Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008.

Slides:



Advertisements
Similar presentations
No Cop on the Beat: Underenforcement in E-Commerce and Cybercrime Peter P. Swire Ohio State University & Center for American Progress Fordham CLIP Information.
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Mobile Payments and the FTC Manas Mohapatra Director of Mobile Policy Mobile Technology Unit Federal Trade Commission The views expressed are not necessarily.
Silicon Valley Apps for Kids Meetup Laura D. Berger October 22, 2012 The views expressed herein are those of the speaker, and do not represent the views.
PRIVACY BREACHES A “breach of the security of the system”: –Is the “unauthorized acquisition of computerized data that compromises the security, confidentiality,
Lesson 8.5 Identity Theft July 2011Copyright © … REMTECH, inc … All Rights Reserved1 Introduction Identity theft occurs when someone steals some.
Advertising and Sales Promotion ©2013 Cengage Learning. All Rights Reserved. Chapter 13.
Fraud and Identity Theft: The United Nations Crime Commission Intergovernmental Expert Group on Fraud and the Criminal Misuse and Falsification of Identity.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Fair competition commission Mobile and Cyber Threat Issues Joshua Msoma Tanzania Fair Competition Commission Sixth Annual African Dialogue Conference Lilongwe,
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
NTIA Privacy Multistakeholder Meeting March 25, 2014 Amanda Koulousias, Attorney Division of Privacy and Identity Protection Federal Trade Commission FTC.
© 2003, EDUCAUSE Information Privacy: Public Policy and Institutional Policies Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
“Privacy Implications of RFID Technology in Health Care Settings” Marc Rotenberg President EPIC Dept. of Health & Human Services Washington, DC 11 January.
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
© Family Economics & Financial Education –October 2007 – Consumer Protection Unit – Online Shopping Funded by a grant from Take Charge America, Inc. to.
Internet safety By Lydia Snowden.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
© 2010 Dorsey & Whitney LLP Social Media Friday, September 17, 2010 The Committee on Finance & Information Technology (CFIT)
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Federal Trade Commission required to issue and enforce regulations concerning children’s online privacy. Initial COPPA Rule effective April 21, 2000;
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Keeping Consumers Safe The Role of Government in Consumer Product Safety Written by Dallas Duncan and Dr. Frank B. Flanders June 2010.
INDUSTRY COMMITMENT TO INNOVATION IN NOTICE AND CHOICE AAAA, ANA, CBBB, DMA, IAB Convene Task-Force (April 2008) Coalition begins drafting industry principles.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
Information Privacy: Public Policy and Institutional Policies Wendy Wigen Policy Analyst, EDUCAUSE Copyright Wendy Wigen, This work is the intellectual.
Phishing: Trends and Countermeasures Blaine Wilson.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
+ Warm up In 3-5 words, define each of the following: 1. Phishing 2. Skimming 3. Pyramid scheme 4. Ponzi scheme Answer the following question: 1. How can.
Federal Agencies and Laws for Consumer Rights
Spam, Phishing, Spyware, and VOIP Law of eCommerce October 6, 2008 Copyright, Peter Vogel,
Direct from Washington: The Impact of Federal Legislation on Direct & Interactive Marketers.
Consumer Protection How can citizens take steps to protect themselves financially? How does the government try to protect citizens?
The Internet of Things and Consumer Protection
Vocabulary 2.02 – Understanding Threats to Financial Security LIFE Gwishiri.
Recent Initiatives and Priorities The Federal Trade Commission’s Debt Collection Program Colin Hector Attorney Division of Financial Practices Federal.
Put a Lock on It: Protecting your online privacy A project of Consumer Action |
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
Chapter 19 Lesson 1 Personal Finance. Consumer Rights  As a consumer you have many rights.  Consumerism is a movement to educate buyers about the purchases.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
© 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. Current Privacy Policy Issues in.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
BBB Wise Giving Alliance & The International Committee of Fundraising Organizations Advancing Trust in the Charitable Sector Federal Trade Commission,
Oregon DMV Fraud Prevention Program Tom McClellan, DMV Administrator.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
21 st Century Law Enforcement Body Cameras & Procurement Stephen R. Fender State Policy Advisor Bureau of Justice Assistance ©2015
IRS Resources for Payroll Professionals & IRS Combats ID Theft with the Help of Payroll Professionals June 16, 2016 Nora Huffman.
Consumer Information Federal Trade Commission Act grants Federal Trade Commission (FTC) responsibility regarding unfair methods of competition and unfair.
IDENTITY THEFT Allyson W. Haynes Assistant Professor of Law Charleston School of Law.
THE FEDERAL TRADE COMMISSION UNDER THE TRUMP ADMINISTRATION: PAST, PRESENT, AND FUTURE February 15, 2017.
Federal Agencies and Laws for Consumer Rights
ALL ABOUT THE FTC By: Brandon Baldwin.
Protecting Personal Information Guidance for Business.
5.5 Consumer Protection Objective: Demonstrate how to be a responsible consumer in the 21st century.
Consumer Rights and Protections
Identity Theft Prevention Program Training
Identity Theft Someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information. If you’re a victim Place fraud.
Presentation transcript:

Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS About the FTC Protects consumers through jurisdiction over both competition and consumer protection Protects consumers through jurisdiction over both competition and consumer protection Main statute Section 5 of the FTC Act Main statute Section 5 of the FTC Act Other statutes Other statutes Fair Credit Reporting Act Fair Credit Reporting Act Children's Online Privacy Protection Act Children's Online Privacy Protection Act CAN-SPAM CAN-SPAM

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Marketing Practices Privacy & Identity Protection Financial Practices Planning & Information Enforcement Advertising Practices Bureau of Consumer Protection Consumer & Business Education

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS The FTC Uses Multiple Tools Enforcement Enforcement Policy Development Policy Development Education Education

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Policy Development

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERSEducation Websites Websites OnGuardOnline.gov OnGuardOnline.gov ftc.gov/idtheft ftc.gov/idtheft Print Publications Print Publications 600+ online at ftc.gov 600+ online at ftc.gov Available in bulk – free Available in bulk – free Multimedia Multimedia Video – YouTube.com Video – YouTube.com Interactive tutorials Interactive tutorials

Data Security and Identity Theft

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Data Security Enforcement 20 data security cases 20 data security cases Most recent cases Most recent cases TJX TJX Lexis Nexis Lexis Nexis

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS The President’s Identity Theft Task Force 17 Federal partners 17 Federal partners Strategic Plan Strategic Plan Released April 2007 Released April 2007 Task Force Website Task Force Website

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Task Force Recommendations 31 recommendations, organized around life cycle of identity theft 31 recommendations, organized around life cycle of identity theft Prevention Prevention Victim recovery Victim recovery Deterrence and punishment Deterrence and punishment

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Task Force Progress Data security and breach management guidance to government agencies Data security and breach management guidance to government agencies OPM led effort to eliminate uses of SSNs in federal human resource functions OPM led effort to eliminate uses of SSNs in federal human resource functions DOJ legislative recommendations on prosecution of identity theft DOJ legislative recommendations on prosecution of identity theft Expanded training for prosecutors Expanded training for prosecutors Victim assistance Victim assistance FTC workshops FTC workshops FTC education FTC education

Education

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Outreach & Business Guidance

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Interactive Online Tutorial

Other Technology Issues

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Behavioral Advertising November 2007 Town Hall November 2007 Town Hall December 2007 Issued Self-Regulatory Principles for Public Comment December 2007 Issued Self-Regulatory Principles for Public Comment April 2008 Comments received and being reviewed April 2008 Comments received and being reviewed

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Spam and Phishing Enforcement Enforcement 94 actions against over 250 defendants 94 actions against over 250 defendants Recent actions Recent actions Valueclick Valueclick Spear Systems Spear Systems Education Education Websites Websites Phishing ecard Phishing ecard Publications Publications

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Spam and Phishing Policy Research and Development Policy Research and Development July 2007 Spam Summit July 2007 Spam Summit Filtering works Filtering works Industry tools Industry tools April 2008 Phishing Roundtable April 2008 Phishing Roundtable Task Force on Phishing Education Task Force on Phishing Education Landing Pages Landing Pages Phishing Videos Phishing Videos

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Phishing Video: “Phishy Home”

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERSSpyware Since October 2004, we have brought 11 cases that stand for 3 principles Since October 2004, we have brought 11 cases that stand for 3 principles Consumer’s computer belongs to him or her Consumer’s computer belongs to him or her Buried disclosures of material information necessary to correct an otherwise misleading impression do not work Buried disclosures of material information necessary to correct an otherwise misleading impression do not work Consumers must be able to uninstall and remove unwanted software Consumers must be able to uninstall and remove unwanted software

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Mobile Commerce Topics Topics Mobile messaging services Mobile messaging services Consumers’ control Consumers’ control Challenges of the small screen Challenges of the small screen Targeting children and teens Targeting children and teens Best practices in preventing fraud Best practices in preventing fraud Security threats and solutions Security threats and solutions Next-generation products/services Next-generation products/services

Things of Interest

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS National Do Not Call Registry 155 million numbers registered 155 million numbers registered No expiration date No expiration date

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERSChildren Education Education ftc.gov/YouAreHere ftc.gov/YouAreHere Social Networking Social Networking Congressional legislation Congressional legislation

F EDERAL T RADE C OMMISSION PROTECTING AMERICA’S CONSUMERS Ordering Publications FTC offers practical information on a variety of topics to help consumers avoid rip-offs and exercise their consumer rights, and to help businesses comply with the law. Single Copies Single Copies View, print, and download publications from ftc.gov. View, print, and download publications from ftc.gov. Bulk Orders (50 or More Copies) Bulk Orders (50 or More Copies) Place order at ftc.gov/bulkorder. Place order at ftc.gov/bulkorder.

Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008