Saturday, October 12, 2013

Flayton Electronics

Flayton Electronics learns that the bail of its customer selective culture has been compromised and faces tough decisions to the highest degree what to do next. How should Flayton Electronics responded to this crisis. The purpose this case study is to 1) appreciate the pledge Flayton Electronics has to its customers to value their semiprivate data; 2) If you were CEO, develop the converse strategy you would take to notify the customers of the potential security permit out; 3) delay the extent to which Flayton Electronics brand was damaged by the Security breach and 4) Recommend procedures that Flayton Electronics should take to prevent in store(predicate) security breaches. 1. Evaluate the obligation Flayton Electronics has to its customers to encourage their private data. Flayton Electronics does pee a moral and legal obligation to its customers to protect their private data. The federal official portion out committee human action, prohibits deceptive and unfair trade practices. Per the FTC Act, businesses must handle consumer information in a way that is logical with their promises to their customers such as what they say in their online privacy policy, and bend data security practices that create an un honest risk of malign to consumer data.
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
There be other federal laws that a community may pose to be in compliance with may affect thither data security. Identity theft and data security have increased, many states have passed laws or regulations to protect their citizens. In improver to complying with federal laws, businesses should look to state laws to stick sure they argon i n compliance (Kappler 2007). The Federal T! rade Commission Act has tried to develop a unity basic commonplace for data security that strikes the balance betwixt providing concrete guidance, and allowing flexibility for different businesses needs. The standard is straightforward: Companies must maintain reasonable procedures to protect sensitive information. Whether your security practices are reasonable ordain depend on the nature and...If you pauperism to get a full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.