If you or your clients are in the tax preparation field, there are three letters you should focus on. OK, I-R-S may be the first thing on your mind. But as the FTC’s proposed settlement with TaxSlayer suggests, don’t forget those other important letters: G-L-B.
Blog Posts Tagged with Privacy and Security
Who’s coming in and what’s going out? Businesses that want to stick with security build commonsense monitoring into their brick-and-mortar operations. Whether it’s a key card reader at the door or a burglar alarm activated at night, careful companies keep an eye on entrances and exits.
Tax professionals are prime targets for identity thieves. Why? Your clients’ information — bank and investment accounts, Social Security numbers, medical records, and more — can be a virtual goldmine in the wrong hands. That’s why securing it against a data breach is critical to protect your clients and your business.
How much information does Uber have about its riders and drivers? A lot. The FTC just announced a settlement addressing charges that the company falsely claimed to closely monitor internal access to consumers’ personal information on an ongoing basis. The FTC also alleges that Uber failed to live up to its promise to provide reasonable security for consumer data.
When it comes to data security, what’s reasonable will depend on the size and nature of your business and the kind of data you deal with. But certain principles apply across the board: Don’t collect sensitive information you don’t need. Protect the information you maintain. And train your staff to carry out your policies.
Internet of Things entrepreneurs are developing products to help keep households running smoothly. But like anyone else you invite into your home, it’s important that IoT devices – appliances, fitness monitors, home security systems, etc. – behave like good houseguests. Out-of-date software can pose a particular problem. One IoT device without software updates can present its own security risks, of course, but it also can introduce vulnerabilities elsewhere on the home network.
Legend has it that King Arthur gathered his knights at a round table. Because the table had no head, it signaled that everyone seated at it was respected, and their contributions were welcome. At the FTC, we love the concept of a round table. It's a way to bring together stakeholders for a mutually beneficial discussion.
Our job at the Bureau of Consumer Protection is to protect consumers by enforcing the FTC Act’s prohibition on deceptive and unfair practices. It’s important that we carry out that mission effectively and efficiently.
Pork Chop Hill Road, Screaming Eagle Boulevard, Hell on Wheels Avenue, or my former home on Patton Drive. If those street names sound familiar, chances are you’re a servicemember, a veteran, or part of a military family. July is the Month of the Military Consumer and the FTC has resources to help keep members of the military fiscally fit and scam savvy – and a tip for businesses that do business with military consumers.
There’s been a lot of talk about “ping trees” and other activities associated with the lead generation industry. The FTC’s concern is that consumers don’t get ponged in the process. A proposed settlement gives a glimpse into how one lead generation company operated and offers insights for businesses about compliance considerations when the “product” in question is consumers’ personal data.
The FTC-NHTSA Connected Cars workshop is revving up – and you can watch from where you are. Experts are gathering in Washington right now to discuss the consumer privacy and security issues posed by automated and connected motor vehicles.
If you own or operate gas stations, chances are you know about skimmers – illegal card readers attached to payment terminals, like gas pumps, that grab data off a credit or debit card’s magnetic stripe without the customer’s knowledge. Criminals sell the stolen data or use it to buy things online. If your pumps are compromised, customers won’t know their information has been stolen until they get an account statement or overdraft notice.
Customers aren’t only victims here. Your business can suffer from the associated costs, including a damaged reputation and lost sales.
Is the Children’s Online Privacy Protection Rule a consideration at your company? We’ve updated our guidance for businesses about complying with COPPA to reflect developments in the marketplace – for example, the introduction of internet-connected toys and other devices for kids.
Ladies and gentlemen, start your engines. The FTC and the National Highway Traffic Safety Administration have announced the agenda for their joint workshop on the consumer privacy and security implications of connected cars. If this emerging tech issue is of interest to your clients, race to Washington (within the lawful speed limit, of course) to attend the event on Wednesday, June 28, 2017.
With schedules changing as frequently as they do, we can’t be sure what’s on tap for tomorrow. But we already know where we’ll be on Wednesday, February 28, 2018. We’ll be at the FTC’s third PrivacyCon – a gathering of researchers, academics, industry members, consumer advocates, and government representatives talking about the privacy and security implications of emerging technologies.
Here’s the story of a database of sensitive consumer information – names, addresses, phone numbers, email, and payment information – posted on a site frequented by (among others) hackers. It took just minutes before identity thieves tried to make unauthorized use of the information. But this tale of stolen credentials is full of surprises, including who posted the data.