Skip to main content
Business Blog

Best practices to foil gas station skimmers

Date
If you own or operate gas stations, chances are you know about skimmers – illegal card readers attached to payment terminals, like gas pumps, that grab data off a credit or debit card’s magnetic...
Business Blog

Has a phishing scam hooked your company’s good name?

Date
When internet fraudsters mimic a legitimate business to trick consumers into giving out their personal information, it’s called phishing. It’s not just a problem for consumers, but for the companies...
Business Blog

Background checks? Don’t double-dip.

Date
Need to verify an applicant's employment or income history? Checking to see if a candidate has a criminal history or civil judgments? If you get information from a company that compiles it so you can...
Business Blog

What Vizio was doing behind the TV screen

Date
Consumers have bought more than 11 million internet-connected Vizio televisions since 2010. But according to a complaint filed by the FTC and the New Jersey Attorney General, consumers didn’t know...
Business Blog

Edge of ‘17

Date
“ Just like the white winged dove sings a song,” you can count on the BCP Business Blog to celebrate the “Edge of Seventeen” – 2017, of course – with a recap of in-case-you-missed-it developments from...
Business Blog

Ashley Madison settles with FTC over data security

Date
If you care about data security and privacy, you’ll want to read about the FTC’s settlement with ruby Corporation, ruby Life Inc., and ADL Media Inc. – the companies that operate AshleyMadison.com...
Business Blog

New Identity Theft Report helps you spot ID theft

Date
Do you ever hear from customers or employees who want you to know that they’ve been affected by identity theft? If so, you’ll probably start seeing them use the new FTC Identity Theft Report. It tells...
Business Blog

Ad libraries and app developers, check out this advice

Date
Researchers report that 72% of American adults now own a smartphone and when they’re on their phones, 89% of their time is spent on apps. An analysis of how app developers generate revenue raises some...
Business Blog

The NIST Cybersecurity Framework and the FTC

Date
We often get the question, “If I comply with the NIST Cybersecurity Framework, am I complying with what the FTC requires?” From the perspective of the staff of the Federal Trade Commission, NIST’s...
Business Blog

What happens when the sun sets on a smart product?

Date
The Internet of Things refers to consumer products that connect to the Internet to send and receive data – everything from fitness devices, wearables, and smart cars to connected smoke detectors...
Business Blog

Practice Fusion case suggests 6 health privacy pointers

Date
Combine two of the most talked-about consumer protection topics – health privacy and consumer-generated online content – and what do you get? A proposed FTC settlement with Practice Fusion, the...
Business Blog

2015’s top-pick topics: A 10-tative list

Date
2015 saw the end of The Late Show with David Letterman, but his Top 10 List legacy lives on. From the home office in Washington, D.C., here is our informal take on ten topics we covered this year in...
Business Blog

Oracle Java SE case serves up a cuppa caution

Date
When consumers updated Java SE, which has been installed on more than 850 million computers, Oracle Corporation promised “safe and secure access to the world of amazing Java content” and stated that...
Business Blog

Order compliance: A behind-the-scenes look

Date
If the Commission is to attain the objectives Congress envisioned, it cannot be required to confine its road block to the narrow lane the transgressor has traveled; it must be allowed effectively to...