Risk
7/15/2008
08:34 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Target's Swipe At Privacy, An Update

A representative from retailing company Target explained why they're scanning customers' driver's licenses, and exactly what information they are collecting.

A representative from retailing company Target explained why they're scanning customers' driver's licenses, and exactly what information they are collecting.Several weeks ago I dashed to my local Target store to get some groceries and a box of Nicorette gum. I was surprised when a Target cashier not only asked to see my driver's license, but proceeded to scan it through the reader in the cash register. Whoa!

The original post is available here. Essentially, I had assumed the clerk was going to view my date-of-birth to verify I was old enough to buy a nicotine cessation product. I then asked why my license had been scanned, and what information was collected. The clerk didn't know. However, Target's customer service responded and said my license was scanned to validate my age, but wouldn't answer what, if any, data was collected and what they planned to do with it.

Yesterday, I received an e-mail stating that they were following up on a voice mail they'd left. I must have missed the voice mail -- which is entirely possible considering how quirky Vonage seems to be at times.

Here's the note from Target PR:

I wanted to follow up on the voice mail I left for you on June 25 regarding your experience buying an age-restricted item at a local Target store. Thank you for your questions regarding the scan of your driver's license. You have made us aware of some potential opportunities for improving the store experience for our guests, and we appreciate your patience as we researched the matter.

If a guest approaches the checkout with an age-restricted item, cashiers are prompted to check ID and scan the guest's driver's license. When scanning an ID for this purpose, our systems only collect date of birth. No other personal information is captured. Scanning an ID provides a more accurate way to verify date of birth and creates a quick and efficient checkout experience for our guests.

Thank you again for contacting us regarding this matter.

So there you have it, nothing other than date-of-birth is collected. That's not a violation of privacy, really, since date-of-birth is public information.

However, I still won't be purchasing "age-restricted" items at Target. I'm not comfortable with my driver's license being used in this way. You can purchase cigarettes at nearly any gas station in the state of Minnesota without having to have your license "scanned." In fact, the last time I purchased alcohol for a house party at a friend's house, the state-run liquor store didn't scan my driver's license.

The only authorities I'll be allowing to scan my license in the future will be the Department of Motor Vehicles, and law enforcement. Period. I'm not taking the chance of trading privacy for expediency at checkout.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Jamie, the darn Unicorn is back."
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.