Filtering by content type: Blog Post
With the help of innovative businesses, consumers are taking a more active role in managing their health information. How? Maybe it’s an app that monitors their exercise habits, a device that lets diabetics track glucose levels, or a site where patients with the same condition share...
Like juggling chain saws or using a Ming vase as a sippy cup, some things are just too risky to be reasonable. Here’s one to add to that list: posting unencrypted financial information about 55,000 consumers on a website available to anyone with an internet connection.
The FTC keeps its finger on the pulse of markets, channeling its resources to protect consumers from deceptive and unfair practices involving new technologies. A few years ago, we created the Mobile Technology Unit to help bring consumer protection into the mobile era. Staffers...
Identity theft is always taxing on victims.
We’ve all been talking about the Internet of Things – the ability of everyday objects to connect to the Internet to send and receive data.
53 and it’s likely to go up. That’s the number of data security law enforcement actions the FTC has settled so far. The facts of each case are different, but distilled down to the basics, they stand for one central proposition: Your company’s data security measures should be...
Filtering by content type: Federal Register Notice
Filtering by content type: Press Release
Defendants posted bank account numbers of 55,000 consumers
In testimony before Congress today, the Federal Trade Commission provided feedback on proposed data security legislation pending before the Subcommittee on Commerce, Manufacturing and Trade of the House Energy and Commerce Committee.
The report is partly based on input from participants in the FTC’s 2013 Internet of Things workshop.
Filtering by content type: Plain Language Guidance
For savvy companies, keeping data secure is a day-to-day part of their business. They reduce the amount of sensitive information they collect in the first place, keep it secure if there’s a legitimate business need to maintain it, and dispose of it safely when they no longer need it....
Start with the fundamentals.
Take advantage of what experts have already learned about security.
Design your product with authentication in mind.
Protect the interfaces between your product and other devices or services.
Consider how to limit permissions.
Take advantage of...
Filtering by content type: Public Statement
Filtering by content type: Public Event
Not long ago, consumers accessed the Internet primarily through the browser on their desktop or laptop PC. While the PC remains a fixture for many, today’s typical consumer relies on a variety of different connected devices to navigate their daily lives. Examples include consulting...
FTC staff hosted a Twitter chat to discuss the new Internet of Things report, using #FTCIoT.
Staff answered questions for 60 minutes. See the Transcript.
Filtering by content type: Case
Filtering by content type: Report
An overview of the FTC’s enforcement, policy initiatives, and consumer outreach and business guidance in the areas of privacy and data security, from January 2014-December 2014.