Blog Posts Tagged with Privacy

A deep dive into mobile app location privacy following the InMobi settlement

In June, the Commission announced its first settlement with a mobile advertising network, InMobi. Among other things, the Commission’s complaint challenges the company’s location tracking practices. In this post, we explain the mechanism that the Commission alleges InMobi used to track users’ location without permission, and discuss technical steps that mobile operating systems have taken to try to address this practice.

FTC goes to DEF CON

In order to protect consumers in our tech economy, we could use the help of some smart and creative technologists. That’s why I’m headed to Las Vegas this week with members of the Office of Technology Research and Investigation and other FTC folks to attend BSidesLV and DEF CON. We want to learn from security and privacy researchers and let them know about our research interests.

National Privacy Research Strategy outlines US privacy research agenda

The White House recently released the first ever United States “National Privacy Research Strategy,” which identifies priorities for privacy research funded by the Federal government. While focused on government, the strategy is also intended to spur similar private sector efforts. I participated in the working group that developed the strategy and am excited to see it published.

Your mobile phone account could be hijacked by an identity thief

A few weeks ago an unknown person walked into a mobile phone store, claimed to be me, asked to upgrade my mobile phones, and walked out with two brand new iPhones assigned to my telephone numbers. My phones immediately stopped receiving calls, and I was left with a large bill and the anxiety and fear of financial injury that spring from identity theft.

Tell us About Your Experiences “Putting Disclosures to the Test”

As we recently announced, the Federal Trade Commission will host a public workshop on September 15, 2016 to examine the testing and evaluation of disclosures that companies make to consumers about advertising claims, privacy practices, and other information. Our goal is to encourage and improve the evaluation and testing of disclosures by industry, academics, and the FTC.

Open Police Data Re-identification Risks

Last week I spoke at a White House event “Opportunities & Challenges: Open Police Data and Ensuring the Safety and Security of Victims of Intimate Partner Violence and Sexual Assault.” This event brought together representatives from government agencies, police departments, and advocacy groups to discuss the potential safety and privacy impact of open police data initiatives.

Four upcoming opportunities to submit your research to the FTC

Researchers, the FTC is interested in hearing from you! Last week we announced our Fall Technology Series on emerging consumer technology issues, and this week we announced our second PrivacyCon event. Both the technology series and PrivacyCon offer opportunities for researchers to submit work that informs questions the FTC is exploring.

Enhancing permissions through contextual integrity

This is the third post in my series on privacy and security in mobile computing, which builds on the Commission’s 2013 mobile security workshop. In my last post, I concluded that – despite a history of usability concerns – permissions in mobile operating systems are clearly an improvement over the opacity of traditional operating systems.

Secure APIs and the principle of least privilege

Editor’s Note: As noted in a previous post, Tech@FTC is expanding to include posts by other technically minded staff at the Commission. This is the first in a series of blog posts by Nithan Sannappa, an attorney in the Division of Privacy and Identity Protection, that will explore several important issues regarding user privacy and security in mobile computing.

What’s the security shelf-life of IoT?

The FTC released a staff report in late January that took a comprehensive look at the emerging “Internet of Things” and security, including secure APIs, authentication, and product updates, was a key theme.

I’d like to briefly explain why I believe IoT security is so important and why the IoT ecosystem presents a unique set of factors that give rise for special attention to security.