SlideShare une entreprise Scribd logo
1  sur  8
The Big Leak
The Personal Data Leak in South Korea

© trythis2that
More than 100million personal data
of three credit card customers

were stolen
© trythis2that
KB Kookmin

Nonghyup

Lotte

ADDRESS
PERSONAL ID NO.
MOBILE PHONE NO.
CREDIT CARD NO.
EXPIRY DATE
BANK ACCOUNT NO.
ANNUAL INCOME

Data included personal information
and financial details
© trythis2that
KCB* employee illegally copied all the clients’ info
to his USB and sold it to telemarketers

*KCB: Korea Credit Bureau, Personal credit rating firm developing fraud detection
system (FDS) for the three credit card companies
© trythis2that
PROBLEM
#1

Credit Card Companies’ Lack of Understanding
the Importance of Data Protection
It was easy for any employees to access customers’ personal data. Also, they did not
strictly control the usage of private data storage tool, such as USB.
© trythis2that
PROBLEM
#2

Credit Card Companies’ Violation to
Personal Data Protection Law
According to the law, they need to discard their customers’ personal data
within five years. However, they had kept the data over 30 years.
© trythis2that
PROBLEM
#3

Absence of Security Culture
Most companies do not acknowledge that data protection is a significant part of their
business. Furthermore, they consider data protection as an expense, not an investment.
© trythis2that
Works Cited
Experienced Alameda-Contra Costa County Can Help. Photograph. n.d. Domestic

Violence Restraining Orders – Questions Answered. HANNAH E. SIMS, LL.M. Web.
3 Feb. 2014.
Five-components-of-data-protection-strategy. Photograph. 17 Dec. 2013. What Is Data

Protection. Ibdaa. Web. 3 Feb. 2014.
Invedu. “The Big Leak.” Korea Investors Protection Foundation Official Blog. Korea
Investors Protection Foundation, 23 Jan. 2014. Web. 3 Feb. 2014.
Password Security. Photograph. 14 June 2012. Comment: Building a Risk-aware, Cyber
Secure Culture. Infosecurity. Web. 3 Feb. 2014.
Yu, Kun-ha. “What it takes to safeguard personal information.” The Korea Herald. The
Korea Herald, 2 Feb. 2014. Web. 3 Feb. 2014.

© trythis2that

Contenu connexe

Tendances

E contracts and validity of e contracts in India
E contracts and validity of e contracts in IndiaE contracts and validity of e contracts in India
E contracts and validity of e contracts in IndiaKajalRandhawa
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E CommerceEd Dickinson
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)Ed Dickinson
 
E contracts busines law
E contracts busines lawE contracts busines law
E contracts busines lawBabasab Patil
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)franciscronje
 
E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)Shawn Tuma
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRALRahul Gurnani
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting PresentationEndcode_org
 
E governance
E governanceE governance
E governancezisanc2
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 

Tendances (20)

E contracts and validity of e contracts in India
E contracts and validity of e contracts in IndiaE contracts and validity of e contracts in India
E contracts and validity of e contracts in India
 
What Is E Commerce
What Is E CommerceWhat Is E Commerce
What Is E Commerce
 
IT ACT 2000
IT ACT 2000IT ACT 2000
IT ACT 2000
 
Electronic Communications Act (2000)
Electronic Communications Act (2000)Electronic Communications Act (2000)
Electronic Communications Act (2000)
 
E contracts busines law
E contracts busines lawE contracts busines law
E contracts busines law
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
Electronic Contracts
Electronic ContractsElectronic Contracts
Electronic Contracts
 
ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)ICT / IT Law (Cyberlaw)
ICT / IT Law (Cyberlaw)
 
E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)E-Contracting: The Basic Rules (2/2/2001)
E-Contracting: The Basic Rules (2/2/2001)
 
Roots of Indian IT ACT 2000- UNCITRAL
Roots of Indian IT ACT 2000-  UNCITRALRoots of Indian IT ACT 2000-  UNCITRAL
Roots of Indian IT ACT 2000- UNCITRAL
 
It law ecommerce
It law ecommerceIt law ecommerce
It law ecommerce
 
Identity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for BusinessIdentity Theft Red Flags Rule for Business
Identity Theft Red Flags Rule for Business
 
