Tag: Privacy and Security

Displaying 41 - 60 of 1557 results.

Pages

Ask a business person where their office is located and the likely answer is “everywhere.” They’re working from home, staying in the loop while traveling, and catching up on email between sales calls. For productivity’s sake, many companies give their employees – and perhaps clients...
If you or your clients are in the tax preparation field, there are three letters you should focus on. OK, I-R-S may be the first thing on your mind. But as the FTC’s proposed settlement with TaxSlayer suggests, don’t forget those other important letters: G-L-B.
The operator of a Georgia-based online tax preparation service has agreed to settle Federal Trade Commission allegations that it violated federal rules on financial privacy and security.
Who’s coming in and what’s going out? Businesses that want to stick with security build commonsense monitoring into their brick-and-mortar operations. Whether it’s a key card reader at the door or a burglar alarm activated at night, careful companies keep an eye on entrances and exits...
Tax professionals are prime targets for identity thieves. Why? Your clients’ information — bank and investment accounts, Social Security numbers, medical records, and more — can be a virtual goldmine in the wrong hands. That’s why securing it against a data breach is critical to...
How much information does Uber have about its riders and drivers? A lot. The FTC just announced a settlement addressing charges that the company falsely claimed to closely monitor internal access to consumers’ personal information on an ongoing basis. The FTC also alleges that Uber...
Note: A conference call for media with FTC Acting Chairman Maureen K. Ohlhausen and Consumer Protection Acting Director Tom Pahl will occur as follows:Date: August 15, 2017Time: 11 a.m. ETCall-in: 800-288-8960; confirmation number 428703Call-in lines, which are for media only, will open 15 minutes...
To make it harder for hackers to bluff their way onto a computer network, careful companies follow the advice of Start with Security and require strong authentication practices.
The Federal Trade Commission has approved TRUSTe’s proposed modifications to its safe harbor program under the Children’s Online Privacy Protection Rule.
When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles apply across the board: Don’t collect sensitive information you don’t need. Protect the information you maintain. And train...
Internet of Things entrepreneurs are developing products to help keep households running smoothly. But like anyone else you invite into your home, it’s important that IoT devices – appliances, fitness monitors, home security systems, etc. – behave like good houseguests. Out-of-date...
The Federal Trade Commission announced that a mobile app developed by a New Hampshire software developer was awarded the top prize in the agency’s competition seeking tools to help consumers protect the security of their Internet of Things (IoT) devices.The FTC launched the contest in January to...
As part of its ongoing efforts to help businesses ensure they are taking reasonable steps to protect and secure consumer data, the Federal Trade Commission is publishing a series of blog posts using hypothetical examples based on lessons from closed investigations, FTC law enforcement actions, and...
Legend has it that King Arthur gathered his knights at a round table. Because the table had no head, it signaled that everyone seated at it was respected, and their contributions were welcome. At the FTC, we love the concept of a round table. It's a way to bring together stakeholders...

Pages