Threat Intelligence

1/8/2018
03:45 PM
50%
50%

VTech to Pay $650,000 in FTC Settlement

VTech's Kid Connect app and its Planet VTech platform collected personal information on 760,000 children without parental permission, the FTC alleges.

VTech Electronics agreed to a $650,000 settlement payment and sanctions by the Federal Trade Commission (FTC) to resolve charges it violated the Children's Online Privacy Protection Act (COPPA), the FTC announced today.

Under COPPA, companies are required to directly notify parents or obtain verifiable parental consent when collecting personal information on their children and also take reasonable measures to safeguard the information. The FTC alleges VTech's Kid Connect app, which had 638,000 children accounts, and its now-defunct Planet VTech gaming and chat platform, which had 130,000 children accounts, violated COPPA requirements.

The FTC also alleges VTech made false claims in its privacy policy by stating it would encrypt information submitted to Planet VTech and also Learning Lodge, which houses the Kid Connect app. However, VTech did not encrypt any of the information, the FTC said.

The FTC settlement agreement also requires VTech to implement a comprehensive data security program, which will undergo independent audits for the next 20 years. VTech is also permanently prohibited from violating COPPA in the future and misrepresenting its security and privacy practices, as part of the settlement agreement.

Read more about VTech's settlement here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Want Your Daughter to Succeed in Cyber? Call Her John
John De Santis, CEO, HyTrust,  5/16/2018
Don't Roll the Dice When Prioritizing Vulnerability Fixes
Ericka Chickowski, Contributing Writer, Dark Reading,  5/15/2018
New Mexico Man Sentenced on DDoS, Gun Charges
Dark Reading Staff 5/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Typin' in my password. Somebody's shoulder surfin'. Woooh!
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11329
PUBLISHED: 2018-05-22
The DrugDealer function of a smart contract implementation for Ether Cartel, an Ethereum game, allows attackers to take over the contract's ownership, aka ceoAnyone. After that, all the digital assets (including Ether balance and tokens) might be manipulated by the attackers, as exploited in the wil...
CVE-2018-11363
PUBLISHED: 2018-05-22
jpeg_size in pdfgen.c in PDFGen before 2018-04-09 has a heap-based buffer over-read.
CVE-2018-11364
PUBLISHED: 2018-05-22
sav_parse_machine_integer_info_record in spss/readstat_sav_read.c in libreadstat.a in ReadStat 0.1.1 has a memory leak related to an iconv_open call.
CVE-2018-11365
PUBLISHED: 2018-05-22
sas/readstat_sas7bcat_read.c in libreadstat.a in ReadStat 0.1.1 has an infinite loop.
CVE-2018-11339
PUBLISHED: 2018-05-22
An XSS issue was discovered in Frappe ERPNext v11.x.x-develop b1036e5 via a comment.