Federal Trade Commission Data Security

The United States Federal Trade Commission is an independent federal agency established in 1914 by the Federal Trade Commission Act. The agency is charged with protecting consumers from misleading, fraudulent or... more +
The United States Federal Trade Commission is an independent federal agency established in 1914 by the Federal Trade Commission Act. The agency is charged with protecting consumers from misleading, fraudulent or deceptive marketing claims, as well as regulating unfair business practices that undermine the competitive marketplace.    less -
News & Analysis as of

FTC Steps Up Activity on APEC Cross-Border Privacy Certification: Issues Warning Letters to 28 Companies Claiming Certification

The Federal Trade Commission (FTC) has issued warning letters to 28 companies that claim to be certified participants in the Asia-Pacific Economic Cooperative’s (APEC) Cross-Border Privacy Rules (CBPR) system on their...more

Privacy Shield Finalized - How Everyone Can Take Advantage of the New European Data Transfer Framework

The EU Data Protection Directive 95/46/EC (the “Directive”) creates the legal framework for national data-protection laws in each EU Member State. The Directive states that personal data may only be transferred to countries...more

[Webinar] Cloud licensing and health care data: Know the risks, learn the solutions - July 27th, 12:00pm CT

As identity theft and malicious attacks against clinical providers increase, more and more health care data is stored in the digital cloud. The health care industry is required to take special precautions when licensing...more

Cybersecurity News & Notes – July 2016

In Case You Missed It: Ruling in FTC v. Amazon Suggests a Way Forward for Companies Responding to Actions Brought by the FTC after a Data Breach. The FTC’s recent actions in the realm of data security have been predicated on...more

In Case You Missed It: Launch Links - June 2016 #4

Some interesting links we found across the web this week: What Brexit Means for Tech Startups - Brexit news dominated headlines this week, so here’s a roundup from the startup perspective....more

Does Your Organization Collect Geo-Location Information?

Smartphones, smartphone apps, websites, and other connected devices (e.g., “wearables”) increasingly request that consumers provide their geo-location information. Geo-location information can refer to general information...more

Best Practices For Implementing Internal Security Controls

Many security risks can be avoided or mitigated by implementing sufficient internal security controls which are tailored to the organization’s size, needs, and specific industry. The Federal Trade Commission (“FTC”) sets...more

A Storm Brews: Retailers Push Back Against Payment Card Industry Data Security Standards

As businesses and financial institutions grapple with data security in the wake of high profile breaches, tensions between retailers and the credit card industry over the creation and implementation of security standards...more

[Webinar] Cloud licensing and health care data: Know the risks, learn the solutions - July 13th, 12:00pm CT

As identity theft and malicious attacks against clinical providers increase, more and more health care data is stored in the digital cloud. The health care industry is required to take special precautions when licensing...more

FTC Delays Ruling in LabMD Appeal

The Federal Trade Commission has decided to put off until late July a decision about whether to overturn a ruling by the agency’s chief administrative law judge in the closely watched data security action against LabMD, the...more

Will Privacy Enforcement Actions Impact “Reasonable” Security Measures Needed to Protect Trade Secrets?

In widely-publicized, contested privacy cases last year, the FTC advocated in favor of a high baseline for information security measures.  Among the security practices attacked by the FTC as critical mistakes by companies...more

The CFPB and Data Security Enforcement

The Consumer Financial Protection Bureau (CFPB) announced its intention to act as a data security regulator by releasing its first unfair, deceptive or abusive acts or practices (UDAAP) enforcement action for allegedly...more

Balancing Innovation With Privacy Concerns: The FTC Provides Comment on the Internet of Things

On June 3, 2016, the Federal Trade Commission (FTC) responded to a Request for Comments issued by the Department of Commerce, National Telecommunications and Information Administration (NTIA) regarding the Internet of Things...more

Financial Services Report, Summer 2016

BELTWAY - Every Last Penny Counts - Five federal banking agencies issued a Supervisory Bulletin titled “Interagency Guidance Regarding Deposit Reconciliation Practices” (the “Guidance”). The Guidance outlines...more

What to Consider When Purchasing a Privacy Certification

Privacy certifications, or "trustbrands," are seals licensed by third parties for organizations to place on their homepage or within their privacy policy. The seals typically state, or imply, that the organization which has...more

FTC Staff Tackle FCC Privacy Rules in Public Comment

As the Federal Communications Commission sifts through over 50,000 comments received in response to its proposed broadband privacy rules, the Federal Trade Commission’s comments are likely to stand as a highlight. In a...more

Understanding How the FTC Tracks Privacy Complaints

The FTC collects complaints about companies that allegedly violate the data privacy, data security, advertising, and marketing laws. The result is a massive database of consumer complaints known as “Consumer Sentinel” that is...more

Advertising Law - May 2016 #4

NAD Vacuums Up Preference Claims - In a challenge brought by a competing vacuum manufacturer, the National Advertising Division recommended that SharkNinja discontinue a claim that "Americans now choose Shark 2-to-1 over...more

Cyber Security

Roughly one million pieces of malware—computer viruses or malicious software—are released every day. In recent years, we’ve witnessed an unprecedented level of activity in the cyber arena, both in the form of increased...more

Are You Prepared for Your Vendor’s Data Breach?

Ever since the Target and Home Depot breaches were traced to intrusions at their vendors, the management of cybersecurity at third-party vendors has been a focus of companies and regulators. The FTC has flagged the issue, as...more

FTC: Data Security Primer for Small Businesses and Start-ups

The Federal Trade Commission will host a one day-conference in Chicago at Northwestern’s Pritzker School of Law on June 15, 2016. This event will be the fourth of the FTC’s Start with Security Events nationwide, which build...more

LabMD’s Waiting Game: Lingering Questions over FTC’s Authority in Data Security Matters

A contentious legal battle over data security between the Federal Trade Commission and LabMD, a small medical testing lab, is chronicled in the latest edition of Bloomberg Businessweek. Dune Lawrence’s report raises...more

The FCC’s Privacy NPRM: A Closer Look at the Commission’s Legal Authority and Some of Its Proposals

As we have previously advised, the FCC’s proposed rulemaking to “protect the privacy of customers of broadband and other telecommunications services” (the “NPRM”) proposes sweeping changes to the ways that Internet Service...more

Judge Flunks Case Against LabMD, FTC Appeals

In March 2015, I wrote about the ongoing dispute between the FTC and LabMD, an Atlanta-based cancer screening laboratory, and looked at whether the FTC has the authority to take enforcement action over data-security practices...more

Federal Agencies Provide User-Friendly Guidance on Compliance with Data Privacy Laws

How federal privacy laws apply to mobile health applications has been an area of significant ambiguity. Recently, the Federal Trade Commission’s (FTC), the U.S. Department of Health and Human Services (HHS) Office of Civil...more

177 Results
|
View per page
Page: of 8
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×