For online retailers, Cyber Monday can set the stage for a gleeful gift-giving season. Here are five tips to help make your “presents” known to holiday shoppers.
Blog Posts Tagged with Data Security
Interested business people are making tracks to the FTC’s workshop today on cross-device tracking. Can’t make it to Washington? Then watch the webcast.
The next stop on the FTC’s Start with Security road show is Austin, Texas, on Thursday, November 5th. Even if you can’t be there, you can still participate. And that’s not all. The FTC will be releasing two new resources to help your business start with security, but you can get a sneak peek now.
Quick: How many connected devices do your customers have within arm’s reach right now? For a lot of them, the answer is (at minimum) a desktop computer, a laptop, a smartphone, a tablet, a connected TV, and a wearable gadget. What are the consumer protection implications when companies collect data through – and across – those devices for the purpose of advertising and marketing?
If the Commission is to attain the objectives Congress envisioned, it cannot be required to confine its road block to the narrow lane the transgressor has traveled; it must be allowed effectively to close all roads to the prohibited goal, so that its order may not be bypassed with impunity.
That’s from the Supreme Court’s 1952 decision in FTC v. Ruberoid, but it also outlines part of the job description of the Bureau of Consumer Protection’s Enforcement Division.
Austin used to be known for Armadillo World Headquarters and the Stallion Drive-In on North Lamar that served a $4.99 chicken fried steak the size of a manhole cover. But the talk now is tech with a burgeoning industry that manages to keep the city both weird and wired. That’s why the FTC’s Start with Security program is on the road again on November 5th – this time to Austin.
If you have new research you’d like to present at PrivacyCon – the FTC’s January 14, 2016, national conference to explore trends in data security and consumer privacy – we need to hear from you by midnight tonight.
The FTC’s first Start with Security conference – the latest in a line of initiatives emphasizing the importance of data security – kicks off on Wednesday, September 9th, in San Francisco in cooperation with UC Hastings College of the Law. Not able to be there in person? Don’t worry. You won’t be left sitting on the dock of the bay. You can watch the webcast from your desk. In addition, the FTC has a new resource for companies interested in starting with security.
It’s called PrivacyCon and the first-of-its-kind FTC event is scheduled for January 14, 2016.
You’ve read Start with Security: A Guide for Business, the new brochure about the FTC’s 53 data security settlements. You’ve digested the lessons learned from those cases. The next step: applying them at your company. The FTC has an easy way to get the ball rolling.
Businesses are understandably concerned about the threat that hackers pose to the security of sensitive data on their networks. But a closing letter the FTC staff sent to Morgan Stanley Smith Barney LLC warns of another danger lurking closer to home.
On the old game show “Password,” the host whispered a word to contestants, who then gave clues to celebrities. The first to guess correctly advanced to the Lighting Round. The loser went home with a year’s supply of car wax.
If you and your clients are concerned about data security – and aren’t we all? – the FTC has something old, something new, and something on the horizon you need to know about.
A natural disaster can wreak havoc on any business. But it’s even worse when that real-world catastrophe becomes a data security calamity.
Before the summer storm season arrives, get your business ready. Just like you gather flashlights, bottled water, and emergency supplies, you can prepare your business by reviewing data retention and disposal practices.
It’s a question we’re asked a lot. “What happens if I’m the target of an FTC investigation involving data security?” We understand – no one wants to get that call. But we hope we can shed some light on what a company can expect.
First things first. All of our investigations are nonpublic. That means we can’t disclose whether anyone is the subject of an investigation. The sources of a data security investigation can be news reports, complaints from consumers or other companies, requests from Congress or other government agencies, or our own initiative.
Maybe it’s a suspicious tax document flagged by your HR staff or a customer concern about an unauthorized charge. Identity theft can reveal itself in many ways. Regardless of the tip-off, there’s a new one-stop federal resource – IdentityTheft.gov – to help people report and recover from ID theft.
According to the proverbs of Solomon, “Plans fail for lack of counsel, but with many advisers they succeed.” Of course, there’s no one-size-fits-all plan to guarantee the security of personal information in your company’s possession. But one effective strategy is to consider what experts at different agencies and organizations are saying. They offer a variety of tips and techniques, but the foundational principles of sound security remain the same.
As the FTC staff discussed at a seminar about consumer generated and controlled health data, people are turning to apps, devices, and websites to manage their own health information. Yesterday we talked about the contours of the compliance landscape.
With the help of innovative businesses, consumers are taking a more active role in managing their health information. How? Maybe it’s an app that monitors their exercise habits, a device that lets diabetics track glucose levels, or a site where patients with the same condition share information. In addition, people are starting to download their information into personal health records, partially because of regulatory initiatives promoting secure online access to medical data.