.

Friday, June 7, 2013

Boss, I Think Someone Stole Our Customer Data

Case Study 3: Boss, I think person Stole Our Customer Data instantlys chore environs thrives on information. Being equal to gather, store, lend oneself, and transmit selective information is captious for every sizing business. The downside of storing and transmitted person-to-person information is the incident of information theft. at that focalise are many an(prenominal) ways for thieves to steel in the flesh(predicate) information and it is the responsibility of the businesses that intake and store customer data to in indisputable it is harbored. In advertise for our economy to enlarge consumers choose to go past money. well-nigh consumers today use electronic repairment cards to pay for purchases and they would non use these cards if they did not feel their information was secure. It is the merchants responsibility to encourage the customers personal data. 1. rate the obligation Flayton Electronics has to its customers to hold dear their private data. In the good example of Flayton Electronics it appears to me that they were not prepared for this conformation of breach. The CIO did not appear to throw a plan in localise to prevent or grant with a data breach. The case made it in truth open that there was no proof that the breach was imputable to Flayton Electronics but the company should wipe out a plan in place to deal with any situation where customer data is involved.
Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
There are move and processes companies can follow to extend and protect customer data. Jerry Cerasale offered the avocation advice at a convention in 2005 to help set the risk of data fraud. 1. rush a written shelter plan. 2. Spend the resources for tribute. 3. Make sure your suppliers and business partners rush interchangeable security plans in place. 4. bonk what information you really need. In this case Flayton did not see to have a security plan in place and although it was suggested that they did spend money on securing information and growth, they may have take to spend more. It appeared that near PCI security measures were being bypassed in order to get former(a) projects online, this may have been receivable to escape of funds or the lack...If you want to get a serious essay, order it on our website: Ordercustompaper.com

If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment