Pros and cons of notifying and not notifying possible victim

Assignment Help Marketing Management
Reference no: EM131311240

THE PROBLEM OF INFORMATION PROTECTION:-

The theft of consumer information-particularly fi nancial information-is causing huge headaches for fi nancial and data companies. This case looks at three incidents that occurred recently at ChoicePoint, Bank of America, and Polo Ralph Lauren. CHOICEPOINT The opening case study in this chapter highlighted the Acxiom Corporation, a company that gathers, packages, and sells information about consumers.

A direct competitor to Acxiom is ChoicePoint, a company that is a spin-off of Equifax, which is one of the three major credit bureaus. ChoicePoint has more than 20 billion records that include information on almost every adult in the United States. ChoicePoint sells this information to customers, such as potential employers, for purposes of verification. ChoicePoint found itself in the headlines when personal financial information on 145,000 customers was stolen in a very high-profile identity fraud theft. And this time there was no sophisticated electronic attack or break-in; rather the theft was accomplished through old-fashioned "social engineering." Social engineering is getting information that you have no right to by conning people who have access to it.

What the identity thieves did was to pose as fake companies buying information on people in every state and the District of Columbia. So far, 750 confirmed cases of identity theft have surfaced from the ChoicePoint security breach. The U.S. Attorney's Office in Los Angeles charged that ChoicePoint had been scammed previously in 2002 resulting in fraud to the tune of $1 million. THE BANK OF AMERICA The Bank of America was also the victim of information theft accomplished in an old-fashioned way. Personal information recorded on tapes belonging to 1.2 million federal employees, including members of Congress, was on a commercial jet en route to a safe backup facility when the tapes were stolen.

Both the Bank of America and ChoicePoint thefts occurred in February 2005 and were followed very quickly by the introduction of privacy legislation at both the state and federal levels. POLO RALPH LAUREN Another example of embarrassment and worse involved Polo Ralph Lauren. It seems that between June 2002 and December 2004, the company was storing credit card information on its point-of-sale system instead of deleting it immediately after transactions had been completed. The realization that this data had been compromised led HSBC North America-the issuer of some of the credit cards whose numbers had been stolen-to notify 180,000 consumers of the possibility of identity theft. MasterCard, Visa U.S.A. and Discover Financial Services customers have all been affected. American Express says it has not seen any activity that has looked suspicious.

Questions
1. If you were the manager of a company where it was discovered that credit card information had been stolen, what responsibility would you have to the people whose personal information was compromised? What are the pros and cons of notifying and of not notifying possible victims?

2. E*Trade, a leader in online brokerage services, is the fi rst company to go to a two-factor authentication system optionally available to its customers with accounts of $50,000 or more. The fi rst factor is the ID and password that customers have always needed, and second, they use a security token or, as E*Trade calls it, a Digital Security ID. This is a little device that you can carry on your key chain that displays a new random six-digit number every minute. E*Trade's host system must, of course, synchronize with the device. When you log in, you have to type in this number after your ID and password.

Since the number changes so often it's virtually impossible to hack an account with this two-pronged protection. From a consumer's point of view, do you think this is a good idea? What are the advantages and disadvantages of the system to businesses and customers? With which online transactions would you consider it worthwhile to enforce this level of security? Remember that you might have a lot of these tokens if you use a lot of online services.

3. In this case study you saw how personal information can be stolen from huge databases and data warehouses. What other ways are there that thieves can obtain personal information about you that would allow them to steal your identity and run up debts in your name? To what extent would you be liable for these debts? What would you have to do (what steps would you take) to reestablish your financial identity if you discovered your identity had been stolen?

4. In the case of the Bank of America, the data was being shipped on tapes to a safe location. This is very good backup policy to make sure that in the event of a major disaster like a fi re or fl ood, data can be quickly restored enabling the company to be back in operation as soon as possible. However, this procedure leaves the company vulnerable to old-fashioned theft of the physical tapes containing personal information. What are two ways that this information that travels on trucks and planes could be protected?

Reference no: EM131311240

Questions Cloud

Federal guidelines governing a business e mail traffic : If you were to give advice to someone who had just started using e-mail, or even someone who's been using e-mail for a while, what would you tell that person should be the one guiding principle in all their e-mail communications?
Determine whether the router creates jitter for this class : Using time lines, show the arrival time, the processing duration, and the departure time for each packet. Also show the contents of the high-priority queue (Q1) and the low-priority queue (Q2) at each millisecond.
How you determined which improvement option to recommend : List the improvement options you tested and the increase in profit per dollar invested for each option tested.Write a brief explanation of how you determined which improvement option to recommend.Include a printed copy of the output sheet from Arena..
Calculate the pump pressure necessary for the given flow : 3-5 A water-tube steam generator operating at 2400 psia has 50-ft-high 3-in ID tubes. The pressure Drop is given by 3.25 x 10-6 m2, where m is the mass flow rate, in pound mass per hour Assuming sanzati water in the downcomer, a water-steam mixtu..
Pros and cons of notifying and not notifying possible victim : hat responsibility would you have to the people whose personal information was compromised? What are the pros and cons of notifying and of not notifying possible victims?
Write a paper about electrical engineering standards : You will write a paper about electrical engineering standards as they apply to communications. The topical coverage may be as specific or as broad as you want.
Increase production even more : Frank, his father notices this and advises Raymond to shutdown the stall, while Marie his mother advises him not only to set up the stall next weekend but to increase production even more. Raymond is extremely confused. Who do you think he should ..
Impact of festivals on promoting cultural tourism : Topic, as this falls in the same umbrella of the area of responsibilities currently handling, and explore more this phenomenal Dhow festival cultural event that drives a lot of visitors during a week of activities, this really impact on developing..
What are ethics and how do ethics apply to business : What are ethics, and how do ethics apply to business?- What situation would qualify as an exception to the copyright law?

Reviews

Write a Review

Marketing Management Questions & Answers

  Contribute to or detract from long-term environmental

Describe at least three ways that information systems can contribute to or detract from long-term environmental (as in natural environment) sustainability.

  Explain steps ed should take to identify the training jane

Assess Ed's actions in working with Jane and explain if his actions have been fair and appropriate - Explain alternate steps Ed should take now in dealing with Jane and the situation.

  How will you deliver your product

How will you deliver your product? Marketing channels and decisions relating to how you deliver your product are just as important to an organization as pricing and product decisions

  Describe how you might market to each demographic

Describe how you might market to each demographic. What main sales promotion techniques will you use? Be specific

  What were the specific strategies and tools that were used

What were the specific strategies and tools that were used most effectively, How did various stakeholder groups influence the final outcome of Medicare Part D legislation

  Is strong branding more or less important

Does your chosen company have a brand name and brand mark? If not, design both. - Is strong branding more or less important in an Internet environment? Why? What makes branding so important?

  Explanations of whether the message and technology were

analyze the messages using the communication process. the analysis should include a descriptive explanation of

  Marketing principles

Identify and describe a potential ethical dilemma that a marketer might face when segmenting a market. How might this concern be appropriately addressed given the need to satisfy stakeholders whose requirements may often be in conflict? The person re..

  Marketing practice to create marketing communications

Give examples of how EE would use this research data in marketing practice to create marketing communications.

  Fantsyfruity drink

Normal 0 false false false EN-US X-NONE X-NONE FantsyFruity Drink

  What is the business need and business problem

What is the business need and business problem, What will be achieved by implementing this database

  How many female offspring does a normal organism produce

How many male offspring? Use your answers to find the number of grandchildren born to each mutant and to each normal organism.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd