Get Instant Help From 5000+ Experts For

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote

Advantages of Information Privacy

Discuss about the Credentials of Customers Crucial Factor.

The privacy of data and information is legal right for individual in era of digital communication. The privacy of information has many advantages and it is usually related with the security if personal data while it is saved in computer systems.  The secured information is preferred in almost all the fields such as the medical records of patients, the financial records of companies, the bank details of customers, the examination results of students and many more (smith, 2016). The privacy of information is also called as the privacy of data (HOLLISTER, 2018). In today’s world of big data, where in every second the huge amount of digital data is generating continuously, the privacy of this information is the most crucial factor for everybody. It is not possible to save all data in personal devices as the memory is limited for all the devices, so the concept of cloud is most popular nowadays. In cloud storage, the data is saved on remote locations thus the security of this data is on highest priority. In this report we are going to analyse the data breach which was happened in the year 2017 in J P Morgan. As per the report of financial regulator the JP Morgan chase & co. have to pay around $2.8 million amount to its customers. The privacy violation was happened in JP Morgan in year 2017, due to which millions of customers were affected.

The privacy of information can be ensured in many ways such as by using encryption, data masking and implementing authorization.

Privacy violations are very common in present scenario. According to a survey done by CSO in 2018, some of the biggest data breaches of present century are (Armerding, 2018):




During September 2016, around 3 billion user accounts of yahoo were attacked. According to Yahoo the main victims of this privacy violation were the passwords. In October 2017 it was stated that the security question and answers were also affected and it was considered as the biggest data breach in the history (GREEN, 2018).

Adult Friend Finder

It was happened during October-2016 and around 412.2 million accounts were affected due to this data breach. Six databases were hacked by hackers. Due to this around 20 years of user’s data which included addresses, name, passwords and emails were impacted (Weinstein, 2016). The main cause of this data breach was the weak encryption algorithm used in database.


In May 2014, this cyber-attack was happened due to which near about 145 million users were affected. The private data of users were exposed because of this attack. It was basically a network attack, in which hackers entered in the network using personal credentials of some employees of organization and they accessed the network for 229 days.


It is the biggest credit bureau in US. On September 7, 2017 due to one application vulnerability, the security of private data of around 147.9 million customers was compromised.

Heartland payment systems

In this privacy violation incidence, around 134 million credit cards of users were exposed due to SQL injection.

Target stores

Due to this data breach the debit and credit card details of 110 million users were affected. The breach was started just before the thanksgiving note. In this breach, hackers got the accessibility rights through a third party software named HVAC at the POS and collected the personal details of plastic money.

TJX Companies Inc.

In this data breach around 94 million credit cards were affected. Hackers took the advantage of weak encryption algorithm and captured the details of credit card during wireless transmission.


In 2016, around 57 million of users and drivers personal information was affected in this data breach. In personal information there were no clues of credit and debit card information only the names, addresses, contact numbers and email ID of users were affected.

JP Morgan Chase

This is one of the largest bank in the world. Due to data breach around 76 million households were affected and around 7 million of small businesses lost their personal information.

US Office personnel management

In this data breach, hackers of China were entered in the OPM system but could not be detected till 2014 March. The information of users were exposed and later misuse this data.

It is clear from above table that almost all the companies are affected from the privacy violation in recent years. These incidences of data breach were sufficient for the financial down gradation of these companies (Solove, 2014). As per the study around 48 billion dollars were lost in US due to the data breach. As per the report published by Forrester, some of the top 6 common factors for the privacy violations are (Morgan, 2018):

  • Misuse by Hacker: The most common cause of any type of privacy violation is deliberately access of the personal data or information of users. It can be resolved easily if the data can be restricted and shared among the users on the basis of their role and credentials. The rule based accessibility algorithms can be planned to resolve this type of data breach(Carolyn Strobel, 2014).
  • Loss of assets: Due to unauthorized remote access of data and weak encryption algorithm can easily erase the data from devices.
  • Phishing: Phishing is a vulnerability, in which the user’s accounts can be hacked by sending them scams through mailing system. To overcome the chances of phishing, strong antivirus applications or firewall implementation is preferred way. Firewall can filters the unwanted or suspicious data packets.
  • Malicious users: These users can be of inside or outside of the organization. These users can access the data of authorized users. To control this data breach the accessibility algorithms can be made strongly.
  • Third party software: Mostly these types of software are enough to control the security of databases and servers. To ensure the level of privacy it is recommended to design a clear set of policies. The agreement duly signed by both the parties will ensure the privacy of company.
  • Loss of assets: To control the privacy of data, the accessibility rules must be designed in data breach checklist. By keeping focus on above points the chances of data breach can be minimized.

