The FTC’s ability to obtain information through subpoenas and civil investigative demands (CIDs) is critical to the task of investigating potential law violations. The FTC uses this authority deliberately and responsibly, avoiding unnecessary burdens on businesses and individuals and consistent with our obligations to enforce the law.
When it comes to getting the working capital your company needs, you’re strictly business. Yes, you confer with traditional financial institutions, but like many small businesses, you also may look into online loans and other newer options. Financing for smaller enterprises is the topic of an upcoming FTC workshop. Mark May 8, 2019, on your calendar for Strictly Business: An FTC Forum on Small Business Financing.
When it came to designing the FTC’s Cybersecurity for Small Business campaign, you called the shots. We hosted round tables across the country and listened to what business owners had to say. You told us you wanted: 1) No-nonsense advice that’s easy to implement; and 2) Consistent guidance from the different federal agencies that deal with cyber threats and data security.
Every year, millions of consumers tell us – and our partners – about the frauds they spotted. In 2018, we heard from 3 million people and learned a lot from the reports entered into our Consumer Sentinel database. Here are some notable facts from the Consumer Sentinel Network’s 2018 Data Book – including that a new category of scams has earned the unenviable right to chant "We’re #1."
We’ll confess to singing along to a Stevie Nicks song or doing an air guitar solo when no one’s looking. But some people take their lip syncing to the next level. More than 200 million people – 65 million of them in the U.S. – downloaded the Musical.ly app. It gave users a platform to create videos and synchronize them with popular songs. It also allowed users to interact directly with each other. That may sound like fun for aficionados, but it raises concerns for parents, especially given public reports that adults have used the Musical.ly app to contact children.
In explaining FTC cases, we try to give readers a behind-the-scenes perspective and sometimes the most accurate insights are out of the mouths of corporate insiders. In the FTC’s first case challenging fabricated reviews on an independent retail site, consider an email from the CEO of Brooklyn-based Cure Encapsulations about a weight loss pill it was selling.
For people looking for highly-paid executive positions with private equity or venture capital firms, Worldwide Executive Job Search Solutions and PrivateEquityHeadhunters.com claimed to offer the inside track to the suite life.
Punching a time clock in and out isn’t how small businesses run these days. Employees are on the road, others are working from home, vendors are accessing your data at off hours – and you’re generating ideas 24/7. How do you maintain high security standards when employees and others may need to connect to your network remotely from a variety of devices? When we met with small business owners across the country, that question came up a lot.
A recent ruling by a Florida Bankruptcy Judge sheds light on a tenacious team within the FTC’s Bureau of Consumer Protection. But first, let’s set the time machine to 2008 when the FTC entered into a settlement with BlueHippo, a computer financing company that pitched electronics to consumers with “less than perfect credit, bad credit, no credit.”
Your website is the online face of your business. Some companies have the in-house capability to manage their web presence. Others hire a web host to handle it for them. When launching a new business or upgrading their site, savvy business owners comparison shop for web hosting services. At the top of your shopping list should be the security features built into what you’re buying.
The name of the case is FTC v. Fat Giraffe Marketing Group, but the lawsuit has nothing to do with obesity, giraffes, or obese giraffes. OK, perhaps there are some similarities in the sense that the defendants made oversized claims, told tales as tall as tree-topping ungulates, and used protective coloration – in this case, bogus endorsements – to camouflage what they were up to.
Just in time for Valentine’s Day, the FTC staff released a Data Spotlight highlighting the category of scam with the highest amount of reported financial loss among complaint categories the FTC uses to track fraud. The category may surprise, but here’s a hint. In the words of Bon Jovi, these con artists “give love a bad name.”
Alzheimer’s disease poses what experts agree is a looming public health crisis. But it also exacts an incalculable personal toll on people living with the condition and the family and friends who love them. The FTC and the Food and Drug Administration just sent warning letters to three companies advertising that their products can treat diseases like Alzheimer’s. It’s a development that merits industry attention.
As a business person, you know about phishing, of course. At first glance, the email looks like it comes from a recognized company, complete with a familiar logo, slogan, and URL. But it’s really from a cyber crook trying to con consumers out of account numbers, passwords, or cash. In addition to the serious injury these scams inflict on consumers, there’s another victim of phishing: the reputable business whose good name was stolen by the scammer.
Some forms of masquerading are just good clean fun. Consider The Masked Singer, a surprise TV hit in which a panel of celebrities tries to guess the identity of other celebrities who sing karaoke while wearing elaborate disguises. (We’re not making that up. It’s a thing now.) But other forms of masquerading are based in deception, as the FTC alleges in a lawsuit against Global Asset Financial Services Group, LLC, and 15 Buffalo- and Charlotte-based defendants.
Steely Dan may be one of the best duos of the rock era. (Sorry, Donnie and Marie fans.) Their song “Hey Nineteen” reminds us to mention some FTC consumer protection developments that could be of interest to your company or clients in 2019. As “Any Major Dude Will Tell You,” when you’re “Reelin’ in the Years” – or at least recapping the past one – consider this non-exhaustive and in-no-particular-order case compilation.
Not many small businesses do business these days without the services of third-party vendors, some of whom have access to your company’s sensitive information. Even if you run a tight cybersecurity ship, what happens if your accountant loses a laptop or the payroll company that connects to your network experiences a security breach? Your business could be in jeopardy, of course, but that’s not all.
An employee gets a phone call, pop-up, or email warning about a problem with the office computer. In an effort to be helpful – or perhaps concerned they clicked on something that caused the glitch – the employee follows instructions to send money, turn over personal information, or provide access to your system. As a small business owner, you know it’s a tech support scam, but are you sure every member of your team has the savvy to spot it?
It’s Day 2 of the data security discussion, presented as part of the FTC Hearings on Competition and Consumer Protection in the 21st Century – and you can watch the webcast live.