Saturday, December 7, 2013

Flayton Electronics

Flayton Electronics learns that the security department of its customer selective study has been compromised and faces tough decisions well-nigh what to do next. How should Flayton Electronics responded to this crisis. The purpose this case study is to 1) appreciate the promise Flayton Electronics has to its customers to value their clubby data; 2) If you were CEO, develop the converse strategy you would take to notify the customers of the potential security let out; 3) delay the extent to which Flayton Electronics brand was damaged by the Security breach and 4) Recommend procedures that Flayton Electronics should take to prevent prospective security breaches. 1. Evaluate the obligation Flayton Electronics has to its customers to entertain their private data. Flayton Electronics does pay off a moral and legal obligation to its customers to protect their private data. The federal official portion out centering exercise, prohibits deceptive and unfair trade pra ctices. Per the FTC Act, businesses must handle consumer information in a way that is logical with their promises to their customers such as what they say in their online privacy policy, and bend data security practices that create an un rational risk of malign to consumer data.
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
There be other federal laws that a community may generate to be in compliance with may affect there data security. Identity theft and data security have increased, many states have passed laws or regulations to protect their citizens. In appendix to complying with federal laws, businesses should look to state laws to stick sure they be in compliance (Kappler 2007). Th! e Federal Trade Commission Act has tried to develop a unity basic quantity for data security that strikes the balance betwixt providing concrete guidance, and allowing tractableness for different businesses needs. The standard is straightforward: Companies must maintain reasonable procedures to protect sensitive information. Whether your security practices are reasonable get out depend on the nature and...If you pauperism to get a full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.