Feeds

Fidelity employee steals 2.3 million consumer records

Database administrator hustles info to marketeers

The Power of One eBook: Top reasons to choose HP BladeSystem

Fidelity National Information Services, the major US financial processing company, said today a senior level database administrator at one of its subsidiaries stole 2.3 million consumer records containing bank account and credit card information as well as other personal information.

The data was commandeered by an unnamed, now-former employee who worked at the company's Florida-based outfit, Certegy Check Services. The employee allegedly sold the information to a data broker, who in turn sold it to a "limited number" of marketing organizations.

Fidelity, also based in Florida, claims the incident does not involve any outside intrusion or compromise of Certegy's technology systems.

“As a result of this apparent theft, the consumers affected received marketing solicitations from the companies that bought the data,” Certegy president Renz Nichols said in a statement. “We have no reason to believe that the theft resulted in any subsequent fraudulent activity or financial damage to the consumer, and we are taking the necessary steps to see that any further use of the data stops.”

Of the approximately 2.3 million records believed to have been compromised, about 2.2 million contain bank account information and 99,000 contain credit card information. The company is still investigating when the theft occurred.

Fidelity said the employee was authorized to access the data for his job, but removing and selling the data was "obviously, outside the scope of his employment and Certegy's knowledge".

Fidelity maintains that there is no evidence that the information was mishandled for anything other than marketing purposes. The company said it is unaware of any identify theft or fraudulent financial activity resulting from the data breach.

Certegy has filed a civil complaint against the former employee and the marketing firms they believe purchased the data. The company is seeking to retrieve the consumer data and to be awarded an injunction against its use.

The company has alerted the country's three major credit reporting agencies and is implementing a fraud watch on its internal systems for the checking accounts that were compromised.

"On behalf of Fidelity National Information Services and our Certegy subsidiary, I want to express my deep sadness and heartfelt apology over this incident,” Fidelity CEO Lee Kennedy said. “We will do everything possible to ensure no consumer is harmed because of this horrible betrayal.” ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.