Free Essay

How Financial Overhaul Could Put the Ftc

In:

Submitted By sam1118
Words 567
Pages 3
This week marks a pivotal point in the history of the Internet. Monday was the 25th anniversary of the first .COM registration—and in some ways, the beginning of the commercial Internet. Yesterday, the Federal Communications Commission unveiled its long-awaited National Broadband Plan, which proposes ambitious subsidies to encourage broadband deployment. On the theory that unease about online privacy may discourage broadband adoption, the Plan also calls for increased regulation of how websites collect, and use, data from consumers.

The debate over how to regulate online data use has gone on for over a decade, leading to today’s final “Roundtable” in the “Exploring Privacy” series held by the Federal Trade Commission over the last three months. The stakes in this debate are high: Data is the lifeblood of online content and services, and consumers will ultimately bear the cost of restrictions on data use in the form of reduced advertising funding for, and innovation in, online content and services.

That’s why this week’s most important technology policy event may ultimately prove to be today’s Senate Commerce Committee hearing on Rep. Barney Frank’s “Wall Street Reform and Consumer Protection Act of 2009” (H.R. 4173), which narrowly passed the House in December without a single hearing and no real debate. Although the sprawling (273,579 word) bill is mostly famous for creating a Consumer Financial Protection Agency, it would also, in just 613 words, “put the FTC on steroids,” in the words of Jim Miller, FTC Chairman from 1981 to 1985. With vastly expanded powers, the FTC could impose sweeping new regulation touching virtually every sector of our economy.

The current FTC chairman, Jon Leibowitz, has made clear his determination to step up regulation of online data use, advertising, “blogola,” and child protection, just to name a few of the hot topics in Internet policy. While the FTC will no doubt continue to push for increased statutory authority, such as the online privacy bill reportedly being drafted by House Commerce Internet Subcommittee Chairman Rick Boucher (mandating opt-in for data collection), Chairman Leibowitz may be able to implement most of his radical Internet regulatory agenda using the new powers conferred on his agency in a bill (H.R, 4173) few realize has anything to do with Internet policy.

Most importantly, Rep. Frank’s bill would repeal procedural safeguards imposed on the FTC by a heavily Democratic Congress in 1980. The agency, in the 1970s, had so thoroughly abused its uniquely vast jurisdiction by, among other things, trying to ban advertising to children, that it was dubbed the “National Nanny” by the Washington Post—hardly a Thatcherite bastion. In fact, Congress actually briefly shut down the agency to make it clear that it had not dubbed the agency a regulatory knight errant, free to tilt its steely lance at imagined windmills of “unfairness” or “deception.” Besides requiring the agency to better define these vague concepts and focus on demonstrable harms, Congress strengthened safeguards it had put in place with the 1975 Magnuson-Moss Act to ensure that the agency did not rush into preemptive regulation without carefully weighing the costs and benefits of government intervention.

FTC Chairman Leibowitz complains that the Magnuson-Moss process takes too long, and Rep. Frank’s bill would indeed accelerate the rulemaking process—by eliminating opportunities for public input and Congressional notification, while removing restrictions on Commissioners’ ex parte meetings. So much for transparency!

Similar Documents

Free Essay

Banking Crisis

...Alonzi Dominican University Robert Irons Dominican University Abstract The recent financial crisis offers instructors rich material for business programs regarding the relations between accounting, business law, economics, and finance, as well as ethical issues. This paper offers a concrete approach to developing a business capstone course built around the financial crisis and the lessons it offers business students. Complete pedagogical modules are offered for each discipline, including suggestions for specific assignments in each discipline. Key Words: Capstone Course, Banking Crisis, Pedagogy Centering the Business Capstone Course, Pate 1 Research in Higher Education Journal INTRODUCTION A capstone course is essential in the business school curriculum. It provides each student the time to refresh their grasp of and to hone their ability to apply the principles, tools, and methods of the fields comprising the business curriculum. Further, it gives students the opportunity to integrate the insights of the various fields. The effectiveness of the capstone course can be enhanced by centering the capstone course on the 2008 financial crisis. All students share the common experience of the 2008 crisis’s violent shaking of the economy. It immediately affected each of their pocketbooks and continues to do so today, as well as their expectations for their futures. This common experience with the financial crisis provides a rich context for framing the illustrations of the principles...

