SAN FRANCISCO (Reuters) – Cisco Systems (CSCO.R) Inc. has agreed to settle a whistleblower’s claim that it is wrong to be sold a video surveillance software with known vulnerabilities on the U.S. federal government, marking the first payment in a False Claims Act matter involving non-compliance with cybersecurity standards.
A FILE PHOTO of Cisco Systems logo are considered to be a part of a display at the Microsoft Ignite technology conference to be held in Chicago, Illinois, on the 4th of May to the end of 2015. REUTERS/Jim Young/File Photo
The settlement of the underlying action, the seal has been broken on a Wednesday, eight years after the first legal complaint. Cisco paid $8.6 million to resolve the case with the majority of the federal government, and 15 managers and more than $1 million will go to the whistleblower, and James Glenn.
“We are very pleased to have been resolved in 2011 in a dispute with the architecture of the video security technology and products,” said Cisco spokeswoman Robyn Blum. “There was no complaint or evidence of unauthorized access to customers’ video, which occurred as a result of the architecture.”
As a lawyer, Anne Hayes Hartman, and other subject matter experts to believe that Cisco’s payout will be the first of the false claims in the cyber-case.
A lot of the more whistleblowing claims may arise, the experts said. In the settlement, “it is clear that it provides an opportunity for active claimants, or potential claimants to go out and look for more examples such as this one,” said Georgetown University law professor Gregory Klass.
Hundreds of false claim suits have been filed each year, due in part to the built-in rewards for those of you who are pointing out the inappropriate behaviour of providers and the government. Under the act, a whistleblower must provide any non-public information, in order to win a prize.
They also have many similarities, which guarantees that the products comply with the cyber security standards set by the government, experts have warned that it claims to be able to expand in that area and to punish the vendors for the vulnerabilities that are present in a wide range of operating systems.
Cisco Video Surveillance Manager that has been used by the Los Angeles International Airport, Washington, D. C. police department, and the New York City public transportation system, as well as a range of schools, said Harris.
The case opened on Wednesday, also names the U.S. Army, Navy, air force, and Marine Corps.
As I worked for a Cisco partner in Denmark is called NetDesign, the complaint says, among other things, the work of the Danish police. In 2008, he said, Cisco, that of a hacker who got into the camera, which was a part of the system, you can also make use of the errors in the software will be for accounting control of the entire network. The suit says that an attacker might then be possible to go further than the video system.
“For the sake of the vulnerability in Cisco’s surveillance system, and a user who has or can get access to a video camera, it can be possible to gain unauthorized access to the network of a federal agency,” the suit says.
If Cisco is not to act As talking to an L. A. airport police department detectives on a federal terrorism task force.
The company acknowledges the error in 2013 when it released an updated version of the software.
“There is a culture that has a tendency to be a priority for the profit-and reputation-to do the right thing,” Glenn said in a written statement. “I’m hoping that it will come out, in my experience, the causes of others in the tech community to think about their ethical mandate.”
Reporting by Joseph Menn in San Francisco; Editing by Greg Mitchell