Preview

Privacy and Security Breaces at Acxiom

Good Essays
Open Document
Open Document
598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Privacy and Security Breaces at Acxiom
Privacy and Security Breaches at Acxiom:
Case Study Chapter 4

Privacy and Security Breaches at Acxiom:
Case Study Chapter 4 Acxiom might be the most important organization that most of us have never heard of. They are the “world’s largest processor of consumer data, collecting and analyzing more than a billion records a day” (Bigdoli, 2012). Acxiom was founded in 1969, and its’ headquarters is located in Little Rock, Arkansas (About Acxiom, 2013). “Its customers include nine of the country 's top ten credit-card issuers, as well as nearly all the major retail banks, insurers, and automakers” (Behar, 2012). Unfortunately, Acxiom has been faced with some breaches of security that have led the company make some important security changes/upgrades. In 2003, Daniel Bass, a 24 year old computer-systems administrator was found to have stolen the data of millions of individuals from Acxiom’s databases. He spent two years collecting this information and stored it on compact discs (Behar, 2004). He broke into their system by simply cracking passwords (Behar, 2004). Bass was not the only hacker to crack Acxiom however. While authorities were investigating Bass, they ultimately discovered an additional hacker group from Boca Raton, Florida, who had cracked the passwords for the same server that Bass had gotten into as well. While they accessed information for millions of people; it did not appear that either hacking incident resulted in the defrauding of any of the individuals whose data was stolen (Behar, 2012). Acxiom definitely needed to do something to beef up their security measures and protect their customers’ data. They first hired a chief security officer, which had not been a position until these incidents. The chief security officer instituted mandatory encryptions, as well as working to prevent cybercrimes. Acxiom additionally began to conduct security audits (both conducted from inside and outside firms) to test for weaknesses in security.



References: About Acxiom. (2013). Retrieved from Acxiom: http://www.acxiom.com/overview/ Behar, R. (2004, February 23). Never Heard Of Acxiom? Chances Are It 's Heard Of You. How a little-known Little Rock company--the world 's largest processor of consumer data--found itself at the center of a very big national security debate. Retrieved from CNN Money: http://money.cnn.com/magazines/fortune/fortune_archive/2004/02/23/362182/index.htm Bidgoli, H. (2012). MIS2. Boston: Cengage Learning.

You May Also Find These Documents Helpful

  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The aim of this report is to provide a practical study in order to determine, analyse and investigate market data through the use of the famous Fama-French three factor model (FF3). Moreover, this study will test the theory and will provide evidence of the anomalies discovered in relation to the variation in stock returns. Hence, in short the study will allow for the assessment of the effectiveness of the FF3 given the market data, and the discovery of the potential limitations.…

    • 4112 Words
    • 31 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * ChoicePoint customers had their identity’s compromised and ultimately stolen * The compromise of their identity means that they criminals could use their names and info for other purposes * ChoicePoint was effected by the Class-action lawsuit as a result * Were being investigated by the U.S Senate…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Davidson, Mary Ann. Security Seminar. “Information Security.” Lecture. Chief Security Officer. Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: October 16, 2001.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Powerful Essays

    On September 27 of 2004, ChoicePoint,a company that aggregates and stores personal information, suspected that some of its small business customers were involved in suspicious activities and informed the police. (Paine, Phillips, 2008)On February of 2005, ChoicePoint only notified those residents of California whose data had been leaked to the illegal customers, since a certain law in California requires it. A protest from the public, however, forced the company to notify the details of the breach to the other involved parties residing in the other states. The swindlers who scammed ChoicePoint had created over 50 accounts with previously stolen identities over the course of a year or even longer. (Pantesco, 2006)…

    • 2180 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Fusion Centers

    • 1091 Words
    • 5 Pages

    "EPIC - Information Fusion Centers and Privacy." EPIC - Electronic Privacy Information Center. N.p., n.d. Web. 16 May 2012. .…

    • 1091 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Evidence Collection Policy

    • 2535 Words
    • 10 Pages

    Whoever conducts the investigation does so in a previously mandated, official, and legally recognized manner.…

    • 2535 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Privacy Issues

    • 402 Words
    • 2 Pages

    Amendment I: Privacy of Beliefs, Amendment III: Privacy of the Home, Amendment IV: Privacy of the Person and Possessions and Liberty Clause of the Fourteenth Amendment which states that no State shall... deprive any person of life, liberty, or property, without due process of law. These are your basic privacy rights stated under the U.S. Bill of Rights. However there are other Acts, types of privacy and cases that have supported and influenced these rights. Examples of these would be The Privacy Act of 1974, The Freedom of Information Act, and Bond v. United States and Beck v. Ohio.…

    • 402 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    What does privacy really mean and why do people want it? It’s a fair question to ask, especially when looking at the internet, a global system that connects you to billions of people (Oxforddictionaries.com). There are endless amounts of details you can discover about a particular person on the internet. Some people enjoy the fact that they can access so much about another person with just a click of a button, while others fear it. That is why people take precautions, limiting the amount of access outsiders have to their information, however that does not always work. There are many loop holes in the terms and conditions we agree to on websites which leaves us open to the public in certain ways. There are also many ethical concerns regarding privacy on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year (“Corporate overview,” 2013). Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen (Jarvis & Milletary, 2014).…

    • 1162 Words
    • 5 Pages
    Better Essays