Skip to main content
Business Blog

2015’s top-pick topics: A 10-tative list

Date
2015 saw the end of The Late Show with David Letterman, but his Top 10 List legacy lives on. From the home office in Washington, D.C., here is our informal take on ten topics we covered this year in...
Business Blog

Oracle Java SE case serves up a cuppa caution

Date
When consumers updated Java SE, which has been installed on more than 850 million computers, Oracle Corporation promised “safe and secure access to the world of amazing Java content” and stated that...
Business Blog

Order compliance: A behind-the-scenes look

Date
If the Commission is to attain the objectives Congress envisioned, it cannot be required to confine its road block to the narrow lane the transgressor has traveled; it must be allowed effectively to...
Business Blog

Third Circuit rules in FTC v. Wyndham case

Date
FTC watchers and data security mavens, it’s the decision you’ve been waiting for . The United States Court of Appeals for the Third Circuit has issued a ruling in the Commission’s favor in FTC v...
Business Blog

Checking up on consumer generated health information

Date
Whether it’s a website where people diagnosed with the same medical condition can share their stories or an app to find out how long it will take in the gym to burn off a Macadamia Mania Ripple sundae...
Business Blog

When a data oops becomes an uh-oh

Date
We’ve said it before, but it bears repeating: Glitch Happens. In the case of Accretive Health, Inc., it was a laptop taken from the passenger compartment of an employee’s car. What transformed this...
Business Blog

You’re on Candid Camera

Date
In the words of the old TV show, “Smile. You’re on Candid Camera.” But according to an FTC lawsuit alleging lax security by a company selling internet cameras, for the hundreds of consumers whose...
Business Blog

Bank data security (but not that kind of bank)

Date
You spend a good portion of your time trying to protect sensitive information on your network from high-tech hijackers. That’s important, of course. But don’t let it take your eye off the risks posed...
Business Blog

Down in the dumps(ter)

Date
Every business generates paper destined for the circular file. But if documents contain sensitive information, don’t toss them out in a way that could invite unauthorized access. According to the FTC...
Business Blog

Trash Talking

Date
Some things you’d expect to find in a trash can: last night’s potato peelings, the casserole that looked so promising in the cookbook photo, and Oscar the Grouch. But if you run a business, the one...
Business Blog

Private eyes: Lessons from the rent-to-own webcam cases

Date
The charges outlined in the FTC’s lawsuits against a software business and seven rent-to-own companies are surprising — and OK, some might say a little creepy. Software on rented computers gave the...
Business Blog

In praise of Toby Flenderson

Date
HR could use better PR. Say "human resources" and some people think of Dunder Mifflin’s joy-deficient Toby Flenderson from "The Office." But you know better and appreciate the job your HR team does to...
Business Blog

Data security & COPPA: RockYou like a hurricane

Date
Are there hotter topics these days than data security and kids’ privacy? An FTC law enforcement settlement with the social networking site RockYou ticks both of those topical boxes and challenges a...