JP Morgan is one of the largest bank in the history of US. It is one of the main victim of privacy violation in US (CROWE, 2016). At the time of data breach in this bank the US attorney Ms. Preet Bharara claimed about three people for the biggest theft of data and information of this financial organization. It is one of the main bank in US having assets of $2.5 trillion. Suddenly news arises that nearly 76 million of customers and around 7 million small businesses were affected due to the privacy issues. In this incidence the main effects were seen are (Lin, 2017):

  • The contact information or personal data of the customers was mainly impacted. It included the name, contact information, address and email contacts of the customers.
  • The information of debit and credit card was also accessed by the third party applications.
  • The hackers entered in the network of bank through unleashed applications and controlled the network, the infrastructure of bank and accessed huge amount of information.

Data Breach in JP Morgan

Every organization wants the security of data and to ensure this, the companies are advised to prepare a checklist for the security parameters. As per the experts the following steps must be taken by CIO’s and CISOs:

Notify the data breach immediately: Whatever is done wrong in the organization, must be reported on urgent basis. Experts says that the solution of privacy violation must be taken as soon as possible. As per the RKON technologies, when the database server is recognized for the data breach, the disk image of this server must be prepared in order to preserve the state of the server. These images must be read only and password authenticated (Roman, 2016).

Prepare a task force: A team of technical experts must be prepared immediately so that the breach can be reported to the legal authorities (Brandon, 2017).

Do proper testing of security issues: It is recommended that before disclosing the breach towards the outside of the organization, the data breach must be completely resolved.

Take support from local authorities: To communicate about the privacy violation with internal and public departments, a clear and concise report must be prepared along with the solution.

Immediate resolve the problem: It is obvious that the company must mention all the implications included in the data breach and about the expected related issues of the organization. The remedial process of data breach is recommended and full-fledged precautions are recommended.


The violation of privacy cannot be completely prevented through any mode of communication, as there are multiple modes of communication present. But if the companies follow some standard guidelines, it can be controlled to some extent. Companies are also recommended to generate an impressive plan to handle the security issues. It is concluded that the causes and solutions will come together. After taking the remedial steps in data breach, continuous auditing and analysis of security breaches must be done to reduce the chances of privacy violation.


Armerding, T. (2018, January 26). the-biggest-data-breaches-of-the-21st-century.html. Retrieved from

Brandon, J. (2017, October 7). 5-steps-to-take-when-a-data-breach-hits.html. Retrieved from

Carolyn Strobel, D. (2014, June 26). top-6-causes-of-data-breach. Retrieved from

CROWE, P. (2016, November 10). 49739816.cms. Retrieved from

GREEN, D. (2018, April 3). If-you-shopped-at-these-7-stores-in-the-last-year-your-data-might-have-been-stolen. Retrieved from

HOLLISTER, S. (2018, April 13). yahoo-aol-oath-privacy-policy-verizon-emails-messages. Retrieved from

Lin, D. (2017, November 10). JPMorgan-is-the-chief-victim-in-the-largest-theft-of-customer-data-from-a-financial-institution-in-US-history. Retrieved from

Morgan, L. (2018, May 20). list-of-data-breaches-and-cyber-attacks-in-march-2018. Retrieved from

Roman, J. (2016, September 15). jpmorgan-a-7319. Retrieved from

smith, R. (2016, February 12). information-privacy. Retrieved from

Solove, D. S. (2014, July 2). privacy-data-security-violations-whats-harm. Retrieved from

Weinstein, M. (2016, December 18). 13-ways-your-privacy-violated-9479084. Retrieved from

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Privacy Of Information: Data Breaches In JP Morgan & Other Companies. Retrieved from

"Privacy Of Information: Data Breaches In JP Morgan & Other Companies." My Assignment Help, 2019,

My Assignment Help (2019) Privacy Of Information: Data Breaches In JP Morgan & Other Companies [Online]. Available from:
[Accessed 24 May 2024].

My Assignment Help. 'Privacy Of Information: Data Breaches In JP Morgan & Other Companies' (My Assignment Help, 2019) <> accessed 24 May 2024.

My Assignment Help. Privacy Of Information: Data Breaches In JP Morgan & Other Companies [Internet]. My Assignment Help. 2019 [cited 24 May 2024]. Available from:

Get instant help from 5000+ experts for

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
sales chat
sales chat