"Federal Trade Commission 2017 Privacy and Data Security Update.
The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged
with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s
primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits unfair or
deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws,
including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal
Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the
Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission to
address a wide array of practices affecting consumers, including those that emerge with the development of
new technologies and business models.
How Does the FTC Protect Consumer Privacy and Promote Data Security?
The FTC uses a variety of tools to protect consumers’ privacy and personal information. The FTC’s principal
tool is to bring enforcement actions to stop law violations and require companies to take affirmative steps to
remediate the unlawful behavior. This includes, when appropriate, implementation of comprehensive privacy
and security programs, biennial assessments by independent experts, monetary redress to consumers,
disgorgement of ill-gotten gains, deletion of illegally obtained consumer information, and providing robust
transparency and choice mechanisms to consumers. If a company violates an FTC order, the FTC can seek civil
monetary penalties for the violations. The FTC can also obtain civil monetary penalties for violations of certain
privacy statutes and rules, including the Children’s Online Privacy Protection Act, the Fair Credit Reporting Act,
and the Telemarketing Sales Rule. To date, the Commission has brought hundreds of privacy and data security
cases protecting billions of consumers..."
FTC privacy and data security report
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment