Cyberbullying is bullying or harassment that happens online. It can happen in email, text message, a game, or on a social networking site. It might involve spreading rumors or images or creating a group or page to make a person feel left out. Read more
You can ensure the hard drive in your old computer won't get misused by identity thieves. Use a program to overwrite or wipe the hard drive, or remove the hard drive and physically destroy it. Read more
“Spam” usually means unsolicited mass commercial email messages from a sender who doesn't have a business relationship with a recipient. The Georgia Slam Spam E-Mail Act penalizes some abuses related to spam messages.
Investment opportunities that claim to be low risk and high reward are almost always frauds. When you research investments, turn to unbiased sources. Update your security software on any computer you use to access your financial accounts. Read more
Malware (short for “malicious software") includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. Criminals use malware to steal personal information, send spam, and commit fraud. Read more
Maybe you want to get in on the growing app business. Maybe you work for an exciting start-up or on your own. Regardless of the size of your business, the Federal Trade Commission has guidelines to help you comply with truth-in-advertising standards and basic privacy principles. Read more
The Privacy Rights Clearinghouse (PRC) publishes in-depth guides on technology and your privacy. Learn how to secure your computer, privacy tips for using social networking sites, what information your smartphone gathers and shares, and more.
The Children's Online Privacy Protection Act (COPPA) helps you protect your children's privacy. COPPA requires websites to get parental consent before they collect or share information from children under age 13.
BBB Scam Stopper helps people avoid wasting money or leaking personal information to a scam. With the growth of social media, internet shopping, online banking and other technology, scams are taking on new forms. It's often difficult to tell a legitimate offer from a scam in disguise.
Often spam is promoting get rich quick schemes and questionable products. Common scams are chain letters, work at home schemes, weight loss potions, credit repair offers, advance fee loans, vacation offers, and adult entertainment. Read more
The Telephone Consumer Protection Act of 1991 (TCPA) and Federal Communications Commission (FCC) rules prohibit sending unsolicited advertisements, also known as “junk faxes,” to a fax machine. This prohibition applies to fax machines at both businesses and residences. Read more
Wi-Fi hotspots in coffee shops, libraries, airports, hotels, universities, and other public places are convenient, but are often not secure. When using a hotspot, it’s best to send information only to websites that are fully encrypted.