 Those invoking the justification should be required to provide compelling reason for the necessity of the sale and the deadline. The court should also analyze the substance of deals for insider benefit and selfdealing.208 Further, because the market test and this heightened scrutiny are designed to combat abuse, the court may lower the level of scrutiny involved where time for a market test is provided, even though truncated, while heightening scrutiny of sales with imminent sale dates. 202. See In re Chrysler LLC (Chrysler I), 405 B.R. 84, 96–97 (Bankr. S.D.N.Y. 2009) (considering the timeline set out by Fiat for the Chrysler merger in ordering the sale); General Motors, 407 B.R. at 480 (considering the United State Government’s requirement that the sale be consummated quickly as justification for ordering the sale). 203. See, e.g., In re Thomson McKinnon, 120 B.R. at 307. Time is of the essence because the contracts with the key employees will expire by January 2, 1991, whereas the trustees of the Funds have threatened to terminate their arrangements with the Partnership if a prospective purchaser is not promptly approved who could offer investment management services which would meet with their approval. Id.; In re Oneida Lake, Inc., 114 B.R. 352, 355–57 (Bankr. N.D.N.Y. 1990) (ordering a sale based on rapidly decreasing market value and an open sale, despite not using “time of the essence” language). 204. See Sloane, supra note 22, at 60–61. 205. See id. (arguing that expedited sales procedures may be used to disenfranchise creditor voting and “short circuit” bankruptcy safeguards). 206. See General Motors, 407 B.R. at 480; see also LoPucki & Doherty, supra note 22, at 37 (discussing the probable effect of a drop dead date on the sale price). 207. See Roe & Skeel, supra note 177, at 749 (noting that the bidding process in Chrysler occurred in a little more than a week, giving bidders insufficient time to perform due diligence or obtain financing, thereby circumventing the protection that the market test is intended to provide). 208. See, e.g., Rose, supra note 22, at 280–83 (discussing the ability of the debtor to circumvent an effective market test and to distort valuation requiring “intensified scrutiny”). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 267 1. THE NECESSITY OF THE SALE/DEADLINE ANALYSIS Courts, following Lionel, require the proponent of a § 363(b) sale to provide “good business justification” for implementing the sale.209 In “time is of the essence” cases, the need to effect a sale before the termination date of purchase contract along with a showing that the sale is in the best interests of the creditors has been sustained as sufficiently good justifications for the § 363(b) sale.210 This analysis requires that the sale provide at least as much as to creditors as a liquidation of the company’s assets.211 Further, it must be shown that it is unlikely that a market test would fetch a higher price for the company.212 Courts also require that the sale be necessary, either by showing that the company will be unable to secure financing to fund its bankruptcy213 or that the company is wasting away in the bankruptcy process.214 When a “time is of the essence” justification is used, courts may lower the scrutiny given to the factors provided in Lionel.215 The need to implement a sale while there is a willing purchaser may pressure the parties or the court to accept a sale.216 Further, due to the speed of many § 363(b) sales, full inquiry into the facts of the bankruptcy or the terms of the sale may not be possible.217 For these reasons, parties may invoke the justification so their agreement will be subject to more relaxed review and the sale will be more likely to proceed. Research has shown that unsecured creditors and equity holders are often placed in a worse position in a § 363(b) sale than they would be in a plan confirmation.218 At the same time secured creditors and priority creditors are often placed in a superior position, possibly due to their involvement in the drafting of the sale agreement and also due to the money saved by averting a drawn out bankruptcy.219 Because of the quick timeline, 209. In re Lionel Corp., 722 F.2d 1063, 1071 (2d Cir. 1983). 210. See, e.g., In re Chrysler LLC (Chrysler I), 405 B.R. 84, 96 (Bankr. S.D.N.Y. 2009) (discussing how proponents of the sale made a showing that the sale was necessary for the preservation of the estate, that no other purchasers were available even after extensive search and that the creditors were receiving a large portion of the distribution just like in a liquidation). 211. 11 U.S.C. § 1129(7)(A)(ii) (2006). 212. See Chrysler I, 405 B.R. 84 (showing was made that there was an extensive search made for purchasers and only Fiat was willing to be involved); In re General Motors Corp., 407 B.R. 463, 480–81 (Bankr. S.D.N.Y. 2009) (showing was made that there were no other purchasers available and willing to acquire the company). 213. See, e.g., Chrysler I, 405 B.R. at 480. 214. See, e.g., Lionel, 722 F.2d at 1071. 215. See Rose, supra note 22, at 270–71 (“[T]he court is reluctant to scrutinize quick transactions since a denial would risk irreparable diminished payouts to creditors.”). 216. See id. at 271. 217. See George W. Kuney, Misinterpreting Bankruptcy Code 363(f) and Undermining the Chapter 11 Process, 76 AM. BANKR. L.J. 235, 279–80 (2002). 218. See id. at 275–80 (indicating that secured and priority creditors benefit from expedited sales while other creditors are placed at a disadvantage). 219. See id. 268 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 limited access to information, and lack of involvement in the drafting of the sale, it is questionable whether impaired parties can meaningfully object in a “time is of the essence” § 363(b) sale hearing.220 The other major problem with a “time is of the essence” sale is that it precludes an effective market test.221 Where urgency is present, market participants either cannot formulate a bid or their offers will be rejected to maintain a current secured offer.222 “Time is of the essence” sales are appealing for the purchasing party because of this limited scrutiny and likely sale.223 However, the sale is susceptible to abuse and increases the likelihood of “sweetheart” deals accruing unfair benefits to the purchaser and insiders.224 A requirement that the proponent of a “time is of the essence” sale show a compelling necessity is needed to counteract the lack of a market test and limited ability of creditors to object;225 the need for a quick sale should heighten scrutiny not diminish it. Courts should inquire into the efforts made to sell the company and require disclosure of any offers for its purchase. This will be necessary to not only analyze whether better offers are available but also what actions were taken to sell the company and whether future offers are likely.226 If the “drop dead date” is sufficiently far in the future, the market test should supplement this showing. To make this showing, the proponent should show that the debtor engaged in bidder shopping and establish that despite the special privileges of § 363(b), a new purchaser would not come forward. Review of the reason for the impending deadline, while not dispositively establishing the credibility of the threat, may reveal an attempt to subvert the system.227 If a “drop dead date” does not relate to a valid business reason, the court should engage in or strengthen the substantive review of the sale. 220. 221. 222. 223. See Rose, supra note 22, at 260. See discussion supra Part III.A.2. See discussion supra Part III.A.2. See, e.g., In re Enron Corp., 291 B.R. 39, 43 (S.D.N.Y. 2003) (vacating sale order of Bankruptcy Court because it failed to adequately scrutinize the sales procedure and relied on the “debtors' business judgment”). 224. See George W. Kuney, Hijacking Chapter 11, 21 EMORY BANKR. DEV. J. 19, 108–09 (2004). 225. See Rose, supra note 22, at 284 (analyzing the shortened timeframe and limited disclosure in § 363(b) sales that hinder the ability of creditors to effectively object to the sale). 226. See, e.g., In re Chrysler LLC (Chrysler I), 405 B.R. 84, 90 (Bankr. S.D.N.Y. 2009) (considering whether Chrysler was in discussions and negotiations for an alliance with multiple manufacturers). 227. See Rose, supra note 22, at 280 (analyzing how debtor’s claim in Polaroid case received the “maximum value” from the initial bid and that bidding should have been closed was debunked by subsequent bids for nearly twice the value, thereby indicating possible insider and unfair dealings). 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 269 2. INDEPENDENT COURT REVIEW FOR FRAUD AND SELF-DEALING In “time is of the essence” § 363(b) sales, review by creditors is limited, full disclosure is ineffective or impossible, and a market test is effectively avoided.228 As such, procedural impediments to abuse are rendered ineffective. In order to instill credibility and deter abuse, the sale agreement must be subject to review by the courts; this provides a reasonable, though imperfect, substitute for a market test.229 The court or the United States trustee should independently review “time is of the essence” sales to ensure against fraud. Finding that the terms are fair and not the product of abuse will prevent insiders selling to the purchaser for below market value in return for side benefits.230 The mere fact of the review may also deter parties from engaging in side dealing or “sweetheart deals” because the court will be aware of and look for such favorable terms. First, in much the same way that disclosure requirements in areas such as securities law deter fraud and self-dealing, court review should deter proponents of § 363(b) sales from engaging in abuse.231 This “substantive fairness”232 review will not likely affect results that are at the margin of reasonable purchases, but it may reveal abuse in egregious cases. Second, the substantive review may provide insight into the bidding process and increase the likelihood that another purchaser will come forward.233 This information can be evaluated along with the record provided by the § 363(b) proceedings to supplement an analysis of the sale’s necessity. If a plan seems “too good to be true,” the court may require the sale to be pushed back and a market test ordered. 