Skip to content

Board Pack (FTC v. ChoicePoint Inc. (2006))

Use this to brief executives and counsel.


Purpose

This board brief provides decision-useful context for FTC v. ChoicePoint Inc.: fraudulent subscriber onboarding, unauthorized acquisition of consumer reports, the 2006 stipulated judgment and order, and remediation of vetting and monitoring programs. It is designed to help the board evaluate governance adequacy, remediation priority, and reporting cadence across legal, technical, and operational dimensions.

Hallucinated writing examples

Scenario: In an illustrative period following the January 2006 FTC stipulated final judgment (time), the Chief Information Security Officer (role) prepares a board security brief (type) for Board Audit Committee (audience).

MEMORANDUM

To: Board Audit Committee
From: Chief Information Security Officer
Date: March 15, 2006
Subject: Board Security Brief — Unauthorized Acquisition of Consumer Data; FTC Matter No. 052-3069; Stipulated Final Judgment and Order (Jan. 26, 2006)

This memorandum summarizes the FTC’s enforcement action arising from fraudulent businesses posing as legitimate subscribers to obtain sensitive consumer information from ChoicePoint, the Stipulated Final Judgment and Order entered January 26, 2006 (Matter No. 052-3069), including civil penalties and consumer redress, and the Company’s security program, monitoring, and assessment obligations. This is a data-broker and subscriber-vetting failure mode—not a source-code credential breach.

Incident Summary: According to the FTC’s complaint and public materials, criminals used fraudulent subscribers and misappropriated identities to acquire consumer reports and sensitive personal information at scale, causing substantial consumer injury and law enforcement attention. The Commission alleged violations of the FTC Act and Fair Credit Reporting Act provisions and resolved the matter with injunctive terms and monetary relief.
The order requires a comprehensive information security program, monitoring of improper access, annual written security assessments for five years, and recordkeeping and reporting to the FTC.

Regulatory and Legal Outcomes: The stipulated judgment imposes a significant civil penalty and consumer redress, plus long-running injunctive obligations. State attorneys general and congressional scrutiny (as reflected in public reporting of the period) increased reputational exposure. Ongoing compliance requires demonstrable vetting, fraud operations capacity, and evidence suitable for FTC inquiry.

Control Failures and Root Causes: The FTC’s theory and internal review emphasized:

  1. Inadequate procedures to verify the legitimacy of businesses and individuals permitted to obtain consumer reports;
  2. Insufficient monitoring and investigation of anomalous query, export, and account-creation patterns;
  3. Weak linkage between fraud operations, security engineering, and executive reporting on subscriber risk;
  4. Limited end-to-end evidence trails from policy to operational logs for regulator and law enforcement requests.

These areas are the focus of our remediation plan.

Remediation and Order Compliance: The Company is implementing enhanced business verification and manual review queues for high-risk segments, analytics for suspicious bulk activity, staffing for fraud investigations, access recertification for internal roles, and annual third-party security assessments with FTC-ready reporting packages.

Approval and Endorsement Requests: Management requests the Committee’s approval of expanded fraud analytics tooling and headcount; endorsement of subscriber onboarding standards with mandatory legal review for high-risk categories; and confirmation of quarterly board metrics on time-to-investigate suspected fraudulent accounts and assessment finding closure.

Please let me know if additional information or further detail would be helpful.

Respectfully submitted,

Chief Information Security Officer

Document-type guide: Board Security Brief

Writing tips: Writing best practices — Board Security Brief

© 2026 Yi Zhang. Licensed under the MIT License.
Last updated: 2026 April 17 9:37 AM