Corporate Directors’ and Officers’ Cybersecurity Standard of Care: The Yahoo Data Breach

  title={Corporate Directors’ and Officers’ Cybersecurity Standard of Care: The Yahoo Data Breach},
  author={Lawrence J. Trautman and Peter C. Ormerod},
On September 22, 2016 Yahoo! Inc. announced that a data breach and theft of information from over 500 million user accounts had taken place during 2014, likely including names, birthdays, telephone numbers, email addresses, hashed passwords, and, in some cases, encrypted or unencrypted security questions and answers. Yahoo further disclosed their belief that the stolen data “did not include unprotected passwords, payment card data, or bank account information. Just two months before Yahoo… 
Data Autonomy
In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policymakers and the media have, nearly in unison, decried the lack of data privacy in the modern world. In
Board liability for cyberattacks: The effects of a prior attack and implementing the AICPA’s cybersecurity framework
Abstract A significant litigation trend is the rise in lawsuits filed against boards of directors following cybersecurity incidents. We perform an experiment to examine factors we predict will
A Novel Approach for Protecting Legacy Authentication Databases in Consideration of GDPR
  • Juanita Blue, Eoghan Furey
  • Computer Science
    2018 International Symposium on Networks, Computers and Communications (ISNCC)
  • 2018
A novel solution for improving the protection of currently non-compliant legacy authentication databases stored on Apache servers is offered that applies best practice mechanisms in the form of salt, one-way encryption (hashing), and iterations to both pre-existing and newly created passwords held within the databases.
Bribery and Corruption: The COSO Framework, FCPA, and U.K. Bribery Act
Long-established major U.S. corporations such as McDonalds, Walmart, and Proctor and Gamble continue to derive a majority of revenues from foreign operations. In addition, a number of relatively new
A novel approach for secure identity authentication in legacy database systems
Information systems in the digital age have become increasingly dependent on databases to store a multitude of fundamental data. A key function of structured databases is to house authentication
How does intellectual capital align with cyber security?
Purpose The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the security requirements of intellectual
Securities Law: Overview and Contemporary Issues
This is not your grandfather’s SEC anymore. Rapid technological change has resulted in novel regulatory issues and challenges, as law and policy struggles to keep pace. The U.S. Securities and
Lessons About Franchise Risk From Yum Brands and Schlotzsky’s
This Article presents YUM! Brands, Inc. disclosure information and presents valuable insight into the risks of starting a business that shares intellectual property with another party. YUM! is the
System-Wide Security for Offline Payment Terminals
This paper designs a novel payment protocol which mitigates security threats for all the participants of VolgaPay, and achieves significant enhancements in security, operation efficiency, and cost reduction via a combination of polynomial multi-hash chain micropayment channels and blockchain grafting for off-chain channel state transition.
Why are Developers Struggling to Put GDPR into Practice when Developing Privacy-Preserving Software Systems?
Investigating the issues that hinder software developers from implementing software applications taking GDPR law on-board revealed that developers are not familiar with GDPR principles, and lack knowledge of theGDPR principles and their techniques to use when developing privacy-preserving software systems.