No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

Inside Regulators’ View of ‘Reasonable Security’

Consent orders and AVCs set standards for testing, training and incident response

by Ryan Smyth and Joe Bruemmer
January 21, 2025
in Cybersecurity
small figurines connecting ethernet cable

State laws and the FTC require companies to implement “reasonable security,” but definitions remain frustratingly vague. FTI Consulting’s Ryan Smyth and BakerHostetler’s Joe Bruemmer break down how recent regulatory actions and guidance are helping to clarify these expectations. 

Many U.S. states and territories have laws that require organizations to maintain “reasonable security” to protect personal information. The FTC has expressed a similar expectation of organizations. Oftentimes, however, the applicable cybersecurity laws do not provide further explanation concerning what constitutes reasonable security. How, then, can organizations determine whether regulators would view their security measures as reasonable?

Fortunately, a number of resources exist to help companies evaluate whether they have “reasonable security” in place. First, a handful of the state cybersecurity laws themselves provide guidance. Second, the FTC and certain state regulators have issued guides explaining their views on the issue. And third, recent consent orders and assurances of voluntary compliance (AVCs) with the FTC and state attorneys general provide insight into the regulators’ expectations. 

By piecing these different resources together, CISOs and cybersecurity professionals can begin to answer the question, “What is reasonable security?”

State cybersecurity laws

The first place to look to understand statutory or regulatory requirements is the language of the statute or regulation itself. Some states, like New York and Massachusetts, provide illustrative, non-exhaustive lists of certain administrative, technical and physical safeguards that the applicable jurisdictions consider to be part of a reasonable information security program, such as risk assessments, employee cybersecurity training and threat detection and prevention measures. Other states take a different approach; Ohio, for example, incentivizes organizations to implement written cybersecurity programs that conform to one of a number of specified, industry-recognized cybersecurity frameworks, such as NIST, CIS and ISO frameworks. Organizations attempting to understand their cybersecurity obligations should begin by identifying the applicable specific state laws and familiarizing themselves with the requirements of those laws.

Regulatory guidance

Certain regulators and state attorneys general have published data security guides for businesses, providing some insight into the regulators’ expectations. In April 2023, the New York attorney general’s office published a report titled, “Protecting consumers’ personal information: Tips for businesses to keep data safe and secure.” The report identifies a number of data security measures that the office views as the “minimum” measures businesses must implement to secure personal information. Specifically, the report encourages businesses to:

  • Maintain controls for secure authentication, such as multifactor authentication and password complexity requirements.
  • Encrypt sensitive customer information.
  • Ensure service providers use reasonable security measures.
  • Know where they keep consumer information (by maintaining an asset inventory).
  • Guard against data leakage in web applications.
  • Protect customer accounts involved in data security incidents (by, for example, notifying customers and resetting their passwords).
  • Delete or disable unnecessary accounts.
  • Guard against automated attacks.
  • Provide clear and accurate notice to consumers.

Similarly, in October 2023, the FTC published, “Start with Security: A Guide for Business,” which built upon its 2016 publication, “Protecting Personal Information: A Guide for Business.” In “Start with Security,” the FTC offers a number of security recommendations for business based on its observations from more than 80 FTC law enforcement actions. Several of the recommendations are also found in the New York attorney general’s guide, such as having security authentication controls, encryption and vendor management programs, but the FTC’s publication goes further and recommends, among other things, that businesses employ security measures like network segmentation, endpoint detection and response tools, vulnerability assessments and penetration tests, along with a number of additional administrative, technical, and physical safeguards.

small child using computer
Data Privacy

The Digital Playground: Children’s Online Safety & Privacy Compliance

by Ryan Smyth, Marygrace Jay and Michael Spadea
December 17, 2024

Laws increasingly call on companies to specially protect kids’ data

Read moreDetails

Consent orders & AVCs

Regulators’ guides aggregate their findings and recommendations from the enforcement actions they’ve brought, but companies interested in developing a more detailed understanding of the regulators’ expectations can go straight to the source — the consent orders and AVCs that the regulators have secured through those enforcement actions.

The FTC has the authority to investigate and take enforcement action against possible violations of the FTC Act (1914), which protects consumers from unfair or deceptive practices in or affecting commerce. In the context of cybersecurity, the FTC Act is used to regulate privacy and security-related activity, such as a misleading privacy notice that could be interpreted as deceptive, often following a cybersecurity incident or data breach.

Should the FTC bring a complaint against an organization, it can result in either an informal resolution, where the organization agrees to modify business practices without formal enforcement action, or a consent order, a formal agreement between the FTC and an organization requiring the modification of business practices. Failure to comply with a consent order may result in further fines, costly litigation or more severe enforcement actions. Consent orders are typically provisioned for 20 years, requiring a third-party auditor to regularly assess if specifically outlined security improvements are being implemented and maintained.

AVCs are statutorily permitted remedies available to state regulators to resolve alleged violations of state data security laws, unfair and deceptive trade practices laws and other consumer protection laws. They involve a voluntary promise by the organization entering into the AVC to take specific actions, such as implementing a written information security program consisting of specified elements and making a monetary payment to the state. Violations of an AVC may result in a state regulator bringing an enforcement action against the organization, and the AVC may be used as evidence in such an action.

What do consent orders and AVCs typically include?

Consent orders and AVCs prescribe specific security measures that the FTC and state attorneys general require organizations to implement. While some of the terms might be tailored to the specific incident at issue, there are certain terms that appear time and again in these agreements and represent the core components of what the attorneys general consider to be reasonable data security. Specifically, they require organizations to:

  • Implement, maintain and revise a written comprehensive information security program containing administrative, technical and physical safeguards appropriate to the size and complexity of the company’s operations, the nature and scope of its operations and the sensitivity of its personal information.
  • Designate a specific executive or officer with the appropriate credentials, background, experience and expertise to oversee the information security program.
  • Have that individual report to the chief executive officer and board of directors on a periodic basis about the information security program and report data security incidents to them within a specified period of time (i.e., 48 hours).
  • Provide sufficient resources and support to allow the information security program to function as intended.
  • Maintain a written incident response plan, test the plan annually and revise it as necessary to adapt to any material changes that affect the security of personal information.
  • Conduct annual risk assessments using a recognized method and use them to inform and evaluate the efficacy of the information security program.
  • Provide security awareness training and privacy training to personnel whose job involves access to or responsibility for personal information.
  • Conduct annual penetration tests and use findings from those tests to identify, assess and remediate security vulnerabilities.
  • Implement, maintain and revise a vendor management program consisting of policies and procedures for overseeing vendors that addresses due diligence requirements for evaluating vendors, data security requirements for vendor contracts and processes to oversee vendors during the life of the engagement and an enhanced process for “significant” vendors.
  • Implement and maintain policies and procedures for secure data retention and deletion.
  • Implement specific technical safeguards, including implementing and maintaining, among other things, an asset inventory, logging and monitoring, endpoint detection and response, data loss prevention, password management and network segmentation.
  • Submit a report within 30 days of an organization’s discovery of a “covered incident,” and subsequently update it every 30 days until the incident is fully investigated and any remediation efforts are fully implemented.

The duration of the requirements of the obligations under the consent orders and AVCs can vary, but it is common for FTC consent orders to remain effective for a period of 20 years.

Leveraging this information to define ‘reasonable security’

There is no static list of security measures that organizations should have in place. Cybersecurity threats and defenses constantly evolve, and organizations should not view the specific safeguards outlined in the guides, consent orders and AVCs discussed above as “check-the-box” requirements that, if implemented, will ensure a regulator will find that they have taken reasonable steps to protect personal information.

Instead, organizations should create written information security programs that are based on periodic risk assessments, employ controls based on those risk assessments and evolve with changes to the organizations’ risk profiles and the cybersecurity landscape. In designing these programs, organizations can use the resources described as helpful reference points for their efforts to achieve compliance with data security laws and maintain reasonable security. Consent orders and many AVCs are publicly available and can be used to gain a better understanding of what is expected regarding cybersecurity best practices. The requirements outlined in the consent orders and AVCs serve as unofficial policy, setting expectations for not only the organization under the order, but other organizations that fall under the regulators’ jurisdiction.

Meeting & exceeding minimum standards

Once organizations are aware of the expectations outlined by consent orders and AVCs, they can assess if their own data policies and procedures are in alignment with the standards and implement changes as needed. Organizations can start this process with:

  • Risk assessments: Conduct a thorough risk assessment to understand the risks presented by the company’s network, vendors and data privacy practices.
  • Risk-based security programs: Develop a risk-based security program that focuses on protecting against the most likely threats to the organization, with a clear link from risks identified during the assessment to safeguards that mitigate those risks.
  • Training: Conduct a tabletop exercise that presents the organization with a fact pattern of a data security incident tailored to the organization’s operations and tests how the organization would respond, both from an incident response and a business continuity perspective.
  • Security assessments/mock audits: Conduct a security assessment to measure the organization’s maturity using a recognized industry framework, and then use the findings from the assessment to evaluate the organization’s compliance with applicable data security laws and regulators’ expectations as to what constitutes “reasonable security.”
  • Incident response plans: Develop or review your incident response plan to ensure that it reflects the most recent developments in the threat and regulatory landscapes.
  • Vendor risk management programs: Develop a vendor risk management program that establishes policies and procedures for assessing and managing vendor risk.

Taking these steps will not only help organizations defend the position that they maintained “reasonable security” if and when the need arises but also will help organizations enhance their cybersecurity practices and reduce the risk of a significant cybersecurity incident occurring in the first place.


Tags: Data Governance
Previous Post

Digital Collaboration: Risk Assessment’s Next Chapter

Next Post

When DOJ Comes for Your Domain: A New Enforcement Era

Ryan Smyth and Joe Bruemmer

Ryan Smyth and Joe Bruemmer

Ryan Smyth is a managing director at FTI Consulting. He advises clients on a wide range of regulatory and compliance issues, with a specific focus on privacy, information security, data governance and business continuity. He has served in senior leadership positions at IBM, Promontory, and LPL Financial and held roles at UBS and Citigroup.
Joe Bruemmer is a partner in the Cincinnati office of law firm BakerHostetler. He has advised numerous public and private companies and other entities across a variety of industries in responding to large-scale ransomware incidents, network intrusions and other cybersecurity and data privacy incidents, providing clear strategic guidance in moments of crisis and translating technical findings into practical, actionable legal advice.

Related Posts

data privacy leader concept

Who’s Minding Your Data? The Case for Dedicated Privacy Leadership

by Daniel Barber
June 16, 2025

As state privacy laws multiply and AI introduces new vulnerabilities, the question isn't whether you need dedicated privacy expertise —...

abstract obscured data colorful

NIST’s Differential Privacy Guidelines: 6 Critical Areas for Secure Implementation

by Michelle Drolet
June 16, 2025

Standard de-identification methods remain vulnerable to sophisticated attacks, but differential privacy offers mathematical guarantees that scale with emerging threats

doj building sign with flags

‘Reasonable Steps’: What the DOJ Expects From Your Bulk Data Transfer Compliance Program

by Alexandra P. Moylan, Alisa L. Chestler and Michael J. Halaiko
May 5, 2025

Sample provisions offer blueprint for compliant data brokerage with foreign entities

data security program concept cameras

Your Sensitive Data Is Now a National Security Matter: The DOJ’s New Data Security Program

by Randall Cook, Vince Mekles and Rachel Woloszynski
April 29, 2025

90-day implementation window closing on regulations affecting companies with genomic, biometric, health and other personal information

Next Post
front of doj building

When DOJ Comes for Your Domain: A New Enforcement Era

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights