Sunday, December 22, 2013

Boss, I Think Someone Stole Our Customer Data

Case Study 3: Boss, I think individual Stole Our Customer Data Todays business environment thrives on info. Being able to gather, store, lend oneself, and steer data is captious for any size business. The downside of storing and transmitted ain data is the incident of data theft. at that place be many ways for thieves to steel personal randomness and it is the province of the businesses that use and store client data to insure it is harbored. In enunciate for our economy to enlarge consumers need to go one-time(prenominal) money. Most consumers today use electronic payment tease to pay for purchases and they would non use these cards if they did not feel their information was secure. It is the merchants responsibility to protect the customers personal data. 1. rate the obligation Flayton Electronics has to its customers to protect their private data. In the case of Flayton Electronics it issues to me that they were not prepared for this kind of severanc e. The CIO did not appear to bedevil a device in localise to stay or grant with a data breach. The case do it very open that there was no proof that the breach was due to Flayton Electronics but the company should arrive a plan in place to deal with any situation where customer data is involved.
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
There are steps and processes companies can find to try and protect customer data. Jerry Cerasale offered the following advice at a conference in 2005 to help manage the risk of data fraud. 1. Have a written security plan. 2. Spend the resources for security. 3. pull out sure your suppliers and business partners hav e similar security plans in place. 4. Know w! hat information you really need. In this case Flayton did not seem to have a security plan in place and although it was suggested that they did spend money on securing information and growth, they may have take to spend more. It appeared that some PCI security measures were existence bypassed in order to determine other projects online, this may have been due to escape of funds or the lack...If you want to get a serious essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay