The following text is
copyright 2007 by Network World, permission is hearby given for reproduction,
as long as attribution is given and this notice is included.
TJX: Willfully and with malice of
forethought?
By Scott Bradner
If the Wall Street Journal is to
be believed, TJX Companies, Inc. (TJX) is trying for the record for the number
of stolen credit cards. Both the
Journal and the New York Times reported that the number of card numbers exposed
or stolen in the December 2006 break in at TJX data center may exceed the 40
million card numbers exposed by the 2005 breach at CardSystems Solutions. (see The winner so far: CardSystems
Solutions - http://www.networkworld.com/columnists/2005/062705bradner.html) TJX released a press release in which
it claimed it had been victimized but it now appears that one of the
perpetrators of this crime was TJX itself.
In late 2004 the payment card
industry (PCI), which includes both debit and credit card issuers, issued a set
of "PCI Security Standards" that, as of last June, had to be met by
anyone handling credit card numbers electronically. (http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf) This set of standards was updated
last year and the revised standards went into effect this month.
(https://www.pcisecuritystandards.org/tech/index.htm)
These standards, both old and
new, are quite comprehensive and would be a good model of how any high value
corporate information should be protected. Some of the rules are easy to implement and some are quite
hard. One of the harder ones might
be rule 1.4 "Prohibit direct public access between external
networks and any system component that stores cardholder data (for example,
databases, logs, trace files)."
This rule means, for example, that you can not have a public web server
that stores credit card numbers on its own disks (or on a shared file system).
According to the Wall Street Journal TJX was not compliant
with the PCI Security Standards.
There are a number of different
parties involved in the credit or debit card business. First there is the "issuing
bank" that you deal with to get a card, then there is the
"merchant" where you use the card to buy something, then there is the
merchant's bank that acquires the money for the merchant (known as the
"acquiring bank") and sometimes there is also a clearinghouse that
helps the processing. Under PCI
rules acquiring banks are responsible for ensuring that their merchants are
meeting the security standard.
There appear to be three crooks --
crooks of commission or omission - in this case. Clearly the person or persons that broke into the TJX system
is likely to be a crook of commission.
But there are two other crooks of omission and are just as liable in my
opinion. Fifth Third Bank, TJX's
acquiring bank and TJX itself failed to ensure that TJX met the security
standards.
At best, this episode will not be
cheap for TJX - if it turns out that the 40 M number is right the cost to TJX
will be $7.2B (if a potentially self serving survey by PGP Inc is right -
http://www.ponemon.org/press/Ponemon_2006%20Data%20Breach%20Cost_FINAL.pdf). It would have been far far cheaper to
just meet the standards in the first place.
What I want to know is why one of
the far too many lawyers out there does not launch a class action suit against
both Fifth Third Bank and TJX. It
appears that both of them willfully and with malice of forethought decided to
not require (in the case of the bank) or implement (in the case of TJX) the
required security standards. If it
costs the average person just 10 hours to deal with cleaning up after a stolen
card that would be another $7 B in real costs plus punitive damages. (Based on
the US average wage.) Maybe a
result like that would wake up the 69% of merchants who are not yet compliant.
disclaimer: Even for Harvard $14 B would be quite a
wake up call but the university has not expressed an opinion on these crimes of
omission.