Skip to main content
Business Blog

Ashley Madison settles with FTC over data security

Date
If you care about data security and privacy, you’ll want to read about the FTC’s settlement with ruby Corporation, ruby Life Inc., and ADL Media Inc. – the companies that operate AshleyMadison.com...
Business Blog

The NIST Cybersecurity Framework and the FTC

Date
We often get the question, “If I comply with the NIST Cybersecurity Framework, am I complying with what the FTC requires?” From the perspective of the staff of the Federal Trade Commission, NIST’s...
Business Blog

What happens when the sun sets on a smart product?

Date
The Internet of Things refers to consumer products that connect to the Internet to send and receive data – everything from fitness devices, wearables, and smart cars to connected smoke detectors...
Business Blog

2015’s top-pick topics: A 10-tative list

Date
2015 saw the end of The Late Show with David Letterman, but his Top 10 List legacy lives on. From the home office in Washington, D.C., here is our informal take on ten topics we covered this year in...
Business Blog

Oracle Java SE case serves up a cuppa caution

Date
When consumers updated Java SE, which has been installed on more than 850 million computers, Oracle Corporation promised “safe and secure access to the world of amazing Java content” and stated that...
Business Blog

Order compliance: A behind-the-scenes look

Date
If the Commission is to attain the objectives Congress envisioned, it cannot be required to confine its road block to the narrow lane the transgressor has traveled; it must be allowed effectively to...
Business Blog

Third Circuit rules in FTC v. Wyndham case

Date
FTC watchers and data security mavens, it’s the decision you’ve been waiting for. The United States Court of Appeals for the Third Circuit has issued a ruling in the Commission’s favor in FTC v...
Business Blog

Checking up on consumer generated health information

Date
Whether it’s a website where people diagnosed with the same medical condition can share their stories or an app to find out how long it will take in the gym to burn off a Macadamia Mania Ripple sundae...
Business Blog

When a data oops becomes an uh-oh

Date
We’ve said it before, but it bears repeating: Glitch Happens. In the case of Accretive Health, Inc., it was a laptop taken from the passenger compartment of an employee’s car. What transformed this...
Business Blog

You’re on Candid Camera

Date
In the words of the old TV show, “Smile. You’re on Candid Camera.” But according to an FTC lawsuit alleging lax security by a company selling internet cameras, for the hundreds of consumers whose...
Business Blog

Bank data security (but not that kind of bank)

Date
You spend a good portion of your time trying to protect sensitive information on your network from high-tech hijackers. That’s important, of course. But don’t let it take your eye off the risks posed...
Business Blog

Down in the dumps(ter)

Date
Every business generates paper destined for the circular file. But if documents contain sensitive information, don’t toss them out in a way that could invite unauthorized access. According to the FTC...
Business Blog

Trash Talking

Date
Some things you’d expect to find in a trash can: last night’s potato peelings, the casserole that looked so promising in the cookbook photo, and Oscar the Grouch. But if you run a business, the one...