SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
MARKETING YOUR
MOBILE APP
GET IT RIGHT FROM THE START
Federal Trade Commission | business.ftc.gov
1
CONGRATULATIONS! The app business is burgeoning and
you’ve decided to get in on the boom. Maybe you work for an
exciting start-up or are striking out on your own. Regardless
of the size of your business, the Federal Trade Commission
(FTC) – the nation’s consumer protection agency – has
guidelines to help you comply with truth-in-advertising
standards and basic privacy principles.
“But we’re a small company and haven’t made any money
from our app yet.” All the more reason to build compliance
in from the start. Laws that apply to established businesses
apply to you, too, and violations can be costly. In addition,
satisfied users may be your best form of marketing. Breaking
into the business with an app that delivers on its promises is
key to your long-term success.
Of course, there’s no one-size-fits-all approach. Every app is
different. Still, there are some general guidelines that all app
developers should consider.
Truthful Advertising
TELL THE TRUTH ABOUT WHAT YOUR APP CAN DO. Once you
start distributing your app, you become an advertiser. Under
the law, an ad isn’t just a multimillion dollar TV campaign. It’s
pretty much anything a company tells a prospective buyer
or user – expressly or by implication – about what a product
can do. Whether it’s what you say on a website, in an app
store, or within the app itself, you have to tell the truth. False
or misleading claims, as well as the omission of certain
important information, can tick off users and land you in legal
hot water. One rule of thumb: Look at your product and your
advertising from the perspective of average users, not just
software engineers or app experts. If you make objective
claims about your app, you need solid proof to back them
up before you start selling. The law calls that “competent
2
and reliable evidence.” If you say your app provides benefits
related to health, safety, or performance, you may need
competent and reliable scientific evidence. For example, the
FTC recently took action against developers who said their
apps could treat acne, but who didn’t have scientific evidence
to back up their claims. Visit the BCP Business Center at
business.ftc.gov for more on keeping your claims compliant.
DISCLOSE KEY INFORMATION CLEARLY AND CONSPICUOUSLY.
If you need to disclose information to make what you
say accurate, your disclosures have to be “clear and
conspicuous.” What does that mean? That they’re big
enough and clear enough that users actually notice them
and understand what they say. Generally, the law doesn’t
dictate a specific font or type size, but the FTC has taken
action against companies that have buried important terms
and conditions in long licensing agreements, in dense blocks
of legal mumbo jumbo, or behind vague hyperlinks. Clear
and conspicuous disclosures make good business sense.
Most people react negatively if they think a company is trying
to pull a fast one by hiding important information. Users are
more likely to continue to do business with a company that
gives them the straight story up front.
Privacy
BUILD PRIVACY CONSIDERATIONS IN FROM THE START. The
FTC calls this “privacy by design.” What does it mean?
Incorporating privacy protections into your practices, limiting
the information you collect, securely storing what you hold on
to, and safely disposing of what you no longer need. Apply
these principles in selecting the default settings for your app
and make the default settings consistent with what people
would expect based on the kind of app you’re selling. For any
collection or sharing of information that’s not apparent, get
3
users’ express agreement. That way your customers aren’t
unwittingly disclosing information they didn’t mean to share.
BE TRANSPARENT ABOUT YOUR DATA PRACTICES. Even if you
need to collect or share data so your app can operate, be
clear to users about your practices. Explain what information
your app collects from users or their devices and what you
do with their data. For example, if you share information with
another company, tell your users and give them information
about that company’s data practices.
OFFER CHOICES THAT ARE EASY TO FIND AND EASY TO
USE. Give your users tools that offer choices in how to use
your app – like privacy settings, opt-outs, or other ways for
users to control how their personal information is collected
and shared. It’s good business to apply the “clear and
conspicuous” standard to these choice mechanisms, too.
Make it easy for people to find the tools you offer, design
them so they’re simple to use, and follow through by honoring
the choices users have made.
HONOR YOUR PRIVACY PROMISES. “But we don’t make any
promises.” Think again and reread your privacy policy or what
you say about your privacy settings. Chances are you make
assurances to users about the security standards you apply
or what you do with their personal information. At minimum,
app developers – like all other marketers – have to live up to
