ChoicePoint's error sparks talk of ID theft law
The company reportedly has data on virtually every adult in the U.S.
IDG News Service - The revelation last week that data collector ChoicePoint Inc. has mistakenly given private information on up to 145,000 U.S. residents to identity thieves has led to renewed calls in Washington for a national data privacy law.
On Feb. 16, Alpharetta, Ga.-based ChoicePoint reached agreement with 19 state attorneys general to tell the 145,000 potential victims that ID thieves may have gained access to personal information such as Social Security numbers and credit reports. Potential victims live in all 50 U.S. states, the District of Columbia, Puerto Rico, Guam and the U.S. Virgin Islands.
The ChoicePoint problem points to the need for a national privacy law, said representatives of the Electronic Privacy Information Center (EPIC) and the Center for Democracy and Technology (CDT), which are privacy advocacy groups. For most U.S. companies, the only regulation that calls for notification of victims of ID theft is a California law that requires companies doing business in the state to notify customers if their personal information has been accessed by an unauthorized person. That law went into effect in July 2003.
"There certainly is agreement that we need better notification, exactly because of cases like this," said Ari Schwartz, associate director at the CDT. "We're seeing [data companies] selling it to a lot of different people."
ChoicePoint has access to about 19 billion public records, and the company reportedly has information on virtually every adult living in the U.S.
In addition to calls for legislation from privacy advocates, Sen. Dianne Feinstein (D-Calif.) has called for congressional hearings on a piece of privacy legislation she introduced this year. Feinstein's Notification of Risk to Personal Data Act, introduced Jan. 24, would require businesses and government agencies to notify a likely victim when there is a "reasonable basis to conclude" that a criminal has obtained unencrypted personal data.
Feinstein's bill lacks co-sponsors, and a similar bill went nowhere in Congress in 2004. Asked about the bill's chances in 2005, a Feinstein spokesman said the ChoicePoint problems have shown the need for legislation.
"Moving any bill is always a difficult prospect, but now more people are coming to an understanding of the issue of identity theft," the spokesman said.
In a statement, Feinstein called for the Senate Judiciary Committee to hold hearings on her bill as soon as possible. "I strongly believe individuals have a right to be notified when their most sensitive information is compromised -- because it is truly their information," she said in the statement. "And they have the right to decide what actions they want to take once a breach has been
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts