Tag: Data Security

Displaying 1 - 20 of 24 results.

Pages

Filtering by content type: Plain Language Guidance

Design security. Use recognized practices. Authenticate and control access. Implement secure data management. Monitor and adress security risks. Create a culture of security. Communicate. Want more?
You just learned that your business experienced a data breach. Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company’s website, you are probably wondering what to do next....
For businesses, the key to safeguarding sensitive information is to start with security. The Start with Security brochure and videos released in 2015 offer practical tips to take from the FTC’s 60+ data security cases.
More than a thousand new apps are hitting the market each day.  In this fast-moving era of entrepreneurship and creativity, is security keeping up?  Apps and devices often rely on consumer data — including contact information, photos, and location to name a few — and can be vulnerable...
A continuación se listan algunos conceptos básicos de computación útiles para su compañía, incluso si usted es el único empleado. Si tiene empleados, capacítelos para que sigan estas recomendaciones. Si recolecta algún tipo de información de consumidores, también consulte nuestros...
Here are a few computer security basics to help your company, even if you’re the only employee. If you have employees, train them to follow these tips. If you collect any consumer information, also check out our advice about protecting personal information.
Most companies keep sensitive personal information in their files—names, Social Security numbers, credit card, or other account data—that identifies customers or employees. This information often is necessary to fill orders, meet payroll, or perform other necessary business functions...
Start with Security: A Guide for Business offers tips for any business wanting to implement sound data security. For health app developers, here’s tailored advice and additional questions to ask.
What Are the Laws? Which Laws Apply to My Mobile Heath App? Glossary
When managing your network, developing an app, or even organizing paper files, sound security is no accident. Companies that consider security from the start assess their options and make reasonable choices based on the nature of their business and the sensitivity of the information...
For savvy companies, keeping data secure is a day-to-day part of their business. They reduce the amount of sensitive information they collect in the first place, keep it secure if there’s a legitimate business need to maintain it, and dispose of it safely when they no longer need it....
INTRODUCTION ACCURACY Guidelines for Policies and Procedures Correct and Update Information Furnishing Specific Items DISPUTES Disputes to CRAs Disputes to Furnishers ADDITIONAL RESPONSIBILITIES
An estimated nine million Americans have their identities stolen each year. Identity thieves may drain accounts, damage credit, and even put medical treatment at risk. The cost to business — left with unpaid bills racked up by scam artists — can be staggering, too.
Although identity theft is usually associated with financial transactions, it also happens in the context of medical care. According to the Federal Trade Commission (FTC), medical identity theft occurs when someone uses another person’s name or insurance information to get medical...
More and more, personal medical information is online. For most hospitals, doctors’ offices, and insurance companies, the Health Insurance Portability and Accountability Act (HIPAA) governs the privacy and security of health records stored online. But many web-based businesses that...
Most businesses collect and store sensitive information about their employees and customers, like Social Security numbers, credit card and account information, and medical and other personal data. Many of them have a legal obligation to protect this information. If it gets into the...
Does your business or organization have a website that allows people to maintain their medical information online? Do you provide applications for personal health records – say, a device that allows people to upload readings from a blood pressure cuff or pedometer into their personal...
Federal Law Requires All Businesses to Truncate Credit Card Information on ReceiptsWhat’s on the credit and debit card receipts you give your customers? The Federal Trade Commission (FTC), the nation’s consumer protection agency, says it’s time for companies to check their receipts...

Pages