Preview

Privacy and Security Breaces at Acxiom

Good Essays
Open Document
Open Document
598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Privacy and Security Breaces at Acxiom
Privacy and Security Breaches at Acxiom:
Case Study Chapter 4

Privacy and Security Breaches at Acxiom:
Case Study Chapter 4 Acxiom might be the most important organization that most of us have never heard of. They are the “world’s largest processor of consumer data, collecting and analyzing more than a billion records a day” (Bigdoli, 2012). Acxiom was founded in 1969, and its’ headquarters is located in Little Rock, Arkansas (About Acxiom, 2013). “Its customers include nine of the country 's top ten credit-card issuers, as well as nearly all the major retail banks, insurers, and automakers” (Behar, 2012). Unfortunately, Acxiom has been faced with some breaches of security that have led the company make some important security changes/upgrades. In 2003, Daniel Bass, a 24 year old computer-systems administrator was found to have stolen the data of millions of individuals from Acxiom’s databases. He spent two years collecting this information and stored it on compact discs (Behar, 2004). He broke into their system by simply cracking passwords (Behar, 2004). Bass was not the only hacker to crack Acxiom however. While authorities were investigating Bass, they ultimately discovered an additional hacker group from Boca Raton, Florida, who had cracked the passwords for the same server that Bass had gotten into as well. While they accessed information for millions of people; it did not appear that either hacking incident resulted in the defrauding of any of the individuals whose data was stolen (Behar, 2012). Acxiom definitely needed to do something to beef up their security measures and protect their customers’ data. They first hired a chief security officer, which had not been a position until these incidents. The chief security officer instituted mandatory encryptions, as well as working to prevent cybercrimes. Acxiom additionally began to conduct security audits (both conducted from inside and outside firms) to test for weaknesses in security.



References: About Acxiom. (2013). Retrieved from Acxiom: http://www.acxiom.com/overview/ Behar, R. (2004, February 23). Never Heard Of Acxiom? Chances Are It 's Heard Of You. How a little-known Little Rock company--the world 's largest processor of consumer data--found itself at the center of a very big national security debate. Retrieved from CNN Money: http://money.cnn.com/magazines/fortune/fortune_archive/2004/02/23/362182/index.htm Bidgoli, H. (2012). MIS2. Boston: Cengage Learning.

You May Also Find These Documents Helpful

  • Powerful Essays

    The aim of this report is to provide a practical study in order to determine, analyse and investigate market data through the use of the famous Fama-French three factor model (FF3). Moreover, this study will test the theory and will provide evidence of the anomalies discovered in relation to the variation in stock returns. Hence, in short the study will allow for the assessment of the effectiveness of the FF3 given the market data, and the discovery of the potential limitations.…

    • 4112 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * ChoicePoint customers had their identity’s compromised and ultimately stolen * The compromise of their identity means that they criminals could use their names and info for other purposes * ChoicePoint was effected by the Class-action lawsuit as a result * Were being investigated by the U.S Senate…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    By understanding what controls and strategies are already in place for this company to protect this data, the company can now move forward and decide on a desired result, develop a workable plan and monitor its process. I feel the key to this company’s problem with breach of sensitive online data is fire wall and encryption.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    There are countless steps that can be taken to safeguard a company’s data systems against intrusions. The company can update POS (Point-of-Sales) systems to EMV (Euro pay, MasterCard, and Visa) technological standards, implementing “layering” encryption and tokenization, and utilizing outsourced penetration tests to access and report on company’s current information security strength.…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year (“Corporate overview,” 2013). Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen (Jarvis & Milletary, 2014).…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Identity theft is when someone steals another person’s identity through the internet. The identity stolen can be personal information such as account names and security numbers to use it for their own benefit. For example, a Facebook user can steal another Facebook user’s personal details by either hacking or visiting their profile, uploading their profile picture, gaining personal details and using it to create a fake account of that Facebook…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Davidson, Mary Ann. Security Seminar. “Information Security.” Lecture. Chief Security Officer. Oracle Government, Education and Healthcare, Oracle Corporation, Reston, VA: October 16, 2001.…

    • 26520 Words
    • 107 Pages
    Good Essays
  • Powerful Essays

    On September 27 of 2004, ChoicePoint,a company that aggregates and stores personal information, suspected that some of its small business customers were involved in suspicious activities and informed the police. (Paine, Phillips, 2008)On February of 2005, ChoicePoint only notified those residents of California whose data had been leaked to the illegal customers, since a certain law in California requires it. A protest from the public, however, forced the company to notify the details of the breach to the other involved parties residing in the other states. The swindlers who scammed ChoicePoint had created over 50 accounts with previously stolen identities over the course of a year or even longer. (Pantesco, 2006)…

    • 2180 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    Fusion Centers

    • 1091 Words
    • 5 Pages

    "EPIC - Information Fusion Centers and Privacy." EPIC - Electronic Privacy Information Center. N.p., n.d. Web. 16 May 2012. .…

    • 1091 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    The Great Depression had caused more impact on countries that depended on exportation of raw materials. As agricultural surpluses were growing the prices started to fall due to overproduction. The United States was doing well at first after the war; however, the crash on Black Thursday caused stock prices to plummet. The crash of the stock market caused many investors to lose all of their money, thus crippling the stability of the investments. With all the chaos happening to the economy in the United States, it caused more issues with Germany and Austria because they received loans from the United States.…

    • 157 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    “[History] does not refer merely, or even principally, to the past. On the contrary, the great force of history comes from the fact that we carry it within us, are unconsciously controlled by it in many ways, and history is literally present in all that we do. It could scarcely be otherwise, since it is to history that we owe our frames of reference, our identities,…

    • 1475 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Evidence Collection Policy

    • 2535 Words
    • 10 Pages

    Whoever conducts the investigation does so in a previously mandated, official, and legally recognized manner.…

    • 2535 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Privacy Issues

    • 402 Words
    • 2 Pages

    Amendment I: Privacy of Beliefs, Amendment III: Privacy of the Home, Amendment IV: Privacy of the Person and Possessions and Liberty Clause of the Fourteenth Amendment which states that no State shall... deprive any person of life, liberty, or property, without due process of law. These are your basic privacy rights stated under the U.S. Bill of Rights. However there are other Acts, types of privacy and cases that have supported and influenced these rights. Examples of these would be The Privacy Act of 1974, The Freedom of Information Act, and Bond v. United States and Beck v. Ohio.…

    • 402 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    What does privacy really mean and why do people want it? It’s a fair question to ask, especially when looking at the internet, a global system that connects you to billions of people (Oxforddictionaries.com). There are endless amounts of details you can discover about a particular person on the internet. Some people enjoy the fact that they can access so much about another person with just a click of a button, while others fear it. That is why people take precautions, limiting the amount of access outsiders have to their information, however that does not always work. There are many loop holes in the terms and conditions we agree to on websites which leaves us open to the public in certain ways. There are also many ethical concerns regarding privacy on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays