{"id":2420,"date":"2010-02-23T00:00:00","date_gmt":"2010-02-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/02\/23\/ftc-warns-100-organisations-over-leaked-p2p-data\/"},"modified":"2021-12-30T11:41:18","modified_gmt":"2021-12-30T11:41:18","slug":"ftc-warns-100-organisations-over-leaked-p2p-data","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/02\/23\/ftc-warns-100-organisations-over-leaked-p2p-data\/","title":{"rendered":"FTC warns 100 organisations over leaked P2P data"},"content":{"rendered":"<p>More than 100 organisations guilty of allowing private data to leak on P2P networks have received warning letters from US consumer watchdog the Federal Trade Commission.  Customer and biz data turning up on Torrents.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The leaked data &#8212; including customer and employee personal information &#8212; was left open to download after workers in the affected organisations decided to download content at work without really understanding what they were doing.<\/p>\n<p>The offending organisations included schools, local governments, private corporations and small businesses.<\/p>\n<p>The FTC issued a statement on this action, which is hopes will act as a wider warning against a real risk.<\/p>\n<p>http:\/\/www.theregister.co.uk\/2010\/02\/23\/p2p_data_leak_warning\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2420","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2420"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2420\/revisions"}],"predecessor-version":[{"id":4907,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2420\/revisions\/4907"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}