Equifax Data Breach Case Study

Improved Essays
Following the Equifax data breach, the demand—the desire, willingness, and ability to pay for a good or service by consumers—for Symantec’s LifeLock identity protection services has soared, and the demand for Equifax’s similar identity protection services has dropped significantly. The relationship between the demand for a good and the price of a substitute good—a good that serves the same purpose—is usually direct: as the price of a substitute decreases, the demand for the original good also decreases. People will not be willing to pay for a good when they can purchase a similar good for much less. Equifax and Symantec provide very similar identity protection services. However, despite the fact that Symantec is charging considerably more for identity protection services than Equifax, the demand for Symantec’s services is increasing rapidly because of branding—the phenomenon where consumers are willing to pay more for a brand name they trust. …show more content…
LifeLock, a well-known substitute product, seems much safer. The benefit—what is gained from a decision—of purchasing LifeLock (the greater security compared to Equifax) outweighs the cost—what is given up when a decision is made—of purchasing LifeLock (the greater monetary expenses). Rational people will make decisions that maximize benefits and minimize costs; for many, that decision is purchasing from Symantec instead of Equifax. Cost-benefit analysis also explains why Equifax began offering services for free; the costs of millions of lawsuits greatly outweigh the lost revenue when protection services are offered for

Related Documents

  • Improved Essays

    Complete Name: Unit 4 Student Name: Donoho, Leslie ********************************************************************************************************** 1. Case Study: “Don’t Let Crooks Steal Your Identity: How to Protect Yourself-and Your Credit Rating” (p. 225) ********************************************************************************************************** 2. Provide several methods that crooks use to steal your identity. Student Answer: There are several ways that our identity can be stolen without our knowledge until we either start bouncing checks or recognizing charges that we never actually made (Kapoor, Dlabay, L, & Hughes, 2014). Thieves are lurking every where we turn hidden in plain sight.…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    After doing so much shopping online, I have decided to make a regulation regarding the theft of identities on websites and stores that are quite popular. I shop at Target, Home Depot, and even buy a lot of coffee at Starbucks and all of these companies have been hacked by identity thieves. Therefore, the regulation that I would like to make would be to protect online shoppers and those who use their phones to pay for services rendered, such as Target.com or the Starbucks app that allows the cashiers to scan cellular phones. a. What problem did you find in your research online that your regulation plans to address?…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    RELATED CASES: None SUPPORT DOCUMENTS: Eight Pages Bank Of America Fraud Affidavit/Transaction History. On 12/09/2015, Sandra Agrait contacted the Pasco Sheriff`s Office by telephone to report fraudulent use of her Bank Of America ATM/Debit Card ending in 5457. Ms. Agrait advised she reviewed her bank account transaction history and observed two unauthorized cash withdrawals that she did not make. She said her houseguest, Timothy Midkiss took her debit card out of her wallet, used it to make the cash withdrawals and returned it to her walle without her knowledge or permission.…

    • 206 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Uber’s Data Breach: Legal and Ethical Issues Introduction In 2016, the tech company Uber suffered a data breach that compromised the personal data of 57 million Uber customers. Uber is a peer-to-peer ridesharing company that is headquartered in San Francisco, California. In the past five years, this company has had multiple instances, prior to the large data breach, where they did not secure their user’s data.…

    • 1284 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Summary: Drowning In Debt

    • 607 Words
    • 3 Pages

    (274). Budding college students conclude that ownership of credit cards launches them from childhood codependence to adult self dependence. This deception occurs as a result of strategic and “sophisticated advertising strategies” utilized by the card companies. Companies fool and pressure the university attendants with their illusory advertisements which feature.…

    • 607 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    This week I was thinking and reading about the massive Equifax data breach that took place this year. Equifax is one of America's 3 main credit reporting agencies. Big data is a threat in today's world. A lot of personal information is collected and stored nowadays, which is used for good reasons but could also be abused. Big data and all new technologies such as artificial intelligence, and machine learning are very powerful and can reform peoples lives in today's times.…

    • 233 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    As consumers, we trust corporations with private information like phone numbers, home addresses, SSID numbers, and in some cases interests or search history. Facebook and Google, which are tech giants, sells out your history to companies like Target to advertise merchandise on the internet that is personally tailored to you. Target and other well known stores have been hacked for customer information. A few easy rules to follow to prevent getting hacked are not shopping online and pay with cash as much as possible. According to Lee Rainie, an expert in research in internet, science and technology if one cannot, they are among “91% of Americans who say they do not have control of their personal information online”(Rainie 7).…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The article explains how many e-crimes are being treated unfairly and the people found guilty for these crimes are charged with an unreasonable sentence. The Computer Fraud and Abuse Act was created in 1986, but needs various improvements to be up to date with to today’s internet. With the CFAA, almost anybody can be prosecuted and convicted of a violation for minor actions that seem harmless, such as using a roommate’s Netflix account. The ethical issues identified in the article are e-crimes are treated unfairly and prosecutors are sentenced for lengthy periods of time for minor offenses.…

    • 342 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    The Computer Fraud and Abuse Act (CFAA) of 1986 was created during the Reagan Administration as the first significant federal legislation designed to combat the growing threat against computer based crimes. In the 1980 's, Congress would only have the vaguest of notions how computer technology would evolve as a medium for communications and social-networking. Lawmakers, at the time, recognized the federal interest of the U.S. government was to protect computers under control of a federal entity, part of a financial institution or somehow involved in interstate or foreign commerce. The CFAA was therefore a crucial piece of legislation that protected U.S. interest in terms of national security and financial information.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays