Comment on the ethical issues and choice points response

Assignment Help Management Information Sys
Reference no: EM131817002

Choice Point, a Georgia-based corporation, is a data aggregator that specializes in risk-management and fraud-prevention data. Traditionally, Choice Point provided motor vehicle reports, claims histories, and similar data to the automobile insurance industry; in recent years, it broadened its customer base to include general business and government agencies. Today, it also offers data for volunteer and job-applicant screening and data to assist in the location of missing children.

Choice Point has over 4,000 employees, and its 2007 revenue was $982 million. It was acquired by Reed Elsevier in 2008. In the fall of 2004, Choice Point was the victim of a fraudulent spoofing attack in which unauthorized individuals posed as legitimate customers and obtained personal data on more than 145,000 individuals. According to the company's Web site: These criminals were able to pass our customer authentication due-diligence processes by using stolen identities to create and produce the documents needed to appear legitimate.

As small business customers of Choice Point, these fraudsters accessed products that contained basic telephone directory-type data (name and address information) as well as a combination of Social Security numbers and/or driver's license numbers and, at times, abbreviated credit reports.

They were also able to obtain other public record information including, but not limited to bankruptcies, liens, and judgments; professional licenses; and real property data. Choice Point became aware of the problem in November 2004, when it noticed unusual processing activity on some accounts in Los Angeles. Accordingly, the company contacted the Los Angeles Police Department, which requested that Choice Point not reveal the activity until the department could conduct an investigation.

In January, the LAPD notified Choice Point that it could contact the customers whose data had been compromised. This crime is an example of a failure of authentication, not a network break-in. Choice Point's firewalls and other safeguards were not overcome. Instead, the criminals spoofed legitimate businesses. The infiltrators obtained valid California business licenses, and until their unusual processing activity was detected they appeared to be legitimate users. In response to this problem, Choice Point established a hotline for customers whose data had been compromised. It also purchased a credit report for each victim and paid for a credit-report-monitoring service for one year. In February 2005, attorneys initiated a class-action lawsuit for all 145,000 customers, with an initial loss claim of $75,000 each.

At the same time, the U.S. Senate announced that it would conduct an investigation. Ironically, Choice Point exposed itself to a public relations nightmare, considerable expense, a class action lawsuit, a Senate investigation, and a 20-percent drop in its share price because it contacted the police and cooperated in the attempt to apprehend the criminals. When Choice Point noticed the unusual account activity, had it simply shut down data access for the illegitimate businesses, no one would have known. Of course, the 145,000 customers whose identities had been compromised would have unknowingly been subject to identity theft, but it is unlikely that such thefts could have been tracked back to Choice Point. As a data utility, Choice Point maintains relationships with many different entities.

It obtains its data from both public and private sources. It then sells access to this data to its customers. Much of the data, by the way, can be obtained directly from the data vendor. Choice Point adds value by providing a centralized access point for many data needs. In addition to data sources and customers, Choice Point maintains relationships with partners such as the vital records departments in major cities. Finally, Choice Point also has relationships with the people and organizations on which it maintains data.

Questions

1. Choice Point exposed itself to considerable expense, many problems, and a possible loss of brand confidence because it notified the Los Angeles Police Department, cooperated in the investigation, and notified the individuals whose records had been compromised. It could have buried the theft and possibly avoided any responsibility.

Comment on the ethical issues and Choice Point's response. Did Choice Point choose wisely? Consider that question from the viewpoint of customers, law enforcement personnel, investors, and management.

2. Given Choice Point's experience, what is the likely action of similar companies whose records are compromised in this way? Given your answer, do you think federal regulation and additional laws are required? What other steps could be taken to ensure that data vendors notify people harmed by data theft?

3. Visit www.choicepoint.com. Summarize the products that Choice Point provides. What seems to be the central theme of this business?

4. Suppose that Choice Point decides to establish a formal security policy on the issue of inappropriate release of personal data. Summarize the issues that Choice Point should address in this policy.

Reference no: EM131817002

Questions Cloud

Heights in centimeters of girls at the start : Heights in centimeters of girls at the start of 1st grade are approximately normal with mean 122, standard deviation 5. Use the 68-95-99.7 Rule to estimate the
Describe the promotional and advertising elements : Discuss how the activities that you identified above contribute towards a coordinated and integrated message for customers.
Compute the percentage total return : Suppose a stock had an initial price of $73 per share, paid a dividend of $1.20 per share during the year, Compute the percentage total return
Weights in kilograms of boys : Weights in kilograms of boys at the start of 1st grade are approximately normal with mean 25, standard deviation 5. Use the 68-95-99.7
Comment on the ethical issues and choice points response : Comment on the ethical issues and Choice Point's response. Did Choice Point choose wisely? Consider that question from the viewpoint of customers.
Random variables is binomial : Tell whether each of these random variables is binomial; if not, tell which condition is not met (fixed sample size n, independence of selections
How should fox lake respond to this incident : In what ways did weaknesses in technical safeguards allow this situation to occur?How should Fox Lake respond to this incident?
Proportion of people do we expect : For any sample size, on average what proportion of people do we expect to have been born in the winter?
Proportion of high school seniors : If we take a sample of seniors from a particular private high school, can we say that sample proportion with no siblings has mean 0.05?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain your rationale behind the design of your e-r diagram

Create a Data Flow Diagram (DFD) relating the tables of your database schema through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required p..

  Design mock-up of the organization program ui

Building on your initial user interface (UI) design mock-up of the organization's program UI, the interface now needs to present more information to the user

  Describe the circumstances of the arrest

The criminal justice process can vary slightly from one state to another as well as from the adult system to the juvenile system but the basic process remains the same, and individual rights under the constitution remain the same in all states at ..

  Create a multimedia presentation

You are working with one of the organizations below to create an instructional guide. You will be conducting research and promoting the instructional guide to the organization's board. Your instructional guide should explain the real-world use of ..

  Describe how you could use reporting systems to assess

Funds are given to activities that few students find attractive, & insufficient funds are allocated to new activities in which students do want to participate.

  Perform a search on the web for articles

Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks.

  Examine five issues that the it department is likely to face

Create an architectural diagram that shows how the virtual teams would collaborate and access common repositories for documents, software, development.

  Discuss about the health information management system

Determine what you believe to be the most critical factor for the successful implementation of a health information management system. Justify your response.

  How digital media has been used to influence core business

Students are required to identify news stories which demonstrate how digital media has been used to influence or has changed core business.

  Describe at least two possible database failures

Assess possible challenges that may exist within each phase. Suggest actions that one can perform in order to overcome these possible challenges.

  Show the bottom-up and top-down budgets

Bottom-Up and Top-Down Budgets - Contrast the strengths of bottom-up and top-down approaches to project budgeting.

  Evaluate the phases of business continuity planning

Evaluate the phases of business continuity planning as they relate to the organization. Analyze how the organization could use emerging trends such as Bluetooth, Wi-Fi, cell phones, and RFID to remain competitive in the future

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd