PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Five Tips From the FTC on Protecting Personal Information & Preventing a Data Breach

Recent news headlines about data breaches with Target stores and U.S. hotel chains emphasize the importance of a sound data security plan for businesses -- these tips from the Federal Trade Commission can help identify any gaps.

2014-02-18
LANCASTER, CA, February 18, 2014 (Press-News.org) As Americans go throughout their day, filling up gas tanks, shopping online and visiting the grocery store, a trail of information is left behind - names, dates of birth, credit card numbers, addresses, online login names and passwords.

Many don't give much thought about personally identifiable information (PII) that companies collect until national headlines grab their attention with startling news, such as the 110 million Target customers PII compromised and more recently, some of the largest hotel chains in the U.S. admitting a data breach affected customers across more than 14 states.

Consumers want to know that the information being collected is being actively safeguarded. The Federal Trade Commission (FTC) offers a guide for businesses on how to safeguard personal information and advises that a sound data security plan is built on five key principles.

1. Take stock: Know what personal information is in files and on computers.
According to the FTC, a solid plan begins with knowing what personal information is kept in company files and on employee computers. This includes all computers, laptops, mobile devices, flash drives, disks, home computers and digital copiers. It is also recommended that businesses stay on top of which employees have access to the information, how it is received and where the information is stored.

2. Scale down: Keep only the information necessary for business.
Once the information is identified, it's time to scale down and only keep what is needed for business. If there is not a legitimate need for PII, there is no need to collect or store it. Once determined what data is absolutely critical for business operations, it's important to only keep it for as long as the information is needed. There is no need to use PII, such as social security numbers for purposes such as employee or customer identification numbers.

3. Lock it: Protect the information.
It is also essential to lock and protect the information - this includes physical and electronic security measures. Physical items include paper documents and files, as well as CDs, zip drives and backups with PII; which should be locked up in a file cabinet, safe or room with limited access to employees with a legitimate need. Never leave a laptop or paper files such as rental applications unattended in your vehicle. To implement electronic security measures, it's critical to keep computer virus detection software, anti-Spyware software, firewalls, routers, servers and additional systems up-to-date with appropriate patches and updates.

Removing or changing default passwords can also help avoid unnecessary risks. The longer and more complex passwords are, the better. According to the FTC, it is best to avoid passwords with common dictionary words and instead use a combination of upper-case and lower-case letters, numbers and special characters.

4. Pitch it: Properly dispose of information no longer needed.
When it comes time to properly dispose of what is no longer needed, it is important that the information cannot be read or reconstructed. Paper records should be shredded, burned or pulverized before discarding. As for computers and portable storage devices; according to the FTC, it's imperative that all utility programs are wiped to make sure files are no longer recoverable.

5. Plan ahead: Create and be ready to implement a response to security breaches.
Lastly, it's critical to create a written plan of response in the event of a security breach approved and familiar to the staff. A timely response and investigation of the incident is also important and employees should know who to contact both internally and externally in the event of a data breach. According to the FTC, this may include consumers, law enforcement, customers, credit bureaus and other business that may be affected.

In addition to these tips for protecting PII, companies such as Visa , MasterCard and American Express are governed by Payment Card Industry Data Security Standards (PCI DSS). They are required to maintain compliance with 12 standards, with the six overall control objectives of building and maintaining a secure network, protecting cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks and maintaining an Information Security policy. While similar to the tips recommended by the FTC, these regulations are much more in-depth, with mandatory compliance.

Recent data breach events with Target stores and U.S. hotel chains serve as an important reminder of how important compliance is. While currently companies such as Visa and MasterCard require both merchants and service providers to maintain PCI DSS compliance, when it comes to protecting PII, going the extra mile to safeguard data, never hurts.

Experian for example, takes proactive measures to safeguard PII and holds clients and partners to the same standard by adopting a similar PCI DSS process and requiring an Experian Independent Third Party Assessment (EI3PA) certification. The certification is required for all companies who process, store or transmit credit information provided by Experian.

As a nationwide tenant screening expert for the multifamily housing industry, CIC maintains a Level 1 EI3PA certification on an annual basis to ensure consumer PII remains safeguarded. Additionally, CIC upholds to the Fair Credit Reporting Act (FCRA), Consumer Financial Protection Bureau (CFPB) and FTC regulations. Protecting the privacy and information of consumers while delivering the most comprehensive tenant screening, remains CIC's highest priority. CIC subscribers are notified in writing of FCRA regulations and Access Security Requirements, and must consent to uphold the requirements.

