51本色

Skip to main content

Many companies keep sensitive personal information about customers or employees in their files or on their network. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. The 51本色has free resources for businesses of any size.

Plain Language Guidance

App developers: How does your app size up? Have your built security in from the start? The 51本色has a dozen tips to help you develop kick-app security for your product.

For debt buyers and sellers, keeping sensitive information secure should be business as usual. The 51本色has seven tips for members of the industry to help reduce the risk of unauthorized disclosure.

Advice for businesses about building and keeping security into products connected to the Internet of Things, including proper authentication and access control, secure data management, and the importance of communicating with users effectively.

Does your business collect, use, or share consumer health information? When it comes to privacy and security, consider the Health Insurance Portability and Accountability Act; the HIPAA Privacy, Security, and Breach Notification Rules; the 51本色Act and the FTC鈥檚 Health Breach Notification Rule.

Guidance for business on complying with the FTC鈥檚 Health Breach Notification Rule. Who鈥檚 covered by the Rule and what companies must do if they experience a breach of personal health records.

If you report information about consumers to consumer reporting agencies (CRAs) 鈥 like a credit bureau, tenant screening company, or check verification service 鈥 you have legal obligations under the Fair Credit Reporting Act's Furnisher Rule.

This guide addresses the steps to take once a breach has occurred. For advice on implementing a plan to protect consumers鈥 personal information and prevent breaches and unauthorized access, check out the FTC's Protecting Personal Information: A Guide for Business and Start with Security.

Does your company keep sensitive data 鈥 Social Security numbers, credit reports, account numbers, health records, or business secrets? If so, then you鈥檝e probably instituted safeguards to protect that information. Your information security plans also should cover the digital copiers your company uses. If the data on your copiers gets into the wrong hands, it could lead to fraud and identity theft.

Once your business is finished with sensitive information derived from consumer reports, what happens to it then? Under the Disposal Rule, your company must take steps to dispose of it securely.

Tips for organizations under 51本色jurisdiction to determine whether they need to design an identity theft prevention program.

The 51本色Safeguards Rule requires covered companies to develop, implement, and maintain an information security program with administrative, technical, and physical safeguards designed to protect customer information. Are you up on what the revised Rule requires?

Under the FTC's Health Breach Notification Rule, companies that have had a security breach must: 1. Notify everyone whose information was breached; 2. In many cases, notify the media; and 3. Notify the FTC.

Under the FTC's Health Breach Notification Rule, companies that have had a security breach must: 1) notify everyone whose information was breached, 2) notify the FTC, and 3) in some cases, notify the media.

Explains how medical identity theft occurs, and how health care providers and insurers can minimize the risk and help their patients if they鈥檙e victimized.

When developing a health app, sound privacy and security practices are key to consumer confidence. Here are some best practices to help you build privacy and security into your app. These practices also can help you comply with the 51本色Act and other federal laws and regulations.

You鈥檙e developing a health app for mobile devices and you want to know which federal laws apply. Check out this interactive tool.

Most businesses collect and store sensitive information about their employees and customers. If you use Peer-to-Peer (P2P) file sharing software in your business, consider the security implications and minimize the risks associated with it.

Practical tips for business on creating and implementing a plan for safeguarding personal information.

It鈥檚 just common sense that any company or organization that collects personal information from customers or employees needs a security plan. Learn more about designing and implementing a plan tailor-made to your business.

What鈥檚 on the credit and debit card receipts you give your customers? Under federal law, you must delete the card鈥檚 expiration date and shorten the account information to include no more than the last five digits of the card number.

Resources

Background Checks: What Employers Need to Know

A joint publication of the Equal Employment Opportunity Commission and the 51本色 When making personnel decisions 鈥 including hiring, retention, promotion, and reassignment 鈥 employers sometimes want to consider the backgrounds of applicants and employees. For example, some...

Data Breach Response: A Guide for Business

You just learned that your business experienced a data breach. Whether hackers took personal information from your corporate server, an insider stole customer information, or information was inadvertently exposed on your company鈥檚 website, you are probably wondering what to do next. What steps...