SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
The Times
3 December 2015
Jingle bells or alarm bells? Digital shopping is dangerous for consumers
but they themselves must take responsibility
The nights are drawing in, Christmas is coming, and retailers are getting fat on the back of
Black Friday and Cyber Monday, which boosted annual high street sales this year to record
levels. Of course, sales initiatives like these also allow retailers to increase their collection of
personal data, offering a window to the lives of their customers and their buying habits. So, is
it jingle bells or rather alarm bells that consumers should have ringing in their ears?
The various touch points for data transfer to retailers are now quite staggering — from store
loyalty cards to more covert monitoring such as using the GPS signal on our mobile phones
to monitor which aisles we spend most time in at the supermarket. It’s become all too easy
for us to be parted from our personal data, often without realising it. What makes this trend
more worrying is how we often rely on the same information as “keys” to access our bank
accounts and other private aspects of our lives.
So while retailers will undoubtedly want our data for their own legitimate commercial
purposes, cyber criminals are also on the lookout for it too. Personal data is big business on
the black market and worth a fortune in the wrong hands — increasing the risks of
conducting business on line.
Perhaps most surprising, then, is that the risks we need to be alert to but regularly miss are
not new. Many will be familiar to consumers. It’s the new ways that technology allows them
to manifest that often catches us unawares.
Crime is a good example. There are now frequent, almost daily reports of retailers websites
coming under attack from cyber criminals. Such encounters are generally followed by social-
engineering scams, in which fraudsters use stolen data to impersonate retailers, win
customers’ confidence and then trick them into transferring money into fake bank accounts.
Retailers undoubtedly have a part to play to keep us safe when harvesting our personal
information. They are obliged to take all technically appropriate steps to protect us but,
worryingly, the law doesn’t specify what “appropriate” means. The rationale for this is it
allows companies flexibility to decide, but increasingly this approach is being shown to be
flawed. The regularity of data theft tells us so. Inconsistency and uncertainty is the result.
For retailers this has to be a serious concern for the boardroom; get it wrong and significant
reputational damage and liabilities will be lurking around the corner.
The bottom line, though, is that consumers have also got to start taking more responsibility
for the protection of their digital assets. It’s a two-way street. More care about to whom they
give their personal information and the purposes for which they agree it can be used is the
place to start. Ensuring that internet security systems on PCs and smart devices are up-to-
date, while also being more alert to decoy websites set up by fraudsters are important basic
measures. Only through taking such steps routinely themselves do consumers stand a chance
of keeping the criminals in check. The battle cannot be won by retailers on their own.
Ed Lewis is a partner in the insurance and eeinsurance team and Kurt Rowe is
an associate in the market affairs group of Weightmans LLP

Weitere ähnliche Inhalte

Ähnlich wie The Times 3 December 2015

Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyMark Albala
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Vesta Corporation
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
Protecting yourself against debit card fraud
Protecting yourself against debit card fraudProtecting yourself against debit card fraud
Protecting yourself against debit card fraudkredx
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal informationZev Aidikoff
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentationmbachnak
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?tommy2tone44
 
Frequent buyer program
Frequent buyer programFrequent buyer program
Frequent buyer programaamatya
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Brunswick Group
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheyPeter Tran
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?- Mark - Fullbright
 
Frequent buyer program
Frequent buyer programFrequent buyer program
Frequent buyer programaamatya
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docxwlynn1
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdfDrysign By Exela
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communicationRosetta
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureRYAN ORTON
 

Ähnlich wie The Times 3 December 2015 (20)

state-of-fraud-2021.pdf
state-of-fraud-2021.pdfstate-of-fraud-2021.pdf
state-of-fraud-2021.pdf
 
Cybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economyCybersecurity is a key ingredient in the digital economy
Cybersecurity is a key ingredient in the digital economy
 
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
Fast Fraud and Merchants: How to Stop Your Next Biggest Threat (White Paper)
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Protecting yourself against debit card fraud
Protecting yourself against debit card fraudProtecting yourself against debit card fraud
Protecting yourself against debit card fraud
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?Will The Typical Person Need ID Fraud Insurance Protection?
Will The Typical Person Need ID Fraud Insurance Protection?
 
Frequent buyer program
Frequent buyer programFrequent buyer program
Frequent buyer program
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 
Senate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_RicheySenate_2014_Data_Breach_Testimony_Richey
Senate_2014_Data_Breach_Testimony_Richey
 
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
Frequent buyer program
Frequent buyer programFrequent buyer program
Frequent buyer program
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
10 Cybersecurity Threats and How eSignatures Can Protect Your Business.pdf
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 

The Times 3 December 2015

  • 1. The Times 3 December 2015 Jingle bells or alarm bells? Digital shopping is dangerous for consumers but they themselves must take responsibility The nights are drawing in, Christmas is coming, and retailers are getting fat on the back of Black Friday and Cyber Monday, which boosted annual high street sales this year to record levels. Of course, sales initiatives like these also allow retailers to increase their collection of personal data, offering a window to the lives of their customers and their buying habits. So, is it jingle bells or rather alarm bells that consumers should have ringing in their ears? The various touch points for data transfer to retailers are now quite staggering — from store loyalty cards to more covert monitoring such as using the GPS signal on our mobile phones to monitor which aisles we spend most time in at the supermarket. It’s become all too easy for us to be parted from our personal data, often without realising it. What makes this trend more worrying is how we often rely on the same information as “keys” to access our bank accounts and other private aspects of our lives. So while retailers will undoubtedly want our data for their own legitimate commercial purposes, cyber criminals are also on the lookout for it too. Personal data is big business on the black market and worth a fortune in the wrong hands — increasing the risks of conducting business on line. Perhaps most surprising, then, is that the risks we need to be alert to but regularly miss are not new. Many will be familiar to consumers. It’s the new ways that technology allows them to manifest that often catches us unawares. Crime is a good example. There are now frequent, almost daily reports of retailers websites coming under attack from cyber criminals. Such encounters are generally followed by social-
  • 2. engineering scams, in which fraudsters use stolen data to impersonate retailers, win customers’ confidence and then trick them into transferring money into fake bank accounts. Retailers undoubtedly have a part to play to keep us safe when harvesting our personal information. They are obliged to take all technically appropriate steps to protect us but, worryingly, the law doesn’t specify what “appropriate” means. The rationale for this is it allows companies flexibility to decide, but increasingly this approach is being shown to be flawed. The regularity of data theft tells us so. Inconsistency and uncertainty is the result. For retailers this has to be a serious concern for the boardroom; get it wrong and significant reputational damage and liabilities will be lurking around the corner. The bottom line, though, is that consumers have also got to start taking more responsibility for the protection of their digital assets. It’s a two-way street. More care about to whom they give their personal information and the purposes for which they agree it can be used is the place to start. Ensuring that internet security systems on PCs and smart devices are up-to- date, while also being more alert to decoy websites set up by fraudsters are important basic measures. Only through taking such steps routinely themselves do consumers stand a chance of keeping the criminals in check. The battle cannot be won by retailers on their own. Ed Lewis is a partner in the insurance and eeinsurance team and Kurt Rowe is an associate in the market affairs group of Weightmans LLP