Words: 10514 - Pages: 43

Premium Essay

Test

...CHAPTER 8 IMPORTING, EXPORTING, AND SOURCING SUMMARY A company’s first business dealings outside the home country often take the form of exporting or importing. Companies should recognize the difference between export marketing and export selling. By attending trade shows and participating in trade missions, company personnel can learn a great deal about new markets. Governments use a variety of programs to support exports, including tax incentives, subsidies, and export assistance. Governments also discourage imports with a combination of tariffs and nontariff barriers. A quota is one example of a nontariff barrier. Export-related policy issues include the status of foreign sales corporations (FSCs) in the United States, Europe’s Common Agricultural Policy (CAP), and subsidies. Governments establish free trade zones and special economic zones to encourage investment. The Harmonized Tariff System (HTS) has been adopted by most countries that are actively involved in export-import trade. Single-column tariffs are the simplest; two-column tariffs include special rates such as those available to countries with normal trade relations (NTR) status. Governments can also impose special types of duties. These include antidumping duties imposed on products whose prices government officials deem too low and countervailing duties to offset government subsidies. Key participants in the export-import process include foreign purchasing agents, export brokers, export merchants...

Words: 8210 - Pages: 33

Premium Essay

White Collar Crimes

...White Collar Crimes: How Does It Affect Businesses? Shari M. Lewis Strayer University (Online) Table of Contents ABSTRACT 3 INTRODUCTION 4 Introduction to the Problem 4 Background of the Study 4 Statement of the Problem 4 Purpose of the Research 5 Research Questions 5 Significance of the Research 5 LITERATURE REVIEW 7 CONCLUSION AND RECOMMENDATIONS 19 ABSTRACT This paper investigates White Collar Crime (“WCC) in society and the affects it has on businesses in today’s society, the cost and statistics involved with white collar crime and the difference in how white collar crime and street crimes are dealt with. While white collar crime has existed for many decades, I have conducted research regarding the definition of white collar crime, the history of white collar crime, the different types of white collar crime that affect businesses directly and indirectly, goals of white collar crime, fraud statistics and the cost factors related to white collar crime. White collar crimes and business ethics play hand in hand with one another and often cross the line with one another into criminal behavior. White collar crimes have played a very instrumental part in our downward economy over the past five years, and the level of trust given by society to corporations and employers entrusted with their life earnings has changed dramatically. My research will include factors that contribute to this problem and how white collar crime affects...

Words: 6980 - Pages: 28

Premium Essay

Cellular Effects

...., Health, Psychological & Sociological , Cellular Technology & History , Moral & Sociological DeVry University LAS432 Society, Ethics, and Technology   Abstract The following paper will discuss the psychological and sociological impact of cellular technology. Cellular technology has seen rapid growth in technology and in personal use. Texting has now become the dominant means of communication and actual conversation skills are diminishing. Exposure to electromagnetic radiation emitted from cellular devices has become a concern and is being studied from many various angles to determine actual health risks from cell phone use. Whether it is for personal or business use, the cell phone has become a permanent fixture in our lives, could have potential health risks, and can become an addiction if necessary steps are not taken to control use and dependency.   Cellular Technology and Society Today At any store they are visible. They have their hand plastered to their ear or they are seemingly talking to no one. These are the cellphone users. Hayley Tsukayama, a writer for the Washington post asserts that according to the Pew Internet and Life Project only seventeen percent of Americans still have a land line and ninety percent own a cellphone. (Tsukayama, 2014) The largest contributor to this trend is convenience. Most cellular devices are small and easily portable, allowing the user to move around freely. The ability to be in contact on the road, at work, or out having...

