To facilitate the transfer of data, many U.S. companies that do business internationally participate in the Asia-Pacific Economic Cooperation Cross-Border Privacy Rules (CBPR) system. It’s voluntary, of course, but if companies say they participate, that representation – like other objective claims – must be truthful. That’s the lesson of three proposed settlements just announced by the FTC.
Blog Posts Tagged with Consumer Privacy
Consumers have bought more than 11 million internet-connected Vizio televisions since 2010. But according to a complaint filed by the FTC and the New Jersey Attorney General, consumers didn’t know that while they were watching their TVs, Vizio was watching them. The lawsuit challenges the company’s tracking practices and offers insights into how established consumer protection principles apply to smart technology.
We recently saw a fellow diner reach across the cafeteria soup station until splat! His phone fell out of his shirt pocket and into the minestrone. But even before he ladled out his soup-logged smartphone, he reached into his bag and took out his tablet. As consumers have come to rely on multiple devices, companies are using technologies to connect a consumer’s activity across those devices – smartphones, tablets, desktops, laptops, and more.
Protecting consumers’ privacy and personal data has long been a priority at the FTC. Over the years, we’ve helped millions of identity theft victims recover from that crime. We created the National Do Not Call Registry to limit unwanted telemarketing, and we continue to fight illegal robocalls. And we’ve brought more than sixty cases against companies that didn’t take reasonable steps to protect people’s data.
If you’re a tax professional, you’re probably already deep into tax season and your time is in short supply. Give us an hour. It can help you save time and money, and avoid scams and stolen data.
What’s that sound? It’s the buzz of the crowd gathering this morning for the FTC’s second PrivacyCon. Leaders from academia, advocacy groups, and industry have convened for a day devoted to the latest research and trends about consumer privacy and data security.
It’s a challenge worthy of Drs. Peter Venkman, Egon Spengler, and Ray Stantz – and it could result in a prize of as much as $25,000 for a creative tech tinkerer.
“Just like the white winged dove sings a song,” you can count on the BCP Business Blog to celebrate the “Edge of Seventeen” – 2017, of course – with a recap of in-case-you-missed-it developments from 2016. (Sorry, Stevie Nicks. That was a stretch.) In no particular order, here is our take on ten noteworthy consumer protection actions from the year gone by.
So you’ve taken every precaution against a zombie attack. You’ve sealed the windows, stockpiled kerosene, and keep a machete or two handy. But despite your best efforts, The Undead still manage to reanimate themselves and stalk their unsuspecting prey. We hate when that happens. But this time it’s not an episode of The Walking Dead.
For academics and researchers in consumer privacy and data security, think of it as Coachella without the sand and Burning Man with nothing spontaneously combusting (we hope).
If you care about data security and privacy, you’ll want to read about the FTC’s settlement with ruby Corporation, ruby Life Inc., and ADL Media Inc. – the companies that operate AshleyMadison.com.
“What do your TV viewing habits say about you?”
Whether they’re tuned to “The Real Houseplants of Poughkeepsie” (guilty as charged, Your Honor) or more high-brow fare, TVs are a lot smarter than many people realize. Smart TVs, streaming devices, game consoles, apps and set-top boxes may track consumers’ viewing habits in one way or another. The benefits of tracking technology are apparent anytime a person follows a “Viewers who watched The Night Manager also enjoyed The Last Panthers” recommendation. But what about the privacy implications?
They’re overhead, on consumers’ minds, and under consideration this afternoon at the latest installment of the FTC’s Fall Technology Series. The topic is drones and experts on drone technology are gathering at the FTC right now to talk over the implications for consumer privacy. The event, which is free and open to the public, takes flight at 1:00 ET at the FTC’s Constitution Center conference facility, 400 7th Street, S.W., in Washington.
Delivery by drone? We thought the Jetsons’ personal jetpack was the height of futuristic fantasy, but drone technology is bringing benefits like that closer to reality. But what about the consumer protection implications, especially when it comes to privacy? That’s on the agenda at the second installment of the FTC’s Fall Technology Series on drones on October 13, 2016.
Researchers report that 72% of American adults now own a smartphone and when they’re on their phones, 89% of their time is spent on apps. An analysis of how app developers generate revenue raises some interesting issues that touch on consumer privacy.
One pundit has called it the most pervasive industry that nobody knows about, which is why the FTC has sponsored a workshop, brought law enforcement actions, and just published a Staff Perspective to call attention to the consumer protection implications.
Gary Numan sang, “Here in my car, I can only receive.” Well, those days are in the past. More and more vehicles are outfitted with the latest communications technologies like Bluetooth, GPS navigation, roadside assistance, streaming music, and web browsing. With mobile technologies in rental cars, consumers’ personal information can stay with the car long after the consumer has returned it. If you’re a car rental company, it’s important to think about protecting consumer privacy in connected rental cars.
If a disclosure is intended to inform consumers – and isn’t that pretty much the job description of a disclosure? – it should accomplish that task effectively. A “disclosure” that fails that fundamental test is no disclosure at all. That’s FTC 101. So what can be done to improve the testing and evaluation of disclosures? Leading academics and testing professionals will gather at the FTC on September 15, 2016, to explore that topic.
We’re not being overdramatic when we describe it as a business executive’s nightmare: a shadowy contact from a hacker who has infiltrated a company’s network, encrypted the data, and now demands ransom for a key to access the files.