those promises. The FTC has taken action against dozens of
companies that claimed to safeguard the privacy or security
of users’ information, but didn’t live up to their promises in
the day-to-day operation of their business. The FTC also has
taken action against businesses that made broad statements
about their privacy practices, but then failed to disclose the
extent to which they collected or shared information with
others – like advertisers or other app developers. What if
you decide down the road to change your privacy practices?
4
You’ll need to get users’ affirmative permission for material
changes. Just editing the language in your privacy policy
isn’t enough in those circumstances. And while you’re taking
another look at your privacy promises, read them with users
in mind. Is the language clear? Is it easy to read on a small
screen? Are you using design elements – color, fonts, and
the like – to call attention to important information?
PROTECT KIDS’ PRIVACY. If your app is designed for children
under 13 and collects personal information, you have
additional requirements under the Children’s Online Privacy
Protection Act (COPPA) and the FTC’s COPPA Rule. But
COPPA compliance doesn’t end there. Regardless of the
kind of app you sell, if you know you’re collecting personal
information from children under 13 – or if you know you’re
collecting personal information from another website or online
service (including another app) that’s designed for kids under
13 – COPPA applies, too.
What does COPPA require? Under COPPA, you have to
clearly explain your information practices, provide direct
notice to parents about those practices, and get parental
consent before collecting personal information from kids.
These obligations apply to you when third parties (like ad
networks or plug-ins) collect personal information through
your app. COPPA also requires that you keep “personal
information” collected from children confidential and secure.
The rule defines that term to include a first and last name, an
address, a telephone number, online contact information, a
screen name or user name that functions like online contact
information, geolocation information, or a persistent identifier
that can be used to recognize a user over time and across
different websites or online services (such as device identifier,
cookie identifier, serial number, or IP address). Visit the FTC’s
COPPA page at business.ftc.gov for compliance advice.
5
COLLECT SENSITIVE INFORMATION ONLY WITH CONSENT. Even
when you’re not dealing with kids’ information, it’s important
to get users’ affirmative OK before you collect any sensitive
data from them, like medical, financial, or precise geolocation
information. It’s a mistake to assume they won’t mind.
KEEP USER DATA SECURE. At minimum, you have to live up
to the privacy promises you make. But what if you don’t say
anything specific about what you do with users’ information?
Under the law, you still have to take reasonable steps to keep
sensitive data secure. One way to make that task easier: If you
don’t have a specific need for the information, don’t collect it in
the first place. The wisest policy is to:
1.	 collect only the information you need;
2.	 secure the data you keep by taking reasonable
precautions against well-known security risks;
3.	 limit access to a need-to-know basis; and
4.	 safely dispose of data when you no longer need it.
These principles apply both to information you ask users to
give you and to any information your software collects. If you
work with contractors, make sure they abide by the same high
standards. The FTC has free resources to help you develop a
security plan appropriate for your business. One place to start:
Protecting Personal Information: A Guide for Business and
the accompanying online tutorial.
Federal Trade Commission
BCP Business Center
business.ftc.gov
April 2013
ABOUT THE FTC
The FTC works for the consumer to prevent fraudulent,
deceptive, and unfair practices in the marketplace
and to provide information to businesses to help
them comply with the law. To file a complaint or to get
free information on consumer issues, visit ftc.gov or
call toll-free, 1-877-FTC-HELP (1-877-382-4357);
TTY: 1-866-653-4261. Watch a video, How to File
a Complaint, at ftc.gov/video to learn more. The FTC
enters consumer complaints into the Consumer Sentinel
Network, a secure online database and investigative tool
used by hundreds of civil and criminal law enforcement
agencies in the U.S. and abroad. For free compliance
resources, visit the Business Center, business.ftc.gov.
Opportunity to Comment
The National Small Business Ombudsman and 10
Regional Fairness Boards collect comments from small
businesses about federal compliance and enforcement
activities. Each year, the Ombudsman evaluates the
conduct of these activities and rates each agency’s
responsiveness to small businesses. Small businesses
can comment to the Ombudsman without fear of
reprisal. To comment, call toll-free 1-888-REGFAIR
(1-888-734-3247) or go to sba.gov/ombudsman.

Mais conteúdo relacionado

Mais procurados

Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Greg Sterling
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online AdvertisingGautam Verma
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceAdler Law Group
 
10 Step Guide to COPPA Compliance
10 Step Guide to COPPA Compliance10 Step Guide to COPPA Compliance
10 Step Guide to COPPA ComplianceKegan Blumenthal
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)Matthew Asbell
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun LiYunLi
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA PresentationRaidious
 
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...TRUSTe
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacyMark Albala
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1feitwincities
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresPatton Boggs LLP
 
Entertainment Law & Technology: Trends in Media & Advertising
Entertainment Law & Technology:  Trends in Media & AdvertisingEntertainment Law & Technology:  Trends in Media & Advertising
Entertainment Law & Technology: Trends in Media & AdvertisingAdler Law Group
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)Jason Haislmaier
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013Amarach Research
 
Social Media Powerpoint Final
Social Media Powerpoint   FinalSocial Media Powerpoint   Final
Social Media Powerpoint FinalDommermuth
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelAffiliate Summit
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talkRobert Bodle
 

Mais procurados (20)

Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019Joint ad trade letter to ag becerra re ccpa 1.31.2019
Joint ad trade letter to ag becerra re ccpa 1.31.2019
 
Targeted Online Advertising
Targeted Online AdvertisingTargeted Online Advertising
Targeted Online Advertising
 
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory ComplianceOnline Behavioral Advertising (OBA) Legal & Regulatory Compliance
Online Behavioral Advertising (OBA) Legal & Regulatory Compliance
 
Ethics in emarketing
Ethics in emarketingEthics in emarketing
Ethics in emarketing
 
10 Step Guide to COPPA Compliance
10 Step Guide to COPPA Compliance10 Step Guide to COPPA Compliance
10 Step Guide to COPPA Compliance
 
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)Social  Media  Marketing 03 24 2010  Non  Ladas (Review Only)
Social Media Marketing 03 24 2010 Non Ladas (Review Only)
 
Presentation Yun Li
Presentation Yun LiPresentation Yun Li
Presentation Yun Li
 
PRSA Presentation
PRSA PresentationPRSA Presentation
PRSA Presentation
 
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
Trusted Download Program: A Year in the Trenches - How Trusted Downloads Make...
 
The long journey toward true data privacy
The long journey toward true data privacyThe long journey toward true data privacy
The long journey toward true data privacy
 
Session B: Handout 1
Session B: Handout 1Session B: Handout 1
Session B: Handout 1
 
FTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy DisclosuresFTC Releases Recommendations on Mobile Privacy Disclosures
FTC Releases Recommendations on Mobile Privacy Disclosures
 
E Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical LegalE Marketing Ch5 Ethical Legal
E Marketing Ch5 Ethical Legal
 
Entertainment Law & Technology: Trends in Media & Advertising
Entertainment Law & Technology:  Trends in Media & AdvertisingEntertainment Law & Technology:  Trends in Media & Advertising
Entertainment Law & Technology: Trends in Media & Advertising
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
Presentation   ncsl - mobile privacy enforcement 130502 (as presented)Presentation   ncsl - mobile privacy enforcement 130502 (as presented)
Presentation ncsl - mobile privacy enforcement 130502 (as presented)
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013
 
Social Media Powerpoint Final
Social Media Powerpoint   FinalSocial Media Powerpoint   Final
Social Media Powerpoint Final
 
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary KibelManaging Privacy Maximizing Data In Affiliate Marketing Gary Kibel
Managing Privacy Maximizing Data In Affiliate Marketing Gary Kibel
 
Business ethics talk
Business ethics talkBusiness ethics talk
Business ethics talk
 

Destaque

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013- Mark - Fullbright
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children - Mark - Fullbright
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012- Mark - Fullbright
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security- Mark - Fullbright
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz- Mark - Fullbright
 

Destaque (6)

Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013McAFEE LABS THREATS REPORT - Fourth Quarter 2013
McAFEE LABS THREATS REPORT - Fourth Quarter 2013
 
The Fleecing of Foster Children
The Fleecing of Foster Children The Fleecing of Foster Children
The Fleecing of Foster Children
 
Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012Parents Guide to Facebook Updated 2012
Parents Guide to Facebook Updated 2012
 
Fourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data SecurityFourth Annual Benchmark Study on Patient Privacy & Data Security
Fourth Annual Benchmark Study on Patient Privacy & Data Security
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 

Semelhante a Business Marketing Your Mobile app

Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applicationsVodafone developer
 
Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features			Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features Shelly Megan
 
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...WiTH Collective
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyTinuiti
 
What is Marketing Compliance?
What is Marketing Compliance?What is Marketing Compliance?
What is Marketing Compliance?PerformLine Inc.
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratchTechugo
 
Telehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive AdvantageTelehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive AdvantageRoger Smith
 
Lawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt YouLawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt YouOregon Law Practice Management
 
FTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA WebinarFTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA WebinarMaya Uppaluru
 
Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile appsioannis iglezakis
 
HIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete GuideHIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete GuideDashTechnologiesInc
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...IDology, Inc
 
Mobile Apps Made Easy Special Report
Mobile Apps Made Easy Special ReportMobile Apps Made Easy Special Report
Mobile Apps Made Easy Special ReportNiche Video Galore
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!Shelly Megan
 
Health insurance app development cost
Health insurance app development costHealth insurance app development cost
Health insurance app development costFuGenx Technologies
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelAbhijeet Kelkar
 
Social media 5 tips to not get sued
Social media   5 tips to not get suedSocial media   5 tips to not get sued
Social media 5 tips to not get suedEric Hsu
 

Semelhante a Business Marketing Your Mobile app (20)

Designing for privacy in mobile applications
Designing for privacy in mobile applicationsDesigning for privacy in mobile applications
Designing for privacy in mobile applications
 
Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features			Healthcare App Development: Strategies & Features
Healthcare App Development: Strategies & Features
 
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
Australian Privacy Principles - Updates presented by WiTH Collective & Marque...
 
Lay of the Land for All Things Privacy
Lay of the Land for All Things PrivacyLay of the Land for All Things Privacy
Lay of the Land for All Things Privacy
 
What is Marketing Compliance?
What is Marketing Compliance?What is Marketing Compliance?
What is Marketing Compliance?
 
Constructing a HIPAA-compliant healthcare app from scratch
 Constructing a HIPAA-compliant healthcare app from scratch Constructing a HIPAA-compliant healthcare app from scratch
Constructing a HIPAA-compliant healthcare app from scratch
 
Telehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive AdvantageTelehealth Protocols to Create Competitive Advantage
Telehealth Protocols to Create Competitive Advantage
 
Lawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt YouLawyers: What You Don't Know About HIPAA Could Hurt You
Lawyers: What You Don't Know About HIPAA Could Hurt You
 
FTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA WebinarFTC Slides for ONC HIPAA Webinar
FTC Slides for ONC HIPAA Webinar
 
Protection of users mobile apps
Protection of users mobile appsProtection of users mobile apps
Protection of users mobile apps
 
HIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete GuideHIPAA Compliance Mobile App Development: A Complete Guide
HIPAA Compliance Mobile App Development: A Complete Guide
 
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
5 Traits of Companies Successfully Preventing Fraud and How to Apply Them in ...
 
Mobile Apps Made Easy Special Report
Mobile Apps Made Easy Special ReportMobile Apps Made Easy Special Report
Mobile Apps Made Easy Special Report
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
Designing for Privacy
Designing for PrivacyDesigning for Privacy
Designing for Privacy
 
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
The Importance of HIPAA Compliance in ensuring the Privacy and Security of PHI!
 
