Tag: Privacy and Security

Displaying 1 - 20 of 1256 results.

Pages

Delivery by drone? We thought the Jetsons’ personal jetpack was the height of futuristic fantasy, but drone technology is bringing benefits like that closer to reality. But what about the consumer protection implications, especially when it comes to privacy? That’s on the agenda at...
The Federal Trade Commission announced the agenda for its Oct. 13 event examining how the growing use of unmanned aerial drones may impact consumer privacy. With businesses using drones for everything from product deliveries to photography, the event will look at the potential risks and benefits...
Researchers report that 72% of American adults now own a smartphone and when they’re on their phones, 89% of their time is spent on apps. An analysis of how app developers generate revenue raises some interesting issues that touch on consumer privacy.
One pundit has called it the most pervasive industry that nobody knows about, which is why the FTC has sponsored a workshop, brought law enforcement actions, and just published a Staff Perspective to call attention to the consumer protection implications.
The Staff Perspective recounts important themes arising out of the discussion by panelists at the full-day workshop. It discusses the mechanics of lead generation and how it functions in the modern economy. The paper describes who collects leads and how they are used – in particular...
The Federal Trade Commission’s workshop “Putting Disclosures to the Test” is taking place tomorrow, Sept. 15, 2016, in Washington. The workshop will feature research on the effectiveness of disclosures made to consumers in a variety of areas from advertising to privacy policies. FTC Chairwoman...
As the old saying goes, “The job’s not finished until the paperwork is done.” But since the enactment of the FTC’s Disposal Rule, the job’s not finished until the paperwork – in this case, consumer reports or information derived from them – is securely destroyed.
Ransom notes used to come in the form of pasted letters clipped from newspapers. Now datanappers gain entry through a weak spot in a company’s network, lock the business out of its own system, and hold files – including sensitive health or financial information – for ransom. Would...
A new blog post from the Federal Trade Commission provides guidance to businesses on how the cybersecurity framework created by the National Institute for Standards and Technology (NIST) aligns with the FTC’s data security program.

Pages