Mark March 7, 2018, on your calendar. That’s when the FTC is putting its Contact Lens Rule under the lens at a public workshop in Washington, DC.
Today’s the day for the FTC-Department of Education workshop on Student Privacy & Ed Tech. As attendees in Washington, DC, settle in before the bell rings, get ready to watch the event from your desk. A few minutes before the 9:00 ET starting time, we’ll post the webcast link from the event page. That’s where you’ll find the full agenda, speaker bios, and public comments.
The “before” photo showed a silver-haired lady in a wheelchair with a hand on her furrowed brow. “24 hours after” and she’s smiling and knitting on the sofa, thanks to a dietary supplement proven in a 1200-person clinical study to reduce or eliminate the symptoms of joint pain, hypertension, diabetes, and depression. And how’s this for a bonus? Users can “easily lose between 8-13 lbs. per week.”
Like Alanis Morissette’s “rain on your wedding day” or “a free ride when you’ve already paid,” the FTC’s lawsuit against Florida’s NextGen Nutritionals, LLC, Anna McLean, Robert McLean, and related companies – in addition to challenging a number of claims as false or deceptive – includes three allegations that could be characterized as ironic.
We’ve all heard about counterfeit money and counterfeit handbags. But counterfeit debt? It’s the subject of a $4.1 million judgment entered last month by a federal court in Kansas – and it illustrates yet another example of the injury inflicted by debt collection deception.
For college students building their resumes, that camp counselor gig is nice – but what about participating in a session at an international conference of privacy and data security experts?
Online news reports appeared to feature the miraculous results celebrities like Will Ferrell and Paula Deen achieved from muscle-building supplements, weight loss products, and other merchandise. But according to the FTC, those “news reports” were deceptively formatted ads and the claims about “miraculous” results were false or misleading. And those weren’t the only secrets hidden within the promotions.
If you own a small business or are active in a nonprofit, the alleged modus operandi of New York- and Illinois-based A1 Janitorial Supply Corp., three other companies, and two individuals should sound a warning. According to the FTC, the defendants called offices to offer a free sample of a cleaning product – but then cleaned up in an altogether different way.
You’re a tax professional and you’ve just learned that your business experienced a data breach. Whether hackers took client information from your server, an insider stole client information, or the information was exposed inadvertently, you’re probably wondering what to do next.
The Federal Trade Commission and Victory Media, Inc. have reached a proposed administrative consent agreement resolving allegations that Victory Media violated Section 5 of the FTC Act in connection with its promotion of post-secondary schools to military consumers.
You’ve read recent news stories about a vulnerability discovered in the WPA2 encryption standard. (Some reports refer to it as KRACK – Key Reinstallation Attack.) Should this be of concern to your business? Yes. Does it warrant further action at your company? Absolutely.
Everyone knows that The stars at night are big and bright, deep in the heart of Texas. But did you know that The AG’s team is a partner’s dream, deep in the heart of Texas?
That’s the tune we’re humming to honor our colleagues at the Consumer Protection Division of the Office of the Texas Attorney General – recipients of the FTC Bureau of Consumer Protection’s Partner Award. The Award recognizes their extraordinary contribution to our shared mission to fight fraud and deception in the marketplace.
You’ve heard about the “dark web” and wondered how it affects businesses – including small businesses. That was one of the topics addressed at an FTC conference earlier this year on identity theft. Recent headlines about high-profile data breaches have added even more urgency to the discussion. So why should the dark web matter to your company?
In our Stick with Security blog series, we’ve done our best to dive deeper into data security by focusing on the lessons learned from recent cases, insights from closed investigations, and the questions and comments we’ve received from businesses.
If you think the feuds among the Great Houses of Westeros get intense, consider the dinner table discussions about student loan debt. It’s not just taking a toll on the home front. Experts report that the $1.4 trillion debt burden carried by 42 million Americans is affecting workplace productivity, too. But at a time when consumers need accurate information, opportunistic outfits fly in like Daenerys Targaryen’s dragons with false promises of debt reduction or forgiveness.
If you own a small business or work for one, you’re probably concerned with protecting your business’ data. You want to make sure that sensitive information isn’t accidentally deleted, turned over to a scammer, or hacked. So this week, during National Cybersecurity Awareness Month, let’s focus on making sure you know the resources the FTC has to help you and your employees understand cybersecurity, maintain your business’ computer networks safely, and keep sensitive information protected.
It’s not much bigger than a postage stamp, but the label on many textile, wool, and fur products provides important information, including fiber content, country of origin, and a company name or Registered Identification Number (RN). The FTC administers the RN system and industry members will want to check out recent upgrades to the RN website.
If you think Ed Tech is the gruff guy in the polo shirt who set up your network, you’re missing out on a revolution happening right now in America’s classrooms. With more than half of K-12 students able to access school-issued personal computing devices, Ed Tech – educational technology – is changing the way kids learn. The benefits are obvious, but it’s also raised questions about how the Children’s Online Privacy Protection Rule (COPPA) and the Family Educational Rights and Privacy Act (FERPA) apply.
High-profile hackers grab the headlines. But some data thieves prefer old school methods – rifling through file cabinets, pinching paperwork, and pilfering devices like smartphones and flash drives. As your business bolsters the security of your network, don’t let that take attention away from how you secure documents and devices.