228. See discussion Part III.B (discussing how shortened time frame of “time is of the essence” sales precludes meaningful opposition). 229. Courts have, on occasion, instituted substantive review of § 363(b) sales to ensure against self dealing, undervaluation and other abuses. See, e.g., In re Enron Corp., 291 B.R. 39, 41–43 (S.D.N.Y. 2003); In re Bidermann Indus. U.S.A., Inc., 203 B.R. 547, 552–54 (Bankr. S.D.N.Y. 1997) (finding that leveraged buyout agreement could not be approved due to conflicts of interest, self-dealing, and improper bidding procedures). 230. See LoPucki & Doherty, supra note 22, at 32–33 (finding that in eleven out of thirty studied reorganizations, the CEO of the selling company was able to secure a side benefit, such as severance payments, continued employment or a paid consulting position). 231. See generally Bernard S. Black, The Legal and Institutional Preconditions for Strong Securities Markets, 48 UCLA L. REV. 781, 808–09 (2001) (discussing disclosure requirements that facilitate discovery, review, and regulation of self-dealing transactions). 232. See id. (discussing how in securities regulation, review by independent parties such as independent corporate directors, regulators, and judges deters self-dealing and illicit transactions and promotes correction through channels such as shareholder derivative suits). 233. See Rose, supra note 22, at 281–82 (discussing how the ability of debtors or purchasers to manipulate market forces through deal protection fees, limited release of information, and limited bidder participation requires judicial oversight to ensure proper valuation of assets). 270 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 While such review cannot replace a market test, this heightened scrutiny will facilitate the bankruptcy judge’s power in such emergency situations to prevent or at least limit abuse. CONCLUSION The Chrysler and General Motors cases indicate that the use of § 363(b) sales is important and relevant.234 The impact of these sales will be felt widely in bankruptcy proceedings, out-of-court workouts, and in corporate meetings throughout America.235 Commercial transactions operate in the “shadow of the law”236 and remains unclear what impact the automotive bankruptcies will have on commercial decisions in the future. However, lenders—such as those that were negatively impacted by the two companies filing for bankruptcy and resorting to § 363(b) sales—are vital to a thriving economy;237 they take into account the risks associated with businesses filing for bankruptcy and allocate future capital accordingly.238 Even assuming that creditors in the General Motors and Chrysler cases were provided with as large of a payout as they would have received in a plan confirmation, their loss of control over the process may have had a negative impact on lenders generally and may chill lending to distressed or even healthy businesses.239 This, coupled with concerns over abuse, fraud, and self-dealing, provides a compelling reason to safeguard creditors and curtail the use of § 363(b) sales.240 234. See Adler, supra note 14, at 305–06 (discussing the precedential impact of the Chrysler and General Motors cases). 235. See Roe & Skeel, supra note 177, at 770 (“The unevenness of the compensation to prior creditors [in Chrysler] raised considerable concerns in capital markets.”). 236. See generally Robert H. Mnookin & Lewis Kornhauser, Bargaining in the Shadow of the Law: The Case of Divorce, 88 YALE L.J. 950 (1979) (discussing divorce law, providing an in depth analysis of the effect of laws on private decisions, and detailing the phenomenon of society functioning in the “shadow of the law”). 237. Barack H. Obama, President, United States, Remarks to Joint Session of Congress (Feb. 24, 2009), http://www.whitehouse.gov/the_press_office/Remarks-of-President-Barack-ObamaAddress-to-Joint-Session-of-Congress. [T]he flow of credit is the lifeblood of our economy. The ability to get a loan is how you finance the purchase of everything from a home to a car to a college education; how stores stock their shelves, farms buy equipment, and businesses make payroll. . . . When there is no lending, families can’t afford to buy homes or cars. So businesses are forced to make layoffs. Our economy suffers even more, and credit dries up even further. Id. 238. See generally Robert K. Rasmussen, Behavioral Economics, the Economic Analysis of Bankruptcy Law and the Pricing of Credit, 51 VAND. L. REV. 1679 (1998). 239. See Adler, supra note 14, at 311 (“[W]hen the bankruptcy process deprives a creditor of its promised return, the prospect of a debtor's failure looms larger in the eyes of future lenders to future firms.”). 240. See Rose, supra note 22, at 284. 2010] 363(b) Sales: Market Test Procedures & Heightened Scrutiny 271 On the other hand, § 363(b) sales provide undeniable benefits to struggling businesses and their stakeholders.241 A solution that combines these benefits—such as speed and efficiency—with the plan confirmation’s democratic protections can improve the system by protecting creditors without limiting the bankruptcy judge’s discretion.242 Providing a meaningful robust market test will contribute such improvement. The market test helps to ensure that the price paid for the business is fair, that there is no inside dealing, and that creditors are benefited by the sale.243 If a market test is impractical because “time is of the essence,” heightened scrutiny of the sale will safeguard against the same factors and work to prevent the abuse of creditors.244 While this proposal is not presented as a panacea for the bankruptcy system, or even for all of the problems associated with § 363(b) sales, it intends to demonstrate that the debate between proponents of Chapter 11 plan confirmations and those of § 363(b) sales should not be viewed as an either/or conflict. Both processes have a great deal to offer a distressed business and its creditors; both also have significant drawbacks, not only to the debtor and creditors, but to the system.245 By crafting a solution that attempts to take advantage of the best aspects from each, the parties, the system, and the community at large all benefit. However, such a solution raises problems and questions of its own. How does a court determine whether the period for the market test is adequate? When proposed sales differ by terms other than price, who decides which plan is superior and what criterion are used? Under what circumstances should a market test be found to be cost prohibitive? Further inquiry is also necessary to assess whether the tradeoffs of disclosure— including deterring possible purchasers—will be outweighed by the benefits of deterring abuse and having parties analyze the transaction. Nor is a judge’s inquiry into the risk of, or fear of denying a “time is of the essence” sale, alleviated. Further, such a proposal will not prevent parties from Fraudulent § 363 preplan business sales undermine the principles and policies that govern our bankruptcy system. In evaluating the impact of these § 363 preplan business sales, we must recognize what is at stake. The finality of the sales, the integrity of the bankruptcy system, and the people that are harmed by sweetheart deals and management's greed justify a substantial limitation on the process and opportunity of § 363 preplan business sales. Id. 241. See discussion supra Part II. 242. Multiple provisions in the Bankruptcy Code demonstrate the necessity of granting bankruptcy judges wide discretion in their duties, including the ability to order a sale with limited appealability under § 363 or the inherent equitable powers granted to the court in § 105. See 11 U.S.C. §§ 105, 363 (2006). 243. See discussion supra Part III.A. 244. See discussion supra Part III.B. 245. See discussion supra Part II. 272 BROOK. J. CORP. FIN. & COM. L. [Vol. 5 attempting to “game the system”246 by creating innovative solutions to benefit themselves at the expense of others. Even if a perfect solution is unattainable, the project is still a worthy one. Improving the bankruptcy system and what it stands for, as attorneys, academics, Congress, and the courts have been doing for two centuries, is reason enough to continue to search for solutions for new problems as they arise. Perhaps by improving the system, perfection may be achieved, for in the words of Sir Winston Churchill, “[t]o improve is to change; to be perfect is to change often.”247 Gennady Zilberman* 246. See JAMES B. RIELEY, GAMING THE SYSTEM: HOW TO STOP PLAYING THE ORGANIZATIONAL GAME, AND START PLAYING THE COMPETITIVE GAME xii–xiii (2001). Gaming the system refers to a process in which an individual uses the rules and procedures of a system for self benefit and in a way in which they were not intended. See id. (describing how players attempting to subvert the system by following the letter of the law while going against its spirit provides for detrimental long term effects). 247. STEPHEN MANSFIELD, NEVER GIVE IN: THE EXTRAORDINARY CHARACTER OF WINSTON CHURCHILL 118 (George Grant ed., 1995). * B.A., New York University, 2007; M.A., New York University, 2008; J.D. candidate, Brooklyn Law School, 2011. All my thanks to Joseph Antignani, Allegra M. Selvaggio, Samuel J. Gordon, and Daniel R. Wohlberg for their guidance throughout the research and writing process. Special thanks to Professor Edward Janger and Dean Michael Gerber for their inspiration and assistance. I would also like to extend my appreciation to Steven Bentsianov, Robert Marko and the entire Brooklyn Journal of Corporate, Financial & Commercial Law editorial staff. And finally, to my family, thank you all for your unwavering support.