Twitter Settles with FTC, Must Create 'Comprehensive' Cybersecurity Program

Twitter Settles with FTC, Must Create 'Comprehensive' Cybersecurity Program - top government contractors - best government contracting eventThe Federal Trade Commission has agreed on a settlement with Twitter stemming from allegations that the micro blog  deceived consumers and put their privacy at risk by failing to safeguard their personal information, resulting in a breach that allowed hackers to take over Twitter twice in 2009.

At the time of the attacks, FTC said Twitter’s privacy policy stated the company was “very concerned” about protecting the confidentiality of users’ personally identifiable information.

The micro blog also asserted it employed administrative, physical and electronic measures designed to protect users’ information from unauthorized access.

That language has since the attacks been removed from Twitter’s privacy policy, Los Angeles Times reported.

FTC alleged that between January and May of 2009, hackers twice gained administrative control of Twitter and hijacked several dozen prominent accounts, including those of Barack Obama and then-CNN anchor Rick Sanchez, as well as accessed accounts’ email addresses and other personal information.

Under the settlement, Twitter will be barred for 20 years from misleading consumers about the extent it protects the security, privacy and confidentiality of nonpublic consumer information, including the measures it takes to prevent unauthorized access to nonpublic information and honor users’ privacy choices.

In addition, the company also must create and maintain a comprehensive information security program, which an independent auditor will review every other year for 10 years.

 

You may also be interested in...

Red Hat's David Egts: Open-Source Training, “˜Sense of Mission' Could Help Agencies Address Cyber Skills Gap - top government contractors - best government contracting event

Red Hat's David Egts: Open-Source Training, “˜Sense of Mission' Could Help Agencies Address Cyber Skills Gap

David Egts, chief technologist for Red Hat's North American public sector, has said there are several options …

HHS, Industry Aim to Help Health Organizations Mitigate Cyber Threats With New Publication - top government contractors - best government contracting event

HHS, Industry Aim to Help Health Organizations Mitigate Cyber Threats With New Publication

The Department of Health and Human Services has released a four-volume document that outlines 10 …

Cloud-Based Identity Tools, Mobile Device-Based Authentication Among Cyber Market Trends to Watch in 2019 - top government contractors - best government contracting event

Cloud-Based Identity Tools, Mobile Device-Based Authentication Among Cyber Market Trends to Watch in 2019

Some of the trends in the cybersecurity market to watch in 2019 include the availability …