Preview

Leak of octopus card

Good Essays
Open Document
Open Document
752 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Leak of octopus card
In Hong Kong, the Octopus Card is not only treated as a means of electric payment. The Octopus Card interacts a lot with our daily life, like entering our apartments, registering students’ attendance in schools, recognizing our membership of certain organizations, etc.

Hong Kong people trust Octopus deeply from our heart. The MTR Corporation together with the KCRC Managing Board owned about 80% of the share of the Octopus, while the HKSAR government is the largest shareholder of the MTR Corporation and the KCRC Managing Board. Hong Kong people trust the Octopus Card Company as much as we trust the HKSAR government. Therefore, The news that the Octopus Card company has been selling customers’ private information to other firms totally break Hong Kong people’s heart and destroy the mutual relationship the company has established.

When the scandal was exposed, the company executives lied and tried to cover it up. Although the Octopus Card Company admitted that it has been selling customers’ personal information to firms, the executives didn’t disclose the details of the incident using an excuse of the resale contract and confidentiality agreement with those companies. The Octopus also insisted that there is a clause which allows the company to disclose customers’ information to other parties included in the long agreement customers signed.

By selling customers’ private data to the public, the Octopus Card Company earned a HK$44 million profit. There are voices from Hong Kong society to return the money Octopus made from this unethical dealing to the public. The Octopus Card scandal has finally ended with the resignation of CEO Prudence Chan and the promise by the government to review its current laws regarding privacy and handling of customer data.

However, the Octopus scandal is just the tip of the iceberg. It is just another version of the Facebook debate over selling customers’ personal information for company profit. Nowadays, people have low awareness

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Annotated Bib

    • 335 Words
    • 2 Pages

    In this article, John Swartz explains how owners of Facebook fare more concerned with profits than protecting people’s privacy. He also explains the dangers associated with lack of privacy. This article contributes greatly to the argument that smart phones and computers have an overall negative effect on society.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Acct3102 Case Study Example

    • 7710 Words
    • 31 Pages

    Richards adopts a teleological-parochialism position 1 to justify that his actions are ethical, 2 even though they are illegal (Baugher & Weisbord, 2009). 3 Richards argues that his actions are ethical as they resulted in desirable consequences, in the form of better sales/performance figures, which met analyst forecasts and positively affected shareholder value (Radtke, 2004; Fernando, Dharmage, & Almeida, 2008). 4 He acted in the interests of his ‘in-group’ (other executives/managers), maximising their performance-based compensation, 5 at the expense of others (Barnett, Bass, & Brown, 1994). 6 Richards also claims that his actions were not serious, as recognising revenues earlier was simply a timing issue, 7 and was common practice in the software industry. 8 Furthermore, his actions are not as serious as other well-publicised corporate scandals. 9 Richards did not adopt a deontological position, as he was not concerned about following rules (Baugher & Weisbord, 2009). 10…

    • 7710 Words
    • 31 Pages
    Powerful Essays
  • Good Essays

    Payment card information is sold by cyber-criminals frequently. In more recent retail breaches, they have been able to steal payment card information from millions of customers and sell it online in what is known as the “Darknet.” Once the cyber-criminal has stolen the payment card information, there is a process that takes place in order to put the information on sale on the Darknet and for the cyber-criminals to make money. The first step in the process is selling the payment card information to brokers. The brokers buy the payment card information in bulk and sell the information to “carders” on carder websites. The definition from “How ‘carders’ trade your stolen personal info” says, “Carders are the people who buy, sell, and trade online the credit card data stolen from phishing sites or from large data breaches at retail stores”. An example of a carder website is Rescator shown in Figure 1 below (Lawrence, 2014). As you can see, the site has full search capabilities based on the type of card you are searching…

    • 598 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Randy Vanderhoof Summary

    • 1496 Words
    • 6 Pages

    In 2012, citizens in the United States incurred 47.3% of global fraud. Imagine being one of the 47% who nearly lost everything (Vanderhoof, 213). One has the option to stand up to fraud or sit back and become a victim. Randy Vanderhoof explains the importance of technology in the fight against fraud at length in his article, “Can Technology Protect Americans from International Cybercriminals?” In his testimony, Vanderhoof expresses the importance of EMV (Europay, Mastercard, and Visa) chip technology in the fight against bankcard fraud (Vanderhoof, 212). Vanderhoof cites the high amount of security that EMV chips have beyond traditional magnetic stripe cards. In addition, Vanderhoof cites recent hacking events to illustrate the need for EMV…

    • 1496 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Tjx It Security Breach

    • 1174 Words
    • 5 Pages

    In January of 2007 the parent company of TJMaxx and Marshalls known as TJX reported an IT security breach. The intrusion involved the portion of its network that handles credit card, debit card, check, and merchandise return functions. Facts slowly began to emerge that roughly 94 million customers’ credit card numbers were stolen from TJMaxx and Marshalls throughout 2006. It was believed that hackers sat in the parking lots and infiltrated TJX using their wireless network.…

    • 1174 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Checkpoint: Tjx Companies

    • 326 Words
    • 2 Pages

    The cost associated with data breaches can be enormous and infinite. A data breach can have severe repercussions including reputational costs to organization and brand. A data breach can also cause the loss of confidence and apprehension in consumer. This in turn will cause less people to shop with TJX companies which can create a loss in revenue. The consumer can also have charges and unauthorized use of their credit information. Banks and issuers of credit and debit cards were forced to replace the stolen cards and refund any money that was stolen due to fraudulent credit or debit charges.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    As seen in the video, criminals stealing hard drives from commercial establishments is becoming more common and holds the opportunity for criminals to steal hundreds of individuals’ credit and debit card information. This growing trend puts the consumer at risk for extra charges on their credit and debit cards as well as identify theft. What is even more surprising is that consumers are unaware of the true risks that are involved in using their card at terminals in stores. Moreover, even though businesses are to swipe the hard drives clean each day, many are failing to complete this proper procedure to prevent consumer’s stolen information. To add, where the consumer’s information was compromised is not made available to the consumer.…

    • 666 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Anil Dash stresses the idea that the implications of the fuzzy line between private and public not strictly defined can lead to greater loss of privacy, through his article “What is Public?” Anil Dash begins his article with numerous considerations of instances that are under normal circumstances thought to be private, transformed into public information more vulnerable to exploitation. The grey area caused by no definite divide between public and private information leaves a lot of room for elasticity in ways for companies to use this to their advantage. The influence by the media and technology industries being keenly interested in thriving off indistinct boundaries lead to their own determination of what will become public.…

    • 739 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The World Wide Web was created far enough back for most people not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all the good things it brings, there are some negatives as well. The internet, once a new place of discovery, is now a place of caution with danger lurking around every corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Andrews describes data aggregators as people or companies…

    • 1630 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    Credit Card Fraud is one of the biggest threats to business establishments today. Originally, credit cards simply carried raised numbers that were transferred to a carbon copy with a card-swiping machine. The merchant simply accepted any card presented. Spending limits and printed lists of lost/stolen cards were ineffective in preventing fraud and other financial losses. Merchants were required to telephone a transaction authorization center to get pre-approval of the transaction. The volume of telephone traffic grew too great, and more automated authorization systems allowed faster, easier, and verified transactions. Magnetic stripes on the backs of these payment cards started to appear and that allowed computers to be used at both ends of the call.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Pointing to “backward U.S. technology,” Ziobro and Sidel reveal a long-standing issue between the financial industry and retailers that has slowed progression on chip cards. Because these cards are widely used in Europe and Canada, the U.S. has become the preferred target for criminal hackers, according to the authors. As a result, “the breaches keep coming,” and a computer-based attack experienced by Neiman Marcus over the holidays as well is used as further evidence of the widespread problem at hand.…

    • 439 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Sick Around the World

    • 2943 Words
    • 12 Pages

    The Taiwan Health Care Smart Card Project. (n.d.). Smart Card Alliance. Retrieved February 23, 2011, from www.smartcardalliance.org/resources/pdf/Taiwan_Health_Card_Profile.pdf…

    • 2943 Words
    • 12 Pages
    Better Essays
  • Better Essays

    TJX Companies, based in Framingham, MA, was a major participant in the discount fashion and retail industry. The TJX brand had presence in the United States as well as in Canada and Europe. In mid-2005, investigators were made aware of serious security breaches experienced in TJX’s credit card system. These breaches were first found at a Marshall’s located in St Paul, MN in which the hackers implemented a “war driving” tactic to steal customer credit card information. This incident resulted in over 46 million debt and credit card numbers being compromised and is considered to be the largest security breach in US history. The security breach at TJX resulted in major members of the credit card association to establish the Payment Credit Industry Data Security Standard (PCI DSS) in order to better regulate security needs for merchants’ company credit card systems.…

    • 1054 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Of this week’s reading by Julia Angwin draw on her observation and experience that highlights how the technology we use every day to converse, could easily be used against us by interfering with our privacy .Because our privacy is not really private, it could it up hurting up as well, Angwin found this to be true when Face book decided to change its policy, which made it possible for people to see you friends list even if you had a private account. As a result, not only was her life in danger but everyone she communicates with.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Other researcher such Brian T and Peter G P (1996) argue that there is no question about the importance of returning consumers. It is the way in which retailer collect the information that is unethical. They point out that consumers give out their private information without knowing that they are doing so. Day R L (1984) also point out that the argument that retailers are using…

    • 2088 Words
    • 9 Pages
    Powerful Essays