Preview

Who's Minding the Store: Analysis

Good Essays
Open Document
Open Document
666 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Who's Minding the Store: Analysis
Who is Minding the Store?:
Analysis:
As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.
Retailers must do more to ensure that POS terminals are cleared of credit and debit card information daily. Erica Johnson, CBC, points out that POS terminals process millions of dollars’ worth of transactions every day. Unfortunately, retailers are not regularly wiping clean the hard drives that store the data, as they are supposed to.

"Ninety five per cent of the [terminals] that I actually see do have data on them," said Ryan Purita of Vancouver-based Sherlock Forensics. "So, although … the consumer may think their data is safe, it isn't." It was unanimous; of the individuals who were interviewed in the video, none were aware that their credit and debit card information was being stored.

Vancouver Crown prosecutor Peter Stabler, who has tried numerous credit card fraud cases, believes retailers have a responsibility to protect their customers. "Business practices have to change and adapt to prevent this on the front line," said Stabler. A system that relies on the retailers to manually wipe the data is clearly not working.

According to the Retail Council of Canada, protecting the consumer’s information is more difficult than people think. "We're getting phone calls every day from

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    To gather information from shoppers a computer chip is buried in the card that is issued to the shopper that records every item that the shopper purchases. Additionally various other personal information is also gathered and stored. The information gathered by the stores allows the store’s marketing companies to target specific shoppers according to their buying habits and other information gathered. Issues do not stem from the gathering of this information but the use of it. Consumers are never really sure how their information is being used or to whom its being sold. It is also a concern of the validity of the information. Is this information accurate? “In order to counter these problems relating to privacy and the merging of databases the American Congress passed the Computer Matching and Privacy Protection Act in the 1980s” (Benjamin, 1991, p. 11).…

    • 1122 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Every day, US department, retail, and grocery stores lose an estimated 91 million dollars to shoplifting. But how is this happening? Are our technologies too simple, too easy to outsmart? Or are the people in today’s society underestimating their ingenuity? Despite the psychological effect of stopping some people from becoming shoplifters, anti-theft devices don't actually stop or deter the professional or determined. Not only do anti-theft devices waste people's time, they do not catch or identify shoplifters any better than a camera could.…

    • 536 Words
    • 3 Pages
    Good Essays
  • Good Essays

    1. The Winn-Dixie Grocery Store- The Winn-Dixie grocery store is in Naomi, Florida and is where the first scene of the book takes place. When Opal walks in to get her groceries, she sees that it is very chaotic because there is a dog running around. When the manager is still on the floor after getting knocked down by the dog, he says to call the pound and Opal doesn't want that to happen. To save the dog from going to the pound, she calls him over, as if he was her own dog, and decides to adopt him. The Winn-Dixie grocery store is a very important place in this book because it is where Opal finds Winn-Dixie and it is where Opal's life changes.…

    • 709 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Businesses are swiping customers’ licenses to get the information saved on the bar codes or magnetic strips. Common information found on the driver licenses and additional information like marital status, phone number, housing value, income range and profession. Their main purpose is to detect underage drinkers and fake IDs, however a lot of businesses are also using their information for marketing purposes in order to understand their customers better and know how to efficiently advertise to each customer segment. The major problem with this is that most of the cases customers are not aware of what is happening when businesses are swiping their cards. And unknowingly, customers are sharing their personal information to businesses. It also is a problem because that information is not regulated and could end in the hands of wrong…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Randy Vanderhoof Summary

    • 1496 Words
    • 6 Pages

    In 2012, citizens in the United States incurred 47.3% of global fraud. Imagine being one of the 47% who nearly lost everything (Vanderhoof, 213). One has the option to stand up to fraud or sit back and become a victim. Randy Vanderhoof explains the importance of technology in the fight against fraud at length in his article, “Can Technology Protect Americans from International Cybercriminals?” In his testimony, Vanderhoof expresses the importance of EMV (Europay, Mastercard, and Visa) chip technology in the fight against bankcard fraud (Vanderhoof, 212). Vanderhoof cites the high amount of security that EMV chips have beyond traditional magnetic stripe cards. In addition, Vanderhoof cites recent hacking events to illustrate the need for EMV…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Good Essays

    I am choosing to talk about Wal-Mart and the way they choose to protect the customer’s data that is collected when a customer uses a credit or debit card or a check at Wal-Mart. This establishment is here to protect the rights and concerns of every consumer who purchases products through either online or by buying items in the store. I know personally from being a regular shopper at Wal-Mart and from working there for about a month they are very concerned about advertising people’s personal information because they are trying to avoid lawsuits and unnecessary actions that can be taken against them.…

