How Data Brokers Should Handle the privacy of Personal ...
How Data Brokers Should Handle the privacy of Personal Information Luai E Hasnawi Agenda Background The Business of Information Sharing ChoicePoint The Case The Fraud Story Role of the Security Breach information Act FTC investigation
What is Data Brokering? It is a new industry that based on gathering, processing and selling personal information. Where do they get their information from? From three major category (locally and Nationwide). . . Public records.(records that are created and maintained
by government agencies and are open for public inspection, e.g. real-estate records and marriage divorce*) Publicly available information(information about an individual from non-governmental sources that is available to the general public, e.g. telephone directory and newspaper*). Nonpublic information(information about an individual obtained from a source that is privately owned and is not
available to the general public, e.g. Addresses and SSN*). * source: http://west.thomson.com/privacy/records.aspx The Business of Information Sharing companies or government agencies purchase from data brokers information about an individual - including his or her Social Security number - in order
to conduct background checks or verify someones identity * Source: CRS Report for Congress, Data Brokers: Background and Industry Overview, 2005 ChoicePoint 1997 ChoicePoint was separated from Equifax credit agency. ChoicePoint has acquired 60 companies and hundred of thousand of customers. ChoicePoint has 5,500 employees. CP sells data to more than 50% of the top 1,000 US companies and has the
largest background screening business. ChoicePoint CP provide critical tasks such as Employee screening. Homeland security Mortgage processing Commercial insurance CP has more than 19B public record. QuickTime and a TIFF (LZW) decompressor
are needed to see this picture. The Case In 14 February 2005, MSNBC reported unauthorized access to ChoicePoints Database. Up to 35,000 Californians might have been affected. After one week, data breaches affected consumers nationwide. At the end of 2005, CP notified 163,000 victims have been fraudulently accessed.
The Fraud Story The Fraud against CP started in 2003. The fraudster acquired fake business license to pose as check-cashing co. and debt-collection firm. The Business license were obtained by using a stolen identities. Application and business license were faxed to CP to get access account. CP run the routine background check and it was clear. Fraudster set up 50 accounts using the above procedure and got username and passwords every time.
The Fraud Story (cont.) 17,000 searched were performed in CP database Criminal Investigator discovered more than 800 identity theft. The breaches cost $27.3M to recover legal fee, notify victims and seek audits in 2005 alone. Role of the Security Breach information Act California state law require any organization to disclose data breaches to California residents
when unauthorized access to unencrypted personal information. CP admitted that in this law does not exist, No one would ever know about the breach. FTC investigation The US Federal Trade Commission (FTC) Concluded its investigation in 2006 by announcing a landmark US$15M, $10M civil penalty and $5M fund to compensate identity theft victims. FTC claimed that CP violated the terms of the
Fair Credit Reporting Act (FCRA) when it shared personal credit data with unauthorized users and misled customer in its privacy statement by claming that its database was secure Lawsuits Goldberg v. CP. Failed within a week after the breach becoming public. The claim was Fraudulent and Negligent in its handle of the breach and employed unfair business Practice. Salladay v CP. Failed within a month after the public disclosure. The claim was violated
and password sent to the customer to access the database. Customers search and logging in history are not archived. No supervision is held on any access. Policy Changes after the data breach Close 50 suspicious accounts Stopped accepting faxes and mails of business license Nongovernmental and private business must attend personally to establish accounts.
Personal information would be sold under new conditions which are: Governmental requests Consumer-Based transaction(e.g. home address verification). Policy Changes after the data breach (cont.) Masking part of SSN and drivers license. Small-Business customer were cut-off the DB. Private investigator, check-cashing and debt collector are cut off the DB.
CP created Office of Credentialing Compliance and privacy to monitor the activities and report to its board of directors. For example, on-site visits, establishing policies for compliance with privacy laws and regulation and improving screening. Policy Changes after the data breach (cont.) Offer victims one year of free credit-monitoring service. CP brought outside help to evaluate its business privacy practice
consumers with information on how CP will mange safeguard data thats collected and sold both online and offline. How federal and state governments have reacted to the data breach Legal Landscape In 2005, only California State has required notification to consumers in the event of unauthorized access to personal info. In September 2006, 33 additional
states had passed similar regulation. How federal and state governments have reacted to the data breach (cont.) Consumer Rights and responsibilities. Generally consumers are excluded from every aspect of their operation, leaving them little access or control over their own personal information. Since data brokers do not interact with individuals consumers, there is no way for a consumer to prevent any kind of data breach.
A research shows high error rate on CP records on individuals. 1 error in every 11 record. As result, CP announced planning to give individuals access to view their own personal information. However, since then, this service is still not available. How federal and state governments have reacted to the data breach (cont.) Consumer responsibilities to minimize the risk. Check credit report regularly for any unauthorized activity.
Consumer must be diligent in attempting to opt-out of any undesired personal information. Consumers can contact each company with which they have relationship to request opting out of information transfer. By allowing consumer to access their information Consumer will strengthen goodwill and trust in their operation. Provide consumer a low-cost means of eliminating harmful error from their records
Recommendations Have a plan to deal with breaches. Companies handling sensitive data must realize the risk and plan accordingly. Any strategy should include a plan for notifying the public in the case of such data breach. Provide accurate notification. Many companies realized the need to promptly alert the public of data breaches before the news media could break the story. Companies that fully disclose verified data breach and announce the changes being made to address
problems will soften the blow and likely maintain public trust in their operation Recommendations Verify Customers identities to preserve privacy. you need to be confident that a business is legitimate and protect your companys assets and reputation Perform regular security audits. By performing such regular audits, companies would both fortify themselves against data breaches and provably maintain commercially reasonable security levels, which is the FTCs standard for negligence in
data breaches. Maintain an audit trail Data broker should log all access to their database as well as all search history. Recommendations Store personal information in encrypted form Encryption of sensitive data minimized the risk to that data if identity thieves acquire it. Express the companys overall privacy
practice clearly make clear to both consumers and customers how it will store and protect sensitive information, and enumerate the rights that consumers have to protect the privacy of that information Thank you 25
Arial Wingdings Calibri Sandstone 1_Sandstone Three Domains of Living Things Kingdom Monera (what we call bacteria) Bacteria have three basic shapes Arrangements vary : Archaebacteria (live in harsh environments) Eubacteria Biology of Monerans Bacteria require energy! Bacterial Reproduction (sex!!)
14 schools exited the FLDOE's "Lowest 300" schools list leaving Miami-Dade County as the district with the fewest 300 schools when compared to Broward, Duval and Hillsborough. Miami-Dade County Public Schools maintained a school grade of B outperforming Broward, Hillsborough,...
Welcome! Meeting will begin at 9:15 am Agenda/documents at front of room Please enjoy some breakfast FOTB Annual Meeting Jonathan D. Mendelson '97 FOTB Board President Agenda Call to order Financial summary Other business Endowment Adjourn Call to Order Select...
Chapter 1: Introduction to Social Psychology Social Psychology by Tom Gilovich, Dacher Keltner, and Richard Nisbett Characterizing Social Psychology Social Psychology - The scientific study of the feelings, thoughts, and behaviors of individuals in social situations 1.
For ASA Fall Conference. R and D Arm/Testing Ground for colleges and universities credit programming or programs that can't be financially solvent. Dual non-credit/credit enrollment to sustain credit bearing courses on campuses.
Improve achievement and graduation rates for all students . Eliminate attendance and learning barriers . Improve attendance . ... reform by identifying what matters for student success and school improvement and creating the critical indicators to chart progress.
Contractual settlement for risk-bearing providers (~June) At present, there is no easy way to collect outcomes data from provider organizations, so payers have developed various mechanisms which vary by: Patient population
Ready to download the document? Go ahead and hit continue!