Info 6027 Case Study
Project One
Softbank – theft of consumer data for extortion
Please read the report published by the IAPP in the journal Privacy Advisor.
Organisations do not normally volunteer any information about any sort of security breach unless they are compelled in some way. The incident described is no exception, it concerned Yahoo! BB and
Softbank BB.
Softbank of Japan offered broadband internet services across Japan through two subsidiaries – Yahoo!
BB and Softbank BB. In February 2004, the bank announced that the security of 4.5 million customer records had been compromised: data from both subsidiaries had been illegally copied and disseminated.
The leaked details included customer names, home phone numbers,
…show more content…
In this example, the threat was to reduce the value of an organisation by revealing information that should have been a well-kept secret. Not only did it cost the company a substantial sum in compensation but it also affected its reputation.
11/07/2013
Info 6027 Case Study
print this page
Japanese Court Orders Payment of 6,000 Yen to Each
Plaintiff in Connection with Yahoo! BB Personal Data Leak inShare August 1, 2006
Jay Ponazecki, Saori Horikawa
On May 19, 2006, the Osaka District Court issued a decision awarding 6,000 yen (approximately $54) to each of the plaintiffs, a small group of subscribers of the Yahoo!BB broadband Internet service, who sued for compensation for the emotional distress that they suffered in connection with the massive security breach that occurred in early 2004. In this incident, a former temporary employee at
Softbank BB gave partners a user name and password he had been using when he was working for
Softbank BB to access the company computer systems remotely, and the personal information of at least 4.6 million customers of the Yahoo!BB service was accessed and used in an effort to extort approximately 2 billion yen from Softbank.
This case is the first private lawsuit to be filed in connection with this incident. Claims for 100,000 yen
(approximately $893) for each plaintiff were made against BB Technology (formerly Softbank BB
Corp.) and Yahoo! Japan, but the claim against Yahoo! Japan was rejected,
The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.
Once we determined that the data breach did not occur on our network we worked with the
Plaintiff further asserts that the Defendant breached its duty of care to her by: (1) “failing to fix a hazardous condition within a reasonable time;” (2) “failing to adequately warn plaintiff of a hazardous condition;” and (3) “otherwise failing to exercise reasonable and due care under the circumstances.” The Plaintiff is seeking compensatory damages in the amount of two hundred thousand dollars, plus interest and costs.
Some reasons why it probably happened were; they had lack in resources to carry out the security and privacy. Another thing was that the privacy and security was subset of corporate compliance and of information technology. Another thing that she identified
Unfortunately this decision was overturned on July 3, 2007 [2007-2 U.S.T.C. ¶50,531, (Jul. 3, 2007)].
The company’s new system alerted the employees that there had been a breach, and the employees
Comes Plaintiff, Constance Wolf F/K/A Constance Wolfgram, by counsel, and for her complaint states as follows:
case for suit because they have a standing to sue based on the fact that their
Bank of America is a multinational banking institute and one of the most trusted in the banking industry. This organizations sole purpose is to protect the customer’s confidentiality and assets by ensuring that data protection is the number one priority; however any organization when holding personal information can be a victim of data breach and BoA is not exempt. One of the largest risks BoA faces today is Mobile Banking. This consumer convenience is used by fifty percent of smart phone owners (Finney, 2014). Phishing is also threat to the banking industry; this strategy by hackers allows the extraction of consumer passwords and other sensitive information. Hackers targeting banking institution employees with convincing e-mails that fool them into clicking on malicious links-which ultimately compromise their credentials or
The Law firm won the case in the end with the verdict that Pacific Gas & Energy had to compensate the plaintiffs in the amount of $333 million for damages (cornell.edu web site).
-evaluate the impact of such a breach on the security of confidential information and on the infrastructure of the website.
Confidentiality must be met in the storage, processing, and transmission of data in an organization. For example, we are going to look at a major recent data breach. On March 8, 2017, the US department of homeland security sent Equifax and notice to patch a vulnerability in versions of the Apache Struts software. On March 9, Equifax dispersed the information to applicable personnel. Although told to apply the patch, Equifax security team did not find
The executives were involved in the company’s decade long bribery scheme in Argentina. The officials engaged in bribery in order to maintain their 1 billion euro contract that they had with the government to produce national identity cards for the Argentine citizens (Posner, 2009 p 101-103). The corruption scheme lasted from 1996 to early 2007. In the early 1990, the Argentine government developed a plan that would see it give every Argentine citizen an electronic ID card. Siemens, in order to obtain the contract that was 1.26 billion us dollars, bribed some Argentine officials with an estimated 70 million U.S dollars. The government in 1998 finally signed the contract with Siemens (Posner, 2009 p 101-103).
The situation got exacerbated, for Qui Ju decided to go to file the same complaint in the district police. To her great unhappiness and to great content of the chief, the decision of the district police was the same – the chief still had to pay the compensation fee of two hundred yens. The chief relished over it, for Qui Ju underwent such lengths in
On an average of 2% a year, personal records are exposed from over 700 public breaches over all areas of the departmentalized sectors. Global cost per every lost or stolen record are on the average of over $100 containing secret and touchy information. There were 35% more security incidents detected within the last