Monday, January 6, 2014

Flayton Electronics

Flayton Electronics learns that the pledge of its customer selective knowledge has been compromised and faces tough decisions about what to do next. How should Flayton Electronics responded to this crisis. The purpose this case study is to 1) appreciate the certificate of indebtedness Flayton Electronics has to its customers to value their tete-a-tete data; 2) If you were CEO, develop the colloquy strategy you would take to notify the customers of the potential security permit out; 3) delay the extent to which Flayton Electronics brand was damaged by the Security breach and 4) Recommend procedures that Flayton Electronics should take to prevent early security breaches. 1. Evaluate the obligation Flayton Electronics has to its customers to cling to their private data. Flayton Electronics does pass a moral and legal obligation to its customers to protect their private data. The federal official portion out accusation roleplay, prohibits deceptive and unfair t rade practices. Per the FTC Act, businesses must handle consumer information in a way that is logical with their promises to their customers such as what they say in their online privacy policy, and bend data security practices that create an un sensible risk of malign to consumer data.
bestessaycheap.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!
There be other federal laws that a community may gravel to be in compliance with may affect in that respect data security. Identity theft and data security have increased, many states have passed laws or regulations to protect their citizens. In add-on to complying with federal laws, businesses should look to state laws t o stick sure they argon in compliance (Kapp! ler 2007). The Federal Trade Commission Act has tried to develop a unity basic meter for data security that strikes the balance betwixt providing concrete guidance, and allowing flexibleness for different businesses needs. The standard is straightforward: Companies must maintain reasonable procedures to protect sensitive information. Whether your security practices are reasonable depart depend on the nature and...If you pauperism to get a full essay, order it on our website: BestEssayCheap.com

If you want to get a full essay, visit our page: cheap essay

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.