Wednesday, May 1, 2019
Flayton Electronics Case Study Example | Topics and Well Written Essays - 750 words
Flayton Electronics - Case Study ExampleWhile some hackers forget do it for fun and for exploration, differents are malicious people who will defraud companies of substantial amounts of money. This paper examines all-important(a) steps that a Flatyton Electronics Company scum bag take after their data is stolen, how it can communicate with its customers, and slipway to curb this in future.Flayton has an obligation to protect its customers private data. For the last 25 years, Flayton has variant a big billet from give customers has on the ships connection. Regular customers pay their bills using credit cards, higher-up cards and other bankcards. According to federal trade commission website (FTC) it is impossible to be in business and not hold personal identifying information. Such information includes credit card numbers, names and addresses, business partners, and other account numbers (FTC, N.d). There is an implied obligation of confidentiality to the stores and their s taff. It is the duty of the management of a store to fixate sealed that customers information does not leak to fraudulent third parties. Therefore, Flayton Electronics management had an obligation to make sure that it employs credible employees who will keep customers information confidential.Additionally, it is an obligation of Flayton to make sure that its firewall remains functional throughout to avoid hacking incidences. For this particular incidence, Flayton firewall remained down for sometime, which may have contributed to illegal access of customers personal data. whole companies dealing with telephone card payments need to comply with all Payment card Industry (PCI) standards. PCI warranter Council is not responsible for enforcing compliance but it is upon the company to comply (PCI Security Standards 2011). Customers dealing with Flayton Electronics assume that this company is compliant with PCI standards and thus their personal data is secure. Unfortunately, Flayton C ompany was only 75% PCI compliant. The conference strategy espouse by the CEO of Flatyton Electronics to inform their customers of the potential security department breach will determine its business in the next few years. Brett Flayton needs to be timely in informing the public. Although the company has little intimacy of what transpired with the customers credit cards, it is wise to be the first to inform the public. Timely communication will make the company win the publics trust. The longer Brett stays without informing the customers, the higher the risks of disclosure from another party where he will need to explain reasons for breaching its customers trust. Brett needs to explain to the security agents the reason for going public. He has the right to refuse to remain silent to enhance chances of catching the thieves as the law enforcing officers advice. However, the mode of communication adopted should be confidential to give a chance to the authorities to enforce laws on the victims. Brett can hold a meeting with the major customers, explain the latest discovery it has made on the security of cards, and detail any information in their hands now. Any defrauded customers will protect themselves from further frauds as a result. Consequently, it will have to keep the customers informed on its latest discoveries. Additionally, Brett will have to influence the customers that the current measures the company has adopted will see to it that such an occurrence will not ingeminate in future. Information on when it is safe to start using the cards again will be necessary. Flayton Electronics brand was damaged by the security breach. The major core value of this company is to win the trust of customers through effective products and efficient services. Brett, the CEO
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.