Free Essay

Mis Choice Point Case

In:

Submitted By quba
Words 1145
Pages 5
Case description

ChoicePoint, a Georgia-based corporation and 1997 spin-off from Equifax Inc., provides risk-management and fraud-prevention data. Traditionally, ChoicePoint provided motor vehicle reports, claims histories, and similar data to the automobile insurance industry, but in recent years it broadened its customer base to include general business and government agencies. ChoicePoint collects, stores, and sells the personal information of consumers (e.g., social security numbers, birth dates, employment information, criminal histories and credit histories) to more than 50,000 businesses and agencies. The company also offered data for volunteer and job-applicant screening and data to assist in the location of missing children. In 2004 ChoicePoint had over 4,000 employees, and its revenue was $918 million.
In the fall of 2004, ChoicePoint was the victim of a fraudulent spoofing attack in which unauthorized individuals posed as legitimate customers and obtained personal data on more than 145,000 individuals. According to the company's Web site:
“These criminals were able to pass our customer authentication due diligence processes by using stolen identities to create and produce the documents needed to appear legitimate. As small business customers of ChoicePoint, these fraudsters accessed products that contained basic telephone directory-type data (name and address information) as well as a combination of Social Security numbers and/or driver's license numbers and, at times, abbreviated credit reports. They were also able to obtain other public record information including, but not limited to bankruptcies, liens, and judgments; professional licenses; and real property data.”
ChoicePoint became fully aware of the problem in October 2004, when it noticed unusual processing activity on some accounts in Los Angeles. Accordingly, the company contacted the Los Angeles Police Department, which requested that ChoicePoint not reveal the activity until the department could conduct an investigation. In January, the LAPD notified ChoicePoint that it could contact the individuals whose data had been compromised.
This crime is an example of a failure of authentication and not a network break-in. ChoicePoint's firewalls and other safeguards were not overcome. Instead, the criminals spoofed legitimate businesses. The infiltrators obtained valid California business licenses, and until their unusual processing activity was detected, appeared to be legitimate users.
In response to this problem, ChoicePoint established a hotline for individuals whose data were compromised to call for assistance. They also purchased a credit report for each of these people and paid for a one-year credit-report-monitoring service. In February 2005, attorneys initiated a class-action lawsuit for 145,000 individuals with an initial loss claim of $75,000 each. It was later acknowledged by ChoicePoint that the total number of individuals whose records were compromised was actually well over this number. At the same time, the U.S. Senate announced that it would conduct an investigation. Later, both the U.S. Federal Trade Commission and Securities and Exchange Commission announced separate investigations into the incident and the response by ChoicePoint executives.
Ironically, ChoicePoint exposed itself to a public relations nightmare, considerable expense, a class-action lawsuit, federal investigation, and a 20 percent drop in its share price because it contacted the police and cooperated in the attempt to apprehend the criminals. When ChoicePoint noticed the unusual account activity, had it simply shut down data access for the illegitimate businesses, no one would have known. Of course, the 145,000 plus individuals whose identities had been compromised would have unknowingly been subject to identity theft, but it is unlikely that such thefts would have been tracked back to ChoicePoint. According to the FTC (which later fined ChoicePoint $10m for their negligence) at least 800 cases of identity theft resulted from the breach.

Case questions

1. Describe how the information security breach occurred and the business impact of the information security breach at ChoicePoint. Be sure to include both tangible and intangible losses. • The criminals posed as customers by using stolen identities to create and produce the documents needed to appear legitimate and obtained personal data of 145,000 individuals • Tangible business losses include: o Purchased credit reports and paid for one year credit monitoring service for those accounts compromised o 20 percent drop in share price o $10mil fine from FTC for negligence • Intangible business impacts include: o Public relations nightmare, class action lawsuit, and federal investigation

2. Describe the actions taken by both ChoicePoint and external entities in response to the information security breach. Include your assessment of each action taken in your answer. ChoicePoint internal actions:
|purchased a credit report for affected accounts and paid |This action does well in alerting the accounts affected, but does not go |
|for a one-year credit-report-monitoring service |beyond this to reimburse the money and information compromised |
|contacted the police and cooperated in the attempt to |This action is ethically correct in alerting police to apprehend the |
|apprehend the criminals |criminals, but consequently compromised the perception of the company and |
| |had many negative financial implications |

