Consumer Financial Protection Circular 2022-04: Insufficient Data Protection or Security for Sensitive Consumer Information, 54346-54349 [2022-19075]
Download as PDF
54346
Federal Register / Vol. 87, No. 171 / Tuesday, September 6, 2022 / Rules and Regulations
■ 2. Section 430.2 is amended by
adding, in alphabetical order,
definitions of ‘‘Decorative hearth
product’’, ‘‘Miscellaneous gas
products’’, and ‘‘Outdoor heater’’ to read
as follows:
§ 430.2
Definitions.
*
*
*
*
*
Decorative hearth product means a
gas-fired appliance that—
(1) Simulates a solid-fueled fireplace
or presents a flame pattern;
(2) Includes products designed for
indoor use, outdoor use, or either indoor
or outdoor use;
(3) Is not for use with a thermostat;
(4) For products designed for indoor
use, is not designed to provide space
heating to the space in which it is
installed; and
(5) For products designed for outdoor
use, is not designed to provide heat
proximate to the unit.
*
*
*
*
*
Miscellaneous gas products mean
decorative hearth products and outdoor
heaters.
*
*
*
*
*
Outdoor heater means a gas-fired
appliance designed for use in outdoor
spaces only, and which is designed to
provide heat proximate to the unit.
*
*
*
*
*
[FR Doc. 2022–18856 Filed 9–2–22; 8:45 am]
BILLING CODE 6450–01–P
BUREAU OF CONSUMER FINANCIAL
PROTECTION
12 CFR Chapter X
Consumer Financial Protection
Circular 2022–04: Insufficient Data
Protection or Security for Sensitive
Consumer Information
Bureau of Consumer Financial
Protection.
ACTION: Consumer Financial Protection
Circular.
AGENCY:
The Consumer Financial
Protection Bureau (Bureau or CFPB) has
issued Consumer Financial Protection
Circular 2022–04, titled, ‘‘Insufficient
Data Protection or Security for Sensitive
Consumer Information.’’ In this circular,
the Bureau responds to the question,
‘‘Can entities violate the prohibition on
unfair acts or practices in the Consumer
Financial Protection Act (CFPA) when
they have insufficient data protection or
information security?’’
DATES: The Bureau released this circular
on its website on August 11, 2022.
jspears on DSK121TN23PROD with RULES
SUMMARY:
VerDate Sep<11>2014
17:41 Sep 02, 2022
Jkt 256001
Enforcers, and the broader
public, can provide feedback and
comments to Circulars@cfpb.gov.
FOR FURTHER INFORMATION CONTACT:
Jaclyn Sellers, Senior Counsel, Office of
Supervision, Fair Lending and
Enforcement, at (202) 435–2661. If you
require this document in an alternative
electronic format, please contact CFPB_
Accessibility@cfpb.gov.
SUPPLEMENTARY INFORMATION:
ADDRESSES:
Question Presented
Can entities violate the prohibition on
unfair acts or practices in the Consumer
Financial Protection Act (CFPA) when
they have insufficient data protection or
information security?
Response
Yes. In addition to other Federal laws
governing data security for financial
institutions, including the Safeguards
Rules issued under the Gramm-LeachBliley Act (GLBA), ‘‘covered persons’’
and ‘‘service providers’’ must comply
with the prohibition on unfair acts or
practices in the CFPA. Inadequate
security for the sensitive consumer
information collected, processed,
maintained, or stored by the company
can constitute an unfair practice in
violation of 12 U.S.C. 5536(a)(1)(B).
While these requirements often overlap,
they are not coextensive.
Acts or practices are unfair when they
cause or are likely to cause substantial
injury that is not reasonably avoidable
or outweighed by countervailing
benefits to consumers or competition.
Inadequate authentication, password
management, or software update
policies or practices are likely to cause
substantial injury to consumers that is
not reasonably avoidable by consumers,
and financial institutions are unlikely to
successfully justify weak data security
practices based on countervailing
benefits to consumers or competition.
Inadequate data security can be an
unfair practice in the absence of a
breach or intrusion.
Analysis
Widespread data breaches and
cyberattacks have resulted in significant
harms to consumers, including
monetary loss, identity theft, significant
time and money spent dealing with the
impacts of the breach, and other forms
of financial distress. Providers of
consumer financial services are subject
to specific requirements to protect
consumer data. In 2021, the Federal
Trade Commission (FTC) updated its
Safeguards Rule implementing section
501(b) of GLBA, to set forth specific
criteria relating to the safeguards that
certain nonbank financial institutions
PO 00000
Frm 00036
Fmt 4700
Sfmt 4700
must implement as a part of their
information security programs.1 These
safeguards, among other things, limit
who can access customer information,
require the use of encryption to secure
such information, and require the
designation of a single qualified
individual to oversee an institution’s
information security program and report
at least annually to the institution’s
board of directors or equivalent
governing body. The Federal banking
agencies also have issued interagency
guidelines to implement section 501 of
GLBA.2
In certain circumstances, failure to
comply with these specific requirements
may also violate the CFPA’s prohibition
on unfair acts or practices. The CFPA
defines an unfair act or practice as an
act or practice: (1) that causes or is
likely to cause substantial injury to
consumers, (2) which is not reasonably
avoidable by consumers, and (3) is not
outweighed by countervailing benefits
to consumers or competition.3
A practice causes substantial injury to
consumers when it causes significant
harm to a few consumers or a small
amount of harm to many consumers. For
example, inadequate data security
measures can cause significant harm to
a few consumers who become victims of
targeted identity theft as a result, or it
can cause harm to potentially millions
of consumers when there are large
customer-base-wide data breaches.
Information security weaknesses can
result in data breaches, cyberattacks,
exploits, ransomware attacks, and other
exposure of consumer data.4
Further, actual injury is not required
to satisfy this prong in every case. A
significant risk of harm is also
sufficient. In other words, this prong of
unfairness is met even in the absence of
a data breach. Practices that ‘‘are likely
to cause’’ substantial injury, including
inadequate data security measures that
have not yet resulted in a breach,
nonetheless satisfy this prong of
unfairness.5
1 86
FR 70272 (Dec. 9, 2021).
66 FR 8616 (Feb. 1, 2001). These guidelines
are currently codified at 12 CFR pt. 30, appendix
B (OCC); Regulation H, 12 CFR 208, appendix D–
2 (Board); Regulation Y, 12 CFR 225, appendix F
(Board); 12 CFR pt. 364, appendix B (FDIC).
3 12 U.S.C. 5531(c). The unfairness standard in
the CFPA is similar to the unfairness standard in
section 5 of the Federal Trade Commission Act.
4 Compliance Management Review—Information
Technology, CFPB Examination Procedures (Sept.
2021), https://files.consumerfinance.gov/f/
documents/cfpb_compliance-management-reviewinformation-technology_examinationprocedures.pdf.
5 See, e.g., FTC v. Wyndham Worldwide Corp.,
799 F.3d 236, 246 (3d Cir. 2015) (‘‘Although
unfairness claims ‘usually involve actual and
completed harms,’ ‘they may also be brought on the
2 See
E:\FR\FM\06SER1.SGM
06SER1
Federal Register / Vol. 87, No. 171 / Tuesday, September 6, 2022 / Rules and Regulations
Consumers cannot reasonably avoid
the harms caused by a firm’s data
security failures. They typically have no
way of knowing whether appropriate
security measures are properly
implemented, irrespective of disclosures
provided. They do not control the
creation or implementation of an
entity’s security measures, including an
entity’s information security program.
And consumers lack the practical means
to reasonably avoid harms resulting
from data security failures.6
Where companies forgo reasonable
cost-efficient measures to protect
consumer data, like those measures
identified below, the CFPB expects the
risk of substantial injury to consumers
will outweigh any purported
countervailing benefits to consumers or
competition. The CFPB is unaware of
any instance in which a court applying
an unfairness standard has found that
the substantial injury caused or likely to
have been caused by a company’s poor
data security practices was outweighed
by countervailing benefits to consumers
or competition.7 Given the harms to
consumers from breaches involving
sensitive financial information, this is
not surprising.
jspears on DSK121TN23PROD with RULES
Relevant Precedent
On July 22, 2019, the CFPB alleged
that Equifax violated the CFPA’s
prohibition on unfair acts or practices.8
The FTC also alleged that Equifax
violated the FTC Act and the FTC’s
Safeguards Rule, which implements
section 501 of GLBA and establishes
certain requirements that nonbank
financial institutions must adhere to in
order to protect financial information.9
basis of likely rather than actual injury,’ ‘[and] the
FTC Act expressly contemplates the possibility that
conduct can be unfair before actual injury
occurs.’ ’’) (interpreting unfairness standard in the
FTC Act, for which precedent is often used in
interpreting the similar CFPA standard) (citations
omitted).
6 FTC v. Neovi, Inc., 598 F. Supp. 2d 1104, 1115
(S.D. Cal. 2008) (‘‘[C]onsumers who had their bank
accounts accessed without authorization had no
chance whatsoever to avoid the injury before it
occurred.’’).
7 FTC v. Neovi, 604 F.3d 1150, 1158 (9th Cir.
2010) (‘‘The FTC also met its burden of showing
that consumer injury was not outweighed by
countervailing benefits to consumers or to
competition.’’); FTC v. Wyndham Worldwide Corp.,
10 F. Supp. 3d 602 (D.N.J. 2014) (defendant
challenged first two elements, but not the
countervailing benefits finding).
8 Complaint at 39–53, BCFP v. Equifax, Inc., 1:19–
cv–03300 (N.D. Ga. July 22, 2019), https://
files.consumerfinance.gov/f/documents/cfpb_
equifax-inc_complaint_2019-07.pdf. The FTC also
alleged that Equifax violated the FTC Act’s
prohibition on unfair acts or practices.
9 Complaint at 45–46, FTC v. Equifax, Inc., 1:19–
mi–99999–UNA (N.D. Ga. July 22, 2019), https://
www.ftc.gov/system/files/documents/cases/172_
3203_equifax_complaint_7-22-19.pdf.
VerDate Sep<11>2014
17:41 Sep 02, 2022
Jkt 256001
In its complaint against Equifax, the
CFPB alleged an unfairness violation
based on Equifax’s failure to provide
reasonable security for sensitive
personal information it collected,
processed, maintained, or stored within
computer networks.10 In particular,
Equifax violated the prohibition on
unfairness (as well as the FTC’s
Safeguards Rule) by using software that
contained a known vulnerability and
failing to patch the vulnerability for
more than four months. Hackers
exploited the vulnerability to steal over
140 million names, dates of birth, and
SSNs, as well as millions of telephone
numbers, email addresses, and physical
addresses, and hundreds of thousands
of credit card numbers and expiration
dates.11
Before the Equifax matter, law
enforcement actions related to
inadequate authentication triggered
liability under the FTC Act’s prohibition
on unfair practices. In 2006, the FTC
sued online check processor Qchex and
related entities for violating the FTC
Act. The FTC alleged that it was an
unfair practice to create and deliver
checks without verifying that the person
requesting the check was authorized to
draw checks on the associated bank
account.12 Qchex created checks ‘‘even
when the customer’s name differed from
the name on the bank account listed on
the checks or from the name on the
credit card account the customer used to
pay for [Qchex’s] services.’’ 13
Even after setting up certain identity
verification procedures, Qchex bypassed
those procedures for some customers.14
Ultimately, a court observed, ‘‘it was a
simple matter for unscrupulous
opportunists to obtain identity
information and draw checks from
accounts that were not their own.’’ 15
That court confirmed that Qchex injured
consumers by creating and delivering
unverified checks, in violation of
section 5 of the FTC Act.16
Implementation of common-sense
practices—including those that are now
required under the FTC’s Safeguards
Rule—protects consumers from injury
and that, in turn, mitigates potential
liability for businesses.
10 Complaint at 40–42, BCFP v. Equifax, Inc.,
https://files.consumerfinance.gov/f/documents/
cfpb_equifax-inc_complaint_2019-07.pdf.
11 The CFPB, FTC, and state Attorneys General
imposed $700 million in relief and penalties against
Equifax.
12 See Complaint at 10, FTC v. Neovi, Inc., 598
F. Supp. 2d 1104 (S.D. Cal. 2008) (No. 06 Civ.
1952), aff’d, 604 F.3d 1150 (9th Cir. 2010).
13 Id. at 5.
14 Id. at 6.
15 Neovi, Inc., 604 F.3d at 1154.
16 Id. at 1157.
PO 00000
Frm 00037
Fmt 4700
Sfmt 4700
54347
Liability for unfair acts or practices
has also been triggered in the context of
password management and routine
software updates. In 2012, the FTC sued
multiple entities associated with the
Wyndham hospitality company for their
failures ‘‘to employ reasonable and
appropriate measures to protect
personal information against
unauthorized access’’ in violation of the
FTC Act’s prohibitions on deceptive and
unfair acts and practices.17 The
inadequate data security practices
included ‘‘using outdated operating
systems that could not receive security
updates or patches to address known
security vulnerabilities,’’ servers that
used ‘‘well-known default user IDs and
passwords . . . which were easily
available to hackers through simple
internet searches,’’ and password
management policies that did not
require ‘‘the use of complex passwords
for access to the Wyndham-branded
hotels’ property management systems
and allow[ing] the use of easily guessed
passwords.’’ 18
The FTC alleged that, due to these
and other deficient security measures,
‘‘intruders were able to gain
unauthorized access to [Wyndham’s]
computer network . . . on three
separate occasions’’ and retrieved
‘‘customers’ payment card account
numbers, expiration dates, and security
codes.’’ 19 One such incident led to ‘‘the
compromise of more than 500,000
payment card accounts, and the export
of hundreds of thousands of consumers’
payment card account numbers to a
domain registered in Russia.’’ 20 When
Wyndham argued that data security
issues were outside the bounds of the
FTC’s unfairness authority, the courts
confirmed that ‘‘the FTC has authority
to regulate cybersecurity under the
unfairness prong of’’ section 5(a) of the
FTC Act and that regulated entities have
adequate notice that cybersecurity
issues could lead to violations of that
provision.21
In March 2022, the FTC announced an
administrative complaint and proposed
consent orders against Residual
Pumpkin Entity, LLC and PlanetArt,
LLC, respectively the former and current
operators of CafePress, a customized
17 First Amended Complaint at 19, FTC v.
Wyndham Worldwide Corp., 10 F. Supp. 3d 602
(D.N.J. 2014) (No. 13 Civ. 1887), aff’d, 799 F.3d 236
(3d Cir. 2015).
18 Id. at 11.
19 Id. at 12–13.
20 Id. at 15.
21 Wyndham Worldwide Corp., 799 F.3d at 240.
E:\FR\FM\06SER1.SGM
06SER1
54348
Federal Register / Vol. 87, No. 171 / Tuesday, September 6, 2022 / Rules and Regulations
merchandise e-commerce platform.22
The FTC’s complaint documented
several inadequate data security
practices, including the failure to
‘‘implement patch management policies
and procedures to ensure timely
remediation of critical security
vulnerabilities,’’ the failure to ‘‘establish
or enforce rules sufficient to make user
credentials (such as username and
password) hard to guess,’’ the failure to
disclose security incidents to relevant
parties, and inadequate ‘‘measures to
prevent account takeovers through
password resets using data known to
have been obtained by hackers.’’ 23
While the prohibition on unfair
practices is fact-specific, the experience
of the agencies suggests that failure to
implement common data security
practices will significantly increase the
likelihood that a firm may be violating
the prohibition. In the examples below,
the Circular describes conduct that will
typically meet the first two elements of
an unfairness claim (likely to cause
substantial injury to consumers that is
not reasonably avoidable by consumers),
and thus increase the likelihood that an
entity’s conduct triggers liability under
the CFPA’s prohibition of unfair
practices.
jspears on DSK121TN23PROD with RULES
1. Multi-Factor Authentication
Multi-factor authentication (MFA) is a
security enhancement that requires
multiple credentials (factors) before an
account can be accessed.24 Factors fall
into three categories: something you
know, like a password; something you
have, like a token; and something you
are, like your fingerprint. A common
MFA setup is supplying both a
password and a temporary numeric
code in order to log in. Another MFA
factor is the use of hardware
identification devices. MFA greatly
increases the level of difficulty for
adversaries to compromise enterprise
user accounts, and thus gain access to
sensitive customer data. MFA solutions
that protect against credential phishing,
such as those using the Web
Authentication standard supported by
web browsers, are especially important.
If a covered person or service provider
does not require MFA for its employees
22 CafePress, 87 FR 16187 (FTC Mar. 22, 2022)
(analysis of proposed consent orders to aid public
comment).
23 Complaint at 4–5, In re Residual Pumpkin
Entity, LLC and PlanetArt, LLC, No. 1923209, (FTC
June 23, 2022), https://www.ftc.gov/system/files/ftc_
gov/pdf/1923209CafePressComplaint.pdf.
24 Back to Basics: What’s multi-factor
authentication—and why should I care?, National
Institute of Standards and Technology, https://
www.nist.gov/blogs/cybersecurity-insights/backbasics-whats-multi-factor-authentication-and-whyshould-i-care.
VerDate Sep<11>2014
17:41 Sep 02, 2022
Jkt 256001
or offer multi-factor authentication as an
option for consumers accessing systems
and accounts, or has not implemented a
reasonably secure equivalent, it is
unlikely that the entity could
demonstrate that countervailing benefits
to consumers or competition outweigh
the potential harms, thus triggering
liability.25
2. Password Management
Unauthorized use of passwords is a
common data security issue. Username
and password combinations can be sold
on the dark web or posted for free on the
internet, which can be used to access
not just the accounts in question, but
other accounts held by the consumer or
employee.
If a covered person or service provider
does not have adequate password
management policies and practices, it is
unlikely they would succeed in showing
countervailing benefits to consumers or
competition that outweigh the potential
harms, thus triggering liability.26 This
includes failing to have processes in
place to monitor for breaches at other
entities where employees may be reusing logins and passwords (including
notifying users when a password reset is
required as a result) and includes use of
default enterprise logins or passwords.
3. Timely Software Updates
Software vendors regularly update
software to address security
vulnerabilities within a program or
product. When patches are released, the
public, including hackers, become
aware of the prior vulnerabilities.
Therefore, when companies use
commonly available software, including
open-source software and open-source
libraries,27 and do not install a patch
that has been released for that software
or take other mitigating steps if patching
is not possible, they neglect to fix a
25 For a more thorough discussion of MFA, please
refer to Cybersecurity & Infrastructure Security
Agency’s (CISA’s) Multi-Factor Authentication
page, or the National Institute of Standards and
Technology’s (NIST’s) Digital Identity Guidelines.
Multi-Factor Authentication, CISA, https://
www.cisa.gov/mfa; Digital Identity Guidelines:
Authentication and Lifecycle Management;
Authenticator Assurance Level 2, NIST, (June 2017),
https://pages.nist.gov/800-63-3/sp800-63b.html.
26 Good Security Habits, CISA, (Feb. 1, 2021),
Good Security Habits | CISA.
27 FTC warns companies to remediate Log4j
security vulnerability (Jan. 4, 2022), https://
www.ftc.gov/policy/advocacy-research/tech-at-ftc/
2022/01/ftc-warns-companies-remediate-log4jsecurity-vulnerability. (‘‘Log4j is a ubiquitous piece
of software used to record activities in a wide range
of systems found in consumer-facing products and
services. Recently, a serious vulnerability in the
popular Java logging package, Log4j (CVE–2021–
44228) was disclosed, posing a severe risk to
millions of consumer products to enterprise
software and web applications.’’)
PO 00000
Frm 00038
Fmt 4700
Sfmt 4700
security vulnerability that has become
widely known. As noted in the CFPB’s
complaint against Equifax, Equifax’s
2017 failure to patch a known
vulnerability resulted in hackers gaining
access to Equifax’s systems that exposed
the personal information of nearly 148
million consumers.28
If covered persons or service
providers do not routinely update
systems, software, and code (including
those utilized by contractors) or fail to
update them when notified of a critical
vulnerability, it is unlikely they would
succeed in showing countervailing
benefits to consumers or competition
that outweigh the potential harms, thus
triggering liability. This includes not
having asset inventories of which
systems contain dependencies on
certain software to make sure software
is up to date and highlight needs for
patches and updates. It also includes the
use of versions of software that are no
longer actively maintained by their
vendors.
About Consumer Financial Protection
Circulars
Consumer Financial Protection
Circulars are issued to all parties with
authority to enforce Federal consumer
financial law. The CFPB is the principal
Federal regulator responsible for
administering Federal consumer
financial law, see 12 U.S.C. 5511,
including the Consumer Financial
Protection Act’s prohibition on unfair,
deceptive, and abusive acts or practices,
12 U.S.C. 5536(a)(1)(B), and 18 other
‘‘enumerated consumer laws,’’ 12 U.S.C.
5481(12). However, these laws are also
enforced by State attorneys general and
State regulators, 12 U.S.C. 5552, and
prudential regulators including the
Federal Deposit Insurance Corporation,
the Office of the Comptroller of the
Currency, the Board of Governors of the
Federal Reserve System, and the
National Credit Union Administration.
See, e.g., 12 U.S.C. 5516(d), 5581(c)(2)
(exclusive enforcement authority for
banks and credit unions with $10
billion or less in assets). Some Federal
consumer financial laws are also
enforceable by other Federal agencies,
including the Department of Justice and
the Federal Trade Commission, the
Farm Credit Administration, the
Department of Transportation, and the
Department of Agriculture. In addition,
some of these laws provide for private
enforcement.
Consumer Financial Protection
Circulars are intended to promote
28 Complaint at 13, BCFP v. Equifax, Inc., https://
files.consumerfinance.gov/f/documents/cfpb_
equifax-inc_complaint_2019-07.pdf.
E:\FR\FM\06SER1.SGM
06SER1
Federal Register / Vol. 87, No. 171 / Tuesday, September 6, 2022 / Rules and Regulations
consistency in approach across the
various enforcement agencies and
parties, pursuant to the CFPB’s statutory
objective to ensure Federal consumer
financial law is enforced consistently.
12 U.S.C. 5511(b)(4).
Consumer Financial Protection
Circulars are also intended to provide
transparency to partner agencies
regarding the CFPB’s intended approach
when cooperating in enforcement
actions. See, e.g., 12 U.S.C. 5552(b)
(consultation with CFPB by State
attorneys general and regulators); 12
U.S.C. 5562(a) (joint investigatory work
between CFPB and other agencies).
Consumer Financial Protection
Circulars are general statements of
policy under the Administrative
Procedure Act. 5 U.S.C. 553(b). They
provide background information about
applicable law, articulate considerations
relevant to the Bureau’s exercise of its
authorities, and, in the interest of
maintaining consistency, advise other
parties with authority to enforce Federal
consumer financial law. They do not
restrict the Bureau’s exercise of its
authorities, impose any legal
requirements on external parties, or
create or confer any rights on external
parties that could be enforceable in any
administrative or civil proceeding. The
CFPB Director is instructing CFPB staff
as described herein, and the CFPB will
then make final decisions on individual
matters based on an assessment of the
factual record, applicable law, and
factors relevant to prosecutorial
discretion.
Rohit Chopra,
Director, Consumer Financial Protection
Bureau.
[FR Doc. 2022–19075 Filed 9–2–22; 8:45 am]
BILLING CODE 4810–AM–P
DEPARTMENT OF TRANSPORTATION
Federal Aviation Administration
14 CFR Part 25
jspears on DSK121TN23PROD with RULES
[Docket No. FAA–2022–1147; Special
Conditions No. 25–829–SC]
Special Conditions: L2 Consulting
Services, Inc., Bombardier Model BD–
700–1A10 and BD–700–1A11
Airplanes; Electronic System Security
Protection From Unauthorized External
Access
Federal Aviation
Administration (FAA), DOT.
ACTION: Final special conditions; request
for comments.
AGENCY:
VerDate Sep<11>2014
17:41 Sep 02, 2022
Jkt 256001
These special conditions are
issued for the Bombardier Model BD–
700–1A10 and BD–700–1A11 airplanes.
These airplanes, as modified by L2
Consulting Services, Inc., will have a
novel or unusual design feature when
compared to the state of technology
envisioned in the airworthiness
standards for airplanes. This design
feature is associated with the
installation of an electronic network
system architecture that will allow
increased connectivity to and access
from external network sources, (e.g.,
operator networks, wireless devices,
internet connectivity, service provider
satellite communications, electronic
flight bags, etc.) to the airplane’s
previously isolated electronic assets
(networks, systems, and databases). The
applicable airworthiness regulations do
not contain adequate or appropriate
safety standards for this design feature.
These special conditions contain the
additional safety standards that the
Administrator considers necessary to
establish a level of safety equivalent to
that established by the existing
airworthiness standards.
DATES: This action is effective on L2
Consulting Services, Inc., on September
6, 2022. Send comments on or before
October 21, 2022.
