Chris Gravatt Mallory De Kovessey Tina Vargas Tim Hogenhouser The ChoicePoint Attack.

Slides:



Advertisements
Similar presentations
Using software for Firearm Acquisition and Disposition
Advertisements

Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Chapter 27 Your Credit and the Law pp Learning Objectives 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal.
Red Flag Rules: What they are? & What you need to do
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
MARKETPLACE FRAUD How the Assistance Network can Prevent, Detect, and Report suspected fraud.
Protecting Personal Information Guidance for Business.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Red Flags Rule & Municipal Utilities
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
The ChoicePoint Attack – Case Study. Team F Susan Crowley Nafisah Hunter Beata Kolodziej Ingrid Macias Toni Steiner Maria Velasco.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Data Protection Act. Lesson Objectives To understand the data protection act.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
Identity Theft Insurance Charles P. Orlowicz November CAS Annual Meeting – Session CS04 A division of the property and casualty subsidiaries.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
The ChoicePoint Attack – Case Study
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
By Renata Jaruseviciute 1 ©Renata Jaruseviciute.  Financial Crime definition & types  Regulatory body  Legislation  Questions to be asked yourself.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Protect Your Business Become a Hard Target. Where Are We Going?
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
Back to Table of Contents pp Chapter 27 Your Credit and the Law.
1 st Choice Document Destruction th Avenue, Milaca, Minnesota Office: Cell:
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
Jeff loses his identity! Lesson 8: Identity Theft.
Chapter 27 Your Credit and the Law pp Learning Targets 1.Explain 1.Explain how government protects credit rights. 2. Name 2. Name federal laws.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Fraudulent and Questioned Documents. Top 5 Countries Originating Fraud.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
Jeff loses his identity! Lesson 5: Identity Theft.
Identity Theft It’s a crime!
Protecting Your Credit Identity
Protection of CONSUMER information
Tax Identity Theft Presenter Date
Chapter 3: IRS and FTC Data Security Rules
Protecting Personal Information Guidance for Business.
Protecting Your Credit
Jeff loses his identity!
Some Challenges Associated with the W!SE Exam
Protecting Yourself from Fraud including Identity Theft
Clemson University Red Flags Rule Training
Identity Theft Presented by 72 Facility
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

Chris Gravatt Mallory De Kovessey Tina Vargas Tim Hogenhouser The ChoicePoint Attack

Synopsis ChoicePoint is a company that offers information on fraud prevention data to federal agencies, missing children reports and businesses on new employees. Fraudulent people were able to obtain personal information on people and subjected these people to identity theft, Notifying the Los Angeles Police Department of these suspicious activity cost ChoicePoint significant loss in market share, as well as clients, and was subjected to a class action law suit where they were forced to pay millions of dollars. ChoicePoint could have avoided all these consequences had they shut down their data source and “buried” the fact that there was even a theft of information.

Question 1 The question asks if choice point had chosen wisely when it publicly announced the information theft and subjected themselves to public ridicule and millions of dollars of lost cost and revenue. We think from an ethical standpoint that the company acted wisely in publicly announcing the theft. Had they tried to bury the fact that a theft indeed had happened, the repercussions could have been much more severe. The company tried to do the right thing by letting law enforcement officials know that there was a theft, and tried to help in the investigation to capture the criminals.

Question 2 The question asks if we think other company’s would take the same steps of action, had their data been infiltrated in the same manner. Also if there should be stricter laws in force to help deter these crimes from taking place? Given the recent history of companies keeping a lot of information form the public, we think that the majority of the companies would try to cover up the fact that a theft had taken place. They would do all that they could to protect their companies from losing valuable reputation, market share, and revenue.

Question 3 Products that ChoicePoint provides on their website and through their company, and what is the central theme of the company. Background Checks Insurance Repots Certified Birth/Death certificates Certified Marriage/ Divorce Certificates The central theme seems to be making sure that information that people provide on various documents are accurate and truthful.

Question 4 Reflect on an appropriate security program for ChoicePoint. Identification and authentication is the security program they should use. The way that the criminals got into the data is by pretending that they were a client of ChoicePoint and fooled the representative into thinking they were someone they are not. Having a more secure identity authentication in place will make it much harder for people to lie about who they are. They could either use a voice recognition system or a more elaborate password system and smart cards to help deter unauthorized access.

Question 4 Con’t ChoicePoint needs a security process to better help them to protect valuable consumer data. This will enable them to mineralize there liability. The people that ChoicePoint should govern under the security system is their customers, employees, IT people, and any outsourcing companies that they hire and interact with.

Question 5 Supposing ChoicePoint issues a security policy, these are some of the issues they should be concerned with. Multiple checks for identifying customers Background checks on all employees new and existing Background checks on new and existing customers. Safer firewalls and database security Making sure that their own information on people is accurate and correct.