Filtering by content type: Blog Post
The desktop, laptop, tablet, smartphone and wireless wearable. Perhaps the only device we used yesterday that wasn’t connected to the internet was the crockpot. And it may know more than it’s telling.
Whether by click, tap, swipe, or scan, apps now offer a variety of beneficial services that can enhance consumers’ shopping experience. These services help consumers compare prices in-store, load the latest deals, and make purchases – all from the convenience of their phone. To...
Goldenshores Technologies’ “Brightest Flashlight Free” is an incredibly popular Android app downloaded by tens of millions of consumers. But did those people know that when they used the app, it would transmit their precise location and unique device identifier to third parties,...
Filtering by content type: Public Event
Not long ago, consumers accessed the Internet primarily through the browser on their desktop or laptop PC. While the PC remains a fixture for many, today’s typical consumer relies on a variety of different connected devices to navigate their daily lives. Examples include consulting...
On May 7, 2014, the Federal Trade Commission staff hosted a seminar on Consumer Generated and Controlled Health Data.
On March 19, 2014, the Federal Trade Commission staff hosted a seminar on Alternative Scoring Products.The speakers described a variety of predictive analytics products offered by many data brokers to predict trends and consumer behavior in a variety of contexts, ranging from identity...
On February 19, 2014, the Federal Trade Commission staff hosted a seminar on Mobile Device Tracking.
Filtering by content type: Video
Filtering by content type: Report
An overview of the FTC’s enforcement, policy initiatives, and consumer outreach and business guidance in the areas of privacy and data security, from January 2013-March 2014.
Filtering by content type: Plain Language Guidance
Start with the fundamentals.
Take advantage of what experts have already learned about security.
Design your product with authentication in mind.
Protect the interfaces between your product and other devices or services.
Consider how to limit permissions.
Take advantage of...
Filtering by content type: Public Statement
Filtering by content type: Case