External actions:
|LAPD requested ChoicePoint to not notify those accounts effected |The initial investigation took several months before ChoicePoint |
|until they conducted an investigation |was able to alert the accounts compromised; this seemingly |
| |negligent action was in compliance with LAPD’s orders |
|The Senate along with the U.S. Federal Trade Commission and the |These intensive investigations were for the benefit and safety of |
|SEC conducted separate investigations into the incident and |the public, but I feel harshly impacted ChoicePoint and ignored |
|response by ChoicePoint executives resulting in a $10mil fine from|the difficult but ethical decision made to alert police when they |
|the FTC |could have kept silent |

3. Describe possible reactive steps by ChoicePoint that might have mitigated their losses subsequent to their discovery of the information security breach? Explain/justify your choices. • Rather then dealing directly with police and allowing transparency with the general pubic to the situation, ChoicePoint could have better compensated and worked directly with those accounts effected by the breach by going further then paying for a credit report • Timeliness is key in a security situation where sensitive information is leaked, and ChoicePoint was deemed negligent by the FTC with a hefty $10mil fine possibly for the months they were aware of the situation and complied with LAPD in not notifying those accounts effected, they should have responded more promptly and with larger compensation

4. Describe possible proactive steps by ChoicePoint that might deter a reoccurrence of information security breaches in the future? Explain/justify your choices. • This crime was a failure of authentication on ChoicePoint’s part and not a network break-in therefore CP’s firewalls and other safeguards were not faulty but rather they could have considered stricter authentication of businesses and limited access to the information • Security features could be implemented to react quicker and notify CP when information of other accounts are extracted because users of their service should only have access to their own account information

Similar Documents

Free Essay

Proposition and Opposition Arguements

...Proposition and Opposition Arguments Worksheet Cari M. Stephens, Greer Cimbalik, Tawni Brown, and Yolanda Martinez HUM/114 June 5, 2012 Mac Wrigley Proposition and Opposition Arguments Worksheet Proposition and Opposition Arguments Worksheet Detailed Initial Argument Preparation: For each of the 10 general arguments that you defined as supporting your stance on the problem or issue being debated in your Week Two Debate Plan Worksheet, research and list at least two facts that support each of the supporting arguments. Be sure to cite your source. Finally, determine how and what you are going to focus on for your debate by ranking the strength or importance of your arguments with 1 being the best or most important argument, and 10 being the weakest or least important argument. General arguments that support your stance on the problem or issue being debated“Proposition” | Two facts that support the argument | Rank of Argument Importance / Strength | Footprints have not been able to be disproven as credible evidence that Bigfoot does exist. | * Size of foot and distance between strides justifies that the footprint cannot be human. Footprints cannot be faked of staged due to size, (Big Foot And Yeti, ). * These footprints are bigger and are different shapes than any other animal on record, (Big Foot And Yeti, ). | 6 | Eyewitness sightings of the North American Bigfoot date back to the 1830’s. | * The fact that there are still eyewitness sightings...

Words: 3547 - Pages: 15

Premium Essay

City Bank Assignment

...Arts Bangladesh. The report was prepared by a group, consisting the member, Sekh Shahnuma Sharmin ID: 112011009, Jenia Sultana Jenny ID: 112011014, Ummay Hani Tanija ID: 112011012 and Shahela Parvin ID: 112011017. The group is thankful to Mr. Dominic S. S. V. Bennett for giving the opportunity to be assigned on such type of topic. 1.2: Objective The main purpose of the report is to understand the Management Information System of City Bank Ltd. In broad sense the objectives to be covered under this report are: * To know about how MIS work in City Bank Ltd. * To know about how the Bank take decision with the help of MIS * To know about the security of the MIS * To make recommendations for improving the MIS n City Bank Ltd. 1.3: Scope of the paper The scope of this report was strictly confined to the official website &contact with particular employee of City Bank Ltd. To collect the information work has been done on the MIS and HR section of the Bank. The area discussed in the paper is limited in Management Information System only. The information has been collected from the City Bank, Mogbazaar branch, Dhaka, Bangladesh. 1.4: Methodology For smooth and accurate study everyone have to follow some rules & regulation. The study impute were collected from only secondary source. * Phone call * Website * Personal...

Words: 2800 - Pages: 12

Premium Essay

The Information Age in Which You Live: Changing the Face of Business

... • Closing Cases • Short-Answer Questions • Assignments and Exercises • Discussion Questions • Industry & Global Perspectives • Additional Assignments and Exercises CONTACT INFORMATION: Stephen Haag (shaag@du.edu) STUDENT LEARNING OUTCOMES 1. Define management information systems (MIS) and describe the three important organizational resources within it – people, information, and information technology. 2. Describe how to use break-even analysis to assess the financial impact of information technology. 3. Describe how to use Porter’s Five Forces Model to evaluate the relative attractiveness of and competitive pressures in an industry. 4. Compare and contrast Porter’s three generic strategies and the run-grow-transform framework as approaches to the development of business strategy. CHAPTER SUMMARY This chapter serves two primary purposes. First the chapter introduces your students to the broad notion of management information systems within an organization and the three key resources on which MIS focuses – people, information, and information technology. Second, the chapter jumps right into the process of appropriately selecting which technologies to use based on the industry in which your organization operates, the identified business strategies for competing in that industry, and how to assess the impact of technology. The primary sections of this chapter include: 1. MIS Resource #1: Information 2. MIS Resource #2:...

Words: 3890 - Pages: 16

Premium Essay

Devry Mis 535 Final Exam-2015

...Devry MIS 535 Final Exam-2015 IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load http://www.hwspeed.com/Devry-MIS-535-Final-Exam-2015-0404044454.htm?categoryId=-1 IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM Question Page 1 Question 1.1. (TCO A) Which of the following objectives best describes the business strategy behind the development of smart grid initiatives by power companies, as discussed in the chapter case? (Points : 4) Operational excellence New products and services Competitive advantage Customer support Question 2.2. (TCO B) The interaction between information systems and organizations is influenced (Points : 5) primarily by the decision making of middle- and senior-managers. by many factors, including structure, politics, culture, and environment. by two main microeconomic forces: capital and labor. primarily by the organization's business processes and culture. Question 3.3. (TCO C) Which of the following is not one of the main problems with a traditional file environment? (Points : 4) Data inconsistency Program-data independence Lack of flexibility in creating ad-hoc reports Poor security Question 4.4. (TCO D) Corporate network infrastructure is simplified in a cloud computing environment because (Points : 4) people are able to do less. corporate LANs are no longer necessary. application, database, and web servers are moved to the cloud. mobile and Wi-Fi networks are no longer supported...

Words: 631 - Pages: 3

Free Essay

Economics of Doping

...Running head: DOPING IN CYCLING 25 June 2014 Utrecht School of Economics The Economics of Doping: policy advices to create a level-playing field in professional cycling. Authors: Danilo Fattorini (3790215) Orkhan Hajizada (3773663) Supervisors: Drs. Erwin van Sas (USE) Dr. Tineke Lambooy (RGL) Group Supervisor: Drs. Erwin van Sas Table of Contents Abstract3 Introduction4 1. Institutional Framework7 1.1. Embeddedness7 1.2. Institutional Environment9 1.2.1. Formal Institutions9 1.2.2. Informal institution – the doping market112 1.3. Governance14 1.4. Resource Allocation and Employment16 2. Decision-making process16 2.1. Prize money and Doping17 2.2. Health and Doping22 2.3. Size of Punishment and Probability of Detection 23 2.3.1. Doping game: introduction26 2.3.2. Theoretical example using real numbers 30 2.4. Number of participants and Doping 34 2.5. Conclusion 37 3. Policy advices38 3.1. Efficiency Comparison 38 3.2. Application of Criminal Law 41 Conclusion42 Bibliography44 Appendix A: Interview with Filippo Simeoni49 Appendix B: Interview with Axel Dekker55 Abstract Sports victories are often strived to at the cost of sportsmen’s integrity, reputation, health, security, or even life. The tendency to use performance-enhancing drugs is shaped by factors characterizing the institutional framework. In particular, the prize money, health costs, severity and frequency of punishment, and number of participants are...

Words: 19471 - Pages: 78

Free Essay

Evil, Christianity and Saint Augustine

...notable of whom is Saint Augustine of Hippo (354-430). He is perhaps one of the most influential philosophers in the history of the Christian Church. Augustine spent much of his life trying to solve this ‘problem of evil’ and it proved to be quite an undertaking. This paper will explore the problem of evil and argue how Saint Augustine solidified the ways in which philosophy and religion, specifically Christianity, coincide through his work on the concepts of the problem of and the origin of evil. Understanding the problem of evil is essential to everyone because it affects the manner in which life is lived. Whether defending a belief in God or trying to share those beliefs with others everyone will encounter the problem of evil at some point. According to Ed Miller and Jon Jensen, authors of Questions that Matter: An Invitation to Philosophy, “The presence in the world of evil, both natural and moral, is surely the biggest stumbling block to belief in an all-powerful and all-loving God.” By obtaining the knowledge with how to respond one can be better prepared in defending the manner by which philosophy can coincide with their beliefs. Structurally, this paper will discuss the problem of evil...

Words: 2315 - Pages: 10

Premium Essay

Microinsurance Delivery Channels

...Insurance culture can be developed by two important elements, understanding and trust. To be able to be aware of the positive effects of MI people need to be able to understand the product and to identify the need for it .As Michal Matul of MI innovations facility clearly explains some of the barriers,’ In most of the developing countries , low income clients think they do not need insurance they do not trust insurance , they do not understand fully the risk pooling concept and strongly believe that the insurance is just for the rich and they do not have enough resources to pay for it’ A variety of channels are needed to reach the target groups largely depending on the literacy levels of our future customers. Religious institutions: Many religious institutions have been in the market specially in sub-Saharan Africa for funeral insurance and South Asia for savings services.A few examples are as follows: Takaful/Indonesia: An Islamic insurance system:Takaful meaning joint guarantee in Arabic complies with the Arabic law. Interest rates, gambling, uncertainty of profits and losses are avoided as they are deemed unislamic.Growth rate was 5% 2004-2007 according to Swiss Re.Allianz Indonesia ‘Payung Keluarga’(family umbrella) offers a microtakaful life insurance which is distributed through MFI’s to its lenders which provides coverage in case of the death of a bread winner. According to the study done by the insurance provisions in the world’s 100 poor countries these Takaful systems...

Words: 1809 - Pages: 8

Premium Essay

Motivational Interviewing the Nurse’s Role in Helping Motivation for Change in Client with Alcohol Dependence

...INTRODUCTION This work will discuss about motivational interviewing (MI) the nurse’s role in helping motivation for change in client with alcohol dependence. For clarity purpose, key terms like MI and alcohol dependence shall be defined. The evidence of effectiveness of MI as a psychosocial intervention for alcohol dependence and policies underpinning the use as well as the strengths and weaknesses and ethical issues. This work will evaluate nurse’s role in providing care and treatment including health education and promotion by helping patients/client’s motivation for change. Through reflection on practise, the writer’s clinical placement practise experiences of working with alcohol dependent clients in the community shall be use for illustration. Name and place will not be mentioned due to patient’s confidentiality (NMC, 2008). In conclusion, recommendations will be made to improve practice. The aim of this work is to critically evaluate the effectiveness of MI as a psychosocial intervention in alcohol dependence. The rational and motivation for choosing to explore this topic is because of a particular interest in substance misuse nursing and experiences from using MI in the care and treatment of alcohol dependent clients. Alcohol dependence represents a major burden to the National Health Service (NHS) and the wider health and social care systems (alcohol concern, 2009, Cabinet Office, 2003). The Department of Health (2004) estimates that nationally, six percent of men...

Words: 2888 - Pages: 12

Free Essay

Conflict of Laws Paper

...Traditional Approaches to Horizontal Choice of Law (introduction/Class 1 = Keeton v Hustler) Keeton v Hustler Discusses procedural v substantive inquiry Mentions 5 CoL considerations: predictability; relationships among the states; simplification; forum interests; sounder rule approach I. What are we looking for in a CoL system? Examples a. Predictability [for litigants] b. Uniformity c. Ease of application d. Respect for state sovereignty (vested rights largely looks to this) e. Respect for state policy f. Justice for parties g. Party expectations h. Better law II. Domicile a. Def: includes mutual obligation between state and individual b. State of domicile at death is controlling law i. Standard: Mined + left behind → 1. Abandoned (physical travel to new domicile) + manifested intent to remain 2. Note: objective + subjective elements c. Test established in White v Tennant (WV 1888) i. Family farm extends over WV/PA borders; husband went to WV on same property to care for wife, planned on going back on the same day ii. H: PA law controls iii. Note: siblings still live in WV, may be favoring forum even though the court doesn’t seem to be….still is room to play d. Test maintained in Maksym v Board of Election Comm’rs of City of Chicago (BB…Rahm Emanuel Case) i. *Once a domicile is established, presumption that you retain it until you create a new domicile ii. Rejects interpretation of “actually lived” iii. Intent is unclear (including...

Words: 5639 - Pages: 23

Premium Essay

It109 Ip1-5

...IT190-08 Key Assignment Curtis McCormick Colorado Technical University IT190-08 Introduction to IT Professor Vandercreek April 13, 2015 Contents Section 1: Information Systems Overview 3 Section 2: Information Systems Concepts 7 Section 3: Business Information Systems 10 Section 4: System Development 14 Section 5: Information Systems and Society 15 References 16 Section 1: Information Systems Overview Caesar’s Entertainment Inc. is a global gaming company which brings in revenue from recreational gambling. This company operates casinos on several continents including North America, South America, Europe, and Africa. It is known as one of the largest casino gaming enterprises in the world and as such requires numerous information systems. From its famed Caesars Palace in Las Vegas, to the well-recognized Harrah’s brand located throughout the United States, this company is visible to most who have gambled in their lifetime. A gaming company of this magnitude requires serious information systems in order to keep track of play among customers, amount won/lost, as well as length of time playing. This does not include their systems for food and beverage, and shopping outlets either. Most of these information systems end up working together to show management and executive personnel daily, weekly, monthly, and quarterly financial data. Caesars Entertainment Inc. utilizes all three information systems. For its day to day operations in restaurants,...

Words: 5609 - Pages: 23

Premium Essay

Information System

... | Table of Contents 1. Brief History of British Airways 3 The decision making process 4 British Airways uses the following information tools at its strategic level. 4 Executive Support System (ESS) 5 Senior management in BA use the following information tools. 6 Transaction Processing Systems (TPS) 7 Roles for Management Information Systems in British Airways 8 References: 9 Entity Relationship Diagram (ERD) 10 The Entities: 11 Entities and Attributes: 11 Entities and Attributes 2 12 First cut ERD Diagram for ELRSC. 13 Normalisation Diagram 14 Requirement Specification for the E L R C System 16 Use case Description for ELRSC 18 Screen shot of use case For ELRSC. 34 Screen Shot Turnitin Report 35 1. Brief History of British Airways The purpose of this project is explore how information systems helps organisations to make decisions at different levels to achieve set objectives and...

Words: 3378 - Pages: 14

Free Essay

Value of Complete Information for Ecrm

...An Empirical Analysis of the Value of Complete Information for eCRM Models Author(s): Balaji Padmanabhan, Zhiqiang Zheng and Steven O. Kimbrough Reviewed work(s): Source: MIS Quarterly, Vol. 30, No. 2 (Jun., 2006), pp. 247-267 Published by: Management Information Systems Research Center, University of Minnesota Stable URL: http://www.jstor.org/stable/25148730 . Accessed: 01/03/2013 09:24 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. . Management Information Systems Research Center, University of Minnesota is collaborating with JSTOR to digitize, preserve and extend access to MIS Quarterly. http://www.jstor.org This content downloaded on Fri, 1 Mar 2013 09:24:20 AM All use subject to JSTOR Terms and Conditions Padmanabhan et al./The Value of Complete Information for eCRM Models Qjarteriy of the Value An Empirical Analysis Information for eCRM Models1 By: Balaji Padmanabhan Operations and Information Management Department The Wharton School University of Pennsylvania 3730 Walnut Street Philadelphia...

