Sie sind auf Seite 1von 3

NAME: Haroon Saeed Roll No: 013 Assignment No: 3rd

Flayton Electronics is showing up as a common point of purchase for a large number of


fraudulent credit card transactions. It's not clear how responsible the company and its less than
airtight systems are for the apparent data breach. Law enforcement wants Flayton's to stay
mute for now, but customers have come to respect this firm for its straight talk and square
deals. A hard-earned reputation is at stake, and the path to preserving it is difficult to see. . The
reason behind was the inefficient and inadequate security system of the company which it had
for its data and information. The fraud involved the data about the customer included there
credit card numbers, email addresses, it was misused. The theft was recorded later and then
the CEO of Flayton Electronics took charge of the difficult situation. It was a tough time for all
and everyone has to be accounted. He advises early and frank external and internal
communications, elimination of security weaknesses, and development of a brand-restoration
strategy. Bill Boni, of Motorola, stresses prevention: comprehensive risk management for data,
full compliance with payment card industry standards, and putting digital experts on staff. For
the inadequately prepared Flayton's, he suggests consulting an established model response
plan and making preservation of the firm's reputation its top priority. John Philip Coghlan,
formerly of Visa USA, discusses the often-divergent positions of data-breach stakeholders and
puts customers' interests first. Swift disclosure by Flayton's, he argues, would empower
consumers to protect themselves against further fraud and might even enhance the company's
reputation for honesty. Jay Foley, of the Identity Theft Resource Center, recommends that
Flayton's emphasize quality of communication over speed of delivery. All the investigation was
therefore was to be kept secret. A number of measures were taken which involved
strengthening the firewall, secret inquiry and several data protection mechanisms.

The article keeps a focuses on how to manage the relationship that a company has with its
customers.
NAME: Haroon Saeed Roll No: 013 Assignment No: 3rd

The case study is based on a potential data theft that occurred at Layton Electronics.
It emphasizes on the importance of security of company’s data which if not given importance
can result in heavy data loss which is a potential threat to the company's working as well as
repute. The article keeps a focuses on how to manage the relationship that a company has with
its customers. The article is about how the above stated company lost its customer trust just
because of the information theft of its customers. The reason behind was the inefficient and
inadequate security system of the company which it had for its data and information. The fraud
involved the data about the customer included there credit card numbers, email addresses, it
was misused. The theft was recorded later and then the CEO of Flayton Electronics took charge
of the difficult situation. It was a tough time for all and everyone has to be accounted. Bill Boni,
of Motorola, stresses prevention: comprehensive risk management for data, full compliance
with payment card industry standards, and putting digital experts on staff. For the inadequately
prepared Flayton's, he suggests consulting an established model response plan and making
preservation of the firm's reputation its top priority. John Philip Coghlan, formerly of Visa USA,
discusses the often-divergent positions of data-breach stakeholders and puts customers'
interests first. The customers had kind of lost trust in the company and it was a very difficult
task for the CEO to restore that trust as that trust was the basic aim of the company. The CEO
made certain measures as is to satisfy the customers. It was also a guess that maybe someone
from inside the company was involved in the fraud and so a clear and just investigation was to
be held such that the trust and confidence of the employees was not shattered. Also that if
such a case was that there was some person from inside the company responsible than it was a
major threat to the company. All the investigation was therefore was to be kept secret. A
number of measures were taken which involved strengthening the firewall, secret inquiry and
several data protection mechanisms.
So the basic aim of this case study is to emphasize on the security of company's data and
information and the customer's trust on the company's working. It emphasizes on the
importance of security of company’s data which if not given importance can result in heavy
data loss which is a potential threat to the company's working as well as repute.

Das könnte Ihnen auch gefallen