title for Data Losses note
home | about | site use | resources | publications | timeline |::| blaw

overview

networks

tapes

laptops

sale

law

prevention

responses

studies

costs



















related pages icon
related
Guides:


Security &
InfoCrime


Consumers
& Trust





related pages icon
related
Profiles
& Notes:


ID Theft,
ID Fraud

















section heading icon     sale or publication

This page highlights recent examples of large scale exposure of sensitive consumer information through sale of that data, its unintentional publication or abandonment.

It covers -

     ChoicePoint

In 2005 major reference agency ChoicePoint sold the personal financial information of 145,000 people to criminals purporting to be legitimate businesses, a large-scale form of pretexting.

The incident has attracted particular attention because ChoicePoint initially sent notice of breach only to Californians. Following criticism after announcement of its security failure it spent US$11.4 million during the following six months on credit reports and credit monitoring for victims.

A damning report by the US Federal Trade Commission noted that ChoicePoint ignored 'red flags', failed to match statements with action and continued to furnish consumer reports to clients "even after receiving subpoenas from law enforcement authorities between 2001 and 2005 alerting it to fraudulent accounts".

     Wachovia

In 2005 US police charged Orazio Lembo and bank employees working for Wachovia, Bank of America, Commerce Bancorp and PNC Bank with selling customer information to over 40 debt collection agencies, law firms and others. The data included names, account numbers and balances regarding over 500,000 consumers.

Lembo's gang reportedly operated for over four years, with Lembo pocketing several million dollars. He was also charged with narcotics, forgery and theft counts.

     Gratis

New York attorney general Eliot Spitzer sued Washington-based Gratis Internet for selling email addresses, despite that organisation's promise of confidentiality to consumers, in what is claimed as "the biggest deliberate breach of Internet privacy".

Consumers thought that they were simply registering to see a site. Contrary to a Gratis statement that it "does not ... sell/rent e-mails" it allegedly sold 7 million addresses to three independent marketers, resulting in hundreds of millions of spam messages.

     Call Centres

In 2005 the London Sun illustrated concerns about offshoring call centres by buying information about 1,000 UK customers from a Delhi call centre worker for £4.25 each. The information included bank account details, passwords, addresses, phone numbers and passport details. The worker reportedly indicated that he could provide information on up to 200,000 accounts each month. India's IT & communications minister commented that the government had nothing to do with the "freak incident".

In 2006 Nadeem Kashmiri of HSBC's Bangalore call centre was arrested after over £230,000 was stolen from the accounts of British customers, with claims that he sold confidential information to a criminal gang.

During the same year Australian current affairs program Four Corners revealed sale by an Indian call centre of personal information about Australians, including birth certificate details, ATM numbers, passport and driver licence details, phone numbers, address (including time at that address), marital status, number of dependants, occupation, job title and employer's business name.

In 2007 UK insurer Norwich Union was fined £1.26 million by the Financial Services Authority after security failures at its call centres allowed fraudsters access to policyholder details. Criminals were able to obtain details of customer policies by supplying basic information such as the account holder's surname, first and middle name, first line of address, date of birth and postcode. Over 632 policies were targeted by the fraudsters, resulting in 74 fraudulent surrenders (including nine held by Aviva directors) worth £3.3 million. The FSA criticised Norwich Union (PDF) for responding to fraud against its its directors ahead of its 6.8 million policyholders.

     South Korean ISPs

During 2006 personal information regarding some 8.37 million high-speed internet subscribers in South Korea was sold by staff of four leading ISPs: KT, Hanaro Telecom, Onse Telecom and Thrunet. Former and current staff of the ISPs appear to have sold customer names, identification numbers, telephone numbers and addresses to marketers for around US$0.01 per head.

Critics alleged that management of the ISPs was negligent (if not complicit in the sales) and as highlighted in the final page of this note initiated class action for damages.

     KDDI

In 2006 Japanese telecommunications group KDDI confirmed that information about 3.9 million of its DION internet customers, as of 2003, had been provided to a third party. The data included names, gender, addresses, birth dates and telephone numbers, although apparently not bank details and passwords. Akio Minomura and Akihiko Torii are suspected of having sought to extort some ¥10 million from KDDI in exchange for the information.

     IPCC, USCB, USN and Air Miles

In 2006 personal details of 20,000 people who made complaints about the Hong Kong police appeared on the net. Publication of the data, originally provided to the HK Independent Police Complaints Council (IPPC), was apparently accidental.

The IPCC database contained full details of complaints made from 1996 to 2004, including the dates of each complaint, full name of the complainant, their address, the nature of alleged offences, information on allegedly corrupt police and the outcome of complaints. Corporate monitor webb-site.com has speculated that the publication may have occurred when an IPCC contractor mistakenly copied the files onto a commercial server in the course of maintenance work.

The US Census Bureau reported in 2007 that it had inadvertently posted personal information from 302 households on a public site multiple times over a five-month period. The information included names, addresses, phone numbers, birth dates and family income ranges.

Also in 2006 the US Navy reported that five spreadsheets with sensitive information on some 28,000 personnel and their families were posted on a civilian web site. The spreadsheets included names, Social Security numbers and birth dates.

