StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Flayton Electronics - Case Study Example

Cite this document
Summary
Flayton Electronics
Advanced technology in the computer industry has come with increased insecurity of operating them. More than before, companies find themselves in a fix after their confidential data leaks to persons outside the company. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Flayton Electronics
Read Text Preview

Extract of sample "Flayton Electronics"

Download file to see previous pages

While some hackers will do it for fun and for exploration, others are malicious people who will defraud companies of substantial amounts of money. This paper examines crucial steps that a Flatyton Electronics Company can take after their data is stolen, how it can communicate with its customers, and ways to curb this in future. Flayton has an obligation to protect its customer’s private data. For the last 25 years, Flayton has build a big business from trust customers has on the company. Regular customers pay their bills using credit cards, master cards and other bankcards.

According to federal trade commission website (FTC) it is impossible to be in business and not hold personal identifying information. Such information includes credit card numbers, names and addresses, business partners, and other account numbers (“FTC,” N.d). There is an implied obligation of confidentiality to the stores and their staff. It is the duty of the management of a store to make sure that customer’s information does not leak to fraudulent third parties. Therefore, Flayton Electronics’ management had an obligation to make sure that it employs credible employees who will keep customers information confidential.

Additionally, it is an obligation of Flayton to make sure that its firewall remains working throughout to avoid hacking incidences. For this particular incidence, Flayton firewall remained down for sometime, which may have contributed to illegal access of customers personal data. All companies dealing with telephone card payments need to comply with all Payment card Industry (PCI) standards. PCI Security Council is not responsible for enforcing compliance but it is upon the company to comply (“PCI Security Standards” 2011).

Customers dealing with Flayton Electronics assume that this company is compliant with PCI standards and thus their personal data is secure. Unfortunately, Flayton Company was only 75% PCI compliant. The communication strategy adopted by the CEO of Flatyton Electronics to inform their customers of the potential security breach will determine its business in the next few years. Brett Flayton needs to be timely in informing the public. Although the company has little knowledge of what transpired with the customers credit cards, it is wise to be the first to inform the public.

Timely communication will make the company win the public’s trust. The longer Brett stays without informing the customers, the higher the risks of disclosure from another party where he will need to explain reasons for breaching its customers trust. Brett needs to explain to the security agents the reason for going public. He has the right to refuse to remain silent to enhance chances of catching the thieves as the law enforcing officers’ advice. However, the mode of communication adopted should be confidential to give a chance to the authorities to enforce laws on the victims.

Brett can hold a meeting with the major customers, explain the latest discovery it has made on the security of cards, and detail any information in their hands now. Any defrauded customers will protect themselves from further frauds as a result. Consequently, it will have to keep the customers informed on its latest discoveries. Additionally, Brett will have to convince the customers that the current measures the company has adopted will see to it that such an occurrence will not recur in future.

Information on when it is safe to start using the cards again will be necessary. Flayton Electronics’ brand was damaged by the security breach. The major core value of this company is to win the trust of customers through effective products and efficient services. Brett, the CEO

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Flayton Electronics Case Study Example | Topics and Well Written Essays - 750 words”, n.d.)
Flayton Electronics Case Study Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/finance-accounting/1455667-case-study
(Flayton Electronics Case Study Example | Topics and Well Written Essays - 750 Words)
Flayton Electronics Case Study Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/finance-accounting/1455667-case-study.
“Flayton Electronics Case Study Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/finance-accounting/1455667-case-study.
  • Cited: 2 times

CHECK THESE SAMPLES OF Flayton Electronics

Recycling E-waste An Essential Solution to a Growing Problem in Clayton County, Georgia

With computer systems pervading almost all walks of our lives, mounds of piled electronic waste are a stark reality of today.... This is because, like any other functioning systems, computer systems have a life span too, and unlike other systems, the rapid transformations that are taking place in the arena of computers ensures that the systems become obsolete faster than other machines/equipment/gadgets....
4 Pages (1000 words) Essay

The General Plans of Information Risk Management

nbsp;All Clayton electronics businesses are required to implement this Plan but may extend requirements if appropriate.... These controls apply to all information, whether in electronic, paper, portable devices, or in other forms, to ensure the Flayton electronics information related risk is managed appropriately.... such entities are likely to be property-owning vehicles with a related Flayton electronics loan which is in default and where Flayton electronics has current and unilateral enforcement rights but does not have legal ownership/control....
8 Pages (2000 words) Assignment

The Risk Management of Flayton Electronics

Flayton Electronics has recently been involved in digital purchasing by providing the service of purchasing using credit cards.... This is in accordance with the trade commission that protects the public from inferior trade practices.... The FTC act states that every organization must handle the information of the consumers… It is the responsibility of every organization to practice proper security that assures the customers that under no condition will their data be used wrongly or given to other people....
4 Pages (1000 words) Assignment

Progression of Flayton Electronics Company

The company's management employs effective tools in managing the risks of the company and carrying… Throughout the company's lifetime, Flayton Electronics has experienced two of its worst risks, which included hacking, and loss of assets through theft.... As the case postulates the company has a developed market and therefore enjoys substantial profitability....
5 Pages (1250 words) Essay

Risk Workshop and Risk Register

layton electronics has recently encountered significant customer data breach.... The coursework called "Risk Workshop and Risk Register" provides information about the importance of risk workshop and risk register for Risk management plan creating.... This paper outlines risks, ways of coping with problems, expectations, and results....
8 Pages (2000 words) Coursework

The Success of Flayton Electronics

The following paper entitled 'The Success of Flayton Electronics' presents Flayton Electronics firm that noted that the security of its customer data had been compromised and they had to make decisions on steps they should undertake to deter such invasions.... hellip; The author states that the company owners realized this after Union Century Bank who regularly examined fraudulent accounts patterns for Flayton Electronics informed them that they had shown up as a common point of purchase for an above-average number of bad cards....
5 Pages (1250 words) Case Study

Risk Workshop and Risk Register Plan Component

The Clayton electronics major security bridge was caused by these factors.... The author of this paper "Risk Workshop and Risk Register Plan Component" discusses the risks involved in terms of priority to point out the main risks faced by the company, which enables the formulation of a specific response plan to these to anticipate risks according to their magnitudes....
6 Pages (1500 words) Essay

Advantages and Disadvantages of IT Based Education

… The paper "Advantages and Disadvantages of IT Based Education" is a great example of a report on education.... E-learning is a form of learning where the engagement between the instructor and the student is via a virtual platform.... The virtual interface between the instructor and student is usually provided by web-based tools hence its name electronic learning....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us