Categories: ArticlesLegal IT

Privacy Law: Helpful Guides

used with permission from SBA.gov

For many companies, collecting sensitive consumer and employee information is an essential part of doing business. It is your legal responsibility to take steps to properly secure or dispose of it.  Financial data, personal information from children, and material derived from credit reports may raise additional compliance considerations. In addition, you may have legal responsibilities to victims of identity theft. 

The Federal Trade Commission (FTC) regulates and oversees business privacy laws and policies that impact consumers. Check out the following guides from more information on how you can ensure you are compliant.

  • Protecting Consumer Privacy – In general, your online and offline privacy policy is your company’s pledge to your customers about how you will collect, use, share, and protect the consumer data you collect from them. While not required by law, the FTC prohibits deceptive practices. Learn more in this FTC guide.
  • Protecting Children’s Privacy Online – The law sets out specific guidelines about the online collection of personal information from children under 13. Refer to this guide to see if your site is compliant.
  • Using and Disposing of Consumer and Employee Credit Reports – Does your business use consumer or credit reports to evaluate customers’ creditworthiness?  Do you consult reports when evaluating applications for jobs, leases, and insurance?  Learn more about your responsibilities for handling this data.
  • Enforcing Data Security and Preventing Identity Theft – If you keep sensitive personal information about customers or employees in your files, you are required to have a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely. Develop your plan with help from this FTC guide.
  • Safeguarding Sensitive Financial Data – Do you offer your customers financial products or services, like loans, investment advice, or insurance? Learn how to comply with information-sharing practices to safeguard sensitive data.

Bryan Antepara: IT Specialist

Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers.

Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service.

He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

How to Choose an Endpoint Security Solution…and Why It Matters

Think of all the devices accessing your network, from laptops and PCs to tablets and…

5 days ago

Understand the Benefits and Limitations of Automated Tools in Penetration Testing

Penetration testing, the process of simulating cyberattacks to identify vulnerabilities, plays an essential role in…

2 weeks ago

Promote Cyber Security Through Obscurity

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. Is your organization trying to…

2 weeks ago

What Is Microsoft’s Role in the Shared Responsibility Model for Data Security?

Migrating to the cloud delivers undeniable business benefits. But it also opens the door to…

3 weeks ago

Closing the Door On Global Cyber Threats

Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. One of our clients —…

3 weeks ago

Microsoft Planner vs. Project: 5 Key Differences in 2024

With the new Microsoft Planner joining the Microsoft 365 universe this year, users are taking…

4 weeks ago