The Navy announced that it had "moved quickly to have the spreadsheets taken down" and of course had "no evidence that any of the compromised information has been used fraudulently".

A month later the Naval Safety Center reported that it had discovered personal information on over 100,000 Navy and Marine Corps aviators was publicly accessible on its site. The data included Social Security numbers. The same data was featured on 1,083 web-enabled 'safety program disks' mailed to all USN and Marine Corps commands; the Center said it was "working to recall the disks".

The Privacy Commissioner of Canada reported in 1999 that Canadian business Air Miles left 50,000 records of people in its loyalty program (the dot-ca version of Australia's Frequent Flyer scheme) on its site "for several months and possibly for as long as a year". The information included the individual's Air Miles card number, name, home phone numbers, email addresses, business name and phone number.

In 2007 journalists disclosed that they were able to access the social insurance numbers, birthdates and driver's licence numbers of people applying for new passports on the Passport Canada website and that customer account details were also incorrectly accessible on Canada Post's business shipping website.

     ADP

In 2006 Automatic Data Processing (ADP), one of the world's largest payroll service companies, confirmed that it had provided a scammer with personal information of investors who had purchased stock through brokerages that use ADP's investor communications services. Fidelity Investments indicated that the breach compromised 125,000 of 72 million active accounts; Morgan Stanley said 3,800 of its clients were affected; UBS said 10,000 of its clients were affected.

The data included investors' names, mailing addresses and the number of shares they held in certain companies. It apparently did not include Social Security numbers or brokerage account numbers.

ADP commented

We have been advised that the information disclosed was not sufficient by itself to permit unauthorized access to your account, and we have no evidence that the information on the lists has been improperly used. However, we recommend that you be alert to any unusual or unexpected contact or correspondence

     HCF

In 2007 the NSW government suggested that health insurer HCF has provided medical histories, without the consent of customers, to a company trying to sell services to patients.

The insurer reportedly provided McKesson Asia Pacific with details of patients' gender, age, mental health and recent hospital admissions, presumably of interest in McKesson's marketing of telephone-based health care services. HCF rejected the claim that it was in breach of privacy laws.

     RadioShack

In 2007 the Texas Attorney General announced that the state was suing retailer RadioShack over dumping thousands of customer records in garbage bins at Corpus Christi. The records contained Social Security numbers, credit and debit card information, names, addresses and telephone numbers.

The suit alleges that RadioShack violated the state's 2005 Identity Theft Enforcement & Protection Act (which requires businesses to protect and properly destroy any consumer records that contain sensitive information) and Chapter 35 of the Texas Business & Commerce Code (which requires businesses to develop retention and disposal procedures for customer personal information and features fines of up to US$500 for each record).

     Astroglide

BioFilm, manufacturer of personal lubricants such as AstroGlide, exposed 263,822 customer data files dating from 2003 to 2007. Those files, which contained names, residential/postal addresses and phone numbers, were provided to BioFilm in response to an offer of a free product.

The information was not encrypted. It was found by Google and other search engines; Google for example indexed the pages and made local cache copies, so that a search on an individual's name now reveals that person's address and the product they requested.

BioFilm's privacy policy features the usual promises, including the claim that

We take reasonable steps to protect your personally identifiable information [PII] as you transmit your information from your computer to our site and to protect such information from loss, misuse, unauthorized access, disclosure, alteration, or destruction. ... Other than as disclosed in this Privacy Policy, we will not contact you with marketing material or share your PII with outside parties unless such use or disclosure is clearly identified at the time you provide your PII or we provide you the opportunity to consent or prohibit such use or disclosure.

     CareerOne and the BNP

In 2007 the Australian CareerOne online job site accidentally enabled public access to confidential client information, with visitors being able to sight and files on CareerOne's customer relationship management database.

The files included spreadsheets with information dating back to 2000. One featured a list of 485 clients, with names, email addresses and CareerOne login details. Another contained a list of 5188 potential clients, with names, addresses and telephone numbers. Exposure attracted attention because the information included acid comments by CareerOne account executives about clients, for example description as a "retard" and as a "lazy good for nothing".

In 2008 the membership list of the far-right British National Party (BNP) was published on the net, allegedly by a disaffected former member.

The list featured the names, addresses, home and mobile phone numbers of over 13,500 current and former members. It also included personal details such as the occupations and hobbies of the members, including teachers, scientists and police personnel.

     Certegy

In July 2007 Certegy Check Services, a subsidiary of major US payment processor Fidelity National Information Services, revealed that an employee improperly sold 2.3 million consumer records to an unidentified data broker. The broker then sold the information to several direct marketing companies, so that "as a result of this apparent theft, the consumers affected received marketing solicitations from the companies that bought the data".

2.2 million of the records contained bank account information; 99,000 featured credit card information. Certegy indicated that it has requested a court to "get back" all the information from the employee (described as a senior level database administrator who was a "rogue and dishonest employee") and from the marketers. It will seek civil penalties against the former worker and wants criminal charges filed against him.








icon for link to next page   next page (law)

 


this site
the web

Google

version of November 2008
© Bruce Arnold
caslon.com.au | caslon analytics