Words: 19048 - Pages: 77

Free Essay

Lily

...[pic] Table of Contents Executive Summary 2-6 External Analysis 7-13 Internal A ,mnalysis 14-17 Functional Analysis 18-21 Business-Level Strategy 22-24 Corporate Level Strategy 25-27 Strategy Implementation 28-30 References 31 Executive Summary A Customer’s Hope Eli Lilly and Company is on a mission that benefits millions of people every day by helping them live longer and fuller lives. They provide their customers with answers that matter—life saving and enhancing medicines. They carry out this mission by discovering, developing, and marketing pharmaceutical therapies. Many of the pharmaceutical products Lilly brings to market are first-in-class, providing customers a therapeutic relief that did not exist. An example of this is their newly FDA-cleared drug, Xigris™, which helps thousands of people every day by treating the potentially fatal condition of sepsis. The Lilly research team persevered over two decades to bring Xigris™ to fruition, even when over ten other companies failed to produce a viable drug remedy for sepsis (Eli Lilly Annual Report 2001). This dedication truly exemplifies Lilly’s commitment to their customers and transcends into all their efforts. Eli Lilly continues to be a successful pharmaceutical company, while other pharmaceutical companies have seen their success erode, because of the strategies they employ. Lilly has focused on building partnerships rather than acquisitions...

Words: 11111 - Pages: 45

Premium Essay

Books of Ark

...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Case Study: Critical Controls that Could Have Prevented Target Breach In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. AD Copyright SANS Institute Author Retains Full Rights Case Study: Critical Controls that Could Have Prevented Target Breach GIAC (GSEC) Gold Certification Author: Teri Radichel, teri@radicalsoftware.com Advisor: Stephen Northcutt Accepted: August 5th 2014 Abstract In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. From what is known about the Target breach, there were multiple factors that led to data loss: vendors were subject to phishing attacks, network segregation was lacking, point of sale systems were vulnerable to memory scraping malware and detection strategies employed by Target failed. A possible...

Words: 8983 - Pages: 36

Premium Essay

Chapter 4 Managing Marketing Information to Gain Customer Insights

...(Chapters 7–17) Part 4: Extending Marketing (Chapters 18–20) 4 Marketing Information to Gain Managing Customer Insights Chapter Preview In this chapter, we continue our exploration of how marketers gain insights into consumers and the marketplace. We look at how companies develop and manage information about important marketplace elements: customers, competitors, products, and marketing programs. To succeed in today’s marketplace, companies must know how to turn mountains of marketing information into fresh customer insights that will help them deliver greater value to customers. Let’s start with a good story about marketing research and customer insights in action at P&G, one of the world’s largest and most re- spected marketing companies. P&G makes and markets a who’s who list of consumer megabrands, including the likes of Tide, Crest, Bounty, Charmin, Puffs, Pampers, Pringles, Gillette, Dawn, Ivory, Febreze, Swiffer, Olay, Cover Girl, Pantene, Scope, NyQuil, Duracell, and dozens more. The company’s stated purpose is to provide products that “improve the lives of the world’s consumers.” P&G’s brands really do create value for consumers by solving their problems. But to build meaningful relationships with customers, you first have to understand them and how they connect with your brand. That’s where marketing research comes in. P&G: Deep Customer Insights Yield Meaningful Customer Relationships C reating customer value. Building meaningful customer...

Words: 26161 - Pages: 105

Free Essay

Project

...1   Table  of  Contents   Executive  Summary   ...............................................................................................  3   Intro  ......................................................................................................................  4   Issues  &  Outlook  Profile  .........................................................................................  6   Mission  and  Strategy  ........................................................................................................................................  6   Key  Issues  ..............................................................................................................  8   Slow  to  Innovate  .................................................................................................................................................  8   PC  Market  in  Decline  ........................................................................................................................................  8   Mobile  Device’s  Poor  Performance  ............................................................................................................  9   The  External  Environment  ....................................................................................   10   PESTEL  Analysis  ............................................................................

Words: 8505 - Pages: 35

Free Essay

With Consent of the Governed: Sec's Formative Years

...Association for Public Policy Analysis and Management With Consent of the Governed: SEC's Formative Years Author(s): Thomas K. McCraw Source: Journal of Policy Analysis and Management, Vol. 1, No. 3 (Spring, 1982), pp. 346-370 Published by: Wiley on behalf of Association for Public Policy Analysis and Management Stable URL: http://www.jstor.org/stable/3324354 . Accessed: 02/10/2013 10:25 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. . Wiley, Association for Public Policy Analysis and Management, John Wiley & Sons are collaborating with JSTOR to digitize, preserve and extend access to Journal of Policy Analysis and Management. http://www.jstor.org This content downloaded from 129.22.124.137 on Wed, 2 Oct 2013 10:25:50 AM All use subject to JSTOR Terms and Conditions WithConsent the of Governed: SEC'sFORMATIVE YEARS Thomas K. McCraw The Securities and Exchange Commission, established in 1934, has achieved a uniquely high reputationfor effectiveregulation. TheSEC succeededin largemeasurebecause of the...

Words: 12685 - Pages: 51

Free Essay

As, Ca, Pdf

...SOCIO‐ECONOMIC PROFILE OF STATES AND INTER‐STATE COMPARISONS  21  ASER 2013: Main Findings  23  SKILL DEVELOPMENT  24  HOW INDIA NEEDS TO FACE CLIMATE CHANGE  24  AGENDA FOR ECONOMIC REFORMS  28  INFRASTRUCTURE  30  WHY LONG‐RUN MATTERS  30  FIVE PRONGED STRATEGY TO CONTROL INFLATION  31  URJIT PATEL COMMITTEE  32  Some Major Issues in India's Merchandise Trade Sector  32  MAKE IN INDIA OPPORTUNITY  34  Make for India or Make in India – The debate begins!  37  VULNERABILITY COMPARISON OF INDIAN ECONOMY  38  PM JAN DHAN YOJANA  39  COOPERATIVE FEDERALISM  40  ZERO DEFECT, ZERO EFFECT  41  DIGITAL INDIA  42  TWO FACTOR IDENTIFICATION ISSUE  43  MINSK AGREEMENT  44  WILFUL DEFAULT  44  © EssaysforIIM.com 2014‐15   Page 1 Issues for IIM PI Process http://www.essaysforIIM.com   ‘MAKE IN INDIA’  45  Features of the ‘Make In India’ campaign .............................................................................................. 46  PM MODI’S ADDRESS TO UN GA  46  ‘CHALEIN SAATH SAATH’  47  DEEPAK PAREKH COMMITTEE ON INFRASTRUCTURE  48  ‘JAPAN PLUS’  48  WHY CRONY CAPITALISM PERSISTS  49  ISSUES IN THE SHG BLP  51  INCLUSIVE RURAL FINANCIAL...

Words: 128478 - Pages: 514

Free Essay

Cap Rate

...GENERAL GROWTH PROPERTIES: TO THE BRINK AND BACK December 6, 2011 Students: Yu (Cherry) Chen, Kevin Connolly, Bill Davis, Stephen Duncan, James Faello, Michael Hazinski, Noah Johnson Faculty Supervisor: Joseph L. Pagliari, Jr. Copyright © 2011 The Real Estate Group at The University of Chicago Booth School of Business All Rights Reserved This case study has been prepared solely for academic purposes. It should not be construed as a judgment about or an endorsement of any particular business matter. Moreover, the information contained herein has been obtained from sources we believe to be reliable; however, we make no representation or warranty as to its accuracy. TABLE OF CONTENTS EXECUTIVE SUMMARY ...................................................................................................... - 1 GENERAL GROWTH BACKGROUND ............................................................................ - 7 2004: A Historic Year for General Growth........................................................................ - 9 2005-2006: Secured Mortgages and Increasing Debt ..................................................... - 16 Simon vs. GGP - Capital Markets Strategy ..................................................................... - 24 IMPACT OF THE CREDIT CRISIS .................................................................................. - 31 GGP Faces Liquidity Challenge .................................................................................

Words: 37589 - Pages: 151

Premium Essay

Case Study

...EUROPE Mobile marketing Dawn of a new medium Mobile usage is exploding and ad revenues should follow We think 2010 marked the crux of the hockey stick for mobile marketing. Smartphones are already 35% of the handset market in the US, Europe and Japan, and tablet computers are now taking off. Apple and Android apps set a new standard, and mobile is now at the forefront of marketers‟ conscience. A $14 billion market – at least – by 2015 This report focuses on marketing, not tech or telecoms, though we incorporate views from Macquarie‟s internet, telecoms and software analysts. We estimate the global mobile ad market could grow from about $3.5bn in 2010 to $14bn in 2015. Mobile only comprises 1% of total ad spending today, but we think this could rise to 3-4% in the next 5 years, and 5-8% over time. We believe mobile marketing and services represent an incremental growth opportunity for ad agencies of anywhere from 0.2-1.3%, and can help elevate agency organic growth to long-term GDP-plus rates. Inside Mobile media usage is exploding; ad spending is following The mobile device landscape Cues from Japan and emerging markets Mobile marketing channels The opportunity for ad agencies Data and privacy issues Appendix: Mobile marketing players 3 6 9 11 21 25 26 The ultimate targeted advertising medium This is a different type of media, incorporating display ads through both apps and browsers, search, messaging (sms and mms), location-based services such as in-store couponing...

Words: 18937 - Pages: 76

Premium Essay

Marketing Related Articles

...CONTENTS Introduction Part One: Foundations Chapter One: Introduction to Advertising 1 Chapter Two: Advertising’s Role in Marketing 34 Chapter Three: Advertising and Society 68 Part Two: Planning and Strategy Chapter Four: How Advertising Works 103 Chapter Five: The Consumer Audience 135 Chapter Six: Strategic Research 169 Chapter Seven: Strategic Planning 205 Part Three: Effective Advertising Media Chapter Eight: Print and Out-of-Home Media 239 Chapter Nine: Broadcast Media 274 Chapter Ten: Interactive and Alternative Media 310 Chapter Eleven: Media Planning and Buying 345 Part Four: Effective Advertising Messages Chapter Twelve: The Creative Side and Message Strategy 378 Chapter Thirteen: Copywriting 411 Chapter Fourteen: Design and Production 443 Part Five: Integration and Evaluation Chapter Fifteen: Direct Response 476 Chapter Sixteen: Sales Promotion, Events, and Sponsorships 508 Chapter Seventeen: Public Relations 542 Chapter Eighteen: Special Advertising Situations 576 Chapter Nineteen: Evaluation of Effectiveness 610 INTRODUCTION Welcome to the Test Item File for the Wells/Moriarty/Burnett Advertising: Principles and Practice, 7th edition text. This test bank was designed with the student and instructor in mind. All questions in this manual are drawn directly from the master text. APPLICATION QUESTIONS: New to the seventh edition of the Test Item File is a section...

Words: 179407 - Pages: 718

Premium Essay

Information Technology

...issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two...

Words: 25389 - Pages: 102

Premium Essay

Dell

...eBAY.COM A Case Report for Getting Tools Used NOTE: THIS IS ONLY A PORTION OF THE GETTING TOOLS USED RESEARCH REPORT. FOR THE FULL DOCUMENT AND OTHER INFORMATION VISIT WWW.CFAH.ORG. Getting Tools Used Table of Contents Foreword by Jessie Gruman ......................................................................................................................................... 1 Executive Summary ........................................................................................................................................................ 3 About CFAH ...................................................................................................................................................................... 7 Table of Contents ........................................................................................................................................................... 8 Introduction: 21st Century Marketplace .................................................................................................................. 9 Research Framework ................................................................................................................................................... 17 Case Studies.................................................................................................................................................................... 25 Consumer Reports: Car Buying Guide ....................................

Words: 18219 - Pages: 73