Computerworld - Drugstore chain CVS Corp. has temporarily disabled a feature on its Web site after concerns were raised that unauthorized persons could improperly obtain customer-purchase records via e-mail.
In a statement, Woonsocket, R.I.-based CVS acknowledged that it has turned off the feature that let registered users of its CVS ExtraCare loyalty cards request copies of their purchase data via e-mail and track purchases made under flexible spending accounts (FSA) set up through their employers.
The problem, said Katherine Albrecht, founder and director of the privacy advocacy group Consumers Against Supermarket Privacy Invasion and Numbering, is that anyone can access a cardholder's purchase records if they have the user's 11-digit account number, ZIP code and the first three letters of his last name.
As part of its ExtraCare FSA records, CVS collects and stores data such as the time and date of purchases, the items bought, store locations, universal product codes and customer names, Albrecht said. "The biggest issue is, why does CVS have all this data on the site in the first place?" she added.
CVS officials didn't respond to several requests for comment. But in its statement, the company said the online feature was designed to provide customers with "easy access to their own purchase information for purposes of filing FSA claims for over-the-counter items."
The information stored on the Web site doesn't include prescription purchases, nor does it include Social Security or credit card numbers, which could be used for identity theft, CVS added.
"The security procedures implemented to protect information ... accessed for FSA-related customer needs have been carefully designed, and we believe [they] are effective," the retailer said in the statement. CVS noted that it has received "absolutely no indication" from any cardholders that information has been improperly accessed.
Nevertheless, CVS said it won't restore the FSA-tracking feature until it has developed "additional security hurdles for accessing this purchase information."
Read more about Privacy in Computerworld's Privacy Topic Center.
- Mission Critical: Managing Mobile Applications & Content Smartphones, tablets and other mobile devices have become embedded in enterprise processes, thanks to the consumerization of IT and a new generation of...
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!