Consumers may not know it, but there are technologies out there that let retailers and others track their movements within and around stores and other attractions through their mobile devices. Businesses can use the information to identify trends in consumer behavior, plan sales and promotions, and more efficiently staff their stores and structure check-out (although no matter how sophisticated the technology, we always manage to choose the slow-moving line).
We’re not lyricists, but had the 1972 hit “You Don’t Mess Around with Jim” been addressed to defendants in FTC actions, here’s our proposed rewrite:
You don’t tug on Superman’s cape.
You don’t spit into the wind.
You don’t pull the mask off that old Lone Ranger.
And you don’t engage in acts and practices in contempt of a United States District Judge’s Permanent Injunction.
Imagine doing a routine online search and having the search engine serve up files that include medical histories, notes from psychiatric sessions and children’s medical exams, sensitive information about drug abuse or pregnancy loss, and personal data like Social Security and driver’s license numbers. That suggests a breach that “uh-oh” doesn’t begin to cover. The FTC’s lawsuit against GMR Transcription Services &ndas
Today is Data Security Day. You've educated your staff about limiting access to sensitive information, locking up confidential paperwork, and securing the network. But Latanya Sweeney, the FTC’s new Chief Technologist, just clued us in about a potential security vulnerability you, your HR team, and your web master can do something right now to correct.
When an ad purports to show a “right before your eyes” demonstration of a product in action, the visual must be a truthful representation of what it can do. If that’s not the case, both the advertiser and the ad agency can find themselves in law enforcement quicksand. That may have been news to Don Draper and his colleagues at Sterling Cooper in the early 60s, but it’s been a well-established legal tenet since then. The FTC&