Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Database

    TJX Encryption, Data Retention Details Trickle Out

    Written by

    Evan Schuman
    Published September 26, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      TJX is still retaining customer data for far too long—months—and for the wrong reasons, although its current wireless efforts appear adequate, according to a report issued Sept. 25 by the Office of the Privacy Commissioner of Canada and the office of the Information and Privacy Commissioner of Alberta.

      The report shed light on a few details of the TJX situation, but it didnt answer the critical questions of how it happened. Reports have focused on a wireless hack and on breaking into a job application kiosk.

      The Canadian report made a cursory reference to the wireless effort, but couched it by saying that “TJX informed us that the intruder may have gained entry into the system outside of two stores in Miami, Florida.” If taken literally, that says little, other than wireless access is still one of the main theories of TJX. The report mentioned nothing about any other theories.

      The only new detail is the reference to Miami. Prior reports—beginning with a May report in the Wall Street Journal—had fairly consistently placed the point of wireless penetration in St. Paul, Minn. But with no specifics as to the method used, those details are relatively meaningless.

      One interesting observation in the report is an unintended benefit to IT procrastination. “TJX states that, in Canada, personal information provided in connection with unreceipted returns at [TJX subsidiary Winners Merchant International] stores could not have been accessed in 2005 because WMI stores only began entering this personal information electronically in November 2005,” the report said. “Prior to this date, the names, addresses and telephone numbers of customers making unreceipted merchandise returns at WMI stores were retained in paper form.”

      More enlightening were sections that discussed TJXs wireless and encryption efforts.

      On that wireless front, the report confirmed that TJX had been using WEP (Wired Equivalent Privacy) encryption protocol during almost all of the period of the breaches, despite having made a decision in September 2005 to upgrade to the much stronger WPA (Wi-Fi Protected Access) encryption protocols.

      But the report has that decision being made and fully deployed much too late. Although it had decided to make the move from WEP to WPA in September 2005, “experts have questioned the use of WEP as a secure protocol” since 2003. “The Institute of Electrical and Electronic Engineers is the organization that originally developed the WEP standard. In June 2003, the IEEE itself recommended that the wireless encryption standard move from WEP to WPA.”

      Even after deciding in September 2005 to move to WPA, the report said, it didnt complete the rollout until mid-January 2007, which was the exact point when TJX announced to the world the largest retail data breach ever.

      The Canadian privacy officials were not pleased with TJXs encryption efforts. “There were flaws. TJX relied on a weak encryption protocol and failed to convert to a stronger encryption standard within a reasonable period of time,” the report said, adding, “While TJX took the steps to implement a higher level of encryption, there is no indication that it segregated its data so that cardholder data could be held on a secure server while it undertook its conversion to WPA.”

      Data retention was another key concern cited in the report. On the plus side, TJX did make “an immediate decision to limit the retention period for data on its Retail Transaction Switch servers” and it suspended “the collection of drivers license and other personal information in return-of-goods transactions,” which had been mandatory at the time of the breach, the report said.

      But, “TJX also states that it needs to retain credit-card and debit-card transactional data elsewhere in the organization for 18 months. This will allow time for customers to challenge charges, for audit purposes, for charge backs and for meeting its contractual obligations with the card issuers. TJX also responded to us that it retained drivers license information for troubleshooting purposes.”

      The report praised a TJX method to make the drivers license less useful to cyber thieves.

      “The new process makes use of what is referred to as a cryptographic hashing function in which identification numbers are immediately converted into a new number referred to as a hash value thereby rendering actual drivers license numbers unreadable to any WMI or TJX employee,” the report said. “The hash value would accomplish the goal of establishing a unique numeric identifier. TJXs return management system could operate in the same way as it presently does since the same identification number could be repeated or transformed into the same hash value every time, but the drivers license number would no longer exist in TJXs system and could not be reproduced.”

      TJX is also using the hash approach on existing identification number in databases, “effectively removing them from the TJX/WMI system permanently. Until the existing numbers have been hashed, TJX has committed to encrypting them.”

      But TJXs intent to use the data for 18 months and for troubleshooting drew a less supportive response. “TJX has not presented a persuasive argument regarding the retention of this information for longer than 18 months, nor any rationale as to why all the information needed to be retained in an identifiable format for such a lengthy time for this purpose,” the report said. “Further, troubleshooting is not directly related to the purpose for which the information was collected in the first place.”

      Canadian privacy rules “specifically requires that personal information be retained only as long as necessary for the fulfillment of the purposes for which the information was collected—not for a new purpose arising after the fact.”

      Retail Center Editor Evan Schuman can be reached at [email protected].

      Check out eWEEK.coms for the latest news, views and analysis on technologys impact on retail.

      Evan Schuman
      Evan Schuman
      Evan Schuman is the editor of CIOInsight.com's Retail industry center. He has covered retail technology issues since 1988 for Ziff-Davis, CMP Media, IDG, Penton, Lebhar-Friedman, VNU, BusinessWeek, Business 2.0 and United Press International, among others.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×