Filtering by content type: Plain Language Guidance
La estafa de la guía comercial
El embuste de los artículos de oficina
La chanchullo del URL
La trampa de la donación de caridad
El engaño del cheque
¿Qué puedo hacer para proteger a mi negocio?
The Directory Listing Scam
The Supply Swindle
The URL Hustle
The Charity Con
The Check Cheat
How can I protect my business?
A joint publication of the Equal Employment Opportunity Commission and the Federal Trade Commission
Filtering by content type: Blog Post
Identity theft is always taxing on victims.
53 and it’s likely to go up. That’s the number of data security law enforcement actions the FTC has settled so far. The facts of each case are different, but distilled down to the basics, they stand for one central proposition: Your company’s data security measures should be...
A box of light bulbs. A case of cleaner. Another box of light bulbs. Ordinary supplies that businesses and nonprofits of all sizes use every day. If these things arrive at your office doorstep, someone in your company or organization must have ordered them, right? And when the bill...
There's an abundant natural resource that’s underused in the U.S. – and unleashing its power could make a major contribution to economic independence.
It’s the expertise and experience of America’s older consumers.
You get an email from your boss’s boss requesting that you make a wire transfer to a new vendor. The email is marked urgent, so you ignore the 20 others that need your attention to take care of it. You handle wire transfers all the time, and you’ll definitely score points for...
Wily deception. Masters of impersonation. International intrigue. We could be describing PBS’ re-imagining of Sherlock Holmes, but we’re not. We’re talking about a scam that’s been around almost as long as the famous resident of 221B Baker Street – and still leaves small businesses...
The Business Blog reflects sources some might describe as, well, eclectic – everything from Supreme Court jurisprudence to 80s TV. But today’s post comes from a message on a neighborhood listerv in Washington, D.C. It starts with a scam, but ends on a note that should be of...
That was the catchphrase from the “Poltergeist” movie series, but we want to warn you about something more dangerous than ghostly apparitions emanating from your TV.
When the talk turns to Big Data, part of the conversation is about all the public information available about people's lives – and how companies market it to prospective employers, landlords, etc.
Every tech publication seems to have a list of best apps for business. Whether the goal is to analyze corporate cash flow or avoid the dreaded middle seat that doesn’t recline, there’s an app for the task. But have you considered the kind of sensitive customer or employee...
When someone mentions the FTC, the EEOC, and the FCRA in the same sentence, it may sound like a ladle of alphabet soup. What’s really being served up is a new joint publication by the Federal Trade Commission and the Equal Employment Opportunity Commission that talks about how the...
In old movies, ransom notes came in the form of pasted letters cut from newspapers. There’s a new kind of ransom that could pose a substantial risk to your business. Have you alerted your staff about how to protect one of your company’s most valuable assets?
Today is Data Security Day. You've educated your staff about limiting access to sensitive information, locking up confidential paperwork, and securing the network. But Latanya Sweeney, the FTC’s new Chief Technologist, just clued us in about a potential security vulnerability you,...
Filtering by content type: Rule Summary
Filtering by content type: Case
Filtering by content type: Public Statement
Appended to Cliffdale Associates, Inc., 103 F.T.C. 110, 174 (1984).
The Honorable John D. Dingell
Chairman Committee on Energy and Commerce
U.S. House of Representatives
Washington, D.C. 20515
Dear Mr. Chairman:
This letter responds to the Committee's inquiry regarding the Commission's...