Peter Watkins
Peter WatkinsPeter Watkins
Peter Watkins
 
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond ConfidentialityPrivacy Compliance for Law Firms: Moving Beyond Confidentiality
Privacy Compliance for Law Firms: Moving Beyond Confidentiality
 
Electronic Contracting Presentation
Electronic Contracting PresentationElectronic Contracting Presentation
Electronic Contracting Presentation
 
E governance
E governanceE governance
E governance
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
The e commerce law
The e commerce lawThe e commerce law
The e commerce law
 

En vedette

clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)
clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)
clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)洋史 東平
 
18 canh dep mua thu tren the gioi (25 nov 11)
18 canh dep mua thu tren the gioi (25 nov 11)18 canh dep mua thu tren the gioi (25 nov 11)
18 canh dep mua thu tren the gioi (25 nov 11)Minh Thich
 
コマンドライン使いもLibreOffice
コマンドライン使いもLibreOfficeコマンドライン使いもLibreOffice
コマンドライン使いもLibreOfficeKiwamu Okabe
 
Receiving Bills Electronically
Receiving Bills ElectronicallyReceiving Bills Electronically
Receiving Bills ElectronicallyEnergyCAP, Inc.
 
2011.12 marketing principles
2011.12 marketing principles2011.12 marketing principles
2011.12 marketing principlesStephan Langdon
 
CBE Ltd Seamus Mc Hugh
CBE Ltd Seamus Mc HughCBE Ltd Seamus Mc Hugh
CBE Ltd Seamus Mc HughDublingame
 
Publicidad
PublicidadPublicidad
PublicidadMarta
 
Foundationsofahealthyrelationship1 110216093737-phpapp02
Foundationsofahealthyrelationship1 110216093737-phpapp02Foundationsofahealthyrelationship1 110216093737-phpapp02
Foundationsofahealthyrelationship1 110216093737-phpapp02kdcsdross
 
Learning3.0 chicago oct_11
Learning3.0 chicago oct_11Learning3.0 chicago oct_11
Learning3.0 chicago oct_11willyerd1
 
Manual estimulacion-prenatal-1210563942438206-9
Manual estimulacion-prenatal-1210563942438206-9Manual estimulacion-prenatal-1210563942438206-9
Manual estimulacion-prenatal-1210563942438206-9Marta
 
Algemene presentatie The Next Level
Algemene presentatie The Next LevelAlgemene presentatie The Next Level
Algemene presentatie The Next LevelThe Next Level
 
Mind Mapping: Walking Notes, Urban Awareness Diary, Barcelona
Mind Mapping: Walking Notes, Urban Awareness Diary, BarcelonaMind Mapping: Walking Notes, Urban Awareness Diary, Barcelona
Mind Mapping: Walking Notes, Urban Awareness Diary, BarcelonaNicholas Socrates
 
About us story
About us storyAbout us story
About us storyagease
 

En vedette (19)

clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)
clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)
clu2cの動態保存とはなんでしょう?(東海道らぐ 初オフ会 in オープンソースカンファレンス 2012 Kansai@Kyoto 資料)
 
18 canh dep mua thu tren the gioi (25 nov 11)
18 canh dep mua thu tren the gioi (25 nov 11)18 canh dep mua thu tren the gioi (25 nov 11)
18 canh dep mua thu tren the gioi (25 nov 11)
 
コマンドライン使いもLibreOffice
コマンドライン使いもLibreOfficeコマンドライン使いもLibreOffice
コマンドライン使いもLibreOffice
 
Receiving Bills Electronically
Receiving Bills ElectronicallyReceiving Bills Electronically
Receiving Bills Electronically
 
2011.12 marketing principles
2011.12 marketing principles2011.12 marketing principles
2011.12 marketing principles
 
CBE Ltd Seamus Mc Hugh
CBE Ltd Seamus Mc HughCBE Ltd Seamus Mc Hugh
CBE Ltd Seamus Mc Hugh
 
Patient Centered
Patient CenteredPatient Centered
Patient Centered
 
Publicidad
PublicidadPublicidad
Publicidad
 
Wherearethey
WherearetheyWherearethey
Wherearethey
 
Mergers & Acquisitions Newsletter - November 2011
Mergers & Acquisitions Newsletter - November 2011 Mergers & Acquisitions Newsletter - November 2011
Mergers & Acquisitions Newsletter - November 2011
 
Foundationsofahealthyrelationship1 110216093737-phpapp02
Foundationsofahealthyrelationship1 110216093737-phpapp02Foundationsofahealthyrelationship1 110216093737-phpapp02
Foundationsofahealthyrelationship1 110216093737-phpapp02
 
CMS Forum
CMS ForumCMS Forum
CMS Forum
 
Learning3.0 chicago oct_11
Learning3.0 chicago oct_11Learning3.0 chicago oct_11
Learning3.0 chicago oct_11
 
Manual estimulacion-prenatal-1210563942438206-9
Manual estimulacion-prenatal-1210563942438206-9Manual estimulacion-prenatal-1210563942438206-9
Manual estimulacion-prenatal-1210563942438206-9
 
身の回りの圧縮
身の回りの圧縮身の回りの圧縮
身の回りの圧縮
 
Algemene presentatie The Next Level
Algemene presentatie The Next LevelAlgemene presentatie The Next Level
Algemene presentatie The Next Level
 
Mind Mapping: Walking Notes, Urban Awareness Diary, Barcelona
Mind Mapping: Walking Notes, Urban Awareness Diary, BarcelonaMind Mapping: Walking Notes, Urban Awareness Diary, Barcelona
Mind Mapping: Walking Notes, Urban Awareness Diary, Barcelona
 
About us story
About us storyAbout us story
About us story
 
Convocation
Convocation Convocation
Convocation
 

Similaire à South Korea Personal Data Leak of 100M Exposed

AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptxsambaba17
 
Digital bangladesh
Digital bangladeshDigital bangladesh
Digital bangladeshMominul Jnu
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxDivyaHinduja2
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final projectKelly Giambra
 
CBIZ Banking & Financial Services Quarterly Newsletter-July 2019
CBIZ Banking & Financial Services Quarterly Newsletter-July 2019CBIZ Banking & Financial Services Quarterly Newsletter-July 2019
CBIZ Banking & Financial Services Quarterly Newsletter-July 2019CBIZ, Inc.
 
2G_SPECTRUM_SCAM.pptx
2G_SPECTRUM_SCAM.pptx2G_SPECTRUM_SCAM.pptx
2G_SPECTRUM_SCAM.pptxAbinash Padhy
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...Alan Quayle
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxHetaDesai13
 
MobiU2012 Summit: Mobile Class Action Litigation & Privacy - by Sedgwick
MobiU2012 Summit: Mobile Class Action Litigation & Privacy - by SedgwickMobiU2012 Summit: Mobile Class Action Litigation & Privacy - by Sedgwick
MobiU2012 Summit: Mobile Class Action Litigation & Privacy - by SedgwickKimberly-Clark
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared ImagesIRJET Journal
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - PrivacyFrances Coronel
 
Workshop on the FSD of Kenya ppt.pptx
Workshop on the FSD of Kenya ppt.pptxWorkshop on the FSD of Kenya ppt.pptx
Workshop on the FSD of Kenya ppt.pptxetebarkhmichale
 
Financial Service Development in Kenya ppt.pptx
Financial Service Development in Kenya ppt.pptxFinancial Service Development in Kenya ppt.pptx
Financial Service Development in Kenya ppt.pptxetebarkhmichale
 
Workshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptx
Workshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptxWorkshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptx
Workshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptxetebarkhmichale
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.jatharrison
 

Similaire à South Korea Personal Data Leak of 100M Exposed (20)

AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
Presentation (004).pptx
Presentation (004).pptxPresentation (004).pptx
Presentation (004).pptx
 
Digital bangladesh
Digital bangladeshDigital bangladesh
Digital bangladesh
 
Consumer Data Rights
Consumer Data RightsConsumer Data Rights
Consumer Data Rights
 
E-comm PPT Team-4.pptx
E-comm PPT Team-4.pptxE-comm PPT Team-4.pptx
E-comm PPT Team-4.pptx
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
CBIZ Banking & Financial Services Quarterly Newsletter-July 2019
CBIZ Banking & Financial Services Quarterly Newsletter-July 2019CBIZ Banking & Financial Services Quarterly Newsletter-July 2019
CBIZ Banking & Financial Services Quarterly Newsletter-July 2019
 
2G_SPECTRUM_SCAM.pptx
2G_SPECTRUM_SCAM.pptx2G_SPECTRUM_SCAM.pptx
2G_SPECTRUM_SCAM.pptx
 
Cobrapost expose
Cobrapost exposeCobrapost expose
Cobrapost expose
 
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
What Everyone Needs to Know about Protecting the CPaaS Ecosystem from Unlawfu...
 
CYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptxCYBER CRIMES AND IT ACT.pptx
CYBER CRIMES AND IT ACT.pptx
 
MobiU2012 Summit: Mobile Class Action Litigation & Privacy - by Sedgwick
MobiU2012 Summit: Mobile Class Action Litigation & Privacy - by SedgwickMobiU2012 Summit: Mobile Class Action Litigation & Privacy - by Sedgwick
MobiU2012 Summit: Mobile Class Action Litigation & Privacy - by Sedgwick
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
 
Ethics in Technology - Privacy
Ethics in Technology - PrivacyEthics in Technology - Privacy
Ethics in Technology - Privacy
 
Cybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower ProtectionsCybersecurity and Data Privacy Whistleblower Protections
Cybersecurity and Data Privacy Whistleblower Protections
 
Workshop on the FSD of Kenya ppt.pptx
Workshop on the FSD of Kenya ppt.pptxWorkshop on the FSD of Kenya ppt.pptx
Workshop on the FSD of Kenya ppt.pptx
 
Financial Service Development in Kenya ppt.pptx
Financial Service Development in Kenya ppt.pptxFinancial Service Development in Kenya ppt.pptx
Financial Service Development in Kenya ppt.pptx
 
Workshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptx
Workshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptxWorkshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptx
Workshop_3_FSD_Kenya_Digital_Credit_Audit_Presentation_workshop_3.pptx
 
Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.Who ownes the customer? Privacy in the connected age.
Who ownes the customer? Privacy in the connected age.
 

Dernier

IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 

Dernier (13)

IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 

South Korea Personal Data Leak of 100M Exposed

  • 1. The Big Leak The Personal Data Leak in South Korea © trythis2that
  • 2. More than 100million personal data of three credit card customers were stolen © trythis2that
  • 3. KB Kookmin Nonghyup Lotte ADDRESS PERSONAL ID NO. MOBILE PHONE NO. CREDIT CARD NO. EXPIRY DATE BANK ACCOUNT NO. ANNUAL INCOME Data included personal information and financial details © trythis2that
  • 4. KCB* employee illegally copied all the clients’ info to his USB and sold it to telemarketers *KCB: Korea Credit Bureau, Personal credit rating firm developing fraud detection system (FDS) for the three credit card companies © trythis2that
  • 5. PROBLEM #1 Credit Card Companies’ Lack of Understanding the Importance of Data Protection It was easy for any employees to access customers’ personal data. Also, they did not strictly control the usage of private data storage tool, such as USB. © trythis2that
  • 6. PROBLEM #2 Credit Card Companies’ Violation to Personal Data Protection Law According to the law, they need to discard their customers’ personal data within five years. However, they had kept the data over 30 years. © trythis2that
  • 7. PROBLEM #3 Absence of Security Culture Most companies do not acknowledge that data protection is a significant part of their business. Furthermore, they consider data protection as an expense, not an investment. © trythis2that
  • 8. Works Cited Experienced Alameda-Contra Costa County Can Help. Photograph. n.d. Domestic Violence Restraining Orders – Questions Answered. HANNAH E. SIMS, LL.M. Web. 3 Feb. 2014. Five-components-of-data-protection-strategy. Photograph. 17 Dec. 2013. What Is Data Protection. Ibdaa. Web. 3 Feb. 2014. Invedu. “The Big Leak.” Korea Investors Protection Foundation Official Blog. Korea Investors Protection Foundation, 23 Jan. 2014. Web. 3 Feb. 2014. Password Security. Photograph. 14 June 2012. Comment: Building a Risk-aware, Cyber Secure Culture. Infosecurity. Web. 3 Feb. 2014. Yu, Kun-ha. “What it takes to safeguard personal information.” The Korea Herald. The Korea Herald, 2 Feb. 2014. Web. 3 Feb. 2014. © trythis2that