...Boss, I Think Someone Stole Our Customer Data- Assignment # 5 Name Withheld Strayer University Professor Name Withheld Project Risk Management (BUS 519) December 11th 2011 1. Of the four (4) commentaries that follow the case, select the one (1) that you believe to be the best solution to reporting the plan to address the problem and state why. Of the four commentaries, the one that I believe to be the best solution to address the issues faced by Flayton Electronics is that of James E. Lee. I particularly liked his recommendations because it addressed all the key areas that are necessary in a risk response plan. Lee’s recommendations are typical of contingency planning; according to Heldman (2005), contingency planning is a form of acceptance because if the risk occurs, you are willing to accept the consequences and devise a plan to deal with those consequences. He is in favor of acting with urgency by addressing the affected parties, as the longer it takes for the company to do this will make then appear less credible, Lee also recommended that once the risk is discovered, timing is an important element in implementing a risk response plan to minimize damages. This should be in the form of a prompt public disclosure once adequate information has been gathered; brand restoration should be initiated through public statements to help improve the company’s image; toll-free hotlines should be set up to address customers concerns; loyalty incentives in the...
Words: 1683 - Pages: 7
...Case Study 3: Boss, I Think Someone Stole Our Customer Data Evaluate the obligation Flayton Electronics has to its customers to protect their private data. Develop the communication strategy you would take to notify the customers of the potential security breach. Recommend procedures that Flayton Electronics should take to prevent future security breaches http://hbr.org/product/boss-i-think-someone-stole-our-customer-data-harva/an/R0709A-PDF-ENG Flayton Electronics is showing up as a common point of purchase for a large number of fraudulent credit card transactions. It's not clear how responsible the company and its less than airtight systems are for the apparent data breach. Law enforcement wants Flayton to stay mute for now, but customers have come to respect this firm for its straight talk and square deals. A hard-earned reputation is at stake, and the path to preserving it is difficult to see. Four experts comment on this fictional case study in R0709A and R0709Z. James E. Lee, of ChoicePoint, offers lessons from his firm's experience with a large-scale fraud scheme. He advises early and frank external and internal communications, elimination of security weaknesses, and development of a brand-restoration strategy. Bill Boni, of Motorola, stresses prevention: comprehensive risk management for data, full compliance with payment card industry standards, and putting digital experts on staff. For the inadequately prepared Flayton, he suggests consulting an established...
Words: 4240 - Pages: 17
...RUNNING HEAD: BOSS, I THINK SOMEONE STOLE OUR CUSTOMER DATA Boss, I Think Someone Stole Our Customer Data Teresa Ellis ACC.571 Forensic Accounting Strayer University Nauri D. Ahmed November 12, 2012 Boss, I Think Someone Stole Our Customer Data When there are potential data breaches, everything gets chaotic. Management and other key team members are scurrying around to find out what happened and why. They questi8on each other as to what caused the data breach, how do we fix it, who is responsible, and do we notify our customers, investors, and shareholders. At Flayton’s, there has been a possible data breach. Their main concern tramples on what is their obligation to their customers to protect their private data. Next, they want to know how to notify their customers of the potential security breach. Then, they want to know if Flayton Electronics’ brand has been damaged by the security breach. Finally, Flayton needs to put in place procedures to prevent future security breaches. Evaluate the obligation Flayton Electronics has to its customers to protect their private data. Flayton Electronics must do everything in their power to protect their customers’ private data. Flayton had implemented a PCI system; however, the system was only running at 75% when it should have been at 100%. There was also a problem with their firewall. Sergei stated that they had to keep turning the system on and off because of glitches. The American Heritage Dictionary (2012...
Words: 1706 - Pages: 7
...dañado (reputación, finanzas, operaciones, etc) por esta fuga. • Recomiende 2 procedimientos para que Flayton Electronics prevenga fugas futuras. • Su trabajo debe incluir portada y referencias (no se cuentan como parte de la extensión). Fecha de entrega: 15 de Agosto 2013 11:55pm Via correo electrónico formato PDF. Miguel Laurent 719 col. Del Valle CP 03100 Benito Juárez, México DF tels. 5604 2178 5688 3512 www.univdep.edu.mx www.hbrreprints.org HBR CASE STUDY AND COMMENTARY How should the Flayton Electronics team respond to the crisis? Four commentators offer expert advice. Boss, I Think Someone Stole Our Customer Data by Eric McNulty • Reprint R0709A Flayton Electronics learns that the security of its customer data has been compromised—and faces tough decisions about what to do next. HBR CASE STUDY Boss, I Think Someone Stole Our Customer Data by Eric McNulty COPYRIGHT © 2007 HARVARD BUSINESS SCHOOL PUBLISHING CORPORATION. ALL RIGHTS RESERVED. Brett Flayton, CEO of Flayton Electronics, stared intently at a troubling memo on his desk from the firm’s head of security. Running his hands through his full head of barely graying hair, he looked not unlike his father did when he established the first Flayton Cameras and Stereos 25 years ago. The security situation had come to Brett’s attention just before nine o’clock...
