Attract, retain and delight more customers with ZOHO CRM. Click here for a 15-day free trial.
Welcome | Sign In
ECommerceTimes.com


 Best Practices for Marketing Automation Excellence
Drive revenue with tips for marketing sophistication with Microsoft CRM. Download the CoreMotives eBook today.

FCC Unveils Smartphone Security Checklist
December 20, 2012
The Federal Communications Commission on Thursday launched a smartphone security checker website to help consumers ensure their devices are as secure as possible. The page lists various mobile operating systems and also points to a general checklist of actions users can take to secure their smartphones.
Instagram: Better to Tell Your Story Than Let Angry Users Tell It
December 20, 2012
The social media era doesn't mean that more people can communicate than in the past. It means that more customers can communicate faster than ever before -- and customers always communicate more and faster when they're angry. You'd think that this message would have been internalized by the nice people over at Facebook, which owns Instagram. Sadly, that's not the case.
Feds Tighten Up Child Privacy Protection Rules
December 19, 2012
The Federal Trade Commission on Wednesday announced final amendments to the Children's Online Privacy Protection Act Rule, which governs the online collection of personal information under the age of 13. This is the culmination of a review that began in 2010 to ensure that the COPPA Rule keeps pace with changes in technology and the way kids use and access the Internet.
User Revolt Prompts Instagram to Retouch Photo Policies
December 19, 2012
Instagram appears to be backtracking on plans to update its privacy policy and terms of service following an uproar from users. The proposed updates were scheduled to come into effect Jan. 16. Provisions that stirred users' wrath apparently let the company use posted images in advertisements without asking for permission or paying the users, and let Instagram share user information with affiliated businesses.
FTC Asks Data Brokers What They're Doing With Your Info
December 18, 2012
The Federal Trade Commission on Tuesday announced that it has demanded nine data brokerage companies explain how they collect and use consumer data. The nine are Acxiom, Corelogic, Datalogix, eBureau, ID Analytics, Intelius, Peekyou, Rapleaf and Recorded Future. These sites offer information on just about anyone, in most cases for a fee.
Next Star of Instagram Ad Could Be You, Like It or Not
December 18, 2012
Instagram is rolling out an update of its terms of service that gives it more control over users' photos. The changes have unleashed a storm of criticism on various social networks. The new policies are privacy measures that will help Instagram integrate more easily with its parent company, Facebook. The terms will also allow the site to more effectively crack down on site violations such as spam.
Healthcare Data Has to Be Both Secure and Right
December 17, 2012
Lake Health, a regional healthcare system in northeast Ohio, has been examining its information-security practices with a maturing approach. It is shifting from deploying security technologies to becoming more of a comprehensive risk-reduction practice provider internally for its own consumers. This has caused Lake Health to look at the quality of its data.
Stallman and Ubuntu: Sticks and Stones and a Blogosphere Brawl
December 17, 2012
It was only a few weeks ago that the Linux blogosphere's Punchy Penguin Saloon suffered its latest round of damage thanks to the recent skirmish over the GPL, but now the popular establishment of questionable repute is actually shut down for a week for repairs. The cause this time? Yet another blogosphere brawl, needless to say, focusing this time on Ubuntu and its newly installed "surveillance code."
FBI Takes 10 Alleged Botnet Operators Offline
December 13, 2012
The Federal Bureau of Investigation has arrested 10 individuals from around the world, including the United States, which it alleges are part of an international cybercrime ring linked to the Yahos malware. Yahos is associated with the notorious Butterfly botnet, which compromised more than 11 million computer systems and resulted in an estimated $850 million in losses.
Facebook Gives a Little, Gets a Little With New Privacy Settings
December 12, 2012
Facebook has introduced a number of changes to its privacy controls, positioning them as easier for users to manage. For example, a new icon on the toolbar will allow users to ask three questions: Who can see my stuff? Who can contact me? and How do I stop someone from bothering me? For further information, users go to the Privacy Settings page.
Cops Seek Law Requiring 2-Year SMS Storage
December 10, 2012
A number of law enforcement groups are lobbying Congress to add provisions to a bill revamping the 1986 Electronic Communications Privacy Act that would require wireless carriers to archive text messages for as long as two years. There may be reasons for companies to archive messages -- but simply functioning as a record-keeping arm for law enforcement is not one of them, privacy advocates maintain.
Give Us Comments, Not Votes, Says Facebook
December 05, 2012
Facebook has elaborated on the changes it wants to make to its Data Use Policy and Statement of Rights and Responsibilities. This new explanation is in response to the user feedback it has received thus far on a proposal it made late last month. The crux of its proposed change is to scrap its user voting system and replace it with high-quality feedback instead.
Facebook May Win Sponsored Stories Settlement - but the Ads Don't Work
December 05, 2012
A U.S. district judge has given preliminary approval to Facebook's attempt to settle a class action lawsuit alleging the company violated members' privacy rights by using their images in Facebook's Sponsored Stories ad format. The settlement would give $10 each to those who objected to their images appearing in the ads. Privacy advocates were less than enthused.
Bill Closing Email Privacy Loophole Clears Committee
December 03, 2012
A bill to protect email privacy cleared a key U.S. Senate committee last week, buoying the spirits of privacy advocates. The proposed law would close a loophole in the 1986 Electronic Communications Privacy Act, which allows the government to peep on email more than 180 days old without a warrant. "We're very happy about it. It's a very good first step," said Chris Calabrese, legislative counsel for the American Civil Liberties Union.
Defend Your Company by Attacking It From Within
November 15, 2012
For those who aren't familiar with the acronym SWOT, it means, "strengths, weaknesses, opportunities and threats. SWOT analysis applies especially well to a tech venture, because tech companies have to be constantly aware of the ever-changing threats to their products and to their very existence.
If You Believe Your Internet Content and Webmail are Private, Read This...
November 14, 2012
Do you really believe your Web-based email is private? Let's start with Terms of Service or Privacy Policies, which few people actually read. In 1986, the Stored Communications Act was initially designed to protect telephone records, not Internet activity. There was not much Web activity then, since there were no browsers.
Obama's Re-election Means IT Plans Can Be Executed
November 13, 2012
One of the conventional views of political pundits after the Nov. 6 Presidential election was that both parties spent billions of dollars on the campaign for a result that did not change the political landscape all that much. Below the broad trends that keep political pundits in business, however, are the myriad federal issues that have a more direct impact on business.
Getting Your Mobile CRM Mojo Working
November 13, 2012
As companies rush to offer mobile CRM apps to their customers, they are in danger of repeating the same mistake made a generation ago with the launch of early online initiatives: not placing enough emphasis on security. We know how that worked out. Untold millions of customers were compromised financially because the companies they chose to do business with online did not take proper precautions.
Security Policy Begins With 'Can It Happen Here?'
November 12, 2012
For a Fortune 100 company such as Liberty Mutual Insurance, security involves much more than preventing hacks and phishing attacks. The introduction of personal devices has created an array of new potential attack vectors. Security must now be introduced at the conception of a project, not as an afterthought. It needs to start with the board and work its way through the organization to every employee.
BlackBerry 10's US Security Clearance Is a Lock
November 08, 2012
While Research In Motion's BlackBerry 10 won't be released until the first quarter of 2013, the platform has already received a highly prized U.S. government security clearance, the company announced Thursday. BlackBerry 10 won the FIPS 140-2 certification that will allow government agencies to deploy devices that run the OS.

See More Articles in Security Section >>
ZOHO CRM
More E-Commerce Times Headlines