Pros and cons of notifying and not notifying possible victim

Assignment Help Marketing Management
Reference no: EM131311240

THE PROBLEM OF INFORMATION PROTECTION:-

The theft of consumer information-particularly fi nancial information-is causing huge headaches for fi nancial and data companies. This case looks at three incidents that occurred recently at ChoicePoint, Bank of America, and Polo Ralph Lauren. CHOICEPOINT The opening case study in this chapter highlighted the Acxiom Corporation, a company that gathers, packages, and sells information about consumers.

A direct competitor to Acxiom is ChoicePoint, a company that is a spin-off of Equifax, which is one of the three major credit bureaus. ChoicePoint has more than 20 billion records that include information on almost every adult in the United States. ChoicePoint sells this information to customers, such as potential employers, for purposes of verification. ChoicePoint found itself in the headlines when personal financial information on 145,000 customers was stolen in a very high-profile identity fraud theft. And this time there was no sophisticated electronic attack or break-in; rather the theft was accomplished through old-fashioned "social engineering." Social engineering is getting information that you have no right to by conning people who have access to it.

What the identity thieves did was to pose as fake companies buying information on people in every state and the District of Columbia. So far, 750 confirmed cases of identity theft have surfaced from the ChoicePoint security breach. The U.S. Attorney's Office in Los Angeles charged that ChoicePoint had been scammed previously in 2002 resulting in fraud to the tune of $1 million. THE BANK OF AMERICA The Bank of America was also the victim of information theft accomplished in an old-fashioned way. Personal information recorded on tapes belonging to 1.2 million federal employees, including members of Congress, was on a commercial jet en route to a safe backup facility when the tapes were stolen.

Both the Bank of America and ChoicePoint thefts occurred in February 2005 and were followed very quickly by the introduction of privacy legislation at both the state and federal levels. POLO RALPH LAUREN Another example of embarrassment and worse involved Polo Ralph Lauren. It seems that between June 2002 and December 2004, the company was storing credit card information on its point-of-sale system instead of deleting it immediately after transactions had been completed. The realization that this data had been compromised led HSBC North America-the issuer of some of the credit cards whose numbers had been stolen-to notify 180,000 consumers of the possibility of identity theft. MasterCard, Visa U.S.A. and Discover Financial Services customers have all been affected. American Express says it has not seen any activity that has looked suspicious.

Questions
1. If you were the manager of a company where it was discovered that credit card information had been stolen, what responsibility would you have to the people whose personal information was compromised? What are the pros and cons of notifying and of not notifying possible victims?

2. E*Trade, a leader in online brokerage services, is the fi rst company to go to a two-factor authentication system optionally available to its customers with accounts of $50,000 or more. The fi rst factor is the ID and password that customers have always needed, and second, they use a security token or, as E*Trade calls it, a Digital Security ID. This is a little device that you can carry on your key chain that displays a new random six-digit number every minute. E*Trade's host system must, of course, synchronize with the device. When you log in, you have to type in this number after your ID and password.

Since the number changes so often it's virtually impossible to hack an account with this two-pronged protection. From a consumer's point of view, do you think this is a good idea? What are the advantages and disadvantages of the system to businesses and customers? With which online transactions would you consider it worthwhile to enforce this level of security? Remember that you might have a lot of these tokens if you use a lot of online services.

3. In this case study you saw how personal information can be stolen from huge databases and data warehouses. What other ways are there that thieves can obtain personal information about you that would allow them to steal your identity and run up debts in your name? To what extent would you be liable for these debts? What would you have to do (what steps would you take) to reestablish your financial identity if you discovered your identity had been stolen?

4. In the case of the Bank of America, the data was being shipped on tapes to a safe location. This is very good backup policy to make sure that in the event of a major disaster like a fi re or fl ood, data can be quickly restored enabling the company to be back in operation as soon as possible. However, this procedure leaves the company vulnerable to old-fashioned theft of the physical tapes containing personal information. What are two ways that this information that travels on trucks and planes could be protected?

Reference no: EM131311240

Questions Cloud

Federal guidelines governing a business e mail traffic : If you were to give advice to someone who had just started using e-mail, or even someone who's been using e-mail for a while, what would you tell that person should be the one guiding principle in all their e-mail communications?
Determine whether the router creates jitter for this class : Using time lines, show the arrival time, the processing duration, and the departure time for each packet. Also show the contents of the high-priority queue (Q1) and the low-priority queue (Q2) at each millisecond.
How you determined which improvement option to recommend : List the improvement options you tested and the increase in profit per dollar invested for each option tested.Write a brief explanation of how you determined which improvement option to recommend.Include a printed copy of the output sheet from Arena..
Calculate the pump pressure necessary for the given flow : 3-5 A water-tube steam generator operating at 2400 psia has 50-ft-high 3-in ID tubes. The pressure Drop is given by 3.25 x 10-6 m2, where m is the mass flow rate, in pound mass per hour Assuming sanzati water in the downcomer, a water-steam mixtu..
Pros and cons of notifying and not notifying possible victim : hat responsibility would you have to the people whose personal information was compromised? What are the pros and cons of notifying and of not notifying possible victims?
Write a paper about electrical engineering standards : You will write a paper about electrical engineering standards as they apply to communications. The topical coverage may be as specific or as broad as you want.
Increase production even more : Frank, his father notices this and advises Raymond to shutdown the stall, while Marie his mother advises him not only to set up the stall next weekend but to increase production even more. Raymond is extremely confused. Who do you think he should ..
Impact of festivals on promoting cultural tourism : Topic, as this falls in the same umbrella of the area of responsibilities currently handling, and explore more this phenomenal Dhow festival cultural event that drives a lot of visitors during a week of activities, this really impact on developing..
What are ethics and how do ethics apply to business : What are ethics, and how do ethics apply to business?- What situation would qualify as an exception to the copyright law?

Reviews

Write a Review

Marketing Management Questions & Answers

  Explain e-commerce marketing using three articles

Explain E-Commerce Marketing using Three Articles and discuss your opinion on the topic and refer to the articles to support your findings

  The goal setting step in the planning phase of the strategic

The goal setting step in the planning phase of the strategic marketing process sets quantified objectives for use in the evaluation phase.

  Seminar topic- service quality

Seminar topic: Service Quality. View this week's archived Seminar and write a 1-page paper, double spaced, that summarizes the Seminar and what you learned

  How consumers respond to various marketing efforts

Of the following, the best starting point to understanding how consumers respond to various marketing efforts

  Prepare a marketing plan for htc unveils premium

Prepare a marketing plan for HTC unveils premium One M9 Smartphone in 400 words count

  Define brand and what are the benefit of managing brand

Define Brand and what are the benefit of managing and Extension of Brands.

  Explain e-business market segmentation matrix

Explain E-business Market Segmentation Matrix and Outline the e-business market segmentation matrix based on its two underlying dimensions

  Develop an estimate of the market value of equity of rcsh

Business Valuation Ruth's Chris Steak House (RCSH) is a chain of restaurants. Develop an estimate of the market value of equity of RCSH in August 2005 and explain your reasoning.

  Analyse the extended marketing mix element

Explain how prices are set for Tata Nano to reflect Tata's objectives and market conditions prevailed in India. Show how promotional activity is incorporated to achieve marketing objectives. Analyse three of the extended marketing mix element.

  Applebees is the largest casual dining chain in the world

applebees is the largest casual dining chain in the world with 1970 locations throughout the united states and nearly

  What other costs does the project manager need to be

using textbook read the article three perceptions of project cost.based on your research and reading answer the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd