270 likes | 408 Views
Protecting the Security of Your Information. Mary Beth Richards Federal Trade Commission May 7, 2008. About the FTC. Protects consumers through jurisdiction over both competition and consumer protection Main statute Section 5 of the FTC Act Other statutes Fair Credit Reporting Act
E N D
Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008
About the FTC • Protects consumers through jurisdiction over both competition and consumer protection • Main statuteSection 5 of the FTC Act • Other statutes • Fair Credit Reporting Act • Children's Online Privacy Protection Act • CAN-SPAM
Bureau of Consumer Protection Advertising Practices Planning & Information Privacy & Identity Protection Consumer & Business Education Marketing Practices Enforcement Financial Practices
The FTC Uses Multiple Tools • Enforcement • Policy Development • Education
Education • Websites • OnGuardOnline.gov • ftc.gov/idtheft • Print Publications • 600+ online at ftc.gov • Available in bulk – free • Multimedia • Video – YouTube.com • Interactive tutorials
Data Security Enforcement • 20 data security cases • Most recent cases • TJX • Lexis Nexis
17 Federal partners Strategic Plan Released April 2007 Task Force Website www.idtheft.gov The President’s Identity Theft Task Force
31 recommendations, organized around life cycle of identity theft Prevention Victim recovery Deterrence and punishment Task Force Recommendations
Task Force Progress • Data security and breach management guidance to government agencies • OPM led effort to eliminate uses of SSNs in federal human resource functions • DOJ legislative recommendations on prosecution of identity theft • Expanded training for prosecutors • Victim assistance • FTC workshops • FTC education
November 2007Town Hall December 2007Issued Self-Regulatory Principles for Public Comment April 2008Comments received and being reviewed Behavioral Advertising
Enforcement 94 actions against over 250 defendants Recent actions Valueclick Spear Systems Education Websites Phishing ecard Publications Spam and Phishing
Spam and Phishing • Policy Research and Development • July 2007Spam Summit • Filtering works • Industry tools • April 2008Phishing Roundtable • Task Force on Phishing Education • Landing Pages • Phishing Videos
Spyware • Since October 2004, we have brought 11 cases that stand for 3 principles • Consumer’s computer belongs to him or her • Buried disclosures of material information necessary to correct an otherwise misleading impression do not work • Consumers must be able to uninstall and remove unwanted software
Mobile Commerce • Topics • Mobile messaging services • Consumers’ control • Challenges of the small screen • Targeting children and teens • Best practices in preventing fraud • Security threats and solutions • Next-generation products/services
National Do Not Call Registry • 155 million numbers registered • No expiration date
Children • Education • ftc.gov/YouAreHere • Social Networking • Congressional legislation
Ordering Publications FTC offers practical information on a variety of topics to help consumers avoid rip-offs and exercise their consumer rights, and to help businesses comply with the law. • Single Copies • View, print, and download publications from ftc.gov. • Bulk Orders (50 or More Copies) • Place order at ftc.gov/bulkorder.
Protecting the Security of Your Information Mary Beth Richards Federal Trade Commission May 7, 2008