SlideShare a Scribd company logo
MARKETING YOUR
MOBILE APP
GET IT RIGHT FROM THE START
Federal Trade Commission | business.ftc.gov
1
CONGRATULATIONS! The app business is burgeoning and
you’ve decided to get in on the boom. Maybe you work for an
exciting start-up or are striking out on your own. Regardless
of the size of your business, the Federal Trade Commission
(FTC) – the nation’s consumer protection agency – has
guidelines to help you comply with truth-in-advertising
standards and basic privacy principles.
“But we’re a small company and haven’t made any money
from our app yet.” All the more reason to build compliance
in from the start. Laws that apply to established businesses
apply to you, too, and violations can be costly. In addition,
satisfied users may be your best form of marketing. Breaking
into the business with an app that delivers on its promises is
key to your long-term success.
Of course, there’s no one-size-fits-all approach. Every app is
different. Still, there are some general guidelines that all app
developers should consider.
Truthful Advertising
TELL THE TRUTH ABOUT WHAT YOUR APP CAN DO. Once you
start distributing your app, you become an advertiser. Under
the law, an ad isn’t just a multimillion dollar TV campaign. It’s
pretty much anything a company tells a prospective buyer
or user – expressly or by implication – about what a product
can do. Whether it’s what you say on a website, in an app
store, or within the app itself, you have to tell the truth. False
or misleading claims, as well as the omission of certain
important information, can tick off users and land you in legal
hot water. One rule of thumb: Look at your product and your
advertising from the perspective of average users, not just
software engineers or app experts. If you make objective
claims about your app, you need solid proof to back them
up before you start selling. The law calls that “competent
2
and reliable evidence.” If you say your app provides benefits
related to health, safety, or performance, you may need
competent and reliable scientific evidence. For example, the
FTC recently took action against developers who said their
apps could treat acne, but who didn’t have scientific evidence
to back up their claims. Visit the BCP Business Center at
business.ftc.gov for more on keeping your claims compliant.
DISCLOSE KEY INFORMATION CLEARLY AND CONSPICUOUSLY.
If you need to disclose information to make what you
say accurate, your disclosures have to be “clear and
conspicuous.” What does that mean? That they’re big
enough and clear enough that users actually notice them
and understand what they say. Generally, the law doesn’t
dictate a specific font or type size, but the FTC has taken
action against companies that have buried important terms
and conditions in long licensing agreements, in dense blocks
of legal mumbo jumbo, or behind vague hyperlinks. Clear
and conspicuous disclosures make good business sense.
Most people react negatively if they think a company is trying
to pull a fast one by hiding important information. Users are
more likely to continue to do business with a company that
gives them the straight story up front.
Privacy
BUILD PRIVACY CONSIDERATIONS IN FROM THE START. The
FTC calls this “privacy by design.” What does it mean?
Incorporating privacy protections into your practices, limiting
the information you collect, securely storing what you hold on
to, and safely disposing of what you no longer need. Apply
these principles in selecting the default settings for your app
and make the default settings consistent with what people
would expect based on the kind of app you’re selling. For any
collection or sharing of information that’s not apparent, get
3
users’ express agreement. That way your customers aren’t
unwittingly disclosing information they didn’t mean to share.
BE TRANSPARENT ABOUT YOUR DATA PRACTICES. Even if you
need to collect or share data so your app can operate, be
clear to users about your practices. Explain what information
your app collects from users or their devices and what you
do with their data. For example, if you share information with
another company, tell your users and give them information
about that company’s data practices.
OFFER CHOICES THAT ARE EASY TO FIND AND EASY TO
USE. Give your users tools that offer choices in how to use
your app – like privacy settings, opt-outs, or other ways for
users to control how their personal information is collected
and shared. It’s good business to apply the “clear and
conspicuous” standard to these choice mechanisms, too.
Make it easy for people to find the tools you offer, design
them so they’re simple to use, and follow through by honoring
the choices users have made.
HONOR YOUR PRIVACY PROMISES. “But we don’t make any
promises.” Think again and reread your privacy policy or what
you say about your privacy settings. Chances are you make
assurances to users about the security standards you apply
or what you do with their personal information. At minimum,
app developers – like all other marketers – have to live up to
those promises. The FTC has taken action against dozens of
companies that claimed to safeguard the privacy or security
of users’ information, but didn’t live up to their promises in
the day-to-day operation of their business. The FTC also has
taken action against businesses that made broad statements
about their privacy practices, but then failed to disclose the
extent to which they collected or shared information with
others – like advertisers or other app developers. What if
you decide down the road to change your privacy practices?
4
You’ll need to get users’ affirmative permission for material
changes. Just editing the language in your privacy policy
isn’t enough in those circumstances. And while you’re taking
another look at your privacy promises, read them with users
in mind. Is the language clear? Is it easy to read on a small
screen? Are you using design elements – color, fonts, and
the like – to call attention to important information?
PROTECT KIDS’ PRIVACY. If your app is designed for children
under 13 and collects personal information, you have
additional requirements under the Children’s Online Privacy
Protection Act (COPPA) and the FTC’s COPPA Rule. But
COPPA compliance doesn’t end there. Regardless of the
kind of app you sell, if you know you’re collecting personal
information from children under 13 – or if you know you’re
collecting personal information from another website or online
service (including another app) that’s designed for kids under
13 – COPPA applies, too.
What does COPPA require? Under COPPA, you have to
clearly explain your information practices, provide direct
notice to parents about those practices, and get parental
consent before collecting personal information from kids.
These obligations apply to you when third parties (like ad
networks or plug-ins) collect personal information through
your app. COPPA also requires that you keep “personal
information” collected from children confidential and secure.
The rule defines that term to include a first and last name, an
address, a telephone number, online contact information, a
screen name or user name that functions like online contact
information, geolocation information, or a persistent identifier
that can be used to recognize a user over time and across
different websites or online services (such as device identifier,
cookie identifier, serial number, or IP address). Visit the FTC’s
COPPA page at business.ftc.gov for compliance advice.
5
COLLECT SENSITIVE INFORMATION ONLY WITH CONSENT. Even
when you’re not dealing with kids’ information, it’s important
to get users’ affirmative OK before you collect any sensitive
data from them, like medical, financial, or precise geolocation
information. It’s a mistake to assume they won’t mind.
KEEP USER DATA SECURE. At minimum, you have to live up
to the privacy promises you make. But what if you don’t say
anything specific about what you do with users’ information?
Under the law, you still have to take reasonable steps to keep
sensitive data secure. One way to make that task easier: If you
don’t have a specific need for the information, don’t collect it in
the first place. The wisest policy is to:
1.	 collect only the information you need;
2.	 secure the data you keep by taking reasonable
precautions against well-known security risks;
3.	 limit access to a need-to-know basis; and
4.	 safely dispose of data when you no longer need it.
These principles apply both to information you ask users to
give you and to any information your software collects. If you
work with contractors, make sure they abide by the same high
standards. The FTC has free resources to help you develop a
security plan appropriate for your business. One place to start:
Protecting Personal Information: A Guide for Business and
the accompanying online tutorial.
Federal Trade Commission
BCP Business Center
business.ftc.gov
April 2013
ABOUT THE FTC
The FTC works for the consumer to prevent fraudulent,
deceptive, and unfair practices in the marketplace
and to provide information to businesses to help
them comply with the law. To file a complaint or to get
free information on consumer issues, visit ftc.gov or
call toll-free, 1-877-FTC-HELP (1-877-382-4357);
TTY: 1-866-653-4261. Watch a video, How to File
a Complaint, at ftc.gov/video to learn more. The FTC
enters consumer complaints into the Consumer Sentinel
Network, a secure online database and investigative tool
used by hundreds of civil and criminal law enforcement
agencies in the U.S. and abroad. For free compliance
resources, visit the Business Center, business.ftc.gov.
Opportunity to Comment
The National Small Business Ombudsman and 10
Regional Fairness Boards collect comments from small
businesses about federal compliance and enforcement
activities. Each year, the Ombudsman evaluates the
conduct of these activities and rates each agency’s
responsiveness to small businesses. Small businesses
can comment to the Ombudsman without fear of
reprisal. To comment, call toll-free 1-888-REGFAIR
(1-888-734-3247) or go to sba.gov/ombudsman.

More Related Content

What's hot

Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Greg Sterling
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online AdvertisingGautam Verma
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
 
10 Step Guide to COPPA Compliance
10 Step Guide to COPPA Compliance10 Step Guide to COPPA Compliance
10 Step Guide to COPPA ComplianceKegan Blumenthal
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)Matthew Asbell
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA PresentationRaidious
 
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...TRUSTe
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacyMark Albala
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1feitwincities
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresPatton Boggs LLP
 
Entertainment Law & Technology: Trends in Media & Advertising
Entertainment Law & Technology:  Trends in Media & AdvertisingEntertainment Law & Technology:  Trends in Media & Advertising
Entertainment Law & Technology: Trends in Media & AdvertisingAdler Law Group
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013Amarach Research
 
Social Media Powerpoint Final
Social Media Powerpoint   FinalSocial Media Powerpoint   Final
Social Media Powerpoint FinalDommermuth
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 

What's hot (20)

Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online Advertising
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
Ethics in emarketing
Ethics in emarketingEthics in emarketing
Ethics in emarketing
 
10 Step Guide to COPPA Compliance
10 Step Guide to COPPA Compliance10 Step Guide to COPPA Compliance
10 Step Guide to COPPA Compliance
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA Presentation
 
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacy
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Entertainment Law & Technology: Trends in Media & Advertising
Entertainment Law & Technology:  Trends in Media & AdvertisingEntertainment Law & Technology:  Trends in Media & Advertising
Entertainment Law & Technology: Trends in Media & Advertising
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013
 
Social Media Powerpoint Final
Social Media Powerpoint   FinalSocial Media Powerpoint   Final
Social Media Powerpoint Final
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 

Viewers also liked

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013- Mark - Fullbright
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children - Mark - Fullbright
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012- Mark - Fullbright
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security- Mark - Fullbright
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 

Viewers also liked (6)

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 

Similar to Business Marketing Your Mobile app

Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applicationsVodafone developer
 
Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features			Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features Shelly Megan
 
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...WiTH Collective
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyTinuiti
 
What is Marketing Compliance?
What is Marketing Compliance?What is Marketing Compliance?
What is Marketing Compliance?PerformLine Inc.
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratchTechugo
 
Telehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive AdvantageTelehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive AdvantageRoger Smith
 
Lawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt YouLawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt YouOregon Law Practice Management
 
FTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA WebinarFTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA WebinarMaya Uppaluru
 
Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile appsioannis iglezakis
 
HIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete GuideHIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete GuideDashTechnologiesInc
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
Mobile Apps Made Easy Special Report
Mobile Apps Made Easy Special ReportMobile Apps Made Easy Special Report
Mobile Apps Made Easy Special ReportNiche Video Galore
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!Shelly Megan
 
Health insurance app development cost
Health insurance app development costHealth insurance app development cost
Health insurance app development costFuGenx Technologies
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelAbhijeet Kelkar
 
Social media 5 tips to not get sued
Social media   5 tips to not get suedSocial media   5 tips to not get sued
Social media 5 tips to not get suedEric Hsu
 

Similar to Business Marketing Your Mobile app (20)

Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applications
 
Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features			Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features
 
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things Privacy
 
What is Marketing Compliance?
What is Marketing Compliance?What is Marketing Compliance?
What is Marketing Compliance?
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
Telehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive AdvantageTelehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive Advantage
 
Lawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt YouLawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt You
 
FTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA WebinarFTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA Webinar
 
Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile apps
 
HIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete GuideHIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete Guide
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Mobile Apps Made Easy Special Report
Mobile Apps Made Easy Special ReportMobile Apps Made Easy Special Report
Mobile Apps Made Easy Special Report
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
 
Health insurance app development cost
Health insurance app development costHealth insurance app development cost
Health insurance app development cost
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 
GDPR Tip Sheet
GDPR Tip SheetGDPR Tip Sheet
GDPR Tip Sheet
 
Social media 5 tips to not get sued
Social media   5 tips to not get suedSocial media   5 tips to not get sued
Social media 5 tips to not get sued
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxJisc
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPCeline George
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationDelapenabediema
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfkaushalkr1407
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

Business Marketing Your Mobile app

  • 1. MARKETING YOUR MOBILE APP GET IT RIGHT FROM THE START Federal Trade Commission | business.ftc.gov
  • 2.
  • 3. 1 CONGRATULATIONS! The app business is burgeoning and you’ve decided to get in on the boom. Maybe you work for an exciting start-up or are striking out on your own. Regardless of the size of your business, the Federal Trade Commission (FTC) – the nation’s consumer protection agency – has guidelines to help you comply with truth-in-advertising standards and basic privacy principles. “But we’re a small company and haven’t made any money from our app yet.” All the more reason to build compliance in from the start. Laws that apply to established businesses apply to you, too, and violations can be costly. In addition, satisfied users may be your best form of marketing. Breaking into the business with an app that delivers on its promises is key to your long-term success. Of course, there’s no one-size-fits-all approach. Every app is different. Still, there are some general guidelines that all app developers should consider. Truthful Advertising TELL THE TRUTH ABOUT WHAT YOUR APP CAN DO. Once you start distributing your app, you become an advertiser. Under the law, an ad isn’t just a multimillion dollar TV campaign. It’s pretty much anything a company tells a prospective buyer or user – expressly or by implication – about what a product can do. Whether it’s what you say on a website, in an app store, or within the app itself, you have to tell the truth. False or misleading claims, as well as the omission of certain important information, can tick off users and land you in legal hot water. One rule of thumb: Look at your product and your advertising from the perspective of average users, not just software engineers or app experts. If you make objective claims about your app, you need solid proof to back them up before you start selling. The law calls that “competent
  • 4. 2 and reliable evidence.” If you say your app provides benefits related to health, safety, or performance, you may need competent and reliable scientific evidence. For example, the FTC recently took action against developers who said their apps could treat acne, but who didn’t have scientific evidence to back up their claims. Visit the BCP Business Center at business.ftc.gov for more on keeping your claims compliant. DISCLOSE KEY INFORMATION CLEARLY AND CONSPICUOUSLY. If you need to disclose information to make what you say accurate, your disclosures have to be “clear and conspicuous.” What does that mean? That they’re big enough and clear enough that users actually notice them and understand what they say. Generally, the law doesn’t dictate a specific font or type size, but the FTC has taken action against companies that have buried important terms and conditions in long licensing agreements, in dense blocks of legal mumbo jumbo, or behind vague hyperlinks. Clear and conspicuous disclosures make good business sense. Most people react negatively if they think a company is trying to pull a fast one by hiding important information. Users are more likely to continue to do business with a company that gives them the straight story up front. Privacy BUILD PRIVACY CONSIDERATIONS IN FROM THE START. The FTC calls this “privacy by design.” What does it mean? Incorporating privacy protections into your practices, limiting the information you collect, securely storing what you hold on to, and safely disposing of what you no longer need. Apply these principles in selecting the default settings for your app and make the default settings consistent with what people would expect based on the kind of app you’re selling. For any collection or sharing of information that’s not apparent, get
  • 5. 3 users’ express agreement. That way your customers aren’t unwittingly disclosing information they didn’t mean to share. BE TRANSPARENT ABOUT YOUR DATA PRACTICES. Even if you need to collect or share data so your app can operate, be clear to users about your practices. Explain what information your app collects from users or their devices and what you do with their data. For example, if you share information with another company, tell your users and give them information about that company’s data practices. OFFER CHOICES THAT ARE EASY TO FIND AND EASY TO USE. Give your users tools that offer choices in how to use your app – like privacy settings, opt-outs, or other ways for users to control how their personal information is collected and shared. It’s good business to apply the “clear and conspicuous” standard to these choice mechanisms, too. Make it easy for people to find the tools you offer, design them so they’re simple to use, and follow through by honoring the choices users have made. HONOR YOUR PRIVACY PROMISES. “But we don’t make any promises.” Think