Protecting the Security of Your Information

27
Protecting the Protecting the Security of Your Security of Your Information Information Mary Beth Richards Mary Beth Richards Federal Trade Commission Federal Trade Commission May 7, 2008 May 7, 2008

description

Protecting the Security of Your Information. Mary Beth Richards Federal Trade Commission May 7, 2008. About the FTC. Protects consumers through jurisdiction over both competition and consumer protection Main statute Section 5 of the FTC Act Other statutes Fair Credit Reporting Act - PowerPoint PPT Presentation

Transcript of Protecting the Security of Your Information

Page 1: Protecting the Security of Your Information

Protecting the Security Protecting the Security of Your Informationof Your Information

Mary Beth RichardsMary Beth RichardsFederal Trade CommissionFederal Trade CommissionMay 7, 2008May 7, 2008

Page 2: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

About the FTCAbout the FTC

Protects consumers Protects consumers through jurisdiction over through jurisdiction over both competition and both competition and consumer protectionconsumer protection

Main statuteMain statuteSection 5 of the FTC ActSection 5 of the FTC Act

Other statutesOther statutes Fair Credit Reporting ActFair Credit Reporting Act Children's Online Privacy Children's Online Privacy

Protection ActProtection Act CAN-SPAMCAN-SPAM

Page 3: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Marketing Practices

Privacy & Identity Protection

Financial Practices

Planning & Information

Enforcement

Advertising Practices

Bureau of Consumer ProtectionBureau of Consumer Protection

Consumer & Business Education

Page 4: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

The FTC Uses Multiple ToolsThe FTC Uses Multiple Tools

EnforcementEnforcement

Policy DevelopmentPolicy Development

EducationEducation

Page 6: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Policy Development Policy Development

Page 7: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

EducationEducation

WebsitesWebsites OnGuardOnline.govOnGuardOnline.gov ftc.gov/idtheftftc.gov/idtheft

Print PublicationsPrint Publications 600+ online at ftc.gov600+ online at ftc.gov Available in bulk – freeAvailable in bulk – free

MultimediaMultimedia Video – YouTube.comVideo – YouTube.com Interactive tutorialsInteractive tutorials

Page 8: Protecting the Security of Your Information

Data Security and Data Security and Identity TheftIdentity Theft

Page 9: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Data Security EnforcementData Security Enforcement

20 data security cases20 data security cases

Most recent casesMost recent cases TJXTJX Lexis NexisLexis Nexis

Page 10: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

The President’s Identity Theft Task ForceThe President’s Identity Theft Task Force

17 Federal partners17 Federal partners

Strategic PlanStrategic Plan Released April 2007Released April 2007

Task Force WebsiteTask Force Website www.idtheft.govwww.idtheft.gov

Page 11: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Task Force RecommendationsTask Force Recommendations

31 recommendations, 31 recommendations, organized around life cycle organized around life cycle of identity theftof identity theft PreventionPrevention Victim recoveryVictim recovery Deterrence and punishmentDeterrence and punishment

Page 12: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Task Force ProgressTask Force Progress

Data security and breach management guidance to Data security and breach management guidance to government agenciesgovernment agencies

OPM led effort to eliminate uses of SSNs in federal human OPM led effort to eliminate uses of SSNs in federal human resource functionsresource functions

DOJ legislative recommendations on prosecution of identity DOJ legislative recommendations on prosecution of identity thefttheft

Expanded training for prosecutorsExpanded training for prosecutors

Victim assistance Victim assistance

FTC workshopsFTC workshops

FTC educationFTC education

Page 13: Protecting the Security of Your Information

EducationEducation

Page 14: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Outreach & Business GuidanceOutreach & Business Guidance

Page 15: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Interactive Online TutorialInteractive Online Tutorial

Page 16: Protecting the Security of Your Information

OtherOtherTechnology IssuesTechnology Issues

Page 17: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Behavioral AdvertisingBehavioral Advertising

November 2007November 2007Town HallTown Hall

December 2007December 2007Issued Self-Regulatory Issued Self-Regulatory Principles for Public Principles for Public CommentComment

April 2008April 2008Comments received and Comments received and being reviewedbeing reviewed

Page 18: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Spam and PhishingSpam and Phishing

EnforcementEnforcement 94 actions against over 250 94 actions against over 250

defendantsdefendants Recent actionsRecent actions

• ValueclickValueclick

• Spear SystemsSpear Systems

EducationEducation WebsitesWebsites Phishing ecardPhishing ecard PublicationsPublications

Page 19: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Spam and PhishingSpam and Phishing

Policy Research and DevelopmentPolicy Research and Development July 2007July 2007

Spam SummitSpam Summit• Filtering worksFiltering works

• Industry toolsIndustry tools

April 2008April 2008Phishing RoundtablePhishing Roundtable• Task Force on Phishing EducationTask Force on Phishing Education

• Landing PagesLanding Pages

• Phishing VideosPhishing Videos

Page 20: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Phishing Video: “Phishy Home”Phishing Video: “Phishy Home”

Page 21: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

SpywareSpyware

Since October 2004, we have brought 11 cases Since October 2004, we have brought 11 cases that stand for 3 principlesthat stand for 3 principles Consumer’s computer belongs to him or herConsumer’s computer belongs to him or her Buried disclosures of material information necessary to Buried disclosures of material information necessary to

correct an otherwise misleading impression do not workcorrect an otherwise misleading impression do not work Consumers must be able to uninstall and remove Consumers must be able to uninstall and remove

unwanted softwareunwanted software

Page 22: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Mobile CommerceMobile Commerce

TopicsTopics Mobile messaging servicesMobile messaging services Consumers’ controlConsumers’ control Challenges of the small screenChallenges of the small screen Targeting children and teensTargeting children and teens Best practices in preventing fraudBest practices in preventing fraud Security threats and solutionsSecurity threats and solutions Next-generation products/servicesNext-generation products/services

Page 23: Protecting the Security of Your Information

Things of InterestThings of Interest

Page 24: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

National Do Not Call RegistryNational Do Not Call Registry

155 million numbers registered155 million numbers registered

No expiration dateNo expiration date

Page 25: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

ChildrenChildren

EducationEducation ftc.gov/YouAreHereftc.gov/YouAreHere Social NetworkingSocial Networking

Congressional legislationCongressional legislation

Page 26: Protecting the Security of Your Information

FEDERAL TRADE COMMISSIONPROTECTING AMERICA’S CONSUMERS

Ordering PublicationsOrdering Publications

FTC offers practical information on a variety of topics FTC offers practical information on a variety of topics to help consumers avoid rip-offs and exercise their to help consumers avoid rip-offs and exercise their consumer rights, and to help businesses comply with consumer rights, and to help businesses comply with the law. the law.

Single Copies Single Copies • View, print, and download publications from ftc.gov. View, print, and download publications from ftc.gov.

Bulk Orders (50 or More Copies) Bulk Orders (50 or More Copies) • Place order at ftc.gov/bulkorder. Place order at ftc.gov/bulkorder.

Page 27: Protecting the Security of Your Information

Protecting the Security Protecting the Security of Your Informationof Your Information

Mary Beth RichardsMary Beth Richards

Federal Trade CommissionFederal Trade Commission

May 7, 2008May 7, 2008