The Ashley Madison hack is a big reminder to all Web users: If you submit private data online, chances are it will never fully be deleted.
The hackers, who stole the data about a month ago and then posted it online this week, claimed in a statement that part of the reason for the theft was Ashley Madison’s fraudulent promise to fully delete users’ information if they paid the company a US$19 fee.
The Web site — whose slogan is “Life is short. Have an affair” — is marketed to people looking for extramarital relationships. It purports to have about 39 million members.
Photo: REUTERS /Mark Blinch
The hackers said the company failed to delete the information, even though it collected the fees. Toronto-based Avid Life Media Inc, Ashley Madison’s parent company, hasn’t commented on the hackers’ accusation. A company spokesman didn’t respond to multiple e-mails seeking comment.
It’s virtually impossible to exist in modern society without putting at least some personal information online. Many people can’t get through a day without using the Internet to shop, pay a bill or check their credit card balance.
People have become accustomed to trusting their most precious personal information to companies. But they also need to know that all of that information is being shared more than they would expect, privacy experts say.
Before you hit “submit,” stop and think before giving up your personal information to any kind of Web site, said Michael Kaiser, executive director of the National Cyber Security Alliance, an industry-funded group that educates consumers about cybersecurity.
SECURING PERSONAL INFORMATION
“Personal information is like money, and you don’t just give away your money,” Kaiser says. “In the environment we’re in right now, you have to value it and think about protecting it everywhere you go on the Internet.”
That means taking a look at a Web site’s business to get an idea of how much they value information security and even asking them about their data retention practices. Banks, which deal in financial information, and large retailers, who have a vested interest in getting people to shop online, are probably safer bets than a dating site.
“Ashley Madison actually charges you to remove your information when you remove your account,” he says. “That’s a big clue about how they feel about your personal information.”
People also need to sometimes take a pass on convenience in the name of online security.
Many consumers like it when e-commerce sites have their credit card and other information on file, or when Web browsers automatically fill in forms with their name, address and other details, says Peter Tyrrell, chief operating officer of the data security firm Digital Guardian. Meanwhile, worries about data theft and loss have prompted companies to back up important information in multiple places.
But both practices increase the likelihood that information could be leaked or shared. And it means that even when a person thinks that their information has been permanently deleted, chances are there are still copies floating around somewhere.
“Ashley Madison is a company with a service that’s completely predicated on privacy,” Tyrrell says, adding that that characteristic sets it apart from many traditional e-commerce sites such as retailers.
“Here the capital, so to speak, isn’t a credit card or consumer goods. The capital is personal information that if released could be ruinous personally, and financially too.”
Breaches, whether they be at a major retailer such as Target Corp., a health insurance company such as Anthem Inc., or Ashley Madison, have become so common that people should give some serious thought before putting personal information online, says Caleb Barlow, a vice president at IBM’s security division.
And while Social Security numbers weren’t involved Ashley Madison hack, people should be especially wary of using them as a backup password to access online information, given the potentially disastrous consequences that could result if they’re intercepted, he says.
“Why are we using Social Security Numbers for both identification and access?” he questions. “Any data that can never be changed can be used for identity, but should never be used for access.”
And no matter how legitimate a company or website may be, people need to be aware that they’re rolling the dice every time they hand over personal information.
Scott Vernick, partner and head of the data security and privacy practice at the law firm Fox Rothschild LLP, says consumers have the right to expect a certain level of online security, depending on the industry standards of the company they’re dealing with.
“But those expectations have to be muted by the knowledge that they’re always taking a risk, whether they’re ordering from Amazon Prime or from Ashley Madison,” Vernick says.
Nothing like the spectacular, dramatic unraveling of a political party in Taiwan has unfolded before as has hit the Taiwan People’s Party (TPP) over recent weeks. The meltdown of the New Power Party (NPP) and the self-implosion of the New Party (NP) were nothing compared to the drama playing out now involving the TPP. This ongoing saga is so interesting, this is the fifth straight column on the subject. To catch up on this train wreck of a story up to Aug. 20, search for “Donovan’s Deep Dives Ko Wen-je” in a search engine. ANN KAO SENTENCED TO PRISON YET AGAIN,
Despite her well-paying tech job, Li Daijing didn’t hesitate when her cousin asked for help running a restaurant in Mexico City. She packed up and left China for the Mexican capital last year, with dreams of a new adventure. The 30-year-old woman from Chengdu, the Sichuan provincial capital, hopes one day to start an online business importing furniture from her home country. “I want more,” Li said. “I want to be a strong woman. I want independence.” Li is among a new wave of Chinese migrants who are leaving their country in search of opportunities, more freedom or better financial prospects at a
During her final years of high school, Chinese teenager Xu Yunting found an unusual way to make some pocket money: transforming herself into male video game characters and taking their female devotees on dates. The trend, called “cos commissioning,” has gained traction in China recently, with social media posts garnering millions of views as an increasing number of young women use their purchasing power to engineer a meeting with their dream man in real life. One early morning in Shanghai last month, Xu carefully inserted contacts to enlarge her irises and adjusted a tangerine wig to transform into “Jesse,” a character from
When the Dutch began interacting with the indigenous people of Taiwan, they found that their hunters classified deer hide quality for trade using the Portuguese terms for “head,” “belly,” and “foot.” The Portuguese must have stopped here more than once to trade, but those visits have all been lost to history. They already had a colony on Macao, and did not need Taiwan to gain access to southern China or to the trade corridor that connected Japan with Manila. They were, however, the last to look at Taiwan that way. The geostrategic relationship between Taiwan and the Philippines was established