Information security management involves processing, detailing, protecting, and the management of information or data from unauthorized use, disruption, modification, inspection, perusal, disclosure, recording or destruction. Choice Point is a leading U.S. “personal broker,” using technology to amass data on almost all adults in the United States that is then sold to, in various forms, to a wide range of corporate, government, and individual clients. It is worth noting that as at 2004, Choice Point has been able to provide information to at least, 7000 federal, state, and local law-enforcement offices and at least 36 federal agencies (EPIC, 2005). With this level of customer base, data protection is one of the major challenges of Choice Point in which critics have been able to expose some of data breach due to the role it plays in IT securities. The breach had exposed thousands of individuals to potential identity theft and would no doubt generate another flurry of congressional proposals to regulate the largely unregulated personal data industry. This breach poses a huge legitimacy on the data Choice Point sells to individuals and organization. The following weaknesses which have contributed to data breach in the management of Information security in Choice Point are listed below.
Firstly, an inaccuracy in the industry’s records is one of the weaknesses in Information Security Management practices likely to contribute to the data breach in Choice Point. There is a general a