Blog Posts Tagged with Data Security

Pages

Across the tracks? FTC explores cross-device tracking

Quick:  How many connected devices do your customers have within arm’s reach right now? For a lot of them, the answer is (at minimum) a desktop computer, a laptop, a smartphone, a tablet, a connected TV, and a wearable gadget. What are the consumer protection implications when companies collect data through – and across – those devices for the purpose of advertising and marketing?

Order compliance: A behind-the-scenes look

If the Commission is to attain the objectives Congress envisioned, it cannot be required to confine its road block to the narrow lane the transgressor has traveled; it must be allowed effectively to close all roads to the prohibited goal, so that its order may not be bypassed with impunity.

That’s from the Supreme Court’s 1952 decision in FTC v. Ruberoid, but it also outlines part of the job description of the Bureau of Consumer Protection’s Enforcement Division. 

Start with Security goes on the road again

Austin used to be known for Armadillo World Headquarters and the Stallion Drive-In on North Lamar that served a $4.99 chicken fried steak the size of a manhole cover. But the talk now is tech with a burgeoning industry that manages to keep the city both weird and wired. That’s why the FTC’s Start with Security program is on the road again on November 5th – this time to Austin.

Plans for tonight?

If you have new research you’d like to present at PrivacyCon – the FTC’s January 14, 2016, national conference to explore trends in data security and consumer privacy – we need to hear from you by midnight tonight.

Starting soon: Start with Security

The FTC’s first Start with Security conference – the latest in a line of initiatives emphasizing the importance of data security – kicks off on Wednesday, September 9th, in San Francisco in cooperation with UC Hastings College of the Law. Not able to be there in person? Don’t worry. You won’t be left sitting on the dock of the bay. You can watch the webcast from your desk. In addition, the FTC has a new resource for companies interested in starting with security.

A word about passwords

On the old game show “Password,” the host whispered a word to contestants, who then gave clues to celebrities. The first to guess correctly advanced to the Lighting Round. The loser went home with a year’s supply of car wax.

Don’t let a natural disaster become a data security calamity

A natural disaster can wreak havoc on any business. But it’s even worse when that real-world catastrophe becomes a data security calamity.

Before the summer storm season arrives, get your business ready. Just like you gather flashlights, bottled water, and emergency supplies, you can prepare your business by reviewing data retention and disposal practices.  

If the FTC comes to call

It’s a question we’re asked a lot. “What happens if I’m the target of an FTC investigation involving data security?” We understand – no one wants to get that call. But we hope we can shed some light on what a company can expect.

First things first. All of our investigations are nonpublic. That means we can’t disclose whether anyone is the subject of an investigation. The sources of a data security investigation can be news reports, complaints from consumers or other companies, requests from Congress or other government agencies, or our own initiative.

Advice and counsel?

According to the proverbs of Solomon, “Plans fail for lack of counsel, but with many advisers they succeed.” Of course, there’s no one-size-fits-all plan to guarantee the security of personal information in your company’s possession. But one effective strategy is to consider what experts at different agencies and organizations are saying. They offer a variety of tips and techniques, but the foundational principles of sound security remain the same.

Using consumer health data?

With the help of innovative businesses, consumers are taking a more active role in managing their health information. How? Maybe it’s an app that monitors their exercise habits, a device that lets diabetics track glucose levels, or a site where patients with the same condition share information. In addition, people are starting to download their information into personal health records, partially because of regulatory initiatives promoting secure online access to medical data.

BCP’s Office of Technology Research and Investigation: The next generation in consumer protection

The FTC keeps its finger on the pulse of markets, channeling its resources to protect consumers from deceptive and unfair practices involving new technologies. A few years ago, we created the Mobile Technology Unit to help bring consumer protection into the mobile era. Staffers assist the Bureau of Consumer Protection and FTC regions with law enforcement investigations and lend their expertise to the development of consumer protection policy.

Pages