StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Impacts of ChoicePoints Negligence in Information Security - Case Study Example

Cite this document
Summary
The author of the paper "Impacts of ChoicePoint’s Negligence in Information Security" will begin with the statement that Oluwatosin’s pretexting trial at the Choice point was effective because his credentials were not verified before selling information to him…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Impacts of ChoicePoints Negligence in Information Security
Read Text Preview

Extract of sample "Impacts of ChoicePoints Negligence in Information Security"

ChoicePoint’s policies were proven to be insufficient and flawed in tackling fraud against the firm as the fraudsters were capable of evading being detected for a whole year. The simple mistakes by the company were the major causes of data breaches.

Question 2

            The pretexting attempt of the data breach impacted the business conducted by ChoicePoint negatively as the company was forced to disclose what had transpired and inform residents about their personal, informal being compromised. The federal-level charged the company with many negligence counts for failing to make use of realistic information security customs. At the same time, the Federal Trade Commission also charged the firm with the violation of giving credit reports to subscribers without permissible reasons to obtain them. The company saw a decline in income and an increase in expenses after the incident. At the same time, there were fines imposed on the firm by FTC fines (Otto, Anton & Baumer, 2007).  ChoicePoint’s paid a $10 million fine and $5 million to compensate their customers for the losses that stemmed from the information breach. Legal expenses amounting to $800,000 were incurred during the first quarter of the year 2006 related to the falsified data access. The company decided to restrict information product sales, which contained sensitive customer data.

Question 3

            The first governance step that ChoicePoint made was employing a chief privacy officer who reported directly to the board to govern privacy and public accountability. The briefings are done quarterly to ensure improvement of privacy and security with other detailed oversight roles. ChoicePoint has also come up with many divisions to tackle privacy and security from various angles like the corporate credentialing center. It is a conformity and privacy division, which also undertakes internal auditing (Conger, 2009). The second step is the distinct definition of the expected behavior and offers tools to employees to make compliance simple. ChoicePoint implemented various practices to scrutinize potentially fake customer behavior such as investigating firms, which abruptly increase their background checks. Thirdly, a firm needs to write data security breach response procedures, which indicate the person who is to be notified in circumstances of a privacy breach and what the firm needs to do for affected customers. The company was forced to implement changes to ensure that consumer reports were given to legitimate businesses only for legitimate purposes. A checkpoint established a security program with comprehensive information. The process was undertaken by obtaining audits from independent security professionals considered third parties. At the same time, the company hired a chief privacy officer to ensure comprehensive verification. ChoicePoint also stopped accepting faxed versions of business licenses. The company also increased its authentication procedures by creating customer identity with non-governmental and privately-held businesses undergoing re-credentialed to continue access to its databases (Conger, 2009). ChoicePoint also decided to correct several early mistakes, which had enabled the pretexting attempt by creating an independent office to deal with privacy matters. ChoicePoint employed outside help to assess its business as well as privacy practices by engaging in many audits to assess their data management practices.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Study Example | Topics and Well Written Essays - 500 words - 30”, n.d.)
Case Study Example | Topics and Well Written Essays - 500 words - 30. Retrieved from https://studentshare.org/e-commerce/1649718-case-study
(Case Study Example | Topics and Well Written Essays - 500 Words - 30)
Case Study Example | Topics and Well Written Essays - 500 Words - 30. https://studentshare.org/e-commerce/1649718-case-study.
“Case Study Example | Topics and Well Written Essays - 500 Words - 30”, n.d. https://studentshare.org/e-commerce/1649718-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Impacts of ChoicePoints Negligence in Information Security

Many Forms of Cybercrime

the operator of TJ Maxx and Marshall stores in the United States, announced in January 2007 that it was the victim of a security breach, which exposed 94 million credit card records to outsiders, and these outsiders made fraudulent credit card purchases with this information about TJX customers.... Moreover, since up to 400,000 of the TJX records included their customer's social security numbers and driver's license numbers, the thieves were able to steal identities as well....
29 Pages (7250 words) Essay

Negligent Security & Premises Liability

hellip; It is evidently clear from the discussion that the elements necessary to establish premises liability are the defendant must possess the premises or land, the plaintiff must be an invitee or licensee, and there must be negligence or some other wrongful act.... This research will begin with the statement that premises liability is the area of law whereby a landowner or possessor of the premises is held liable for certain torts which occur on their premises, real property or land....
6 Pages (1500 words) Research Paper

Evaluation of Data and System Security

Security officers in various companies have tried some very harsh tactics to ensure they get rid of the bad guys, Carol Dibattiste states that as security officer in ChoicePoint where it had been attacked by a Nigerian person by the name of Olatunji Oluwatosin, who had posed as a legitimate set of enterprises and he was then able to set up 50 bogus accounts and got hold of choicepoints' customers personal data, including names, addresses and social security numbers.... Classically, computer security has been about systems of prevention....
3 Pages (750 words) Coursework

Negligence in Healthcare

negligence [Name of Student] [Name of Institution] Introduction Records and reports indicate that more nurses are being sued for malpractice by the day.... Quite apparent in these campaigns, education, training is the distinction among malpractice, negligence, and gross negligence.... This paper explores the differences among negligence, gross negligence, and malpractice.... In addition, the paper discusses the importance of documentation and its connection with a negligence case in which a patient's wrong leg was amputated....
4 Pages (1000 words) Essay

Information and Systems Security

The paper “Information and Systems security” seeks to evaluate Network security as one of the most highly debated topics in the present-day world.... Network security has many dimensions.... hellip; The author states that Network security has become a very essential part of each and every network present on this planet- be it the Internet which we use or the LANs (Local Area Networks) and MANs (Metro Area Networks)....
6 Pages (1500 words) Assignment

Tort of Negligence

This principle has been established as the tort of negligence in tort law and applies to all civil wrongs and claims7.... The paper "Tort of negligence" discusses that it is essential to state that in any action for negligence, the first and foremost consideration to be taken cognizance of is whether the defendant was under a lawful duty to safeguard the claimant from injury.... In order to prove that there is a tort of negligence had occurred, the claimant must prove that the defendant was under a duty of care....
9 Pages (2250 words) Coursework

Data Collection

nformation Handling at ChoicePoint:What are the major benefits of choicepoints data collection?... hat are some of the possible harms of choicepoints data collection?... This data is also beneficent for security and law agencies because through ChoicePoint they can have an access to the data which they cannot access by themselves due to legal restrictions.... This paper also argues on the fact that whether the use of personal data collection in Running Head: information handling at ChoicePoint....
1 Pages (250 words) Research Paper

Data Breach at ChoicePoint

In addition to this, the sufficiency of fines imposed on the ChoicePoint and effectiveness of the changes implemented by the organization concerning data security are also discussed.... The organization purchases the personal information of individuals including their names, birthdates, credit histories, social security numbers, employment data, etc.... In 2000, ChoicePoint sold important information without checking the background and credentials of buyers....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us