[Dataloss] Federal loan Web site left unprotected
DAIL, ANDY
ADAIL at sunocoinc.com
Mon Sep 18 12:54:08 EDT 2006
Far too many organizations think it's acceptable to shortcut that
requirement by taking information that was "formerly known as production
data" and using it for test because it's already in the production
format, and, "Well, the data is no longer current enough to be
considered 'live' or 'production'."
There is a great deal of pressure on IT groups to save time and money.
>From a strictly time management and book keeping perspective it seems
like a logical idea. But, developers don't seem to remember the fact
that even though the data is no longer of use to the company, the
consumers aren't quite finished using those numbers yet. You know,
Social Security Numbers, Drivers License Numbers, dates of birth.
Their managers seem willing to gamble that it won't happen to them, and
are willing to take the risk to save the time and cost of developing
mock data. The cost of addressing one incident would change their minds
if the money to remediate came from their cost centers.
Andy Dail
Sunoco PCI Project Manager
-----Original Message-----
From: dataloss-bounces at attrition.org
[mailto:dataloss-bounces at attrition.org] On Behalf Of blitz
Sent: Sunday, September 17, 2006 7:59 PM
To: Dissent
Cc: dataloss at attrition.org
Subject: Re: [Dataloss] Federal loan Web site left unprotected
What part of "DON'T USE PRODUCTION DATA" do they not understand?
Sheesh!
At 09:40 9/17/2006, you wrote:
Complications from a computer software upgrade caused a
security
breach that left loan borrowers' private information,
such as their
Social Security numbers, unprotected online.
The problem occurred from the evening of Aug. 20 to the
morning of
Aug. 22 on the Web site of Direct Loans. Direct Loans is
part of the
William D. Ford Federal Direct Loan Program within the
Dept. of
Education and Federal Student Aid.
Anyone who used the Web site and performed the same
transaction at
the same time in the same part of the system as another
user could
have had his or her data exposed, Bushman said.
... She estimated that 21,000 accounts of the more than
six million
on the system could have been affected. All those
potentially
affected already would have been notified, she said.
[...]
http://www.press-citizen.com/apps/pbcs.dll/article?AID=/20060917/NEWS01/
609170310/1079/NEWS01
--
No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.405 / Virus Database: 268.12.4/449 -
Release Date: 9/15/2006
_______________________________________________
Dataloss Mailing List (dataloss at attrition.org)
http://attrition.org/dataloss
Tracking more than 146 million compromised records in
349 incidents over 6 years.
--
This message has been scanned for viruses and
dangerous content by MailScanner <http://www.mailscanner.info/>
, and is
believed to be clean.
This message and any files transmitted with it is intended solely for the designated recipient and may contain privileged, proprietary or otherwise private information. Unauthorized use, copying or distribution of this e-mail, in whole or in part, is strictly prohibited. If you have received it in error, please notify the sender immediately and delete the original and any attachments.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://attrition.org/pipermail/dataloss/attachments/20060918/0f8da32d/attachment.html
More information about the Dataloss
mailing list