Warning for Businesses: Wegmans $400,000 NYAG Settlement Shows Poor Cybersecurity Hygiene Without Data Misuse or Theft Could Draw Regulatory Action

Aug 10, 2022

Reading Time : 5 min

Although there was no evidence that any bad actor misused or accessed Wegmans’ customer data, the NYAG still pursued enforcement.  The NYAG enforcement stands in contrast to private federal class action enforcement, which requires concrete harm to consumers to convey standing—particularly in light of the Supreme Court’s ruling in TransUnion LLC v. Ramirez, discussed in further detail here. The NYAG focused on language in Wegmans’ privacy policy that assured customers that their data privacy was a “top priority” for Wegmans, which the NYAG found deceptive under New York’s consumer protection law. 

The Cloud Breach

On April 13, 2021, a “security researcher” informed Wegmans that one of the company’s cloud storage containers hosted on Microsoft Azure was “unsecured and open to public access,” potentially exposing sensitive customer information.1 An investigation by Wegmans revealed that the container had been publicly accessible since its January 2018 creation, and contained over 3 million records of customer email addresses and account passwords.2

On May 12, 2021, Wegmans uncovered a second misconfigured container, likewise vulnerable since its creation in November 2018. This second container housed customer names, email addresses, mailing addresses, as well as checksum values derived from drivers’ license numbers.3 On June 16, 2021, Wegmans began notifying affected customers.

NYAG Identifies Wegmans’ Cloud Vulnerabilities

The NYAG alleged that Wegmans failed its duty to protect customer personal information in the cloud due to deficiencies in five areas:

1. Access Controls – Microsoft Azure cloud containers were not properly configured to limit access at the outset.4

2. Password Management – the company did not properly secure user passwords, choosing to hash them using the outdated SHA-1 hashing algorithm.5 Even though Wegmans had begun transitioning to the more secure PBKDF2 hashing algorithm in 2016, it continued to store passwords with SHA-1.6

3. Asset Management and Security Assessment – Wegmans did not maintain an inventory of the cloud assets containing personal information, nor did it conduct security assessments of cloud databases.7

4. Logging and Monitoring – Wegmans did not maintain long-term logs of its cloud assets in Microsoft Azure, opting to only maintain logs for 30 days. Wegmans also declined to run security tests of cloud assets.8

5. Data Collection and Retention – According to the NYAG, some of the compromised information included checksums derived from customer drivers’ license numbers, despite Wegmans not having a “reasonable business purpose” for indefinitely retaining such information.9 This constituted an unjustifiable retention of unnecessary personal information.10

The NYAG also pointed out that Wegmans’ online privacy policy claimed to make securing customer personal information a “top priority” with “administrative, technical and physical safeguards in place” to protect information.11 The NYAG found that in light of this privacy policy language, Wegmans’ actions were deceptive and unlawful under New York consumer protection law, while its data security practices violated the state’s data security law – the New York SHIELD Act.12

Prescribed Data Security Measures

Without admitting or denying fault, Wegmans has agreed to pay a $400,000 fine and will implement the following cybersecurity measures:

  • Build and maintain a complete information security program tailored for the nature and scope of operations, and sensitivity of the information. This program must be reviewed annually, with a qualified individual appointed to take responsibility, and employee training provided.13
  • Maintain appropriate asset management practices, including both manual and automated tools to inventory assets in the cloud. This inventory must include the asset name, version, owner and location on the network, along with a criticality rating, any patches or updates, and whether it collects, processes or stores personal information.14
  • Establish access control policies and procedures for all cloud assets containing personal information.
  • Develop a penetration testing program to identify, assess and remediate vulnerabilities in cloud assets, with one comprehensive test of the company’s cloud environment conducted annually.15
  • Establish a centralized system to log and monitor cloud asset activity that includes collection and aggregation of logging for cloud assets, and security monitoring for suspicious activity. Logs must be accessible for a minimum of 90 days and stored for at least one year after logging.16
  • Implement password policies and procedures for customer accounts that includes safeguards for unauthorized access and conforms to standards from the National Institute of Standards and Technology (NIST). Within 18 months, implement a program to both inform customers of the benefits of multifactor authentication for accounts, and allow customers to opt in to multifactor authentication.17
  • Maintain a program to allow third parties (such as security researchers) to disclose vulnerabilities. This program should be made available on the company website.
  • Build policies and procedures for management and authentication of customer accounts, including methods for security challenges and re-authentication for when customers change their account information.18
  • Reform data collection and retention practices, restricting collection of customer personal information to cases where there is a reasonable business purpose for collection, and deleting personal information when there is no reasonable business purpose for retaining the information.19

Following up on these measures, Wegmans agreed to have its new information security program undergo a third party assessment and provide the written report to the NYAG, with subsequent annual reviews for three years.

Takeaways

Although a $400,000 fine for a misconfiguration may seem draconian, the Wegmans settlement demonstrates that the NYAG has very specific expectations pursuant to the New York SHIELD Act.  This action demonstrates two important points: (1) that companies must build their cybersecurity with not only their network assets in mind, but also assets in the cloud, and (2) the NYAG expects to see specific components representing reasonable security in an information security program, and is willing prescribe them as part of enforcement with or without a showing of concrete harm to consumers. Companies should assess compliance with very specific expectations surrounding access controls, password management, asset management, security assessments for network and cloud assets, log retention and monitoring, and data collection, mapping, and retention.  Before deciding on security measures to protect their information however, companies should first begin data mapping to identify the locations where they are storing that information, and ensure that their privacy policies do not overstate their cybersecurity measures.

Please contact a member of Akin Gump’s cybersecurity, privacy and data protection team if you have any questions about this decision or its impact on your company.


1 Investigation by Letitia James, Attorney General of the State of New York of Wegmans Food Markets, Inc., In the Matter of, Assurance No. 21-075 (June 21, 2022), hereinafter “Settlement,” available at https://ag.ny.gov/sites/default/files/ny_ag_wegmans_aod_6-2022_-_fully_executed.pdf.

2 Id. at 2.

3 Id., “checksum values” are created to represent the number of bits in a transmission message, used to check files for integrity.

4 Settlement at 3.

5 A “hashing algorithm” is a mathematical function that scrambles data to make it unreadable.

6 Id. at 3.

7 Id.

8 Id.

9 Id. at 4.

10 See General Business Law § 899-bb, also known as the New York SHIELD Act.

11 Settlement at 4.

12 Id. at 5, See Executive Law § 63(12), General Business Law §§ 349 and 899-bb.

13 Id. at 6.

14 Id. at 7, a “criticality rating” is used to determine how often equipment should be inspected or maintained.

15 Id. at 8.

16 Id.

17 Id. at 9.

18 Id.

19 Id.

Share This Insight

Previous Entries

Data Dive

March 3, 2025

On January 16, 2025, the Federal Trade Commission (FTC) issued a Final Rule updating the Children’s Online Privacy Protection (COPPA) Rule, significantly expanding compliance obligations for online services that collect, use, or disclose personal information from children under 13.1 The amendments impose new restrictions on targeted advertising, add data security requirements, refine parental consent mechanisms, and introduce additional compliance measures.

...

Read More

Data Dive

February 21, 2025

On January 8, 2025, the DOJ published a final rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

January 22, 2025

On January 17, 2025, days before the inauguration, former President Joe Biden issued an executive order titled Strengthening and Promoting Innovation in the Nation's Cybersecurity (EO 14144). Building on previous efforts, including Executive Order 14028, this directive seeks to bolster cybersecurity across federal systems, supply chains and critical infrastructure from adversarial nations, particularly from the People’s Republic of China (PRC).

...

Read More

Data Dive

January 10, 2025

UPDATE: The California Privacy Protection Agency (CPPA) has extended the deadline for submitting public comments from January 14 to February 19, 2025, in response to the recent California wildfires. This extension aims to afford stakeholders additional time to provide comprehensive and detailed feedback, considering the significant challenges posed by the wildfires.

...

Read More

Data Dive

November 25, 2024

Treasury has issued a Final Rule to implement President Biden’s 2023 EO targeting U.S. investments in Chinese companies engaged in certain activities related to semiconductors, quantum computing or AI.

...

Read More

Data Dive

November 19, 2024

The European Union’s AI Office published the inaugural General-Purpose AI Code of Practice on November 14, 2024. The Code is intended to assist providers of AI models in their preparations for compliance with the forthcoming EU AI Act, to be enforced from August 2, 2025. The Code is designed to be both forward-thinking and globally applicable, addressing the areas of transparency, risk evaluation, technical safeguards and governance. While adherence to the Code is not mandatory, it is anticipated to serve as a means of demonstrating compliance with the obligations under the EU AI Act. Following a consultation period that garnered approximately 430 responses, the AI Office will be empowered to apply these rules, with penalties for nonconformity potentially reaching 3% of worldwide turnover or €15 million. Three additional iterations of the Code are anticipated to be produced within the coming five months.

...

Read More

Data Dive

November 15, 2024

On October 29, 2024, the DOJ issued a proposed rule prohibiting and restricting certain transactions that could allow persons from countries of concern, such as China, access to bulk sensitive personal data of U.S. citizens or to U.S. government-related data (regardless of volume).

...

Read More

Data Dive

October 17, 2024

During the course of any lending transaction, lenders will conduct a due diligence review of the borrower, including reviewing any relevant “know-your-customer” information.

...

Read More

© 2025 Akin Gump Strauss Hauer & Feld LLP. All rights reserved. Attorney advertising. This document is distributed for informational use only; it does not constitute legal advice and should not be used as such. Prior results do not guarantee a similar outcome. Akin is the practicing name of Akin Gump LLP, a New York limited liability partnership authorized and regulated by the Solicitors Regulation Authority under number 267321. A list of the partners is available for inspection at Eighth Floor, Ten Bishops Square, London E1 6EG. For more information about Akin Gump LLP, Akin Gump Strauss Hauer & Feld LLP and other associated entities under which the Akin Gump network operates worldwide, please see our Legal Notices page.