To settle data violation Equifax to pay nearly $700m

Credit score agency Equifax has accepted to pay nearly $700m (£561m) as part of a contract with a US regulator following a data violation in 2017.

The Federal Trade Commission had declared the Atlanta-based firm neglected to take prudent steps to guard its network.

The records of nearly 147 million individuals were detected in the event. Nearly $300m will continue towards meeting for identification theft services and other relevant costs run up by the victims.

The amount will extend to a total of $425m if wanted to meet the customers’ damages.

Moreover, the remaining balance amount will be shared amid 50 US states and territories and a penalty settled to the Consumer Financial Protection Bureau.

It depicts the FTC’s biggest data-breach settlement to date, covering a $148m penalty Uber accepted to last year.

“Equifax lost to take necessary steps that may have limited the violation,” stated the FTC’s chairman Mr. Joe Simons.

“The settlement demands that the company pocket measures to enhance its data security moving ahead, and will guarantee that customers wrecked by this violation can take help defending themselves from identity theft and fraud.”

The agency reckoned that amid the plagiarized information, the hackers lifted:

The UK’s Information Commissioner’s Office has previously announced the company with a £500,000 penalty for neglecting to shield the personal information of nearly 15 million UK citizens while the corresponding attack.

Unreinforced regularity

Further, in March the company had been cautioned that one among its databases -(ACIS) – experienced from a significant vulnerability, the FTC responded.

The ACIS was adopted by members of the society to check their credit statements.

However, because of the space that Equifax’s IT systems had resulted, it also presented a system for hackers to access other irrelevant records saved by the company.

The FTC claimed that Equifax’s security unit requested that the unprotected systems be reinforced within 48 hours after being notified of the exposure in March 2017.

Still, the watchdog responded that the firm missed verifying that this was caused and that as an outcome multiple hackers were ready to misuse the defect and steal consumers’ details over some months.


About the author


Chris Aaron

Chris holds an MBA degree in management and a diploma in journalism. He has more than 3.5 years of experience in writing news-based content for various print media. He joined the team recently, and he brings together the substantial news-based content from the field of Technology. He loves technology, and he is busy with his gadgets all the time when he is not at work. He has a great sense of managing things, and that is why he does her work with great consistency within the time frame.

Add Comment

Click here to post a comment

Get in Touch!

For any queries or feedback, please get in touch at [email protected]. We respond to queries within 24 x 48 hours.