Welcome!
If you have an account, please:
Log in
Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

I want info first...

Fair enough. Click the thumbnail below:

Employees are allies, not the adversary
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Choicepoint

Lexis Nexis - The bottomless pit of user data
(Image used under: Creative Commons 3.0 [SRC][Mod])

LexisNexis (which acquired ChoicePoint) is the largest data-broker in the world. They create vast profiles on people and use that information to create various reports that they sell to companies of all kinds. These reports are used to make decisions about renting, insurance and more. In the past these reports have been purchased by law enforcement and criminal organizations; all to find out more information about you.

It might be a good idea to find out what's in your report, but it turns out neither simple web searching or LexisNexis themselves do much for listing out all the types of data they know about you. Well here's the list of information they had (or could have had) from my personal LexisNexis dossier:

Auto/Property Insurance Records:

LexisNexis is tied into the "Current Carrier" insurance information system used by insurance companies and agencies when deciding to issue you a policy. Think of it like a "credit report for insurance".

This includes 7 years worth of:

  • Name of insurance company
  • Your policy number
  • Type of policy (auto, boat, fire, quake, tenant, home, etc).
  • Risk type (standard, preferred, facility, etc).
  • Policy start date
  • Policy termination date and reason for termination
  • Names of each subject found on the policy

For auto, this also includes:

  • Insured vehicle (including VIN, year, and make)
  • Type of vehicle
  • Coverage amounts

For property, this also includes:

  • Address of property
  • Eviction records

Personal information that may be included

  • Date of Birth (partially omitted; ex. like 06/##/1970)
  • Sex
  • Social Security Number (Minus the last four digits)
  • Driver's license number (partially omitted)

"C.L.U.E"® insurance loss information reports (apparently reports on whether you're a high risk person or not)

"Esteem" report

This report lists circumstances relating to theft while working at a retail company (admitted or convicted).

In my case, this was of course blank so I don't know specifically what data items would have been included. Most entertaining, there's a line in the report that reads "If you believe we should have information about you in our Esteem Database, let us know".... Wow.

Background Investigation

If any company ever pays LexisNexis to perform a background check on you, LexisNexis will keep the information for future sales purposes. This may include your full date driving record and your personal credit file.

Screennow ® report

This report shows results of a national criminal records search.

Public Records

  • Professional licences held (Doctor, lawyer, pharmacist, barber, insurance agent, pilot, etc)
  • Address history
  • Deed transfer data
  • Aircraft registration
  • Loan information (where the loan was secured with collateral: i.e. a car)
  • Bankruptcies, liens, and judgements
  • Controlled substance license (in case you want to know who can legally get illegal drugs)
  • Business affiliations - When you're an officer or principal of an incorporated company
  • Significant shareholder records

Employment history

They claim they'll only have history of employers who previously asked LexisNexis to do a background check on you.

Does that make you uncomfortable?

Data brokers are just a business like any other, but as the credit report companies proved, buying and reselling data carelessly leads to disaster. Considering that these reports are FAR more detailed with a much wider variety of information, I can only imagine the consequences of allowing them to proceed as they have been.

Fortunately, you may not have to.

I was able to order my report using this webpage. I believe that doing so would be a good idea, but after that, make sure to also use their opt out procedures if you can.

It turns out that they'll only let your data go if you can prove that you're an identity theft victim or in imminent danger of bodily harm (police officer, public officials, etc). But it's easy to understand why they make it hard. After all, why would you set free one of your prize milk cows for no good reason?

In the end, I hope that strong regulation is introduced before we reach a problem like we did with identity theft.

Tags: , , ,

Share This

Have a Comment or Question?

10 Comments to “What Does Lexis Nexis Know About Me?”

» Comments RSS Feed

I’m sure your not surprised about this
Hackers Steal Michelle Obama’s ID Details From Data Broker
http://techbeat.com/2013/09/hackers-steal-michelle-obamas-id-details-data-broker/

    Data Broking is a nosey business. Minding other people’s business. They are worthless people that can’t find better jobs.
    imo

THIS COMPANY IS HORRIBLE INVASION OF PRIVACY! They have networked peoples personal information on a level that is outright assault! Please look into this company they will destroy your life if at all possible. I am not over reacting I just read this: http://cryptome.org/2013/08/proton-clearwater-lexis-nexis.htm

EVERYONE should be aware of this. Why have we been kept in the dark?

Jacqueline King says:

By using my personal health information this company allowed my car insurance company (AAÅ) to raise my monthly premimun 10% for the coming year. What’s next?!! How many other insurance carriers will use this information to raise their rates? There’s something wrong with this!!

    Peace be unto you…
    I finally have figured out where this search came from…

    Thank you…
    It must have been my new insurance company…

    This is quite insane, but we are now mostly powerless and only through persistent searching and those providing information; will we know what is going on and how to partially protect ourselves…

    Take care and be true to your heart
    With Peace and Divine Loving Consciousness Sakinah

Peace be unto you…
Thank you for your information…

I received my Driving Record and found this company searched for me…

These companies are out of control and there used to be regulations so as isn’t them and it had stopped for some time…

They must have found a Virtual Loophole…

Take care and be true to your heart
With Peace and Divine Loving Consciousness Sakinah

Rogaciano Resendiz says:

Delete my information from your files.

    I’m not certain if you’re joking, but I certainly have no information about you… other than this comment that you entered yourself. I can delete your comment I suppose…

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Data Abuse

Data brokering is the practice of collecting as much data as possible about customers or visitors into profiles. Then the data is sold, shared, or lost in data breaches to be used in targeted marketing or ID Theft.

[Click for full description]

How to Steal Identities - Why It's So Easy

Just why is it so easy to steal identities? Where is all this information coming from!?

[Click for full description]

Data Abuse

Data brokering is the practice of collecting as much data as possible about customers or visitors into profiles. Then the data is sold, shared, or lost in data breaches to be used in targeted marketing or ID Theft.

[Click for full description]

How to Steal Identities - Why It's So Easy

Just why is it so easy to steal identities? Where is all this information coming from!?

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]