The Federal Trade Commission recently issued revised its “Red Flag Rules” guidance. The Red Flag Rules protect consumers by requiring businesses to watch for and respond to warning signs or red flags of identity theft. The guidance outlines which businesses are covered by the Rule. A copy of the guidance can be viewed at http://business.ftc.gov/documents/bus23-fighting-identity-theft-red-flags-rule-how-guide-business.
The Social Media Teen Generation
Today’s teens certainly constitute the social media generation. And a recent study titled “Teens, Social Media and Privacy” by the Pew Research Center’s Internet & American Life Project sheds light on this phenomenon.
Significant findings include the following:
Your Life in Photos: Privacy and a New Kind of Camera
What if you could capture your entire life in photos? The New York Times reported that a Swedish company Memoto has developed a wearable camera that accomplishes just that. http://bits.blogs.nytimes.com/2013/03/08/meet-memoto-the-lifelogging-camera/. This application goes way beyond Instagram.
Memoto’s website says: “The Memoto camera is a tiny camera and GPS that you clip on and wear. It’s an entirely new kind of digital camera with no controls. Instead, it automatically takes photos as you go. The Memoto app then seamlessly and effortlessly organizes them for you.”
Read more about the pros and cons of this new device at the New Media and Entertainment Law Blog.
President Obama’s Executive Order: 5 Ways To Improve Cybersecurity
Following his recent State of the Union address, President Obama issued an Executive Order entitled “Improving Critical Infrastructure Cybersecurity.”
The Policy section of the Executive Order notes that repeated cyber intrusions into critical infrastructure demand improved cybersecurity. This section correctly points out that the threat to critical infrastructure “continues to grow and represents one of the most serious national security challenges we must confront.”
Indeed, it is stated that the “national and economic security of the United States depends on the reliable functioning of the Nation’s critical infrastructure in the face of such threats.”
Continue reading “President Obama’s Executive Order: 5 Ways To Improve Cybersecurity”
High Tech Replacing Familiar Favorites, But Low Tech Will Live On
Technology is advancing at warp speed, and the way we live is changing constantly. Indeed, what was once lifestyle bedrock is now going the way of the dinosaurs.
For example, when I backpacked in Europe more than three decades ago, I kept in touch with my family by way of aerogrammes and postcards. Those days are gone. My daughter just started her study abroad program in Copenhagen, and within hours of hitting Danish soil, I heard from her by way of Facebook messages and mobile telephone calls via Skype.
Continue reading “High Tech Replacing Familiar Favorites, But Low Tech Will Live On”
FTC Imposes a Record $22.5 Million Civil Penalty on Google for Privacy Misrepresentations
On August 9, 2012, the FTC announced that Google agreed to pay a record $22.5 million civil penalty to settle charges that it made misrepresentations to users of the Safari Internet browser when Google represented that it would not place cookies or serve targeted ads to those users. In doing so, Google violated an earlier privacy settlement it had with the FTC.
FTC Chairman Jon Leibowitz said “[t]he record setting penalty in this matter sends a clear message to all companies under an FTC privacy order. . . “[n]o matter how big or small, all companies must abide by FTC orders against them and keep their privacy promises to consumers, or they will end up paying many times what it would have cost to comply in the first place.”
FTC Released its Final Report Today on Best Practices for Businesses to Protect Consumer Privacy
Today, the Federal Trade Commission released its final report titled “Protecting Consumer Privacy in an Era of Rapid Change: Recommendations For Businesses and Policymakers.” http://www.ftc.gov/opa/2012/03/privacyframework.shtm
The report details best practices for businesses to protect the privacy of consumers. Recognizing the burden on small businesses, the FTC says that the framework should not apply to companies that collect and do not transfer only non-sensitive data from fewer than 5,000 consumers a year.
FBI’s Social Media Monitoring Plan Must Balance Privacy, Security
A few weeks ago this blog pointed out that the Department of Homeland Security’s command center regularly monitors social networking sites such as Facebook and Twitter, popular sites like Hulu, controversial sites including WikiLeaks, and news and commentary sites like The Huffington Post and Drudge Report, according to a government document.
Now, there is an indication that the Federal Bureau of Investigation is developing a web application that will have the ability to monitor social media sites like Facebook and Twitter. Such an application supposedly will give the FBI intelligence about potential security threats.
Continue reading “FBI’s Social Media Monitoring Plan Must Balance Privacy, Security”
Is Homeland Security Watching You Online?
Are George Orwell’s fears of a governmental “Big Brother” from his novel 1984 coming true now? Well, let’s hope not, but read on.
Recent press has reported on a particular government document: a Privacy Compliance Review issued by the U.S. Department of Homeland Security in late 2011. The document reveals that the DHS command center regularly monitors social-networking sites like Facebook and Twitter, popular sites like Hulu, controversial sites including WikiLeaks, and news and commentary sites like Drudge Report and The Huffington Post.
Continue reading “Is Homeland Security Watching You Online?”
The Ever Expanding Data Breach Notification Laws…
Just when you thought the state breach notification laws could not get more cumbersome, states continue to amend their breach notification laws in an effort to expand the content and reach of the notice.
Texas Amendment Requires Notification to Affected Residents in All 50 States
Texas recently amended its data breach notification law by expanding the notification requirements to cover affected non-residents. Prior to the amendment, Texas required that entities conducting business in Texas notify residents when sensitive personal information was believed to have been acquired by an unauthorized person. Continue reading “The Ever Expanding Data Breach Notification Laws…”