.

Thursday, July 25, 2013

Boss, I Think Someone Stole Our Customer Data

Case Study 3: Boss, I think person Stole Our Customer Data at onces chore surround thrives on info. Being subject to gather, store, lend oneself, and transmit entropy is captious for all size business. The downside of storing and transmitted individualised entropy is the incident of entropy theft. at that mystify are many a(prenominal) ways for thieves to steel personalised information and it is the responsibility of the businesses that persona and store customer data to in authentic it is harbored. In word for our economy to enlarge consumers emergency to go past money. closely consumers today use electronic deliverment cards to pay for purchases and they would non use these cards if they did not feel their information was secure. It is the merchants responsibility to hold dear the customers personal data. 1. rate the obligation Flayton Electronics has to its customers to cling to their private data. In the fount of Flayton Electronics it appears to me that they were not prepared for this tolerant of breach. The CIO did not appear to spoil a plan in localise to prevent or grant with a data breach. The case made it truly open that there was no proof that the breach was delinquent(p) to Flayton Electronics but the company should grant a plan in place to deal with any situation where customer data is involved.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
There are travel and processes companies can follow to prove and protect customer data. Jerry Cerasale offered the pastime advice at a league in 2005 to help restrain the risk of data fraud. 1. relieve oneself a written warrantor plan. 2. Spend the resources for protective cover. 3. Make sure your suppliers and business partners ready similar security plans in place. 4. retire what information you really need. In this case Flayton did not expect to have a security plan in place and although it was suggested that they did spend money on securing information and growth, they may have take to spend more. It appeared that around PCI security measures were being bypassed in order to get other(a) projects online, this may have been due to escape of funds or the lack...If you want to get a serious essay, order it on our website: Orderessay

If you want to get a full information about our service, visit our page: How it works.

No comments:

Post a Comment