Tag Archives: FTC

FTC Settles Complaint Against Venmo

On February 27, the Federal Trade Commission (FTC) reached a settlement with Paypal, Inc. relating to the privacy and security practices of Venmo, Paypal’s peer-to-peer payment service. The FTC alleged that Venmo failed to adequately disclose to its users that transfers of funds from their Venmo balances to external bank accounts were subject to review, […]

Identifying Your Independent Recourse Mechanism for Privacy Shield Certification

A U.S. based organization that is subject to the enforcement authority of either the U.S. Federal Trade Commission (FTC) or U.S. Department of Transportation (DOT) may join Privacy Shield by self-certifying its commitment to comply with the seven Privacy Shield Principles. The seventh Privacy Shield Principle—recourse, enforcement, and liability—requires that an organization seeking Privacy Shield […]

In Spite of the “Privacy Shield” U.S. Businesses Will Still Seek Data Protection Guidance

You will probably be seeing reports that the European Union (EU) & the United States (US) agreed on a new mechanism to replace the old Safe Harbor, effectively titled the “Privacy Shield.” The details are hazy and a formal written policy has not been released, but as far as I can glean, the new mechanism […]

An Agnostic View on Cybersecurity

The Federal Trade Commission (FTC) has taken an agnostic view towards cyber security as of late. The FTC’s chairwoman Edith Ramirez has called for a “culture of security” whereby she encourages companies and start-ups to make the appropriate investment for security when they first conceive a product. However, there is a distinct disconnect between the […]

What Are the Federal Government’s Standards for Cyber Security?

The U.S. Federal Trade Commission (FTC) can now take action against companies failing to protect customer data, according to a recent decision by the U.S. Court of Appeals for the Third Circuit. The important point to note about this headline is that the federal government has not set actual standards for cyber security. Therefore, it […]