Identity theft is always taxing on victims.
Blog Posts Tagged with Data Security
We’ve all been talking about the Internet of Things – the ability of everyday objects to connect to the Internet to send and receive data.
53 and it’s likely to go up. That’s the number of data security law enforcement actions the FTC has settled so far. The facts of each case are different, but distilled down to the basics, they stand for one central proposition: Your company’s data security measures should be reasonable and appropriate in light of the sensitivity and amount of consumer information you have, the size and complexity of your business, and the availability and cost of tools to improve security and reduce vulnerabilities.
For most people, January offers a lull after the holidays. But if you’re a tax professional, the busy season just started. Now that figures are flying, the FTC reminds tax preparers, accountants, and others in the industry about the role they can play in fighting back against tax identity theft. Participate in events scheduled for January 26th through 30th – Tax Identity Theft Awareness Week – and consider five timely tips from the FTC.
It’s rare we get Shakespearean on you, but a letter the FTC staff just sent to Verizon Communications reminds us of the quote from Julius Caesar, “The fault, dear Brutus, is not in our stars, but in ourselves. . . ” When it comes to the FTC’s now-closed investigation of Verizon, the staff says the fault wasn’t in the stars, but in the default.
If you’ve been following the FTC’s 50+ data security settlements, you know there are some places it’s not wise to leave sensitive information laying around – for example, in a dumpster behind a drugstore, in the trash near a payday loan company, or in an employee’s backpack.
Big Data is a big deal for businesses, consumers, academics, and policymakers. There's no doubt it opens the door to more powerful analytical techniques that can advance medical research, education, transportation, etc. But some have voiced concerns about whether it may be used to categorize consumers in ways that may affect them unfairly, or even unlawfully. That's the topic on the table at an FTC workshop, Big Data: A Tool for Inclusion or Exclusion?, and it's happening today,
You may have heard about it in the news: reports that Russian hackers have stolen more than a billion unique username and password combinations, and more than 500 million email addresses, grabbed from thousands of websites. What steps should you take?
Whether by click, tap, swipe, or scan, apps now offer a variety of beneficial services that can enhance consumers’ shopping experience. These services help consumers compare prices in-store, load the latest deals, and make purchases – all from the convenience of their phone. To better understand the consumer protection implications of this ever-changing environment, FTC staff recently issued a report, What’s the Deal?
Ask most people to name the streets in the neighborhood where they grew up and they’ll tell you Maple Lane or Sycamore Drive. Ask a military kid – ask this military kid – and she’ll mention Tank Destroyer Boulevard and Hell on Wheels Avenue. Years ago, if you drove down Tank Destroyer and exited the East Gate of Fort Hood, the neon signs advertising “zero down,” “E-Z credit,” or “low monthly payments” lit up the Central Texas sky like a discount aurora borealis.
Ahab hunts big fish.
Captain and whaling boat sink.
Sometimes you want to read all 209,117 words of Moby Dick. Other times a haiku will do. Sometimes you want an in-depth analysis of the FTC’s enforcement, rulemaking, research, education, and international efforts related to privacy and data security. Other times a summary will suffice.
The Department of Justice recently announced a multinational law enforcement effort to disrupt the Gameover Zeus Botnet. What is it and why should your company care?
Gameover Zeus is malware designed to steal banking and other credentials from home and business computers. Once infected, a computer becomes part of a global network of compromised computers known as a botnet. Criminals use botnets to carry out illegal activity – like sending spam and spreading malware.
As news about the eBay hack hits the media, you may be wondering what you can do to protect yourself from fraud. If your small business has a presence on eBay – or even if you’re just an occasional buyer or seller – consider taking these six steps.
The FTC isn’t in a position to evaluate your latest cholesterol results, and no, we can’t tell you if that looks infected. But we’d still like to hear your health questions – your questions about consumer generated and controlled health data, that is. That’s the topic of an FTC seminar from 10:00 ET to noon on Wednesday, May 7, 2014
Whether it’s a website where people diagnosed with the same medical condition can share their stories or an app to find out how long it will take in the gym to burn off a Macadamia Mania Ripple sundae, consumers are taking their health in their own hands – and generating a massive amount of digital data in the process. If you or your clients have jumped into this burgeoning market, here’s a development you’ll want to follow.
That was the catchphrase from the “Poltergeist” movie series, but we want to warn you about something more dangerous than ghostly apparitions emanating from your TV.
Every tech publication seems to have a list of best apps for business. Whether the goal is to analyze corporate cash flow or avoid the dreaded middle seat that doesn’t recline, there’s an app for the task. But have you considered the kind of sensitive customer or employee information some apps let you transmit? Developers may claim to take steps to secure the data, but as the FTC’s proposed settlements with Fandango and Credit Karma demonstrate,
Imagine a burly doorman at an exclusive party. When someone claims to be a guest, the doorman checks their invitation and runs it against the names on the list. If it doesn’t match up, the person won’t make it through the velvet rope. But what happens if the doorman isn’t doing his job? His lapse could allow a ringer into the party to scarf up the hors d’oeuvres and steal the valuables.
In old movies, ransom notes came in the form of pasted letters cut from newspapers. There’s a new kind of ransom that could pose a substantial risk to your business. Have you alerted your staff about how to protect one of your company’s most valuable assets?
Familiar with Fantage? If you have kids, they probably are. It’s a MMORPG – a massively multiplayer online role-playing game – where millions of children customize avatars to play online games in a virtual world. According to the FTC, there are a few more initials this MMORPG will want to be mindful of in the future: the U.S.-EU Safe Harbor Framework.