Equifax Executives Resign Without Charge

After an estimated 143 million Americans' personal information was accessed by hackers targeting Equifax Inc., its chief information officer and chief security officer are stepping down.

Equifax said recently that Chief Information Officer David Webb and Chief Security Officer Susan Mauldin had departed. They've been replaced by current international IT chief Mark Rohrwasser as interim chief information officer and Russ Ayres, a vice president in Equifax's IT operation, as interim chief security officer.

Background

Picture a factory gushing pollution into a nearby waterway. Now, imagine the factory’s executives knew a giant leak was likely but did nothing to prevent it. Finally, think of those same executives waiting weeks to warn anyone of the spill, and then bungling the clean-up efforts, after first trying to profit from them.

If all this happened, the company responsible would face criminal fines and its executives would likely end up in prison.

That's why Equifax and its leadership team can count themselves lucky they’re in the data business. Even though their incompetence and foot-dragging compromised the security of over 140 million Americans, they're beyond the reach of criminal law.

Equifax may face class action suits and a FTC investigation, but the worst that can happen to individual executives is they will have to resign (two already have), probably with a tidy payout on their way out.

Executives should Catch-Up

It doesn’t have to be this way. According to Jesse Eisinger, author of a recent book about white collar crime, there’s ample precedent for corporate executives going to jail for negligence. In an interview with Fortune, Eisinger pointed to a rule called the “responsible corporate officer” doctrine, which prosecutors can use to charge executives whose lack of oversight endangers the public welfare.

The catch, though, is the “responsible officer” rule has only been deployed in cases involving food, drugs or the environment. Examples include executives who received criminal penalties over mislabeled oxycontin shipments, and whose negligence led to salmonella-tainted eggs.

According to David Frulla, a regulatory lawyer at Kelley Drye, prosecutors can only bring responsible officer charges in respect to a specific law, such as the FDCA, that provides criminal penalties for violators. They can't simply charge Equifax executives for general incompetence.

Right now, there's no such federal law when it comes to personal data. But there probably should be given the clear public harm that occurs after major data breaches, including the Equifax hack, which has been widely described as the worst in history.

In the case of Equifax, hackers plundered not only the name and Social Security numbers of more than 100 million people but, in many cases, their phone numbers and home addresses (past and present) as well. Those who paid for Equifax’s credit monitoring service also had their credit card information stolen.

All of that data is already for sale in dark corners of the Internet, and is going to lead to a spate of scams and identity thefts that will haunt people for years. Meanwhile, the website Equifax set up to help consumers find out if they had been breached has also been found vulnerable to hackers, and critics are accusing the company of using the breach to tout paid ID Theft products. Some sort of punishment is clearly in order.

Many people in cyber-security circles caution that shaming corporate hacking victims is not a good idea because companies will be less forthcoming about data breaches. This reasoning is not convincing in the case of Equifax, however. The company’s whole business revolves around personal data, their failure to protect it should mean public disgrace.

Equifax executives behaved with brazen carelessness, storing the data in a way that made it easy for hackers to try and steal it. Eventually, the hackers broke in because Equifax failed to update a critical piece of software, even though a patch had been available for months.

It’s poor practice, these days, for consumers not to update the software on their home devices. For a giant corporation to ignore software updates is simply reckless, and even more so when that corporation’s core business involves consumer data.

Equifax executives will nonetheless face no legal consequences for this debacle (other than three officers who could face charges for selling stock before the breach was disclosed). The US right now just doesn’t have the laws to hold them accountable. Meanwhile, CEO Richard Smith will probably keep the $68.9 million he's made from selling the company's shares since 2016.

This could change, however, if US Senators Orrin Hatch and Ron Wyden are serious about getting to the bottom of the Equinox breach. Their proposed investigation should seek to identify who at Equifax was responsible for the breach, and also propose ways for this not to happen again.

According to Sam Buell, who teaches corporate criminal law at Duke University School of Law, scandals like the Equifax affair often trigger public conversations that lead to new regulatory oversight.

"There's a good argument this is one of those industries where there’s a need for a higher standard or the pain of criminal punishment. When you’re in a business that has the potential to do this scale of harm, you have a duty of care for your product that could be covered by criminal law."

Consumers would no doubt agree. The time is rapidly coming when executives should be held to the same standard for protecting personal data as they do for the environment or the food supply.

Fortune:      The Street:

You MIght Also Read:

Disastrous Equifax Breach Exposes 44% Of The US Population:

Threat Lessons from Sony and Anthem:

 

« Transforming Your Database
Preventing The Hacked AI Apocalypse »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Increase Your Skills (IYS)

Increase Your Skills (IYS)

Armed and ready: raise awareness of cyberattacks in your company with the Full-Service Awareness Platform from IYS – fast and effective. We help you develop a robust, sustainable security strategy.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.