Risk
4/20/2012
01:32 PM
50%
50%

Many Identity Theft Protection Services Promise The Impossible

Consumer Federation of America report warns about ID theft service providers that offer vague, misleading, or incomplete assurances about their services.

Identity theft protection service subscribers: Beware trial offers, as well as refund and cancellation policies, and always seek specifics about the exact type of assistance that will be provided.

Those warnings come from a new report into identity theft services. Released by the Consumer Federation of America (CFA), which counts 280 national, state, and local consumer rights groups as members, the 48-page study analyzes the practices of 20 identity theft services (which were not named in the report), as well as complaints made on the Internet about such services. It also details a series of best practices with which the CFA believes all identity theft service providers should comply.

"We found that most of the services' websites did a fair job of complying with the best practices, but there is need for improvement," said Susan Grant, CFA's director of consumer protection, in a statement.

[ Privacy groups are attacking the proposed Cyber Intelligence Sharing and Protection Act. Is CISPA Worth Saving? ]

One problem is marketing hype, as various services promise to "stop fraud before it starts" (Identity Hawk), "stop identity theft in its tracks" (Experian), or even to "prevent identity theft" (TransUnion). Compare that language with the Federal Trade Commission's guide to avoiding identity theft, which talks about how consumers can "deter, detect, defend, [and] avoid" ID theft.

Any identity theft service provider's promise to do more than that is hollow. "They can't prevent consumers' personal information from being stolen or detect identity theft in all instances ... [and] it's not always possible to stop identity theft, especially if someone's social security number has been compromised," according to the CFA's report.

Free trials are another offering that have seen their fair share of consumer complaints. "While many identity theft services are offered for free for a limited trial period, from the complaints that CFA found online it appears that the terms aren't always made clear," according to the report.

Plus, some identity theft service providers force consumers to jump through multiple hoops to cancel their trials. "Sometimes consumers can't get through to the company to cancel," according to the report. "Some consumers are charged even though they never agreed to try the service--usually because they gave their financial account information to that company or a partner of that company for something else."

Finally, not all identity theft service providers make clear exactly which services and features they're offering to provide. In many cases, researchers had to hunt through terms of service, FAQs, "and other less obvious places" to create a clear picture of what the service offered. "Some identity theft services act on behalf of customers if they become victims to resolve their problems, but most only provide advice and counseling," according to the report. In addition, the terminology related to services offered can be slippery. "For instance, if a credit score is provided, some services don't explain that it is an educational score, which is not the same score that lenders use," according to the report.

The CFA report findings may draw "truth in advertising" scrutiny from the FTC, as many services claim to be "#1" or "top-ranked," but provide no reference to back up that claim. Likewise, many of the identity theft statistics used by companies marketing ID theft services are outdated or inaccurate.

How could deficient identity theft service providers improve? For starters, the CFA has called on all such companies to cease sharing people's financial details with their affiliates, give consumers a warning when their free trials are ending, and detail the cost--should they continue after the free trial ends--as well as how they can easily and quickly cancel the service.

Put an end to insider theft and accidental data disclosure with network and host controls--and don't forget to keep employees on their toes. Also in the new, all-digital Stop Data Leaks issue of Dark Reading: Why security must be everyone's concern, and lessons learned from the Global Payments breach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Railroader
50%
50%
Railroader,
User Rank: Apprentice
4/22/2012 | 8:20:22 PM
re: Many Identity Theft Protection Services Promise The Impossible
We must stop using SOC numbers as identification, and get those numbers off of the very places you mentioned such as Experian, TransUnion and other credit reporting agencies, there is not such thing as a secure computer, and until we do that, there will be no such thing a no identity theft.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: nice one good
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas in a thought-provoking discussion about the evolving role of the CISO.