Risk
11/14/2012
09:52 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

FTC Commissioner Chats With Industry Leaders

"Privacy is being incorporated at the most fundamental levels," said Julie Brill at Annual PMA Marketing Law Conference

CHICAGO, Nov. 13, 2012 /PRNewswire/ -- FTC Commissioner Julie Brill joined Ron Urbach of Davis & Gilbert, in a far-ranging "Fireside Chat" as a keynote presentation of the Annual PMA Marketing Law Conference.

Before Commissioner Brill joined him onstage, Mr. Urbach reminded his audience of more than 600 leading lawyers, brand marketers and policymakers just how fast "Big Data" continues to grow. "Ninety percent of the data created over all of human history was created in the last two years," according to Mr. Urbach.

"Businesses have become data vacuum cleaners. It's important that legal concerns do not go unnoticed."

Commissioner Brill stressed that those concerns can never be an afterthought and discussed the FTC's recent privacy report and its recommendations around "privacy by design" where brands are asked to consider privacy issues at the conceptual stage rather than to treat them as an add-on.

When asked by Mr. Urbach for an overall impression of how the industry is meeting these challenges, she provided high marks. "I am remarkably encouraged by the amount of attention companies are giving to our recommendations," said Commissioner Brill. "Companies are bringing in people who specialize in these issues and creating Chief Privacy Officers. Privacy is being incorporated at the most fundamental levels."

Mr. Urbach and Commissioner Brill touched on a variety of topics including the need to consider what they termed "the context of the interaction" and the manner in which data is ultimately used; as well as privacy concerns around nascent technologies like facial recognition tools and new-to-market apps.

"The very fact that Commissioner Brill is participating in this forum for this audience demonstrates the need for our industry to be collaborative," said Mr.

Urbach. "We're all encouraged that the FTC recognizes the efforts the industry continues to make in this area. Today's marketplace is the most pluralistic we've seen. Power and innovation are decentralized and there is an increased access to information. All of that is good, but there is a dark side and we have to work together to protect the public."

Industry professionals and the general public are invited to keep up with the conference highlights at www.pmalink.com, on Twitter #pmalaw or by downloading the PMA Law 2012 app at the iTunes store.

About the PMA

Founded in 1911, the New York based PMA is the national non-profit trade association dedicated to the industry of marketing disciplines that motivate behavior, activate response and build brands. Representing $1trillion in sales, these disciplines include promotion marketing, digital marketing, shopper/retailer marketing, sponsorship and experiential marketing. The organization's membership is comprised of Fortune 500 companies, top marketing agencies, law firms, retailers, service providers and academia, representing thousands of brands worldwide. More information is available at www.pmalink.org.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-2413
Published: 2014-10-20
Cross-site scripting (XSS) vulnerability in the ja_purity template for Joomla! 1.5.26 and earlier allows remote attackers to inject arbitrary web script or HTML via the Mod* cookie parameter to html/modules.php.

CVE-2012-5244
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Banana Dance B.2.6 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) return, (2) display, (3) table, or (4) search parameter to functions/suggest.php; (5) the id parameter to functions/widgets.php, (6) the category parameter to...

CVE-2012-5694
Published: 2014-10-20
Multiple SQL injection vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 allow remote attackers to execute arbitrary SQL commands via the (1) agentPhNo, (2) controlPhNo, (3) agentURLPath, (4) agentControlKey, or (5) platformDD1 parameter to frameworkgui/attach2Agents.p...

CVE-2012-5695
Published: 2014-10-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Bulb Security Smartphone Pentest Framework (SPF) 0.1.2 through 0.1.4 allow remote attackers to hijack the authentication of administrators for requests that conduct (1) shell metacharacter or (2) SQL injection attacks or (3) send an SMS m...

CVE-2012-5696
Published: 2014-10-20
Bulb Security Smartphone Pentest Framework (SPF) before 0.1.3 does not properly restrict access to frameworkgui/config, which allows remote attackers to obtain the plaintext database password via a direct request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.