    • 961 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Data Protection Act 1998, prevents Marks and Spencer’s from using their customer’s personal information. If Marks and Spencer did not follow this law then their customers will not be fully protected. Also any information about Marks and Spencer’s customer can only be kept for a specific period of time. If Marks and Spencer’s don’t comply with this law then they will start to lose customers as all customers want their details to be protected as they don’t want their credit cards to be stolen etc...…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The TJX Corporation, a major retailer with stores in the United States, Puerto Rico, and even the United Kingdom, experienced one of the largest security breaches. Millions of their customer’s credit and debit card information were stolen over a seventeen-month period. The TJX Corporation announced to the public on February 21, 2007 an unauthorized user had accessed their security system and the sensitive information stored in their system had been compromised. The span of unauthorized access went unnoticed from the first hacking in July of 2005. The usual encryptions, that protect vital information like credit card numbers and accounts, had been broken down by the hacker. The files, as far as 2002, that were accessed were vulnerable to theft. Furthermore, the intruder was not even detected until December of 2006. There was much controversy in the manner the information was made available to the public. The consumers’ whose account information was violated had to learn they were at risk of identity theft from the local news. The millions of T.J. Maxx, Marshalls, HomeGoods, and A.J. Wright costumers’ personal information had been infiltrated by a source that the TJX Corporation was unable to detect for seventeen months and also were unable to determine if the hacker had also interfered in the purchasing process. Aside from the 45.7 million customer information that was exposed to criminals, TJX also had to rebuild their creditability with their customers.…

    • 1046 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The critical situation that retailers play in the payment card system came into sharp relief the past years with a series of large retailer breaches to fraud of credit cards being used by black hat hackers to transact online. Criminal organizations target not only big co-operations but also smaller business and this month it has been reported that there is underground purchase of point of sale malware at two thousand dollars. As the profitability of cyber criminals has become apparent, hackers have increasingly engineered and executed many devastating data breaches in the global net. Many of the cyber criminals are transnational criminals organizations that hack online, Avoiding being traced due to the obstacles law enforcement may encounter when tracking perpetrators in foreign countries.…

    • 931 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    compromised 1.16 million credit and debit cards used by customers at 119 stores across 35…

    • 708 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Vfdcgfcf

    • 11376 Words
    • 46 Pages

    “Now that most transactions and exchanges have become electronic, you really don’t need to be an expert to predict that this will become, or already is, a crime generator. What is relatively new is the value of business information. We see a tendency for rising criminal activity in this field. Not only the theft of information, but also the threat of making information public.”1…

    • 11376 Words
    • 46 Pages
    Powerful Essays
  • Powerful Essays

    TJMax Case analisys

    • 1658 Words
    • 7 Pages

    There were many failures that combined, created the largest breach of personal data ever reported in the history of IT security. People who are associated with the attack and need attention are the top-level executives and the Payment Card Industry Data Security Standard (PCI DSS) auditors. The top-level executives need to understand that IT security is a business issue and not just a technology issue. The article shows how by cutting corners and trying to “save” money by not investing in IT security, a breach cost them hundreds of millions of dollars in losses, which definitely it doesn’t only have an impact on the bottom-line but the image and reputation of TJX. The second major issue was the PCI DSS auditors whose job was to prevent this from happening, but according to the paper the PCI DSS auditors, failed to identify three key security issues when protecting the TJX’s network and they are: absence of network monitoring, absence of log data, and the presence of unencrypted data stored on the system. Another factor, the inexperience of the internal employees working inside the store and the lack of knowledge to identify the kind and use of equipment, allowed the perpetrators to use USB drives to upload software to kiosk system terminals available through the store.…

    • 1658 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    SBMT 2010

    • 4413 Words
    • 13 Pages

    Personal information is an essential part of our identification and is useful in many aspects of our life. However, it's also becoming more and more vulnerable in contemporary society with a multitude of approaches for collecting and using people’s information emerges. The leak and abuse of personal information can cause serious troubles to people’s life and selling others’ information for commercial purposes has long been regarded as unethical behaviour in business world. With the backdrop of the recent privacy violations committed by the Octopus Card Company ,wherein they sold the personal information of users to corporations, we thought it was of the utmost importance to increase awareness about the severity of the issue by providing users’ with thorough research on the issue as well as means to minimise the harm. By researching the current condition of personal information security and providing people with useful information on how to protect their personal data, we hope that our project can help people cope with this ethic issue. We believe that knowledge is power and an alert consumer is a safe consumer. Hence, we created a research-oriented website wherein research was conducted using academic reports, personal surveys, in-person meetings and interactions with decision making authorities like the Privacy Commissioner of Personal Data of Hong Kong. Then, we compiled this research together and disseminated it by uploading it onto our website (http://businessethics07.wix.com/information-security) and marketing that website through in-person meetings with individuals off-campus, various online consumer forums in Hong Kong, social networks like Facebook and Twitter and by conducting a talk on the campus of the Hong Kong University of Science and Technology.…

    • 4413 Words
    • 13 Pages
    Powerful Essays