DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Credit Report Resellers Settle FTC Charges; Security Failures Allowed Hackers to Access Consumers’ Personal Information

Posted on February 3, 2011 by Dissent

As part of the Federal Trade Commission’s ongoing campaign to protect consumers’ personal information, three companies whose business is reselling consumers’ credit reports have agreed to settle FTC charges that they did not take reasonable steps to protect consumers’ personal information, failures that allowed computer hackers to access that data. The settlements require the companies to strengthen their data security procedures and submit to audits for 20 years. These are the FTC’s first cases against credit report resellers for their clients’ data security failures.

According to administrative complaints issued by the FTC, the three resellers buy credit reports from the three nationwide consumer reporting agencies (Equifax, Experian, and TransUnion) and combine them into special reports they sell to mortgage brokers and others to determine consumers’ eligibility for credit. Due to their lack of information security policies and procedures, the companies allegedly allowed clients without basic security measures, such as firewalls and updated antivirus software, to access their reports. As a result, hackers accessed more than 1,800 credit reports without authorization via the clients’ computer networks. In addition, even after becoming aware of the data breaches, the companies did not make reasonable efforts to protect against future breaches.

The resellers are SettlementOne Credit Corporation and its parent company, Sackett National Holdings Inc.; ACRAnet Inc.; Fajilan and Associates Inc., doing business as Statewide Credit Services; and Robert Fajilan. They are charged with violating the Fair Credit Reporting Act by failing to protect their internet portals and thereby furnishing credit reports to hackers who lacked a permissible purpose to have them, failing to maintain reasonable procedures to limit the furnishing of credit reports for such purposes, and furnishing credit reports when they had reasonable grounds for believing the reports would not be used for a permissible purpose. Their failure to protect consumers’ personal information also allegedly violated the FTC Act.

In addition, the resellers allegedly violated the Gramm-Leach-Bliley Safeguards Rule by failing to design and implement information safeguards to control the risks to consumer information; to regularly test or monitor the effectiveness of their controls and procedures; to evaluate and adjust their information security programs in light of known or identified risks; and to have comprehensive information security programs.

The proposed consent orders bar the respondents from violating the Safeguards Rule and require them to:

  • have comprehensive information security programs designed to protect the security, confidentiality, and integrity of consumers’ personal information, including information accessible to clients;
  • obtain independent audits of their security programs, every other year for 20 years;
  • furnish credit reports only to those with a permissible purpose; and
  • maintain reasonable procedures to limit the furnishing of credit reports to those with a permissible purpose.

The orders also contain record-keeping provisions to allow the FTC to monitor compliance.

The FTC will publish a description of the consent agreement packages in the Federal Register shortly. The agreements will be subject to public comment for 30 days, beginning today and continuing through March 7, after which the Commission will decide whether to make the proposed consent orders final. Interested parties can submit written comments electronically or in paper form by following the instructions in the Invitation To Comment part of the “Supplementary Information” section. Comments in electronic form should be submitted using these Web links (https://ftcpublic.commentworks.com/ftc/settlementone,

https://ftcpublic.commentworks.com/ftc/acranet,https://ftcpublic.commentworks.com/ftc/statewide) and following the instructions on the web-based form. Comments in paper form should be mailed or delivered to: Federal Trade Commission, Office of the Secretary, Room H-113 (Annex D), 600 Pennsylvania Avenue, N.W., Washington, DC 20580. The FTC is requesting that any comment filed in paper form near the end of the public comment period be sent by courier or overnight service, if possible, because U.S. postal mail in the Washington area and at the Commission is subject to delay due to heightened security precautions.

Source: Federal Trade Commission

Category: Breach IncidentsBusiness SectorFinancial SectorHackOf NoteU.S.Unauthorized Access

Post navigation

← Questions about HIPAA? CDT wants to know.
LA: Teen charged with computer crimes →

1 thought on “Credit Report Resellers Settle FTC Charges; Security Failures Allowed Hackers to Access Consumers’ Personal Information”

  1. WhoComplys says:
    February 9, 2011 at 9:31 pm

    No monetary fine?

    Quote: “even after becoming aware of the data breaches, the companies did not make reasonable efforts to protect against future breaches.”

    Once again an organization puts profits over protection. I am very surprised the FTC did not take them to the cleaners and fine them heavily. How much money was spent to investigate and bring this action against the companies involved? Sad, very sad!

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas gastroenterology and surgical practice victim of ransomware attack
  • Romanian Citizen Pleads Guilty to ‘Swatting’ Numerous Members of Congress, Churches, and Former U.S. President
  • North Dakota Enacts Financial Data Security and Data Breach Notification Requirements
  • Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says
  • Vanta bug exposed customers’ data to other customers
  • Lyrix Ransomware Targets Windows Users with Advanced Evasion Techniques
  • Central Maine Healthcare tackles suspected cybersecurity issue; hospitals remain open
  • Cartier Data Breach: Luxury Retailer Warns Customers that Personal Data Was Exposed
  • Beyond the Pond Phish: Unraveling Lazarus Group’s Evolving Tactics
  • Akira doesn’t keep its promises to victims — SuspectFile

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Supreme Court Agrees to Clarify Emergency Situations Where Police Don’t Need Warrant
  • Stewart Baker vs. Orin Kerr on “The Digital Fourth Amendment”
  • Fears Grow Over ICE’s Reach Into Schools
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.