Beware the FTC Case 2:22-cv-00073: How Assumed Guides You from the Ghouls of Data Insecurity

Taylor Leikness Avatar



laptop with an eyeball, data leak monitoring, seeding data.

Today is Halloween and there is more to be wary of than ghosts and goblins. The digital realm has its own pitfalls, and the recent FTC Case 2:22-cv-00073 serves as a chilling reminder. But fear not, for Assumed is here as your cover.

What horrors happened?

One fateful company found itself in the crosshairs of the FTC’s watchful gaze. As mentioned in Case 2:22-cv-00073, the company lacked a process to “seed” sensitive consumer information. “…has no program for investigating whether
sensitive consumer information it furnishes to potential purchasers is safeguarded
or used for purposes other than offering a loan. For example, “seeding” data by
adding unique dummy data is a common technique to detect leaks or breaches in
data security, and to monitor how data is being used.” This was not the primary reason for the FTC’s action, but it was important enough for them to list it in the Case.

The haunting reality

The FTC highlighted that the mentioned company did not assess the content of policies and procedures of entities receiving consumer information. They should have ensured these policies were implemented effectively. This tale is a cautionary story for all in the digital realm, emphasizing the importance of implementing a process for ‘seeding’ your data.

Assumed: your guiding light in the darkness

Fret not; Assumed is here to assist so you do not share the same fate as the company mentioned:

  1. Seeding the Data: Assumed understands the power of “seeding” data. Using Assumed, you can detect unsolicited communication by embedding decoy data within genuine information, pinpointing potential leaks and their sources.
  2. Vetting Vendors: Using Assumed, you can not only use the contacts for your database, but also for vetting vendors and partners! By using a contact to fill out a form or “seeding” them in a list, you will have a bird’s eye view of what they are sending out. This feedback assists in protecting your business and knowing who to not work with.
  3. Continuous Monitoring: Assumed’s real-time monitoring keeps an eye, alerting businesses to potential breaches and allowing for swift action.

Concluding the tale

As the Halloween season unfolds, let the tale of FTC Case 2:22-cv-00073 be a reminder of what companies need to do with their data. Sign up for Assumed today and start “seeding” your data!