Blog Posts Tagged with Data Security

Pages

Today’s the day for Big Data

Big Data is a big deal for businesses, consumers, academics, and policymakers.  There's no doubt it opens the door to more powerful analytical techniques that can advance medical research, education, transportation, etc.  But some have voiced concerns about whether it may be used to categorize consumers in ways that may affect them unfairly, or even unlawfully.  That's the topic on the table at an FTC workshop, Big Data: A Tool for Inclusion or Exclusion?, and it's happening today,

What’s the Deal? Dealing with shopping apps

Whether by click, tap, swipe, or scan, apps now offer a variety of beneficial services that can enhance consumers’ shopping experience.  These services help consumers compare prices in-store, load the latest deals, and make purchases – all from the convenience of their phone. To better understand the consumer protection implications of this ever-changing environment, FTC staff recently issued a report, What’s the Deal?

This time it's personal

Ask most people to name the streets in the neighborhood where they grew up and they’ll tell you Maple Lane or Sycamore Drive. Ask a military kid – ask this military kid – and she’ll mention Tank Destroyer Boulevard and Hell on Wheels Avenue. Years ago, if you drove down Tank Destroyer and exited the East Gate of Fort Hood, the neon signs advertising “zero down,” “E-Z credit,” or “low monthly payments” lit up the Central Texas sky like a discount aurora borealis.

The long and short of it

Ahab hunts big fish.
Captain and whaling boat sink.

Ishmael prevails.

Sometimes you want to read all 209,117 words of Moby Dick.  Other times a haiku will do.  Sometimes you want an in-depth analysis of the FTC’s enforcement, rulemaking, research, education, and international efforts related to privacy and data security.  Other times a summary will suffice.

It's Game Over for Gameover Zeus

The Department of Justice recently announced a multinational law enforcement effort to disrupt the Gameover Zeus Botnet.  What is it and why should your company care?

Gameover Zeus is malware designed to steal banking and other credentials from home and business computers.  Once infected, a computer becomes part of a global network of compromised computers known as a botnet.  Criminals use botnets to carry out illegal activity – like sending spam and spreading malware.  

Checking up on consumer generated health information

Whether it’s a website where people diagnosed with the same medical condition can share their stories or an app to find out how long it will take in the gym to burn off a Macadamia Mania Ripple sundae, consumers are taking their health in their own hands – and generating a massive amount of digital data in the process.  If you or your clients have jumped into this burgeoning market, here’s a development you’ll want to follow.

They’re baa-ack

That was the catchphrase from the “Poltergeist” movie series, but we want to warn you about something more dangerous than ghostly apparitions emanating from your TV.

Business execs: 7 things to consider before using that app

Every tech publication seems to have a list of best apps for business.  Whether the goal is to analyze corporate cash flow or avoid the dreaded middle seat that doesn’t recline, there’s an app for the task.  But have you considered the kind of sensitive customer or employee information some apps let you transmit?  Developers may claim to take steps to secure the data, but as the FTC’s proposed settlements with Fandango and Credit Karma demonstrate,

Default lines: How the FTC says Credit Karma and Fandango SSLighted security settings

Imagine a burly doorman at an exclusive party.  When someone claims to be a guest, the doorman checks their invitation and runs it against the names on the list.  If it doesn’t match up, the person won’t make it through the velvet rope.  But what happens if the doorman isn’t doing his job?  His lapse could allow a ringer into the party to scarf up the hors d’oeuvres and steal the valuables. 

Lock, stock, and peril

In old movies, ransom notes came in the form of pasted letters cut from newspapers.  There’s a new kind of ransom that could pose a substantial risk to your business.  Have you alerted your staff about how to protect one of your company’s most valuable assets?

The best 30-second investment you’ll make all day

Familiar with Fantage?  If you have kids, they probably are.  It’s a MMORPG – a massively multiplayer online role-playing game – where millions of children customize avatars to play online games in a virtual world.  According to the FTC, there are a few more initials this MMORPG will want to be mindful of in the future:  the U.S.-EU Safe Harbor Framework.

What’s this “mall tracking” I’ve been hearing about?

Consumers may not know it, but there are technologies out there that let retailers and others track their movements within and around stores and other attractions through their mobile devices.  Businesses can use the information to identify trends in consumer behavior, plan sales and promotions, and more efficiently staff their stores and structure check-out (although no matter how sophisticated the technology, we always manage to choose the slow-moving line).

50th data security settlement offers golden opportunity to check your practices

Imagine doing a routine online search and having the search engine serve up files that include medical histories, notes from psychiatric sessions and children’s medical exams, sensitive information about drug abuse or pregnancy loss, and personal data like Social Security and driver’s license numbers.  That suggests a breach that “uh-oh” doesn’t begin to cover.  The FTC’s lawsuit against GMR Transcription Services –

Pages