Skip to main content
Business Blog

Safeguards Rule notification requirement now in effect

Date
If your business is covered by the FTC’s Gramm-Leach Bliley Safeguards Rule, an amendment to the Rule that requires covered companies to report certain data breaches and other security events to the...
Technology Blog

Cars & Consumer Data: On Unlawful Collection & Use

Date
Some say the car a person drives can say a lot about them. As cars get “connected,” this turns out to be truer than many people might have realized. While connectivity can let drivers do things like...
Business Blog

Hey, Alexa! What are you doing with my data?

Date
What you say in your home, what you do in your home. It doesn’t get more private than that. But, according to two recent FTC complaints, Amazon and Ring used this highly private data – voice...
Business Blog

How readiness can help protect veteran-owned businesses

Date
Army brats like me grew up around the word “readiness.” We knew it meant weeks or even months of a parent away on deployment, training for “What if . . .” scenarios. One of the reasons so many...
Business Blog

Ransomware risk: 2 preventive steps for your small business

Date
If recent headlines about ransomware attacks on companies have you worried, your concerns are well-founded. Earlier this year, the Department of Homeland Security’s Cybersecurity & Infrastructure...
Business Blog

Back to business #1: Where’s your data?

Date
As many companies shift to an in-person workplace, you and your employees face the opportunities and challenges of the new new normal. Today is the first in a five-part Back to Business blog series to...
Business Blog

Will your research take centerstage at PrivacyCon 2021?

Date
It’s an annual celebration of the innovative, the audacious, and the avant garde. The Met Gala? Not quite. It’s the FTC’s sixth PrivacyCon, scheduled to convene virtually on July 27, 2021. PrivacyCon...
Business Blog

Better safeguard than sorry

Date
To quote studio head Samuel Goldwyn’s famous malaprop, an oral contract isn’t worth the paper it’s printed on. The same can be said of a written security policy if a company doesn’t carry out its...
Business Blog

Ransomware prevention: An update for businesses

Date
Imagine turning on your computer one morning to discover you and your employees are locked out of your system. A threatening message appears on the screen demanding a ransom if you ever want to see...