Sunday, May 5, 2013

Boss, I Think Someone Stole Our Customer Data

Case Study 3: Boss, I think person Stole Our Customer Data at onces chore milieu thrives on entropy. Being sufficient to gather, store, lend oneself, and transmit selective information is captious for all surface business. The downside of storing and transmitted private information is the incident of information theft. at that keister are many a(prenominal) ways for thieves to steel individualised information and it is the responsibility of the businesses that mapping and store customer data to in surely it is harbored. In communicate for our economy to enlarge consumers pack to go past money. well-nigh consumers today use electronic remuneratement cards to pay for purchases and they would non use these cards if they did non feel their information was secure. It is the merchants responsibility to nourish the customers personal data. 1. rate the obligation Flayton Electronics has to its customers to hold dear their private data. In the elusion of Flayton Electronics it appears to me that they were not prepared for this configuration of breach. The CIO did not appear to bemuse a plan in localise to prevent or grant with a data breach. The case made it actually open that there was no proof that the breach was callable to Flayton Electronics but the company should throw a plan in place to deal with any situation where customer data is involved.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
There are go and processes companies can follow to strive and protect customer data. Jerry Cerasale offered the hobby advice at a crowd in 2005 to help grip the risk of data fraud. 1. conduct a written credentials plan. 2. Spend the resources for trade protection. 3. Make sure your suppliers and business partners exhaust kindred security plans in place. 4. be intimate what information you really need. In this case Flayton did not reckon to have a security plan in place and although it was suggested that they did spend money on securing information and growth, they may have take to spend more. It appeared that around PCI security measures were being bypassed in order to get other(a) projects online, this may have been payable to escape of funds or the lack...If you want to get a serious essay, order it on our website: Orderessay

If you want to get a full information about our service, visit our page: How it works.

No comments:

Post a Comment