Words: 6346 - Pages: 26
...Case Study 3: Boss, I Think Someone Stole Our Customer Data ACC 571 Forensic Accounting 15-May-12 Evaluate the obligation Flayton Electronics has to its customers to protect their private data. All client data needs to be kept secure all of the time. Doing this helps to protect company operations from being slowing down because the firm looks bad in the eyes of the public. Flayton Electronic has an obligation to protect all client information so that their needs are met without and drama or dilemmas. The firm does not want to have an instance on their hands where personal client data or company records were compromised. Flayton Electronic needs to protect the complete client base from any type of impending exposure. Adequate protection should be offered with the credit card despite the fact that the card is also covered by Flayton Electronics individual banks. The action of shielding the confidential data of clients would reclaim the representation of the company. Securing date can be protection of the data is made possible through use of refined examination tools that would identify any abnormal patterns before they had the chance to surface. In the beginning stages when the business was entering into an agreement with well-regarded clients, the customer data was to be confined from other outside entities. It is the duty of Flayton Electronics to ensure the client records are kept safe. An envisioned security breach...
Words: 1012 - Pages: 5
...Boss, I Think Someone Stole Our Customer Data 1. Of the four (4) commentaries that follow the case, select the one (1) that you believe to be the best solution to reporting the plan to address the problem and state why Of the four commentaries that follow the case, the one that I believe to be the best solution to address the issues faced by Flayton Electronics is that of James E. Lee. I particularly liked his recommendations because it addressed all the key areas that are necessary in a risk response plan. Lee’s recommendations are typical of contingency planning; according to Heldman (2005), contingency planning is a form of acceptance because if the risk occurs, you are willing to accept the consequences and devise a plan to deal with those consequences. He is in favor of acting with urgency by addressing the affected parties, as the longer it takes for the company to do this will make then appear less credible. Lee also recommended that once the risk is discovered, timing is an important element in implementing a risk response plan to minimize damages. This should be in the form of a prompt public disclosure once adequate information has been gathered; brand restoration should be initiated through public statements to help improve the company’s image; toll-free hotlines should be set up to address customers concerns; loyalty incentives in the form of discounts and sales should be given to compensate those customers that still stay loyal to Flayton’s; releasing a formal...
Words: 1650 - Pages: 7
...sites? Expected Privacy While Using Digital Media - Privacy Breaches - Ethical use of personal identifiable information Conclusion References Digital media has greatly enhance the way that we share things in both our personal and business lives. It has enabled us to share things with our communities so fast and so easily that we to forget about the ramifications that could come of this technology if we don’t fully understand its power. As more and more people and organizations turn to digital media the implications of our actions begin to present themselves. There are various ethical concerns that need to be addressed as we consume digital media in our everyday lives. These challenges are widespread and can be applied to virtually every corner and medium of the internet. In this research paper we will address just a few areas of concern listed below: • Should teachers be allowed to communicate with students via social media? • Should a teachers personal posts affect their professional life? • What amount of privacy should we expect and who is responsible to maintain that privacy? • Just because you can say it does it mean you should? These questions touch on the huge subject of ethical behavior as it relates to our consumption of digital media. Sure there are many more areas that can be addressed but, we will attempt to understand the ethical environment that these questions present and attempt to determine if these areas can give an overall understanding...
Words: 2849 - Pages: 12
...or someone a lot. | My partner's been away for a fortnight- I am ACHING FOR her. | Act on | To take action because of something like information received. | The police were ACTING ON a tip from an informer and caught the gang red-handed. | Act on | Affect. | The medicine only ACTS ON infected tissue. | Act out | Perform something with actions and gestures.. | They ACTED OUT the story on stage. | Act out | Express an emotion in your behaviour. | Their anger is ACTED OUT in their antisocial behaviour. | Act up | Behave badly or strangely. | My computer's ACTING UP; I think I might have a virus. | Act upon | To take action because of something like information received. | The police were ACTING UPON a tip-off. | Act upon | Affect. | The enzyme ACTS UPON certain proteins. | Add on | Include in a calculation. | You have to ADD the VAT ON to the price they give. | Add up | To make a mathematical total. | We ADDED UP the bill to check it was correct. | Add up | Be a satisfactory explanantion for something. | She explained why the work wasn't ready, but her story doesn't ADD UP. | Add up to | Have a certain result. | Trains delays are getting worse and with the high fares, it all ADDS UP TO misery for the commuters. | Add up to | Come to a certain amount or figure. | The total costs ADD UP TO several million euros. | Agree with | Affect- usually used in the negative to show that something has had a negative effect, especially is it makes you feel bad. | I feel...
Words: 58300 - Pages: 234
...SPEAK ENGLISH LIKE AN AMERICAN YOU ALREADY SPEAK ENGLISH... NOW SPEAK IT EVEN BETTER! DELUXE BOOK & CD SET A M Y GILLETT Copyright © 2004 by Language Success Press All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means including information storage and retrieval systems without permission in writing from the publisher. First Edition ISBN 0-9725300-3-7 Library of Congress Control Number: 2004102958 Visit our website: www.languagesuccesspress.com Bulk discounts are available. For information, please contact: Language Success Press 2232 S. Main Street #345 Ann Arbor, MI 48103 USA E-mail: sales@languagesuccesspress.com Fax: (303) 484-2004 (USA) Printed in the United States of America The author is very grateful to the following people for their collaboration and advice while preparing this book and CD set: Vijay Banta, Jacqueline Gillett, Thomas Gillett, Marcy Carreras, John McDermott, Natasha McDermott, Cat McGrath, Patrick O'Connell. ABOUT THE AUTHOR Amy Gillett has taught English as a Second Language (ESL) in Stamford, Connecticut and in Prague, Czech Republic. Her essays and humor writing have appeared in many publications, including MAD Magazine, the San Francisco Chronicle, and Family Circle. Amy majored in Slavic Languages and Literature at Stanford University and holds a Master's degree from Stanford in Russian and Eastern European Studies. Amy has studied and worked abroad in many countries...
Words: 27413 - Pages: 110
...Chapter 1 Developing Self-Awareness True/False Questions Key Dimensions of Self-Awareness 1. Self-awareness is at the foundation of personal life management skills. True (page 58, easy, recall) If false, why? The Enigma of Self-Awareness 2. Empirical evidence indicates that people who are more self-aware are healthier, perform better in leadership roles, and are more productive at work. True (page 59, easy, recall) If false, why? 3. The concept of sensitive line refers to the point at which individuals welcome information about themselves from their co-workers. False (page 59, moderate, recall) If false, why? The concept of sensitive line refers to the point at which people become defensive or protective of information about themselves 4. Marvin consistently finds fault with Alicia’s competence as a manager. Because Alicia has been told she is doing a good job and therefore responds in a threat rigid way. Thus, her most likely response will be to defend herself in light of Marvin’s accusations. True (page 60, moderate, understanding) If false, why? 5. Self-awareness can be managed by exercising minimal control over when and what kind of information one receives about oneself and by not involving others in the pursuit of self-understanding. False (page 60, moderate, understanding) If false, why? It requires more than minimal control. Understanding and Appreciating...
Words: 7832 - Pages: 32
...17 Executive Summary – Andrea Any animal lover wants the best for their pet. Having the secure feeling of knowing where their pet is at all times not only helps the owner but also puts the safety of the pet first. GPawS is an online business focusing on just that. GPawS provides a customizable collar for pet owners who want to keep their pet as safe as possible. The features that the customer has to mix and match with are: a temperature gage, an activity tracker, tone trainer, Location GPS and custom tag. The mission, vision and goals of GPawS all flow together. The mission is to form to the customer needs, not the other way around. The mission is as follows; “We exist to bring comfort and safety to all animal lovers, providing a product with the technology to meet our customer’s needs.” Having the customer’s heart in mind the vision of GPawS is to seamlessly promote the safety of all animals with the benefits of customization to meet the needs of all animal lovers in the market place. Following the vision are the core values such as; safety of pets, strong relationships with our customers, forward looking and have a fun and...
Words: 4781 - Pages: 20
...www.hbr.org ARTICLE COLLECTION Your emotions are highly contagious. Which ones are you spreading through your firm? Best of HBR on Emotionally Intelligent Leadership, 2nd Edition Included with this collection: 2 What Makes a Leader? by Daniel Goleman 14 Leadership That Gets Results by Daniel Goleman 30 Primal Leadership: The Hidden Driver of Great Performance by Daniel Goleman, Richard Boyatzis, and Annie McKee 42 Social Intelligence and the Biology of Leadership by Daniel Goleman and Richard Boyatzis Product 12088 Best of HBR on Emotionally Intelligent Leadership, 2nd Edition Collection Overview What distinguishes great leaders from merely good ones? It’s not toughness, vision, or industry smarts. It’s their emotional intelligence—a potent combination of self-management and relationship skills. Studies strongly suggest that emotional intelligence plays a far greater role than IQ in determining leaders’ effectiveness, and thus their organizations’ success. To increase your emotional intelligence, start by understanding the skills that define it. Then learn how to flexibly interchange those skills to meet the needs of shifting circumstances. Finally, use mood contagion (a powerful neurological process) to create positive chemical connections between your and your followers’ brains. COPYRIGHT © 2008 HARVARD BUSINESS SCHOOL PUBLISHING CORPORATION. ALL RIGHTS RESERVED. Featuring the work of Daniel Goleman, this HBR Article...
Words: 31797 - Pages: 128
... Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources Acknowledgments Foreword We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves. We were rewarded often in our attempts to learn new things, solve puzzles, and win at games. But at the same time, the world around us taught us rules of behavior that...
Words: 125733 - Pages: 503
...8/19/13 Wall of Text Wl o Tx al f et 04.08 05.08 06.08 07.08 08.08 09.08 11.08 01.09 03.09 06.09 07.09 08.09 09.09 10.09 12.09 01.10 02.10 03.10 04.10 05.10 08.10 09.10 10.10 12.10 02.11 03.11 06.11 09.11 02.12 Much Ado About Nothing I suppose it is time. Wednesday, February 22, 2012 Since October 1. Hum. Well, I briefly dated/flinged‐‐flung?‐‐a girl named Belle. Basically the first date went fantastic, which introduced super high expectations, that were later not met. It's entirely possible they were impossible to meet. Belle and I are still friends, though it took a couple months. In the last couple days in Rwanda, we headed back toward the airport. On the way, we visited some orphans and widows, doing missionary work like a cop eats a doughnut. The woman my group met with was 51 years old and had an amazing, tragic story. Her husband was a fisherman and died drowning when she was in her early twenties. By then she had two kids, but her parents and parents‐in‐law disowned her. She couldn't afford the house she was living in, and had no where to go, so she lived, quite literally, under a mat for ten years. The neighbors took pity on her kids some nights and gave them food, some of which they smuggled in their shirts, so that's how the woman survived. There was something about her owning the house they'd lived in, but not the land it was on, and the man who owned it refused to part with it. He was planning on leveling the house, but since it was government‐built, it was illegal...
Words: 18885 - Pages: 76
...managing NOW! Gary Dessler Florida International University Jean Phillips Rutgers University Houghton Mifflin Company Boston New York To Samantha Vice President, Executive Publisher: George Hoffman Executive Sponsoring Editor: Lisé Johnson Senior Marketing Manager: Nicole Hamm Development Editor: Julia Perez Cover Design Manager: Anne S. Katzeff Senior Photo Editor: Jennifer Meyer Dare Senior Project Editor: Nancy Blodget Editorial Assistant: Jill Clark Art and Design Manager: Jill Haber Senior Composition Buyer: Chuck Dutton Cover photo credits Main image: © Bryan F. Peterson/CORBIS Lower left image: © Stockbyte/Getty Images Lower right image: © David Oliver/Getty Images Additional photo credits are listed on page 516. Copyright © 2008 by Houghton Mifflin Company. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system without the prior written permission of Houghton Mifflin Company unless such copying is expressly permitted by federal copyright law. Address inquiries to College Permissions, Houghton Mifflin Company, 222 Berkeley Street, Boston, MA 02116-3764. Printed in the U.S.A. Library of Congress Control Number: 2007924351 Instructor’s exam copy : ISBN-13: 978-0-618-83347-4 ISBN-10: 0-618-83347-1 For orders, use student text ISBNs: ISBN-13: 978-0-618-74163-2 ISBN-10: 0-618-74163-1 1 2 3 4 5 6 7...
Words: 96057 - Pages: 385