ADDRESSES: Send comments identified
by Docket No. FAA–2022–1147 using
any of the following methods:
• Federal eRegulations Portal: Go to
https://www.regulations.gov/ and follow
the online instructions for sending your
comments electronically.
• Mail: Send comments to Docket
Operations, M–30, U.S. Department of
Transportation (DOT), 1200 New Jersey
Avenue SE, Room W12–140, West
Building Ground Floor, Washington, DC
20590–0001.
• Hand Delivery or Courier: Take
comments to Docket Operations in
Room W12–140 of the West Building
Ground Floor at 1200 New Jersey
Avenue SE, Washington, DC, between 9
a.m. and 5 p.m., Monday through
Friday, except Federal holidays.
• Fax: Fax comments to Docket
Operations at 202–493–2251.
Privacy: Except for Confidential
Business Information (CBI) as described
in the following paragraph, and other
information as described in title 14,
Code of Federal Regulations (14 CFR)
11.35, the FAA will post all comments
received without change to https://
www.regulations.gov/, including any
personal information you provide. The
FAA will also post a report
summarizing each substantive verbal
contact received about these special
conditions.
SUMMARY:
PO 00000
Frm 00039
Fmt 4700
Sfmt 4700
54349
Confidential Business Information:
Confidential Business Information (CBI)
is commercial or financial information
that is both customarily and actually
treated as private by its owner. Under
the Freedom of Information Act (FOIA)
(5 U.S.C. 552), CBI is exempt from
public disclosure. If your comments
responsive to these special conditions
contain commercial or financial
information that is customarily treated
as private, that you actually treat as
private, and that is relevant or
responsive to these special conditions, it
is important that you clearly designate
the submitted comments as CBI. Please
mark each page of your submission
containing CBI as ‘‘PROPIN.’’ The FAA
will treat such marked submissions as
confidential under the FOIA, and the
indicated comments will not be placed
in the public docket of these special
conditions. Send submissions
containing CBI to Thuan T. Nguyen,
Aircraft Information Systems, AIR–622,
Technical Innovation Policy Branch,
Policy and Innovation Division, Aircraft
Certification Service, Federal Aviation
Administration, 2200 South 216th
Street, Des Moines, Washington 98198;
telephone; 206–231–3365; email
Thuan.T.Nguyen@faa.gov. Comments
the FAA receives, which are not
specifically designated as CBI, will be
placed in the public docket for these
special conditions.
Docket: Background documents or
comments received may be read at
https://www.regulations.gov/ at any
time. Follow the online instructions for
accessing the docket or go to Docket
Operations in Room W12–140 of the
West Building Ground Floor at 1200
New Jersey Avenue SE, Washington,
DC, between 9 a.m. and 5 p.m., Monday
through Friday, except Federal holidays.
FOR FURTHER INFORMATION CONTACT:
Thuan T. Nguyen, Aircraft Information
Systems, AIR–622, Technical
Innovation Policy Branch, Policy and
Innovation Division, Aircraft
Certification Service, Federal Aviation
Administration, 2200 South 216th
Street, Des Moines, Washington 98198;
telephone; 206–231–3365; email
Thuan.T.Nguyen@faa.gov.
The
substance of these special conditions
has been published in the Federal
Register for public comment in several
prior instances with no substantive
comments received. Therefore, the FAA
finds, pursuant to 14 CFR 11.38(b), that
new comments are unlikely, and notice
and comment prior to this publication
are unnecessary.
SUPPLEMENTARY INFORMATION:
E:\FR\FM\06SER1.SGM
06SER1
Agencies
[Federal Register Volume 87, Number 171 (Tuesday, September 6, 2022)]
[Rules and Regulations]
[Pages 54346-54349]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2022-19075]
=======================================================================
-----------------------------------------------------------------------
BUREAU OF CONSUMER FINANCIAL PROTECTION
12 CFR Chapter X
Consumer Financial Protection Circular 2022-04: Insufficient Data
Protection or Security for Sensitive Consumer Information
AGENCY: Bureau of Consumer Financial Protection.
ACTION: Consumer Financial Protection Circular.
-----------------------------------------------------------------------
SUMMARY: The Consumer Financial Protection Bureau (Bureau or CFPB) has
issued Consumer Financial Protection Circular 2022-04, titled,
``Insufficient Data Protection or Security for Sensitive Consumer
Information.'' In this circular, the Bureau responds to the question,
``Can entities violate the prohibition on unfair acts or practices in
the Consumer Financial Protection Act (CFPA) when they have
insufficient data protection or information security?''
DATES: The Bureau released this circular on its website on August 11,
2022.
ADDRESSES: Enforcers, and the broader public, can provide feedback and
comments to [email protected].
FOR FURTHER INFORMATION CONTACT: Jaclyn Sellers, Senior Counsel, Office
of Supervision, Fair Lending and Enforcement, at (202) 435-2661. If you
require this document in an alternative electronic format, please
contact [email protected].
SUPPLEMENTARY INFORMATION:
Question Presented
Can entities violate the prohibition on unfair acts or practices in
the Consumer Financial Protection Act (CFPA) when they have
insufficient data protection or information security?
Response
Yes. In addition to other Federal laws governing data security for
financial institutions, including the Safeguards Rules issued under the
Gramm-Leach-Bliley Act (GLBA), ``covered persons'' and ``service
providers'' must comply with the prohibition on unfair acts or
practices in the CFPA. Inadequate security for the sensitive consumer
information collected, processed, maintained, or stored by the company
can constitute an unfair practice in violation of 12 U.S.C.
5536(a)(1)(B). While these requirements often overlap, they are not
coextensive.
Acts or practices are unfair when they cause or are likely to cause
substantial injury that is not reasonably avoidable or outweighed by
countervailing benefits to consumers or competition. Inadequate
authentication, password management, or software update policies or
practices are likely to cause substantial injury to consumers that is
not reasonably avoidable by consumers, and financial institutions are
unlikely to successfully justify weak data security practices based on
countervailing benefits to consumers or competition. Inadequate data
security can be an unfair practice in the absence of a breach or
intrusion.
