Skip to content

Regulatory Security Explanation (FTC v. ChoicePoint Inc.)

Use this to explain your organization’s security posture and controls to a regulator (e.g., FTC); demonstrates program effectiveness and responsiveness to a consent order.


Purpose

This explanation frames the organization’s security posture for regulator, examiner, or counsel review in light of FTC v. ChoicePoint Inc. It connects governance, technical controls, and evidence practices to the relevant legal or enforcement context so external stakeholders can assess control reasonableness and implementation maturity.

Hallucinated writing examples

Scenario: In an illustrative period following the Commission’s January 26, 2006 settlement (time), ChoicePoint Inc. — Chief Information Security Officer (role) prepares a regulatory security explanation (type) for Federal Trade Commission (Staff) (audience).

REGULATORY SECURITY EXPLANATION

To: Federal Trade Commission (Staff)
From: ChoicePoint Inc. — Chief Information Security Officer
Date: March 15, 2006
Re: Information Security Program — Stipulated Final Judgment and Order (Jan. 26, 2006); Matter No. 052-3069

Introduction: This submission describes ChoicePoint’s information security program and control environment following the data security investigation that led to the Stipulated Final Judgment and Order for civil penalties and consumer redress, accepted by the Commission on January 26, 2006 (In the Matter of ChoicePoint Inc., FTC Matter No. 052-3069). The order requires a comprehensive information security program with designated accountability, annual written assessments, consumer and FTC reporting in specified circumstances, and detailed record retention—among other obligations tied to fraudulent account activity and consumer reporting workflows. The scope of this response includes governance, risk management, safeguards for consumer data and customer onboarding, evidence of operation, and remediation. Assertions are supportable by the attached evidence index and underlying policies, assessments, and operational artifacts.

Governance: A senior officer coordinates the information security program with defined reporting to executive leadership and the board on program status, incidents, and material changes. Security policies and standards are maintained under approved change control; exceptions require documented risk acceptance and compensating controls.

Risk Management: Following the incidents underlying the order, the Company prioritized risks related to fraudulent and improper customer account creation, identity verification and credentialing of business customers, data access and segmentation between consumer reporting and other lines of business, and monitoring for misuse of ChoicePoint services. Risks are inventoried, scored, assigned owners, and tracked to closure with dated evidence.

Control Environment and Evidence Of Operation: Key controls by domain: (1) Customer and subscriber vetting. Enhanced procedures for verifying business customers and monitoring for improper access to consumer reports. Evidence: underwriting files, audit logs, exception reports, training records. (2) Access control and auditing. Role-based access, logging of queries and exports, and periodic access reviews. Evidence: access control matrices, log samples, review attestations. (3) Monitoring and fraud analytics. Processes to detect anomalous query patterns and escalate suspected fraud. Evidence: model documentation, alert tickets, analyst runbooks. (4) Incident response and law enforcement coordination. IR plans, forensic readiness, and procedures for timely consumer and regulatory notice where required. Evidence: playbooks, incident tickets, notification records (samples). (5) Assessments and attestations. Annual written security program assessments as required; tracking of findings. Evidence: assessment reports, management responses, closure evidence.

Incidents and Remediation: The Commission’s complaint addressed unauthorized acquisition of sensitive consumer information and related unfair practices in connection with fraudulent accounts. Remediation has focused on the control domains above and on compliance with the order’s program, assessment, reporting, and recordkeeping requirements. This response is submitted for staff review and is supported by the attached evidence index.

Document-type guide: Regulatory Security Explanation

Writing tips: Writing best practices — Regulatory Security Explanation

© 2026 Yi Zhang. Licensed under the MIT License.
Last updated: 2026 April 17 9:37 AM