Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
LiveRamp
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Regulatory and security matters== ===Electronic Privacy Information Center (2003)=== In 2003, the [[Electronic Privacy Information Center]] filed a complaint before the [[Federal Trade Commission]] against LiveRamp predecessor Acxiom and [[JetBlue Airways]], alleging the companies provided consumer information to Torch Concepts, a company hired by the [[United States Army]] "to determine how information from public and private records might be analyzed to help defend military bases from attack by terrorists and other adversaries."<ref name=epic>{{cite web|url=http://www.epic.org/privacy/airtravel/jetblue/ftccomplaint.html |title=EPIC Complaint Against JetBlue Airways and Acxiom Corp. to the Federal Trade Commission |website=epic.org |date=2003-09-22 |accessdate=2018-05-09}}</ref> According to the complaint, Acxiom's activities constituted unfair and deceptive trade practices, as "Acxiom has publicly represented its belief that individuals should have noticed about how information about them is used and have choices about that dissemination, and has stated that it does not permit clients to make non-public information available to individuals", yet Acxiom proceeded to sell information to Torch Concepts without obtaining consent or providing the ability to opt-out, or furnishing notice to the affected consumers.<ref name=epic/> The FTC took no action against Acxiom, which responded that it had followed its privacy principles and was not deceptive in its business practices. "Torch Concepts was acting under contract to the Department of Defense in their efforts to research ways to improve military base security", a company spokesman said. "Our policy clearly states that we 'provide information products which include financial information, [[Social Security number]] and other related information where permitted by law,' and that this information is 'provided to government agencies for the purposes of verifying information, employment screening and assisting law enforcement.'"<ref>{{cite web|url=https://www.usatoday.com/tech/news/techpolicy/2003-09-23-acxiom-jetblue_x.htm |title=Tech |website=usatoday.com |date=2003-09-23 |accessdate=2018-05-09}}</ref> ===Security breach (2003)=== In 2003, more than 1.6 billion customer records were stolen during the transmission of information to and from LiveRamp predecessor Acxiom's clients; the information included names, addresses, and e-mail addresses. Prosecutors described the 2006 case against the hacker accused of stealing the data as the "largest ever invasion and theft of personal data" ever tried.<ref>{{cite web|url=https://www.theregister.co.uk/2006/02/23/acxiom_spam_hack_sentencing/ |title=Acxiom database hacker jailed for 8 years |website=theregister.co.uk |date=2006-02-23 |accessdate=2018-05-09}}</ref> The stolen data came to light during an investigation of a separate data theft incident.<ref>{{cite web|url=http://www.securityfocus.com/news/7697 |title=Chats led to Acxiom hacker bust |website=securityfocus.com |date=2006-02-23 |accessdate=2018-05-09}}</ref> Based on their investigation, prosecutors said there was no risk of identity theft or harm to individuals based on the breaches. They also praised Acxiom for being aggressive in pursuing the hackers and cooperating with authorities. "The positive outcome of this investigation is testament to the strong partnerships we have established with our counterparts at the headquarters and field offices of various organizations, from the FBI and Department of Justice to the Internal Revenue Service and U.S. Attorney's Office in Little Rock", said K. C. Crowley, [[Special Agent in Charge]] of Secret Service's Little Rock Field Office. "Furthermore, I commend Acxiom Corporation for their cooperation and responsible approach to the situation. Acxiom's quick response in contacting federal investigators after determining there had been a network intrusion should serve as a model for others in similar circumstances."<ref>[http://www.ustreas.gov/usss/press/pub1604.pdf U.S. Secret Service news release, July 21, 2004] {{webarchive|url=https://web.archive.org/web/20080916201245/http://www.ustreas.gov/usss/press/pub1604.pdf|date=September 16, 2008}}</ref> The two primary hackers were sentenced to lengthy (8 years) prison terms.<ref>Bremner, Kristin, [http://www.dmnews.com/acxiom-hacker-gets-prison-sentence/article/87117/ "Acxiom Hacker Gets Prison Sentence"], ''dmnews.com'' (''Direct Marketing''), March 28, 2005. Retrieved 2015-12-19.</ref><ref>Vijayan, Jaikumar, [http://www.computerworld.com/article/2543400/cybercrime-hacking/appeals-court--stiff-prison-sentence-in-acxiom-data-theft-case-stands.html "Appeals court: Stiff prison sentence in Acxiom data theft case stands"], ''computerworld.com'', February 23, 2007. Retrieved 2015-12-19.</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)