Protecting the security of your information
This presentation is the property of its rightful owner.
Sponsored Links
1 / 27

Protecting the Security of Your Information PowerPoint PPT Presentation


  • 81 Views
  • Uploaded on
  • Presentation posted in: General

Protecting the Security of Your Information. Mary Beth Richards Federal Trade Commission May 7, 2008. About the FTC. Protects consumers through jurisdiction over both competition and consumer protection Main statute Section 5 of the FTC Act Other statutes Fair Credit Reporting Act

Download Presentation

Protecting the Security of Your Information

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Protecting the security of your information

Protecting the Security of Your Information

Mary Beth Richards

Federal Trade Commission

May 7, 2008


About the ftc

About the FTC

  • Protects consumers through jurisdiction over both competition and consumer protection

  • Main statuteSection 5 of the FTC Act

  • Other statutes

    • Fair Credit Reporting Act

    • Children's Online Privacy Protection Act

    • CAN-SPAM


Bureau of consumer protection

Bureau of Consumer Protection

Advertising Practices

Planning & Information

Privacy & Identity Protection

Consumer & Business Education

Marketing Practices

Enforcement

Financial Practices


The ftc uses multiple tools

The FTC Uses Multiple Tools

  • Enforcement

  • Policy Development

  • Education


Policy development

Policy Development


Education

Education

  • Websites

    • OnGuardOnline.gov

    • ftc.gov/idtheft

  • Print Publications

    • 600+ online at ftc.gov

    • Available in bulk – free

  • Multimedia

    • Video – YouTube.com

    • Interactive tutorials


Data security and identity theft

Data Security and Identity Theft


Data security enforcement

Data Security Enforcement

  • 20 data security cases

  • Most recent cases

    • TJX

    • Lexis Nexis


The president s identity theft task force

17 Federal partners

Strategic Plan

Released April 2007

Task Force Website

www.idtheft.gov

The President’s Identity Theft Task Force


Task force recommendations

31 recommendations, organized around life cycle of identity theft

Prevention

Victim recovery

Deterrence and punishment

Task Force Recommendations


Task force progress

Task Force Progress

  • Data security and breach management guidance to government agencies

  • OPM led effort to eliminate uses of SSNs in federal human resource functions

  • DOJ legislative recommendations on prosecution of identity theft

  • Expanded training for prosecutors

  • Victim assistance

  • FTC workshops

  • FTC education


Education1

Education


Outreach business guidance

Outreach & Business Guidance


Interactive online tutorial

Interactive Online Tutorial


Other technology issues

OtherTechnology Issues


Behavioral advertising

November 2007Town Hall

December 2007Issued Self-Regulatory Principles for Public Comment

April 2008Comments received and being reviewed

Behavioral Advertising


Spam and phishing

Enforcement

94 actions against over 250 defendants

Recent actions

Valueclick

Spear Systems

Education

Websites

Phishing ecard

Publications

Spam and Phishing


Spam and phishing1

Spam and Phishing

  • Policy Research and Development

    • July 2007Spam Summit

      • Filtering works

      • Industry tools

    • April 2008Phishing Roundtable

      • Task Force on Phishing Education

      • Landing Pages

      • Phishing Videos


Phishing video phishy home

Phishing Video: “Phishy Home”


Spyware

Spyware

  • Since October 2004, we have brought 11 cases that stand for 3 principles

    • Consumer’s computer belongs to him or her

    • Buried disclosures of material information necessary to correct an otherwise misleading impression do not work

    • Consumers must be able to uninstall and remove unwanted software


Mobile commerce

Mobile Commerce

  • Topics

    • Mobile messaging services

    • Consumers’ control

    • Challenges of the small screen

    • Targeting children and teens

    • Best practices in preventing fraud

    • Security threats and solutions

    • Next-generation products/services


Things of interest

Things of Interest


National do not call registry

National Do Not Call Registry

  • 155 million numbers registered

  • No expiration date


Children

Children

  • Education

    • ftc.gov/YouAreHere

    • Social Networking

  • Congressional legislation


Ordering publications

Ordering Publications

FTC offers practical information on a variety of topics to help consumers avoid rip-offs and exercise their consumer rights, and to help businesses comply with the law.

  • Single Copies

    • View, print, and download publications from ftc.gov.

  • Bulk Orders (50 or More Copies)

    • Place order at ftc.gov/bulkorder.


Protecting the security of your information1

Protecting the Security of Your Information

Mary Beth Richards

Federal Trade Commission

May 7, 2008


  • Login