Words: 3323 - Pages: 14

Premium Essay

English for Business Administration

...Information Systems (MIS) 2/ MIS, Monitoring & Evaluation Introduction Monitoring and Evaluation Process points: Types and levels of monitoring and evaluation activities Some monitoring and evaluation definitions What are indicators? Methods and tools for monitoring and evaluation Steps in planning and conducting monitoring and evaluation ❐ Tools and techniques: How to write your evaluation report Tips for improving monitoring and evaluation of your project Management Information Systems (MIS) ❐ What is on MIS? ❐ Why is an MIS important? Sources for decision making, monitoring, and evaluation ❐ Targets Designing an MIS Using data to inform your MIS: conducting a baseline study Performance information Key questions in designing an MIS Institutionalizing an MIS in an organization MIS: step-by-step Using MIS outputs for decision-making How is information used in the organization? ❐ How does information flow in your organization? A word about reporting ❐ Tips and Tools: Report preparation checklist A final word about evaluation ❐ Process evaluation ❐ Output evaluation ❐ Effects evaluation ❐ Short-term impact evaluation Summary 1 2 4 5 5 7 8 9 10 1 1 1 1 13 1 2 1 3 1 5 16 1 7 19 20 2 1 22 25 26 27 Figures, Tables, and Exercises Figure 1: Exercise A: Table 1: Exercise B: Figure 2: Figure 3: Exercise C: Figure 4: Relation between program monitoring and evaluation and the MIS Comparing monitoring...

Words: 9061 - Pages: 37

Premium Essay

I Got Mi

...diagnosis that I thought I would ever hear. I am very slender and athletic and my cholesterol levels are all well under control. I do know that to get to the point of an MI, means that I more than likely have arteries full of plaque which ultimately leads to a sudden and extended obstruction of blood supple to myocardial tissue. My brain is already spinning in curiosity of the severity of ischemia in my left ventricle. What is even more scary to me, as a woman, is the higher risk of silent ischemia in women. Silent ischemia doesn’t produce any symptoms when the heart experiences ischemic events. So I guess after the shock wears off, that is when the “oh shit” moment is about to happen. 2. Myocardial Infarction(MI) is also known as a heart attack. MI results when the flow of oxygen rich blood to a myocardium suddenly becomes blocked. If blood flow is not restored quickly, this results in cellular death by necrosis or apoptosis. Acute MI is an important form of Coronary Heart Disease (CHD). MI can occur at any age, but the risk of frequency raises with age progression. It is estimated that MI causes more than 150,000 deaths annually in the US. The American male has a greater than 1 in 5 chance of sustaining an MI or fatal ischemic event before the age of 65. Females that are younger than 45 have a 6 fold lesser risk of MI than men of the same age, however after menopause the rate becomes essentially equal by age 80. The initiating event is the development of a thrombus on top...

Words: 2373 - Pages: 10

Premium Essay

Fraud

...Q# 3 The role of the MIS in an organization can be compared to the role of heart in the body. The information is the blood and MIS is the heart. In the body the heart plays the role of supplying pure blood to all the elements of the body including the brain. The heart works faster and supplies more blood when needed. It regulates and controls the incoming impure blood, processes it and sends it to the destination in the quantity needed. It fulfills the needs of blood supply to human body in normal course and also in crisis. The MIS plays exactly the same role in the organization. The system ensures that an appropriate data is collected from the various sources, processed, and sent further to all the needy destinations. The system is expected to fulfill the information needs of an individual, a group of individuals, the management functionaries: the managers and the top management. The MIS satisfies the diverse needs through a variety of systems such as Query Systems, Analysis Systems, Modeling Systems and Decision Support Systems the MIS helps in Strategic Planning, Management Control, Operational Control and Transaction Processing. The MIS helps the clerical personnel in the transaction processing and answers their queries on the data pertaining to the transaction, the status of a particular record and references on a variety of documents. The MIS helps the junior management personnel by providing the operational data for planning, scheduling and control, and helps them further...

Words: 1935 - Pages: 8