Analysis
Widespread data breaches and cyberattacks have resulted in
significant harms to consumers, including monetary loss, identity
theft, significant time and money spent dealing with the impacts of the
breach, and other forms of financial distress. Providers of consumer
financial services are subject to specific requirements to protect
consumer data. In 2021, the Federal Trade Commission (FTC) updated its
Safeguards Rule implementing section 501(b) of GLBA, to set forth
specific criteria relating to the safeguards that certain nonbank
financial institutions must implement as a part of their information
security programs.\1\ These safeguards, among other things, limit who
can access customer information, require the use of encryption to
secure such information, and require the designation of a single
qualified individual to oversee an institution's information security
program and report at least annually to the institution's board of
directors or equivalent governing body. The Federal banking agencies
also have issued interagency guidelines to implement section 501 of
GLBA.\2\
---------------------------------------------------------------------------
\1\ 86 FR 70272 (Dec. 9, 2021).
\2\ See 66 FR 8616 (Feb. 1, 2001). These guidelines are
currently codified at 12 CFR pt. 30, appendix B (OCC); Regulation H,
12 CFR 208, appendix D-2 (Board); Regulation Y, 12 CFR 225, appendix
F (Board); 12 CFR pt. 364, appendix B (FDIC).
---------------------------------------------------------------------------
In certain circumstances, failure to comply with these specific
requirements may also violate the CFPA's prohibition on unfair acts or
practices. The CFPA defines an unfair act or practice as an act or
practice: (1) that causes or is likely to cause substantial injury to
consumers, (2) which is not reasonably avoidable by consumers, and (3)
is not outweighed by countervailing benefits to consumers or
competition.\3\
---------------------------------------------------------------------------
\3\ 12 U.S.C. 5531(c). The unfairness standard in the CFPA is
similar to the unfairness standard in section 5 of the Federal Trade
Commission Act.
---------------------------------------------------------------------------
A practice causes substantial injury to consumers when it causes
significant harm to a few consumers or a small amount of harm to many
consumers. For example, inadequate data security measures can cause
significant harm to a few consumers who become victims of targeted
identity theft as a result, or it can cause harm to potentially
millions of consumers when there are large customer-base-wide data
breaches. Information security weaknesses can result in data breaches,
cyberattacks, exploits, ransomware attacks, and other exposure of
consumer data.\4\
---------------------------------------------------------------------------
\4\ Compliance Management Review--Information Technology, CFPB
Examination Procedures (Sept. 2021), https://files.consumerfinance.gov/f/documents/cfpb_compliance-management-review-information-technology_examination-procedures.pdf.
---------------------------------------------------------------------------
Further, actual injury is not required to satisfy this prong in
every case. A significant risk of harm is also sufficient. In other
words, this prong of unfairness is met even in the absence of a data
breach. Practices that ``are likely to cause'' substantial injury,
including inadequate data security measures that have not yet resulted
in a breach, nonetheless satisfy this prong of unfairness.\5\
---------------------------------------------------------------------------
\5\ See, e.g., FTC v. Wyndham Worldwide Corp., 799 F.3d 236, 246
(3d Cir. 2015) (``Although unfairness claims `usually involve actual
and completed harms,' `they may also be brought on the basis of
likely rather than actual injury,' `[and] the FTC Act expressly
contemplates the possibility that conduct can be unfair before
actual injury occurs.' '') (interpreting unfairness standard in the
FTC Act, for which precedent is often used in interpreting the
similar CFPA standard) (citations omitted).
---------------------------------------------------------------------------
[[Page 54347]]
Consumers cannot reasonably avoid the harms caused by a firm's data
security failures. They typically have no way of knowing whether
appropriate security measures are properly implemented, irrespective of
disclosures provided. They do not control the creation or
implementation of an entity's security measures, including an entity's
information security program. And consumers lack the practical means to
reasonably avoid harms resulting from data security failures.\6\
---------------------------------------------------------------------------
\6\ FTC v. Neovi, Inc., 598 F. Supp. 2d 1104, 1115 (S.D. Cal.
2008) (``[C]onsumers who had their bank accounts accessed without
authorization had no chance whatsoever to avoid the injury before it
occurred.'').
---------------------------------------------------------------------------
Where companies forgo reasonable cost-efficient measures to protect
consumer data, like those measures identified below, the CFPB expects
the risk of substantial injury to consumers will outweigh any purported
countervailing benefits to consumers or competition. The CFPB is
unaware of any instance in which a court applying an unfairness
standard has found that the substantial injury caused or likely to have
been caused by a company's poor data security practices was outweighed
by countervailing benefits to consumers or competition.\7\ Given the
harms to consumers from breaches involving sensitive financial
information, this is not surprising.
---------------------------------------------------------------------------
\7\ FTC v. Neovi, 604 F.3d 1150, 1158 (9th Cir. 2010) (``The FTC
also met its burden of showing that consumer injury was not
outweighed by countervailing benefits to consumers or to
competition.''); FTC v. Wyndham Worldwide Corp., 10 F. Supp. 3d 602
(D.N.J. 2014) (defendant challenged first two elements, but not the
countervailing benefits finding).
---------------------------------------------------------------------------
Relevant Precedent
On July 22, 2019, the CFPB alleged that Equifax violated the CFPA's
prohibition on unfair acts or practices.\8\ The FTC also alleged that
Equifax violated the FTC Act and the FTC's Safeguards Rule, which
implements section 501 of GLBA and establishes certain requirements
that nonbank financial institutions must adhere to in order to protect
financial information.\9\
---------------------------------------------------------------------------
\8\ Complaint at 39-53, BCFP v. Equifax, Inc., 1:19-cv-03300
(N.D. Ga. July 22, 2019), https://files.consumerfinance.gov/f/documents/cfpb_equifax-inc_complaint_2019-07.pdf. The FTC also
alleged that Equifax violated the FTC Act's prohibition on unfair
acts or practices.
\9\ Complaint at 45-46, FTC v. Equifax, Inc., 1:19-mi-99999-UNA
(N.D. Ga. July 22, 2019), https://www.ftc.gov/system/files/documents/cases/172_3203_equifax_complaint_7-22-19.pdf.
---------------------------------------------------------------------------
In its complaint against Equifax, the CFPB alleged an unfairness
violation based on Equifax's failure to provide reasonable security for
sensitive personal information it collected, processed, maintained, or
stored within computer networks.\10\ In particular, Equifax violated
the prohibition on unfairness (as well as the FTC's Safeguards Rule) by
using software that contained a known vulnerability and failing to
patch the vulnerability for more than four months. Hackers exploited
the vulnerability to steal over 140 million names, dates of birth, and
SSNs, as well as millions of telephone numbers, email addresses, and
physical addresses, and hundreds of thousands of credit card numbers
and expiration dates.\11\
---------------------------------------------------------------------------
\10\ Complaint at 40-42, BCFP v. Equifax, Inc., https://files.consumerfinance.gov/f/documents/cfpb_equifax-inc_complaint_2019-07.pdf.
\11\ The CFPB, FTC, and state Attorneys General imposed $700
million in relief and penalties against Equifax.
---------------------------------------------------------------------------
Before the Equifax matter, law enforcement actions related to
inadequate authentication triggered liability under the FTC Act's
prohibition on unfair practices. In 2006, the FTC sued online check
processor Qchex and related entities for violating the FTC Act. The FTC
alleged that it was an unfair practice to create and deliver checks
without verifying that the person requesting the check was authorized
to draw checks on the associated bank account.\12\ Qchex created checks
``even when the customer's name differed from the name on the bank
account listed on the checks or from the name on the credit card
account the customer used to pay for [Qchex's] services.'' \13\
---------------------------------------------------------------------------
\12\ See Complaint at 10, FTC v. Neovi, Inc., 598 F. Supp. 2d
1104 (S.D. Cal. 2008) (No. 06 Civ. 1952), aff'd, 604 F.3d 1150 (9th
Cir. 2010).
\13\ Id. at 5.
---------------------------------------------------------------------------
Even after setting up certain identity verification procedures,
Qchex bypassed those procedures for some customers.\14\ Ultimately, a
court observed, ``it was a simple matter for unscrupulous opportunists
to obtain identity information and draw checks from accounts that were
not their own.'' \15\ That court confirmed that Qchex injured consumers
by creating and delivering unverified checks, in violation of section 5
of the FTC Act.\16\ Implementation of common-sense practices--including
those that are now required under the FTC's Safeguards Rule--protects
consumers from injury and that, in turn, mitigates potential liability
for businesses.
---------------------------------------------------------------------------
\14\ Id. at 6.
\15\ Neovi, Inc., 604 F.3d at 1154.
\16\ Id. at 1157.
---------------------------------------------------------------------------
Liability for unfair acts or practices has also been triggered in
the context of password management and routine software updates. In
2012, the FTC sued multiple entities associated with the Wyndham
hospitality company for their failures ``to employ reasonable and
appropriate measures to protect personal information against
unauthorized access'' in violation of the FTC Act's prohibitions on
deceptive and unfair acts and practices.\17\ The inadequate data
security practices included ``using outdated operating systems that
could not receive security updates or patches to address known security
vulnerabilities,'' servers that used ``well-known default user IDs and
passwords . . . which were easily available to hackers through simple
internet searches,'' and password management policies that did not
require ``the use of complex passwords for access to the Wyndham-
branded hotels' property management systems and allow[ing] the use of
easily guessed passwords.'' \18\
---------------------------------------------------------------------------
\17\ First Amended Complaint at 19, FTC v. Wyndham Worldwide
Corp., 10 F. Supp. 3d 602 (D.N.J. 2014) (No. 13 Civ. 1887), aff'd,
799 F.3d 236 (3d Cir. 2015).
\18\ Id. at 11.
---------------------------------------------------------------------------
The FTC alleged that, due to these and other deficient security
measures, ``intruders were able to gain unauthorized access to
[Wyndham's] computer network . . . on three separate occasions'' and
retrieved ``customers' payment card account numbers, expiration dates,
and security codes.'' \19\ One such incident led to ``the compromise of
more than 500,000 payment card accounts, and the export of hundreds of
thousands of consumers' payment card account numbers to a domain
registered in Russia.'' \20\ When Wyndham argued that data security
issues were outside the bounds of the FTC's unfairness authority, the
courts confirmed that ``the FTC has authority to regulate cybersecurity
under the unfairness prong of'' section 5(a) of the FTC Act and that
regulated entities have adequate notice that cybersecurity issues could
lead to violations of that provision.\21\
---------------------------------------------------------------------------
\19\ Id. at 12-13.
\20\ Id. at 15.
\21\ Wyndham Worldwide Corp., 799 F.3d at 240.
---------------------------------------------------------------------------
In March 2022, the FTC announced an administrative complaint and
proposed consent orders against Residual Pumpkin Entity, LLC and
PlanetArt, LLC, respectively the former and current operators of
CafePress, a customized
[[Page 54348]]
merchandise e-commerce platform.\22\ The FTC's complaint documented
several inadequate data security practices, including the failure to
``implement patch management policies and procedures to ensure timely
remediation of critical security vulnerabilities,'' the failure to
``establish or enforce rules sufficient to make user credentials (such
as username and password) hard to guess,'' the failure to disclose
security incidents to relevant parties, and inadequate ``measures to
prevent account takeovers through password resets using data known to
have been obtained by hackers.'' \23\
---------------------------------------------------------------------------
\22\ CafePress, 87 FR 16187 (FTC Mar. 22, 2022) (analysis of
proposed consent orders to aid public comment).
\23\ Complaint at 4-5, In re Residual Pumpkin Entity, LLC and
PlanetArt, LLC, No. 1923209, (FTC June 23, 2022), https://www.ftc.gov/system/files/ftc_gov/pdf/1923209CafePressComplaint.pdf.
---------------------------------------------------------------------------
While the prohibition on unfair practices is fact-specific, the
experience of the agencies suggests that failure to implement common
data security practices will significantly increase the likelihood that
a firm may be violating the prohibition. In the examples below, the
Circular describes conduct that will typically meet the first two
elements of an unfairness claim (likely to cause substantial injury to
consumers that is not reasonably avoidable by consumers), and thus
increase the likelihood that an entity's conduct triggers liability
under the CFPA's prohibition of unfair practices.
1. Multi-Factor Authentication
Multi-factor authentication (MFA) is a security enhancement that
requires multiple credentials (factors) before an account can be
accessed.\24\ Factors fall into three categories: something you know,
like a password; something you have, like a token; and something you
are, like your fingerprint. A common MFA setup is supplying both a
password and a temporary numeric code in order to log in. Another MFA
factor is the use of hardware identification devices. MFA greatly
increases the level of difficulty for adversaries to compromise
enterprise user accounts, and thus gain access to sensitive customer
data. MFA solutions that protect against credential phishing, such as
those using the Web Authentication standard supported by web browsers,
are especially important.
---------------------------------------------------------------------------
\24\ Back to Basics: What's multi-factor authentication--and why
should I care?, National Institute of Standards and Technology,
https://www.nist.gov/blogs/cybersecurity-insights/back-basics-whats-multi-factor-authentication-and-why-should-i-care.
---------------------------------------------------------------------------
If a covered person or service provider does not require MFA for
its employees or offer multi-factor authentication as an option for
consumers accessing systems and accounts, or has not implemented a
reasonably secure equivalent, it is unlikely that the entity could
demonstrate that countervailing benefits to consumers or competition
outweigh the potential harms, thus triggering liability.\25\
---------------------------------------------------------------------------
\25\ For a more thorough discussion of MFA, please refer to
Cybersecurity & Infrastructure Security Agency's (CISA's) Multi-
Factor Authentication page, or the National Institute of Standards
and Technology's (NIST's) Digital Identity Guidelines. Multi-Factor
Authentication, CISA, https://www.cisa.gov/mfa; Digital Identity
Guidelines: Authentication and Lifecycle Management; Authenticator
Assurance Level 2, NIST, (June 2017), https://pages.nist.gov/800-63-3/sp800-63b.html.
---------------------------------------------------------------------------
2. Password Management
Unauthorized use of passwords is a common data security issue.
Username and password combinations can be sold on the dark web or
posted for free on the internet, which can be used to access not just
the accounts in question, but other accounts held by the consumer or
employee.
If a covered person or service provider does not have adequate
password management policies and practices, it is unlikely they would
succeed in showing countervailing benefits to consumers or competition
that outweigh the potential harms, thus triggering liability.\26\ This
includes failing to have processes in place to monitor for breaches at
other entities where employees may be re-using logins and passwords
(including notifying users when a password reset is required as a
result) and includes use of default enterprise logins or passwords.
---------------------------------------------------------------------------
\26\ Good Security Habits, CISA, (Feb. 1, 2021), Good Security
Habits [verbar] CISA.
---------------------------------------------------------------------------
3. Timely Software Updates
Software vendors regularly update software to address security
vulnerabilities within a program or product. When patches are released,
the public, including hackers, become aware of the prior
vulnerabilities. Therefore, when companies use commonly available
software, including open-source software and open-source libraries,\27\
and do not install a patch that has been released for that software or
take other mitigating steps if patching is not possible, they neglect
to fix a security vulnerability that has become widely known. As noted
in the CFPB's complaint against Equifax, Equifax's 2017 failure to
patch a known vulnerability resulted in hackers gaining access to
Equifax's systems that exposed the personal information of nearly 148
million consumers.\28\
---------------------------------------------------------------------------
\27\ FTC warns companies to remediate Log4j security
vulnerability (Jan. 4, 2022), https://www.ftc.gov/policy/advocacy-research/tech-at-ftc/2022/01/ftc-warns-companies-remediate-log4j-security-vulnerability. (``Log4j is a ubiquitous piece of software
used to record activities in a wide range of systems found in
consumer-facing products and services. Recently, a serious
vulnerability in the popular Java logging package, Log4j (CVE-2021-
44228) was disclosed, posing a severe risk to millions of consumer
products to enterprise software and web applications.'')
\28\ Complaint at 13, BCFP v. Equifax, Inc., https://files.consumerfinance.gov/f/documents/cfpb_equifax-inc_complaint_2019-07.pdf.
---------------------------------------------------------------------------
If covered persons or service providers do not routinely update
systems, software, and code (including those utilized by contractors)
or fail to update them when notified of a critical vulnerability, it is
unlikely they would succeed in showing countervailing benefits to
consumers or competition that outweigh the potential harms, thus
triggering liability. This includes not having asset inventories of
which systems contain dependencies on certain software to make sure
software is up to date and highlight needs for patches and updates. It
also includes the use of versions of software that are no longer
actively maintained by their vendors.
About Consumer Financial Protection Circulars
Consumer Financial Protection Circulars are issued to all parties
with authority to enforce Federal consumer financial law. The CFPB is
the principal Federal regulator responsible for administering Federal
consumer financial law, see 12 U.S.C. 5511, including the Consumer
Financial Protection Act's prohibition on unfair, deceptive, and
abusive acts or practices, 12 U.S.C. 5536(a)(1)(B), and 18 other
``enumerated consumer laws,'' 12 U.S.C. 5481(12). However, these laws
are also enforced by State attorneys general and State regulators, 12
U.S.C. 5552, and prudential regulators including the Federal Deposit
Insurance Corporation, the Office of the Comptroller of the Currency,
the Board of Governors of the Federal Reserve System, and the National
Credit Union Administration. See, e.g., 12 U.S.C. 5516(d), 5581(c)(2)
(exclusive enforcement authority for banks and credit unions with $10
billion or less in assets). Some Federal consumer financial laws are
also enforceable by other Federal agencies, including the Department of
Justice and the Federal Trade Commission, the Farm Credit
Administration, the Department of Transportation, and the Department of
Agriculture. In addition, some of these laws provide for private
enforcement.
Consumer Financial Protection Circulars are intended to promote
[[Page 54349]]
consistency in approach across the various enforcement agencies and
parties, pursuant to the CFPB's statutory objective to ensure Federal
consumer financial law is enforced consistently. 12 U.S.C. 5511(b)(4).
Consumer Financial Protection Circulars are also intended to
provide transparency to partner agencies regarding the CFPB's intended
approach when cooperating in enforcement actions. See, e.g., 12 U.S.C.
5552(b) (consultation with CFPB by State attorneys general and
regulators); 12 U.S.C. 5562(a) (joint investigatory work between CFPB
and other agencies).
Consumer Financial Protection Circulars are general statements of
policy under the Administrative Procedure Act. 5 U.S.C. 553(b). They
provide background information about applicable law, articulate
considerations relevant to the Bureau's exercise of its authorities,
and, in the interest of maintaining consistency, advise other parties
with authority to enforce Federal consumer financial law. They do not
restrict the Bureau's exercise of its authorities, impose any legal
requirements on external parties, or create or confer any rights on
external parties that could be enforceable in any administrative or
civil proceeding. The CFPB Director is instructing CFPB staff as
described herein, and the CFPB will then make final decisions on
individual matters based on an assessment of the factual record,
applicable law, and factors relevant to prosecutorial discretion.
Rohit Chopra,
Director, Consumer Financial Protection Bureau.
[FR Doc. 2022-19075 Filed 9-2-22; 8:45 am]
BILLING CODE 4810-AM-P