again and reread your privacy policy or what you say about your privacy settings. Chances are you make assurances to users about the security standards you apply or what you do with their personal information. At minimum, app developers – like all other marketers – have to live up to those promises. The FTC has taken action against dozens of companies that claimed to safeguard the privacy or security of users’ information, but didn’t live up to their promises in the day-to-day operation of their business. The FTC also has taken action against businesses that made broad statements about their privacy practices, but then failed to disclose the extent to which they collected or shared information with others – like advertisers or other app developers. What if you decide down the road to change your privacy practices?
  • 6. 4 You’ll need to get users’ affirmative permission for material changes. Just editing the language in your privacy policy isn’t enough in those circumstances. And while you’re taking another look at your privacy promises, read them with users in mind. Is the language clear? Is it easy to read on a small screen? Are you using design elements – color, fonts, and the like – to call attention to important information? PROTECT KIDS’ PRIVACY. If your app is designed for children under 13 and collects personal information, you have additional requirements under the Children’s Online Privacy Protection Act (COPPA) and the FTC’s COPPA Rule. But COPPA compliance doesn’t end there. Regardless of the kind of app you sell, if you know you’re collecting personal information from children under 13 – or if you know you’re collecting personal information from another website or online service (including another app) that’s designed for kids under 13 – COPPA applies, too. What does COPPA require? Under COPPA, you have to clearly explain your information practices, provide direct notice to parents about those practices, and get parental consent before collecting personal information from kids. These obligations apply to you when third parties (like ad networks or plug-ins) collect personal information through your app. COPPA also requires that you keep “personal information” collected from children confidential and secure. The rule defines that term to include a first and last name, an address, a telephone number, online contact information, a screen name or user name that functions like online contact information, geolocation information, or a persistent identifier that can be used to recognize a user over time and across different websites or online services (such as device identifier, cookie identifier, serial number, or IP address). Visit the FTC’s COPPA page at business.ftc.gov for compliance advice.
  • 7. 5 COLLECT SENSITIVE INFORMATION ONLY WITH CONSENT. Even when you’re not dealing with kids’ information, it’s important to get users’ affirmative OK before you collect any sensitive data from them, like medical, financial, or precise geolocation information. It’s a mistake to assume they won’t mind. KEEP USER DATA SECURE. At minimum, you have to live up to the privacy promises you make. But what if you don’t say anything specific about what you do with users’ information? Under the law, you still have to take reasonable steps to keep sensitive data secure. One way to make that task easier: If you don’t have a specific need for the information, don’t collect it in the first place. The wisest policy is to: 1. collect only the information you need; 2. secure the data you keep by taking reasonable precautions against well-known security risks; 3. limit access to a need-to-know basis; and 4. safely dispose of data when you no longer need it. These principles apply both to information you ask users to give you and to any information your software collects. If you work with contractors, make sure they abide by the same high standards. The FTC has free resources to help you develop a security plan appropriate for your business. One place to start: Protecting Personal Information: A Guide for Business and the accompanying online tutorial.
  • 8. Federal Trade Commission BCP Business Center business.ftc.gov April 2013 ABOUT THE FTC The FTC works for the consumer to prevent fraudulent, deceptive, and unfair practices in the marketplace and to provide information to businesses to help them comply with the law. To file a complaint or to get free information on consumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. Watch a video, How to File a Complaint, at ftc.gov/video to learn more. The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online database and investigative tool used by hundreds of civil and criminal law enforcement agencies in the U.S. and abroad. For free compliance resources, visit the Business Center, business.ftc.gov. Opportunity to Comment The National Small Business Ombudsman and 10 Regional Fairness Boards collect comments from small businesses about federal compliance and enforcement activities. Each year, the Ombudsman evaluates the conduct of these activities and rates each agency’s responsiveness to small businesses. Small businesses can comment to the Ombudsman without fear of reprisal. To comment, call toll-free 1-888-REGFAIR (1-888-734-3247) or go to sba.gov/ombudsman.