Boss I think someone stole our customers
Flayton Electronics Case Study
Brett Flayton, CEO of Flayton Electronics, is facing the most critical crisis of his career when it is discovered that 1,500 of 10,000 transactions have been compromised through an unprotected wireless link in the real-time inventory management system. Brett has to evaluate his obligation to let customers know of the massive leak of private data, define a communication strategy that would notify customers across all states of the potential security breach, and also evaluate the extent to which the Flayton Electronics' brand has been damaged in the security breach. In addition, steps that the company can take in the future to avert such a massive loss of customer data also needs to be defined and implemented.
Assessing the Obligations to Customers vs. Keeping It Quiet
Ethically, Brett Flayton has a responsibility to tell the customers immediately of the security breach (Sanderson, 2011). How he chooses to sequence the communicating of the breach to customers has clear implications on the ongoing investigation by the security service. It will also have a major impact on the ability to completely solve the firewall situation, determine if it was negligence or if in fact the company was hacked, and whether those responsible have greater control than the senior management team at Flayton Electronics realize.
In all data breaches there are major impacts on profitability and long-term viability of a business (Gatzlaff, McCullough, 2010). The costs associated with a data breach, both directly and indirectly, can cripple a business. Worse still, not responding at all and being seen as trying to cover it up can virtually assure a business will not be trusted anymore. Brett, the CEO, must decide if this risk is worth taking or not, and whether disclosing the information to customer's would lead to the investigation being compromised. The also has to consider how pervasive the potential link is as well.
Based on these considerations and the potential that customer's...
sorts of legal protections should BUG have. Bug automatically has protection of its trade secrets, which involve confidential issues such as product plans and new designs, any sort of business proceedings, and products under development prior to patent application. Bug does not need to file anything to maintain these rights other than take all reasonable precautions to keep them secret, such as informing employees that these are trade secrets, refraining
Coffee and Life As the story goes Kaldi, a goat herder in Ethiopia in the year 850, noticed that his goats were acting a little strange. They were dashing around the fields and for some reason seemed to have a lot more energy than they normally did. This behavior continued for some time and the goat herder began to think that they had eaten something to make them act this way
In "Piaf," Pam Gems provides a view into the life of the great French singer and arguably the greatest singer of her generation -- Edith Piaf. (Fildier and Primack, 1981), the slices that the playwright provides, more than adequately trace her life. Edith was born a waif on the streets of Paris (literally under a lamp-post). Abandoned by her parents -- a drunken street singer for a mother and a
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now