As more and more data breaches continue to gain national attention, it's critical that businesses remain committed to protecting consumer PII and on the leading edge to implement security measures to prevent a breach.

About CIC

Founded in 1986, CIC is a leading provider of tenant screening for the multifamily housing industry. CIC offers tenant background checks for the rental industry, gives clients secure access to credit reports from all three major bureaus, the nation's most comprehensive eviction records database, and includes a complete nationwide criminal records search. For more information, please visit http://www.cicreports.com.


ELSE PRESS RELEASES FROM THIS DATE:

Subrata Roy Talks About India's Economic Growth and the Necessity of Good Talent to Achieve the Target

2014-02-18
India is trying to raise 500 million skilled people by the end of 2022. How can companies help to make this dream comes true? I think the human resource development is the best part of Indian corporate, working as the biggest platform of trained people. Thereby, they should try hard to get this target. It is also important to develop the entrepreneurial skills. The corporate sector should come forward to increase the job opportunities and take the employment as investment to boost up the economical condition of the country. In such a doubtful economic condition, ...

Ten Pretty Good Reasons to Hire Boston and Rhode Island (RI) Wedding DJs Ra-Mu and The Crew for your 2014-2015 Boston-Providence-Newport Reception

2014-02-18
Ten Pretty Good Reasons to Hire Boston and Rhode Island (RI) Wedding DJs Ra-Mu and The Crew for your 2014-2015 Boston-Providence-Newport Reception 10. Ra-Mu and the Crew are CONSISTENT, DOMINANT, AND CLUTCH in getting your guests on the dance floor. 9. Ra-Mu and the Crew have the most number of positive reviews than any other DJ company in Rhode Island. 8. Ra-Mu and the Crew have ample video footage online(youtube and vimeo) to showcase talent before potential clients sign a contract. 7. Ra-Mu and the Crew is excited about your wedding. We are PASSIONATE about ...

Visix Takes Home Bronze Content Award at Digital Signage Expo

2014-02-18
Visix is honored to receive a Bronze DSE Content Award for their Western Iowa Tech Community College (WITCC) digital signage design. Robert Brown, Creative Content Artist for Visix, won the award for his custom interactive wayfinding and traditional digital signage for the school. "Each year at DSE, they award the best in ground-breaking creative projects, and I'm honored to have been recognized," says Brown. "We always aim to bring a unique design approach to each project that not only meets the customer's technical and branding requirements, but will ...

OPTEX and Mobile Pro Systems Create a Rapid-Deployment Security Solution

2014-02-18
Optex Redscan laser detectors provide rugged and reliable detection in an innovative pole-mounted, short-term, mobile surveillance system capable of wireless communication, perimeter detection, lighting and remote monitoring. The security system is being used by Cove Properties, one of Alberta Canada's premier luxury condo builders, to secure construction sites from theft and vandalism in the harsh elements of northern Canada. Cove Properties worked with 2020 DSS, a leading-edge digital security system company in Edmonton, Alberta, who created a unique solution based ...

RealeyeZ Takes 3D Animation to the Next Level with RealHDTM MooV

RealeyeZ Takes 3D Animation to the Next Level with RealHDTM MooV
2014-02-18
Online shoppers are accustomed to viewing consumer products in 360 degrees. Now RealeyeZ3D is taking the power of RealHDTM to the next level. Their new product, RealHDTM MooV, offers moving features that are not available elsewhere in video or 3D marketing and merchandising. "RealHDTM Moov uses the MPEG-4 movie format," says company founder and CEO, Ofer Rubin. "It is compatible with Apple and all other platforms and responsive to all screen sizes. Together with its new scalability. It will look like retailers spent tens of thousands of dollars on high-end ...

Sharon Kenig Named Associate Vice President of Credit & Syndication for AmeriQuest Transportation Services

2014-02-18
Sharon Kenig has been appointed to the position of Associate Vice President of Credit & Syndication for AmeriQuest Transportation Services, a leading provider of comprehensive fleet management services, financial solutions, and operational support services. Kenig joined AmeriQuest in 2011 and is responsible for closing all syndication transactions ranging from $100K to $22M. In addition, she provides all credit analyses and ultimate underwriting decisions in support of all sales and syndication efforts, and conducts pricing analyses and economic summaries for funding ...

Cyclomundo, the Premier Cyclotourism Agency in France, Suggests Tips for Saving on Bicycle Trips Without Skimping on the Experience

2014-02-18
With spring fast approaching, Cyclomundo (http://www.cyclomundo.com/) believes there's no better time than now to consider planning a cycling tour of one of France's many wine-growing regions, the Swiss Alps, the breathtaking Mediterranean coast, or sensuous and historic Tuscany. The French cyclotourism agency prides itself on offering intimate, memorable bike tours at competitive prices. Now, the agency is suggesting even more ways for tourists to save their hard-earned money. Most tours with Cyclomundo are self-guided, which has a couple of distinct advantages. Self-guided ...

Mechanism of dengue virus entry into cells

Mechanism of dengue virus entry into cells
2014-02-18
WASHINGTON D.C. Feb. 17, 2014 -- Dengue fever, an infectious tropical disease caused by a mosquito-borne virus, afflicts millions of people each year, causing fever, headache, muscle and joint pains and a characteristic skin rash. In some people the disease progresses to a severe, often fatal, form known as dengue hemorrhagic fever. Despite its heavy toll, the prevention and clinical treatment of dengue infection has been a "dramatic failure in public health compared to other infectious diseases like HIV," said Ping Liu of the University of North Carolina at Chapel Hill. ...

It's alive! Bacteria-filled liquid crystals could improve biosensing

Its alive! Bacteria-filled liquid crystals could improve biosensing
2014-02-18
VIDEO: Enabled by the birefringence of liquid crystal, motion of 24nm thick bacteria flagella now is easily visible using a simple polarizing microscope. Click here for more information. WASHINGTON D.C. Feb. 17, 2014 -- Plop living, swimming bacteria into a novel water-based, nontoxic liquid crystal and a new physics takes over. The dynamic interaction of the bacteria with the liquid crystal creates a novel form of soft matter: living liquid crystal. The new type of active ...

Finding ways to detect and treat Alzheimer's disease

Finding ways to detect and treat Alzheimers disease
2014-02-18
WASHINGTON D.C. Feb. 17, 2014 -- Alzheimer's disease has long been marked by progress -- but not the kind of progress the medical community seeks. It is the most common form of dementia among older Americans, and its risk increases with increasing age; for those living with the disease, its ravages get worse over time; and as we move into the 21st century, it will place a greater and greater burden on society. The number of Americans living with Alzheimer's has doubled since 1980 and is expected to triple again by 2050. Sadly, Alzheimer's disease has been the least prone ...

LAST 30 PRESS RELEASES:

Fig trees convert atmospheric CO2 to stone

Intra-arterial tenecteplase for acute stroke after successful endovascular therapy

Study reveals beneficial microbes that can sustain yields in unfertilized fields

Robotic probe quickly measures key properties of new materials

Climate change cuts milk production, even when farmers cool their cows

Frozen, but not sealed: Arctic Ocean remained open to life during ice ages

Some like it cold: Cryorhodopsins

Demystifying gut bacteria with AI

Human wellbeing on a finite planet towards 2100: new study shows humanity at a crossroads

Unlocking the hidden biodiversity of Europe’s villages

Planned hydrogen refuelling stations may lead to millions of euros in yearly losses

Planned C-sections increase the risk of certain childhood cancers

Adults who have survived childhood cancer are at increased risk of severe COVID-19

Drones reveal extreme coral mortality after bleaching

New genetic finding uncovers hidden cause of arsenic resistance in acute promyelocytic leukemia

Native habitats hold the key to the much-loved smashed avocado’s future

Using lightning to make ammonia out of thin air

Machine learning potential-driven insights into pH-dependent CO₂ reduction

Physician associates provide safe care for diagnosed patients when directly supervised by a doctor

How game-play with robots can bring out their human side

Asthma: patient expectations influence the course of the disease

UNM physician tests drug that causes nerve tissue to emit light, enabling faster, safer surgery

New study identifies EMP1 as a key driver of pancreatic cancer progression and poor prognosis

XPR1 identified as a key regulator of ovarian cancer growth through autophagy and immune evasion

Flexible, eco-friendly electronic plastic for wearable tech, sensors

Can the Large Hadron Collider snap string theory?

Stuckeman professor’s new book explores ‘socially sustainable’ architecture

Synthetic DNA nanoparticles for gene therapy

New model to find treatments for an aggressive blood cancer

Special issue of Journal of Intensive Medicine analyzes non-invasive respiratory support

[Press-News.org] Five Tips From the FTC on Protecting Personal Information & Preventing a Data Breach
Recent news headlines about data breaches with Target stores and U.S. hotel chains emphasize the importance of a sound data security plan for businesses -- these tips from the Federal Trade Commission can help identify any gaps.