Monday, January 20, 2014

Flayton Electronics

Flayton Electronics learns that the security of its customer selective training has been compromised and faces tough decisions almost what to do next. How should Flayton Electronics responded to this crisis. The purpose this case study is to 1) appreciate the responsibility Flayton Electronics has to its customers to value their confidential data; 2) If you were CEO, develop the confabulation strategy you would take to notify the customers of the potential security allow out; 3) delay the extent to which Flayton Electronics brand was damaged by the Security breach and 4) Recommend procedures that Flayton Electronics should take to prevent prox security breaches. 1. Evaluate the obligation Flayton Electronics has to its customers to nourish their private data. Flayton Electronics does mother a moral and legal obligation to its customers to protect their private data. The federal official portion out outfit conduct, prohibits deceptive and unfair trade practi ces. Per the FTC Act, businesses must handle consumer information in a way that is logical with their promises to their customers such as what they say in their online privacy policy, and bend data security practices that create an un sensible risk of malign to consumer data.
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
There be other federal laws that a community may expect to be in compliance with may affect there data security. Identity theft and data security have increased, many states have passed laws or regulations to protect their citizens. In admission to complying with federal laws, businesses should look to state laws to stick sure the y atomic number 18 in compliance (Kappler 2! 007). The Federal Trade Commission Act has tried to develop a unity basic specimen for data security that strikes the balance betwixt providing concrete guidance, and allowing flexibility for different businesses needs. The standard is straightforward: Companies must maintain reasonable procedures to protect sensitive information. Whether your security practices are reasonable allow depend on the nature and...If you pauperism to get a full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.