Feeds

Data collector charged $275,000 for leaking personal data

$20 a head. 13,750 heads

Securing Web Applications Made Simple and Scalable

One of world's biggest collectors of consumer data has agreed to pay $275,000 after federal authorities accused it of exposing the personal information of 13,750 people.

The payment, which settles charges the Federal Trade Commission brought against Choicepoint, amounts to just $20 per exposed consumer. The breach was the result of someone at the company inadvertently turning off a database monitoring system. Unknown intruders then accessed social security numbers and other details by conducting unauthorized searches.

Choicepoint's gaffe came even as the company was under court-ordered monitoring for a separate security lapse in 2005 that led to at least 800 cases of identity theft, according to the FTC. A year later, Choicepoint paid $15m and promised to implement procedures ensuring that consumer reports were provided only to legitimate businesses for lawful purposes. The data collector also agreed to regularly get independent assessments of its data security program through 2026.

Despite the ongoing scrutiny from the FTC, the Choicepoint employee switched off an electronic monitoring system designed to identify unauthorized access to customer accounts. During one of the four months the system remained inactive, unauthorized individuals used stolen credentials to look up personal information on 13,750 consumers listed in Choicepoint databases, according to the FTC.

Choicepoint, which is owned by Reed Elsevier, blamed the breach on a former government customer that failed to protect a user ID and password used to access its database. Its statement didn't explain why the monitoring system was shut off, but it maintained that the company remained fully compliant with its 2006 settlement agreement with the FTC.

The settlement came on Monday, a day before the FTC announced settlements in two other cases that harmed consumers.

The agency said the second-biggest US money transfer service had agreed to pay $18m to settle charges it turned a blind eye to crooked telemarketers who defrauded consumers out of more than $84m. Minnesota-based MoneyGram International also agreed to implement a comprehensive program to root out fraud and to perform background checks before hiring agents.

From 2004 to 2008, con artists bilked the people by calling them and claiming they had won lotteries or been awarded guaranteed loans but needed to pay taxes or insurance fees before they could collect. MoneyGram was chosen as the payment method because it allowed the scammers to pick up the transferred funds immediately and payments were often untraceable. Victims also have no chargeback rights or other recourse, according to the FTC.

The agency on Tuesday also said a children's clothing marketer has agreed to pay $250,000 for collecting minors' personal information without first getting their parents' permission. Iconix Brand Group had required customers to disclose a wide variety of details to receive updates or enter contests, according to the FTC. That included date of birth, full name, email address, mailing address, gender and phone number.

Iconix had collected the information since 2006. The practice violated the Children's Online Privacy Protection Act, the FTC said. ®

This article was updated to reflect that the $275,000 Choicepoint was required to pay was not a fine. Language was also added to reflect company comments that the fraud monitor was accidentally disabled by an employee and that the breach took place during a single month. A Choicepoint spokesman claims an FTC press release is incorrect in saying the 2005 breach resulted in 800 cases of identity theft.

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.