It’s a challenging trade-off. Consumer information is often at the heart of technological innovation and the benefits can be substantial. But what about the injury people may experience when information about them is misused? Informational injury is the topic under discussion at an FTC workshop on Tuesday, December 12, 2017, in Washington, DC.
Blog Posts Tagged with Privacy and Security
Today’s the day for the FTC-Department of Education workshop on Student Privacy & Ed Tech. As attendees in Washington, DC, settle in before the bell rings, get ready to watch the event from your desk. A few minutes before the 9:00 ET starting time, we’ll post the webcast link from the event page. That’s where you’ll find the full agenda, speaker bios, and public comments.
For college students building their resumes, that camp counselor gig is nice – but what about participating in a session at an international conference of privacy and data security experts?
You’re a tax professional and you’ve just learned that your business experienced a data breach. Whether hackers took client information from your server, an insider stole client information, or the information was exposed inadvertently, you’re probably wondering what to do next.
You’ve read recent news stories about a vulnerability discovered in the WPA2 encryption standard. (Some reports refer to it as KRACK – Key Reinstallation Attack.) Should this be of concern to your business? Yes. Does it warrant further action at your company? Absolutely.
You’ve heard about the “dark web” and wondered how it affects businesses – including small businesses. That was one of the topics addressed at an FTC conference earlier this year on identity theft. Recent headlines about high-profile data breaches have added even more urgency to the discussion. So why should the dark web matter to your company?
In our Stick with Security blog series, we’ve done our best to dive deeper into data security by focusing on the lessons learned from recent cases, insights from closed investigations, and the questions and comments we’ve received from businesses.
If you own a small business or work for one, you’re probably concerned with protecting your business’ data. You want to make sure that sensitive information isn’t accidentally deleted, turned over to a scammer, or hacked. So this week, during National Cybersecurity Awareness Month, let’s focus on making sure you know the resources the FTC has to help you and your employees understand cybersecurity, maintain your business’ computer networks safely, and keep sensitive information protected.
If you think Ed Tech is the gruff guy in the polo shirt who set up your network, you’re missing out on a revolution happening right now in America’s classrooms. With more than half of K-12 students able to access school-issued personal computing devices, Ed Tech – educational technology – is changing the way kids learn. The benefits are obvious, but it’s also raised questions about how the Children’s Online Privacy Protection Rule (COPPA) and the Family Educational Rights and Privacy Act (FERPA) apply.
High-profile hackers grab the headlines. But some data thieves prefer old school methods – rifling through file cabinets, pinching paperwork, and pilfering devices like smartphones and flash drives. As your business bolsters the security of your network, don’t let that take attention away from how you secure documents and devices.
Recent headlines offer a reminder that no business is immune from cyberattack. If you’re a tax professional, the sensitive information you handle makes you a particularly appealing target. Find out how to reduce your cyber risk at a free webinar for tax professionals.
UPDATE: As of September 21, 2018, the law says credit freezes are free for everyone, and alerts now last one year (not 90 days). Read more here.
The EU-U.S. Privacy Shield Framework has been in place for more than a year and the Swiss-U.S. Privacy Shield went into effect in April 2017. Self-certification programs like Privacy Shield offer benefits to business and protections for consumers. The FTC enforces the promises companies make when they join the frameworks, as well as false claims of participation.
The Wizard of Oz was right: “Pay no attention to the man behind the curtain.” That’s because according to an FTC settlement, computer company Lenovo should have been paying attention to the “man in the middle.” In this case, the “man in the middle” was preloaded ad-injecting software that put consumers’ personal information at risk from harmful man-in-the-middle attacks.
Ask a business person where their office is located and the likely answer is “everywhere.” They’re working from home, staying in the loop while traveling, and catching up on email between sales calls. For productivity’s sake, many companies give their employees – and perhaps clients or service providers – remote access to their networks. Are you taking steps to ensure those outside entryways into your systems are sensibly defended?
If you or your clients are in the tax preparation field, there are three letters you should focus on. OK, I-R-S may be the first thing on your mind. But as the FTC’s proposed settlement with TaxSlayer suggests, don’t forget those other important letters: G-L-B.