That was the catchphrase from the “Poltergeist” movie series, but we want to warn you about something more dangerous than ghostly apparitions emanating from your TV.
Blog Posts Tagged with Privacy and Security
When the talk turns to Big Data, part of the conversation is about all the public information available about people's lives – and how companies market it to prospective employers, landlords, etc.
It was Shakespeare who asked “What’s in a name?” If you and your clients keep tabs on the latest legal developments in social networking and reputation management, you’ll want to read the FTC’s complaint against the website Jerk.com – how’s that for a name?
Every tech publication seems to have a list of best apps for business. Whether the goal is to analyze corporate cash flow or avoid the dreaded middle seat that doesn’t recline, there’s an app for the task. But have you considered the kind of sensitive customer or employee information some apps let you transmit? Developers may claim to take steps to secure the data, but as the FTC’s proposed settlements with Fandango and Credit Karma demonstrate,
Imagine a burly doorman at an exclusive party. When someone claims to be a guest, the doorman checks their invitation and runs it against the names on the list. If it doesn’t match up, the person won’t make it through the velvet rope. But what happens if the doorman isn’t doing his job? His lapse could allow a ringer into the party to scarf up the hors d’oeuvres and steal the valuables.
Most consumers know that creditors use information about them and their credit experiences – like the number and type of accounts they have, their bill paying history, and whether they pay their bills on time – to create a credit score, which helps predict how creditworthy they are.
When someone mentions the FTC, the EEOC, and the FCRA in the same sentence, it may sound like a ladle of alphabet soup. What’s really being served up is a new joint publication by the Federal Trade Commission and the Equal Employment Opportunity Commission that talks about how the Fair Credit Reporting Act and the mandate to comply with anti-discrimination laws intersect when employers use background checks in personnel decisions.
In old movies, ransom notes came in the form of pasted letters cut from newspapers. There’s a new kind of ransom that could pose a substantial risk to your business. Have you alerted your staff about how to protect one of your company’s most valuable assets?
Familiar with Fantage? If you have kids, they probably are. It’s a MMORPG – a massively multiplayer online role-playing game – where millions of children customize avatars to play online games in a virtual world. According to the FTC, there are a few more initials this MMORPG will want to be mindful of in the future: the U.S.-EU Safe Harbor Framework.
Consumers may not know it, but there are technologies out there that let retailers and others track their movements within and around stores and other attractions through their mobile devices. Businesses can use the information to identify trends in consumer behavior, plan sales and promotions, and more efficiently staff their stores and structure check-out (although no matter how sophisticated the technology, we always manage to choose the slow-moving line).
Imagine doing a routine online search and having the search engine serve up files that include medical histories, notes from psychiatric sessions and children’s medical exams, sensitive information about drug abuse or pregnancy loss, and personal data like Social Security and driver’s license numbers. That suggests a breach that “uh-oh” doesn’t begin to cover. The FTC’s lawsuit against GMR Transcription Services –
Today is Data Security Day. You've educated your staff about limiting access to sensitive information, locking up confidential paperwork, and securing the network. But Latanya Sweeney, the FTC’s new Chief Technologist, just clued us in about a potential security vulnerability you, your HR team, and your web master can do something right now to correct.
Business may seem borderless these days, but it’s important that companies honor applicable legal principles. That’s especially true when it comes to privacy. The good news for U.S.
Whooping it up can be fun, but hooping it up – requiring consumers to jump through hoops to exercise their rights under the Fair Credit Report Act – is illegal. That’s one message businesses can take from the FTC’s $3.5 million settlement with TeleCheck.
They’re incredibly valuable. In the wrong hands, they can be dangerous. And they’re in your workplace right now. What are they? Your employees’ Social Security numbers. Are you taking commonsense steps to thwart tax identity theft at your business?
Back in the day, consumers looking for a personalized product had to settle for a monogrammed hanky. GeneLink, Inc.
We’ve said it before, but it bears repeating: Glitch Happens. In the case of Accretive Health, Inc., it was a laptop taken from the passenger compartment of an employee’s car. What transformed this oops into a full-fledged uh-oh was that the laptop contained files with 20 million pieces of data about 23,000 patients, including sensitive health information. And according to the FTC’s lawsuit, the employee in question didn’t need all that
We got an interesting suggestion recently. “With how fast technology changes, how about building in a process so companies can see if newer methods meet the requirements of existing rules?” A related recommendation: Crowdsourcing. “The FTC could publicize an idea and get feedback from people.” We’re fans of innovation, too, which is why the Children’s Online Privacy Protection Rule includes a procedure for companies to ask if methods of getting parental consent not listed in COPPA nonetheless meet the Rule’s standards. As for crowdsourcing, we call it a notice and request for public c
No one is sliding across the living room floor in shades lip synching to Bob Seger, but violating the FTC’s Risk-Based Pricing Rule is risky business nonetheless. That’s the message of the FTC’s $1.9 million settlement with telecom company Time Warner Cable, Inc., the first case brought under the Risk-Based Pricing Rule.
Goldenshores Technologies’ “Brightest Flashlight Free” is an incredibly popular Android app downloaded by tens of millions of consumers. But did those people know that when they used the app, it would transmit their precise location and unique device identifier to third parties, including ad networks? According to a lawsuit filed by the FTC, Goldenshores didn’t give people the straight story about how their information would be used and then compounded the problem by making them think they could exercise a choice about it – a “cho