Tag: Data Security

Displaying 81 - 100 of 679 results.

Pages

Filtering by content type: Basic Page

Filtering by content type: Public Statement

Filtering by content type: Press Release

Federal Trade Commission Chairwoman Edith Ramirez has issued the enclosed statement following the release today of the Federal Communications Commission’s Fact Sheet on Broadband Consumer Privacy Proposal:
A new blog post from the Federal Trade Commission provides guidance to businesses on how the cybersecurity framework created by the National Institute for Standards and Technology (NIST) aligns with the FTC’s data security program.
The Federal Trade Commission is seeking public comment on Standards for Safeguarding Customer Information (the “Safeguards Rule”) as part of its systematic review of all FTC rules and guides.
After a public comment period, the Federal Trade Commission has approved a final order resolving the Commission’s complaint against Practice Fusion. In its complaint, the FTC charged that Practice Fusion misled consumers by soliciting reviews for doctors in connection with an online healthcare...

Filtering by content type: Plain Language Guidance

Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees. This information often is necessary to fill orders, meet payroll, or perform other necessary business functions...
You just learned that your business experienced a data breach. Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company’s website, you are probably wondering what to do next....

Filtering by content type: Public Event

Ten years ago, President Bush launched a new era in the fight against identity theft by issuing an executive order establishing the Identity Theft Task Force, which the Commission co-chaired. In the ensuing ten years, great strides have been made to combat identity theft but it...

Filtering by content type: Blog Post

As the old saying goes, “The job’s not finished until the paperwork is done.” But since the enactment of the FTC’s Disposal Rule, the job’s not finished until the paperwork – in this case, consumer reports or information derived from them – is securely destroyed.
Ransom notes used to come in the form of pasted letters clipped from newspapers. Now datanappers gain entry through a weak spot in a company’s network, lock the business out of its own system, and hold files – including sensitive health or financial information – for ransom. Would...

Filtering by content type: Video

Filtering by content type: Federal Register Notice

Pages