Wednesday, July 17, 2019

Privacy and Security Breaces at Acxiom

concealment and Security Breaches at Acxiom Case appear Chapter 4 Privacy and Security Breaches at Acxiom Case Study Chapter 4 Acxiom magnate be the more or less measurable organization that most of us restrain never heard of. They be the worlds largest processor of consumer entropy, collection and analyzing more than a billion records a day (Bigdoli, 2012). Acxiom was founded in 1969, and its headquarters is situated in Little Rock, Arkansas ( active Acxiom, 2013). Its customers all in allow in nine of the countrys top ten credit-card issuers, as soundly as nearly all the major retail banks, insurers, and automakers (Behar, 2012).Unfortunately, Acxiom has been faced with rough breaches of certificate that wear led the connection make some important shelter changes/upgrades. In 2003, Daniel thick, a 24 stratum old computer-systems administrator was found to have stolen the data of millions of individuals from Acxioms databases. He worn-out(a) two years collectin g this study and stored it on compact discs (Behar, 2004). He broke into their system by simply snap bean passwords (Behar, 2004). Bass was non the only literary hack to crack Acxiom however. date authorities were investigating Bass, they at last discovered an additional hacker chemical group from Boca Raton, Florida, who had cracked the passwords for the same server that Bass had gotten into as well. While they entrywayed selective cultivation for millions of lot it did not appear that either hacking happening resulted in the defrauding of any of the individuals whose data was stolen (Behar, 2012). Acxiom unquestionably needed to do something to beef up their security measures and protect their customers data.They first hire a chief security officer, which had not been a position until these incidents. The chief security officer instituted mandatory encryptions, as well as working to prevent cybercrimes. Acxiom to boot began to conduct security audits (both conducted from inside and outback(a) firms) to test for weaknesses in security. As removed as secretiveness is concerned, Acxiom is considered to have single of the most stringent privacy policies there are. You can read it here http//www. acxiom. com/about-acxiom/privacy/.They had a privacy officer tenacious before they had a security officer. In terms of privacy, we are left sceptical whether the government should have introduction to the information that is collected. I believe that the government should have only limited access. Acxiom was able to support the government with the investigation of the terrorist 9/11 attacks (Behar, 2004). The government should only be apt(p) access to information relevant to important cases, not just have bump reign to interpret all of the data any way they pass fit.Other organizations might also find out they need access to this tete-a-tete data for security reasons. While I do not see how this could ever happen, the possible organizations th at might feel they need access to such information might be school districts, private security firms, real estate professionals (especially luxuriously end), colleges and universities. While safety is an important issue at all of these places (and most others), having access to this sort of information does not secure safety, but in fact places raw targets on many harmless individuals.References About Acxiom. (2013). Retrieved from Acxiom http//www. acxiom. com/overview/ Behar, R. (2004, February 23). Never comprehend Of Acxiom? Chances Are Its Heard Of You. How a little-known Little Rock companythe worlds largest processor of consumer datafound itself at the center of a very tough national security debate. Retrieved from CNN Money http//money. cnn. com/magazines/ quite a little/fortune_archive/2004/02/23/362182/index. htm Bidgoli, H. (2012). MIS2. Boston Cengage Learning.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.