Blog Posts Tagged with Data Security

Pages

Batten down the patches: Six points to take from the FTC settlement with HTC

By now, you’ve read about the FTC’s settlement with HTC — the agency’s first law enforcement action against a mobile device manufacturer.  According to the complaint, when HTC customized the operating systems used on many of its products, it introduced security vulnerabilities that put users’ sensitive information at risk.  In addition to requiring implementation of a comprehensive security program, the

Device Squad: The story behind the FTC's first case against a mobile device maker

HTC America is a leading manufacturer of smartphones and tablets using the Android, Windows Mobile, and Windows Phone operating systems.  The company’s motto is “quietly brilliant.”  But based on an FTC lawsuit challenging the company's security practices, consumers might be surprised to find out their devices have also been “quietly vulnerable.”  To settle the case — the FTC’s first against a device manufacturer — HTC has agreed to a far-reaching settlement that imposes a first-of-its-kind remedy:  patching vulnerabilities on millions

Gray matters

When even the #1 movie at the box office is called “Identity Thief,” it’s a topic at the top of everyone’s list.  If you’re in the financial or healthcare sector — or just want to stay up on an emerging issue — find out more about an FTC initiative focused on how identity theft affects a particular segment of your community.

12 tips toward kick-app mobile security

Before you start marketing your app, let’s go through the TO DO list.

Does it deliver on what you say it can do?  Check.
Have you thought through your marketing strategy?  Check.
Does it look like app stores might be interested?  Check.
Ready?  Not so fast.  There’s an indispensible step you may be overlooking.  But there’s good news:  The FTC has 12 tips to make that task easier.

Bank data security (but not that kind of bank)

You spend a good portion of your time trying to protect sensitive information on your network from high-tech hijackers.  That’s important, of course.  But don’t let it take your eye off the risks posed by good old-fashioned — make that bad old-fashioned — theft.  That’s the message businesses can take from the FTC’s settlement with cord blood bank, Cbr Systems, Inc.

Down in the dumps(ter)

Every business generates paper destined for the circular file.  But if documents contain sensitive information, don’t toss them out in a way that could invite unauthorized access.  According to the FTC’s lawsuit against PLS Financial Services, PLS Group, and The Payday Loan Store of Illinois, loan applications, credit reports, and other confidential paperwork found their way into dumpsters near the defendants’ locations.  The settlement applies just to the entities specified in the order.  But is it a good time to take a look at h

Trash Talking

Some things you’d expect to find in a trash can:  last night’s potato peelings, the casserole that looked so promising in the cookbook photo, and Oscar the Grouch.  But if you run a business, the one thing you don’t want in the dumpster behind your office is paperwork containing sensitive information about your customers.  Just ask PLS Financial Services, PLS Group, and the Payday Loan Store of Illinois.

Calling for back-up

Everybody needs a wingman — somebody there just in case you need back-up.  When it comes to explaining the consumer protection basics of mobile apps to client and colleagues, you’ve got a wingman at the ready.

It’s called Marketing Your Mobile App: Get It Right From the Start.  It’s a to-the-point brochure from the FTC outlining fundamental truth-in-advertising and privacy principles for app developers.  The brochures focuses on time-tested tips like:

Facing Facts

Say facial recognition and it’s easy for people to get all Minority Report-ish.  But it’s no longer science fiction.  If you’ve uploaded a photo to try on a pair of glasses or check yourself out with a different hairstyle, you’ve used a form of the technology.  Marketers are taking advantage, too, using facial characteristics like gender or age to serve up targeted ads in retail spots.

Do you do B2B?

Old Blue Eyes wasn’t in the tech biz, but before giving the ring-a-ding-ding to a B2B transaction that allows partners to share customer data through software one company licenses to the other, we’re guessing he would have agreed with some basic principles derived from the FTC’s proposed settlement with web analytics company Compete, Inc.

Be clear about what you collect

Twenty years ago nobody told their third grade classmates they wanted to go into web analytics when they grew up.  But unlike cowboys and dinosaur wranglers, the analytics business is booming.  Information about consumer behavior can offer companies helpful insights to boost web traffic and sales.  But as a recent FTC settlement suggests, it’s wise to be transparent about your practices and take reasonable and appropriate measures to keep sensitive information secure.

Private eyes: Lessons from the rent-to-own webcam cases

The charges outlined in the FTC’s lawsuits against a software business and seven rent-to-own companies are surprising — and OK, some might say a little creepy.  Software on rented computers gave the companies the ability to hit the kill switch if people were behind on their payments.  But according to the complaints, it also let them collect sensitive personal information, grab screen shots, and take webcam photos of people in their homes.

New FTC publication for mobile app developers

Are you in the mobile app business?  If so, you’re probably considering some important questions, like what to tell users about your app, what information to collect from users, and what to do with any information you collect.  Whether you work for a tech giant or are striking out on your own with that gotta-have-it app, the same truth-in-advertising standards and basic privacy principles apply.

It's back-to-school time: Protecting kids' identities

As back-to-school time approaches, children may be thinking about meeting up with friends to share stories about their summer adventures.  But when it comes to personal information, parents and kids need to be careful about sharing too much.  These days the casual use of sensitive data (like a Social Security number on a registration form, permission slip, or health document) can lead to child identity theft, a serious crime that impacts thousands of kids each year.  Parents can take steps to protect their children from ID theft — and your business can help by sharing free FTC resources in

Identity Protection: It's Everybody's Business

Identity theft has been the top complaint that consumers have reported to the FTC for 12 years in a row.  We’ve also heard from companies that ID theft can cause huge headaches in the form of unauthorized charges, worthless receivables, and customer service snafus.  That’s why business executives should be at the forefront in the drive for identity protection.

In praise of Toby Flenderson

HR could use better PR.   Say "human resources" and some people think of Dunder Mifflin’s joy-deficient Toby Flenderson from "The Office."  But you know better and appreciate the job your HR team does to keep your organization up and running.  They're also a critical line of defense between your company and the onslaught of data thieves and scammers.  The BCP Business Center has a special page to make their job a little easier.

FTC lodges complaint against Wyndham

The FTC's law enforcement action against hotel company Wyndham Worldwide Corporation and three of its subsidiaries alleges that a series of security breaches — three within two years — resulted in fraudulent charges, millions of dollars in fraud loss, and the export of hundreds of thousands of people's account information to an Internet domain address registered in Russia.  According to the lawsuit, a number of the defendants' practices, taken together, unreasonably and unnecessarily exposed consumers' personal data, including their cred

Older Americans and ID Theft: When It Hits Home

When it comes to identity theft, older Americans face unique risks.  While all age groups may be vulnerable, older consumers are more likely to have to share personal data with doctors, hospitals, lawyers, financial advisors, and others.  Some may face physical limitations or health challenges that could make it more difficult to safeguard their information — like securing decades of financial paperwork or managing the learning curve as life moves online.  How does this issue affect you?  As the business person or attorney in the family, your relatives may look to you to take the lead in se

Pages