Health insurance app development cost
Health insurance app development costHealth insurance app development cost
Health insurance app development cost
 
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad ModelGDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
GDPR, Data Ownership, Virtual Data Ownership and the Platform Ad Model
 
GDPR Tip Sheet
GDPR Tip SheetGDPR Tip Sheet
GDPR Tip Sheet
 
Social media 5 tips to not get sued
Social media   5 tips to not get suedSocial media   5 tips to not get sued
Social media 5 tips to not get sued
 

Mais de - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mais de - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Último

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 

Último (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

Business Marketing Your Mobile app

  • 1. MARKETING YOUR MOBILE APP GET IT RIGHT FROM THE START Federal Trade Commission | business.ftc.gov
  • 2.
  • 3. 1 CONGRATULATIONS! The app business is burgeoning and you’ve decided to get in on the boom. Maybe you work for an exciting start-up or are striking out on your own. Regardless of the size of your business, the Federal Trade Commission (FTC) – the nation’s consumer protection agency – has guidelines to help you comply with truth-in-advertising standards and basic privacy principles. “But we’re a small company and haven’t made any money from our app yet.” All the more reason to build compliance in from the start. Laws that apply to established businesses apply to you, too, and violations can be costly. In addition, satisfied users may be your best form of marketing. Breaking into the business with an app that delivers on its promises is key to your long-term success. Of course, there’s no one-size-fits-all approach. Every app is different. Still, there are some general guidelines that all app developers should consider. Truthful Advertising TELL THE TRUTH ABOUT WHAT YOUR APP CAN DO. Once you start distributing your app, you become an advertiser. Under the law, an ad isn’t just a multimillion dollar TV campaign. It’s pretty much anything a company tells a prospective buyer or user – expressly or by implication – about what a product can do. Whether it’s what you say on a website, in an app store, or within the app itself, you have to tell the truth. False or misleading claims, as well as the omission of certain important information, can tick off users and land you in legal hot water. One rule of thumb: Look at your product and your advertising from the perspective of average users, not just software engineers or app experts. If you make objective claims about your app, you need solid proof to back them up before you start selling. The law calls that “competent
  • 4. 2 and reliable evidence.” If you say your app provides benefits related to health, safety, or performance, you may need competent and reliable scientific evidence. For example, the FTC recently took action against developers who said their apps could treat acne, but who didn’t have scientific evidence to back up their claims. Visit the BCP Business Center at business.ftc.gov for more on keeping your claims compliant. DISCLOSE KEY INFORMATION CLEARLY AND CONSPICUOUSLY. If you need to disclose information to make what you say accurate, your disclosures have to be “clear and conspicuous.” What does that mean? That they’re big enough and clear enough that users actually notice them and understand what they say. Generally, the law doesn’t dictate a specific font or type size, but the FTC has taken action against companies that have buried important terms and conditions in long licensing agreements, in dense blocks of legal mumbo jumbo, or behind vague hyperlinks. Clear and conspicuous disclosures make good business sense. Most people react negatively if they think a company is trying to pull a fast one by hiding important information. Users are more likely to continue to do business with a company that gives them the straight story up front. Privacy BUILD PRIVACY CONSIDERATIONS IN FROM THE START. The FTC calls this “privacy by design.” What does it mean? Incorporating privacy protections into your practices, limiting the information you collect, securely storing what you hold on to, and safely disposing of what you no longer need. Apply these principles in selecting the default settings for your app and make the default settings consistent with what people would expect based on the kind of app you’re selling. For any collection or sharing of information that’s not apparent, get
  • 5. 3 users’ express agreement. That way your customers aren’t unwittingly disclosing information they didn’t mean to share. BE TRANSPARENT ABOUT YOUR DATA PRACTICES. Even if you need to collect or share data so your app can operate, be clear to users about your practices. Explain what information your app collects from users or their devices and what you do with their data. For example, if you share information with another company, tell your users and give them information about that company’s data practices. OFFER CHOICES THAT ARE EASY TO FIND AND EASY TO USE. Give your users tools that offer choices in how to use your app – like privacy settings, opt-outs, or other ways for users to control how their personal information is collected and shared. It’s good business to apply the “clear and conspicuous” standard to these choice mechanisms, too. Make it easy for people to find the tools you offer, design them so they’re simple to use, and follow through by honoring the choices users have made. HONOR YOUR PRIVACY PROMISES. “But we don’t make any promises.” Think again and reread your privacy policy or what you say about your privacy settings. Chances are you make assurances to users about the security standards you apply or what you do with their personal information. At minimum, app developers – like all other marketers – have to live up to those promises. The FTC has taken action against dozens of companies that claimed to safeguard the privacy or security of users’ information, but didn’t live up to their promises in the day-to-day operation of their business. The FTC also has taken action against businesses that made broad statements about their privacy practices, but then failed to disclose the extent to which they collected or shared information with others – like advertisers or other app developers. What if you decide down the road to change your privacy practices?
  • 6. 4 You’ll need to get users’ affirmative permission for material changes. Just editing the language in your privacy policy isn’t enough in those circumstances. And while you’re taking another look at your privacy promises, read them with users in mind. Is the language clear? Is it easy to read on a small screen? Are you using design elements – color, fonts, and the like – to call attention to important information? PROTECT KIDS’ PRIVACY. If your app is designed for children under 13 and collects personal information, you have additional requirements under the Children’s Online Privacy Protection Act (COPPA) and the FTC’s COPPA Rule. But COPPA compliance doesn’t end there. Regardless of the kind of app you sell, if you know you’re collecting personal information from children under 13 – or if you know you’re collecting personal information from another website or online service (including another app) that’s designed for kids under 13 – COPPA applies, too. What does COPPA require? Under COPPA, you have to clearly explain your information practices, provide direct notice to parents about those practices, and get parental consent before collecting personal information from kids. These obligations apply to you when third parties (like ad networks or plug-ins) collect personal information through your app. COPPA also requires that you keep “personal information” collected from children confidential and secure. The rule defines that term to include a first and last name, an address, a telephone number, online contact information, a screen name or user name that functions like online contact information, geolocation information, or a persistent identifier that can be used to recognize a user over time and across different websites or online services (such as device identifier, cookie identifier, serial number, or IP address). Visit the FTC’s COPPA page at business.ftc.gov for compliance advice.
  • 7. 5 COLLECT SENSITIVE INFORMATION ONLY WITH CONSENT. Even when you’re not dealing with kids’ information, it’s important to get users’ affirmative OK before you collect any sensitive data from them, like medical, financial, or precise geolocation information. It’s a mistake to assume they won’t mind. KEEP USER DATA SECURE. At minimum, you have to live up to the privacy promises you make. But what if you don’t say anything specific about what you do with users’ information? Under the law, you still have to take reasonable steps to keep sensitive data secure. One way to make that task easier: If you don’t have a specific need for the information, don’t collect it in the first place. The wisest policy is to: 1. collect only the information you need; 2. secure the data you keep by taking reasonable precautions against well-known security risks; 3. limit access to a need-to-know basis; and 4. safely dispose of data when you no longer need it. These principles apply both to information you ask users to give you and to any information your software collects. If you work with contractors, make sure they abide by the same high standards. The FTC has free resources to help you develop a security plan appropriate for your business. One place to start: Protecting Personal Information: A Guide for Business and the accompanying online tutorial.
  • 8. Federal Trade Commission BCP Business Center business.ftc.gov April 2013 ABOUT THE FTC The FTC works for the consumer to prevent fraudulent, deceptive, and unfair practices in the marketplace and to provide information to businesses to help them comply with the law. To file a complaint or to get free information on consumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. Watch a video, How to File a Complaint, at ftc.gov/video to learn more. The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online database and investigative tool used by hundreds of civil and criminal law enforcement agencies in the U.S. and abroad. For free compliance resources, visit the Business Center, business.ftc.gov. Opportunity to Comment The National Small Business Ombudsman and 10 Regional Fairness Boards collect comments from small businesses about federal compliance and enforcement activities. Each year, the Ombudsman evaluates the conduct of these activities and rates each agency’s responsiveness to small businesses. Small businesses can comment to the Ombudsman without fear of reprisal. To comment, call toll-free 1-888-REGFAIR (1-888-734-3247) or go to sba.gov/ombudsman.