It’s one of those “All I Really Need to Know I Learned in Kindergarten” principles: Don’t use someone’s stuff without their permission. Back then, the rule applied to crayons and cupcakes. A case announced by the FTC and New Jersey AG against the marketers of a free mobile app called Prized proves that it applies to smartphones, too. And you’re not going to believe what the defendants were using people’s phones to do.
The online ads offer consumers a “risk-free trial” of skincare products from companies that claim to be accredited by the Better Business Bureau with an A- rating. How could that possibly be deceptive or unfair? Let us count the ways.
Beef on weck, frozen custard – and one of the largest debt collection industries in the U.S. Those are some of the things Buffalo is known for. That’s why the FTC kicked off its continuing Debt Collection Dialogue in Buffalo on June 15, 2015.
A natural disaster can wreak havoc on any business. But it’s even worse when that real-world catastrophe becomes a data security calamity.
Before the summer storm season arrives, get your business ready. Just like you gather flashlights, bottled water, and emergency supplies, you can prepare your business by reviewing data retention and disposal practices.
Thinking about crowdfunding to raise money for your latest project? If so, you’ll want to pay attention to the FTC’s first crowdfunding case. The lesson: If you launch a crowdfunding campaign, keep your promises.
The Buyers Guide on a used car can’t confirm whether the original owner was that little old lady who just drove to church, but it offers other important information about the scope of any warranty the car comes with. The FTC’s Used Car Rule requires dealers to display the Buyers Guide on used vehicles offered for sale.
Look at those lists of the most admired companies in America and what do you notice about them? Great products, for sure. But many also enjoy stellar reputations for service after the sale. When a buyer is confident you’ll stand by your product, you’ve probably created a customer for life. One measure of that is how you honor your obligations under the Magnuson-Moss Warranty Act.
Homeopathy has been around for centuries. But what was once a niche product formulated for an individual user has grown into a multibillion-dollar over-the-counter marketplace. Just what is homeopathy? How are homeopathic products advertised? And how does the FTC Act apply to ad claims? Those are a few of the topics on the table at Homeopathic Medicine & Advertising: An FTC Workshop, scheduled for September 21, 2015.
After the FTC revised its Endorsement Guides in 2009, we followed up with What People are Asking, an informal staff publication to answer questions that were on advertisers’ minds. More than five years have passed – a lifetime in blog years – but the legal principles remain the same. What has changed are the kinds of questions we’re getting.
It’s graduation season. How’s this for a truthful take on the usual oratory?
Esteemed guests and distinguished graduates, despite what we said in our ads, many of you just got a degree or diploma that won’t qualify you to get the licenses you need to land a job in your field. And don’t count on your credits transferring to four-year colleges. But thanks for the thousands of dollars you paid out of your own pocket!
It’s a text that would make most people take notice: ALERT ALERT ALERT .. YOUR PAYMENT WAS DECLINED DUE TO AN INSUFFICIENT ACH TRANSACTION…CALL 866.597.3075. But it wasn’t really an alert. There wasn’t a declined payment. And an “insufficient ACH transaction” isn’t even a real thing.
It was a deceptive text message sent by debt collectors to illegally lure purported debtors into contacting them.
It’s a question we’re asked a lot. “What happens if I’m the target of an FTC investigation involving data security?” We understand – no one wants to get that call. But we hope we can shed some light on what a company can expect.
First things first. All of our investigations are nonpublic. That means we can’t disclose whether anyone is the subject of an investigation. The sources of a data security investigation can be news reports, complaints from consumers or other companies, requests from Congress or other government agencies, or our own initiative.
Caribbean cruises, jet ski outings, trips to Disneyworld, tickets to sporting events and concerts, and even dating service subscriptions. You’d expect to see that on reruns of “Lifestyles of the Rich and Famous.” What you wouldn’t expect is that they were paid for by donations people made to cancer charities.
A royal flush? More like a royal pain for consumers who trusted claims that moist flushable wipes manufactured by trade supplier Nice-Pak were safe for home plumbing systems. According to an FTC complaint, the wipes were made of a non-woven fabric that didn’t break down as quickly and easily as advertised, rendering that “flushable” claim a pipe dream – or maybe a pipe nightmare if your sewer or septic system got clogged as a result.
In the immortal words of renowned legal scholar Yogi Berra, it’s “déjà vu all over again.” A national company is in bankruptcy court and an issue has arisen regarding the possible sale of consumers’ personal information, at least some of which was collected with the express promise, “We will not sell or rent your personally identifiable information to anyone at any time.”
Maybe it’s a suspicious tax document flagged by your HR staff or a customer concern about an unauthorized charge. Identity theft can reveal itself in many ways. Regardless of the tip-off, there’s a new one-stop federal resource – IdentityTheft.gov – to help people report and recover from ID theft.
Everyone harbors a dark secret – a forbidden mystery concealed behind closed doors. Three cases just filed by the FTC pull back the curtain on one of those taboos:
The efforts people make to hide the fact they’re going gray.
In her blog, a registered nurse offered candid opinions about a broad range of topics, including parenthood, men with comb-overs, and the challenges of menopausal weight gain. There wasn’t much she could do about the comb-over issue, but she claimed to have found a solution to those extra pounds: a dietary supplement called Amberen.
According to the proverbs of Solomon, “Plans fail for lack of counsel, but with many advisers they succeed.” Of course, there’s no one-size-fits-all plan to guarantee the security of personal information in your company’s possession. But one effective strategy is to consider what experts at different agencies and organizations are saying. They offer a variety of tips and techniques, but the foundational principles of sound security remain the same.
In the annals of undercover operatives, their work may not be the most glamorous. But the intelligence they glean plays a central role in protecting consumers.