It’s awards season for the entertainment industry. There’s no red carpet in front of the FTC and no one’s likely to ask “Who are you wearing?” — except to ascertain that the manufacturer complied with the Care Labeling Rule. But consumer protection is a common theme in movies nonetheless. With acknowledgments to Steve Baker, director of the FTC’s Midwest Region who first started the list, here are some of our favorite consumer protection-themed films:
The FTC has gone to court in an effort to shut down an operation that allegedly blasted consumers with more than five million illegal spam text messages, including many pitching loan modification help, debt relief, and other services. The agency also has charged that the defendant marketed his text message services with email that violated the CAN-SPAM Act.
How do leaders in advertising, marketing, and law stay current on FTC developments that affect consumers? They read Penn Corner, the agency's monthly digest of notable updates. The February edition runs the gamut from a law enforcement crackdown on robocalls to an FTC staff comment on a North Carolina Board of Opticians' proposal that could impact how Tarheels (and Blue Devils, Demon Deacons, Eagles, and the Wolfpack) buy glasses and contacts.
Of course, no legitimate business would put out a welcome mat for crooks. But as the FTC’s data security cases make clear, that’s the effect when companies fail to take reasonable steps to secure sensitive information in their possession — or data they allow others to access. Three recent settlements with companies that resell credit reports illustrate that point.
Whether you’re waiting to board an airplane or grabbing a quick cuppa at a neighborhood café, public wireless networks are a great way for busy professionals to keep connected.
Convenient? Yes. Secure? Mmm, not so much.
Unfortunately, most hotspots don’t encrypt what goes over the internet. So if you send email, manage your calendar, use social networks, or transmit financial data while using a public network, you make it easier for hackers to lift confidential info like user names, passwords, and account numbers.