Feeds

Titsup airport express lane biz may pawn flyer data

If the feds Clear it

5 things you didn’t know about cloud backup

Defunct American airport security lane service Clear said on Friday it may sell its sensitive customer data to a similar provider if it's authorized to do so by the US government.

Before Monday, the Clear program promised to rush customers paying $200 per year through the diabolical gauntlet that is America's airport security checkpoints.

When Clear abruptly shut down operations, its quarter million customers that handed over private data like fingerprints, employment history, social security number, and credit information to get cutsies in line began wondering what happens to all the sensitive information. Government officials are also wondering.

In a statement on its website today, Verified Identity Pass, which runs Clear, said its airport kiosks are now being wiped clean of all data and software.

Computers that Verified Identity Pass assigned to its former employees are being wiped clean too, the company said.

But not all information is being deleted while Clear is read its last rites. The company adds that its customers' personally identifiable information could still be used by a similar provider, presumably if Clear's assets are sold later on.

"Any new service provider would need to maintain personally identifiable information in accordance with the Transportation Security Administration's privacy and security requirements for Registered Traveler programs," it stated. "If the information is not used for a Registered Traveler program, it will be deleted."

Clear says it's now "communicating" with the TSA, airports, and airline sponsors to ensure the security of the information and systems is maintained throughout the process.

The company said at the present time, Verified Identity Pass hasn't filed for bankruptcy. It blamed its abrupt end on failing to negotiate an agreement with its senior creditor and further affirmed it won't issue refunds to customers.

Clear said it will notify members in a "final email message" when the information is deleted. No mention if the same courtesy will be extended if they don't. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
One HUNDRED FAMOUS LADIES exposed NUDE online
Celebrity women victimised as Apple iCloud accounts reportedly popped
Rubbish WPS config sees WiFi router keys popped in seconds
Another day, another way in to your home router
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.