Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Mktg5004 Business Research Methods - Assessment Answers

  20 Download     📄   3 Pages / 749 Words

This is the first case study for the course, we looked into and discussed Edward Snowden. We will now look at another case that has happened to the general public - Equifax data breach!!
Highlight at least three policies that you feel were violated in this case and address the policies that need to be in place to prevent those violations from occurring in the future. Make sure to include enough detail that it could be amended to an existing policy and clear enough that any/all employees know what the new policy addresses.
Part 1:
The beginning of your paper explaining the three issues you want to address and why. Follow APA guidelines for paper format and make sure to check spelling/grammar prior to submitting.
Part 2:
Write your mini-security policy following the template in textbook addressing the three issues you identified.

Answer:

Introduction:

The main purpose of this report is to discuss about the sensitive issue based on the Equifax data breach activity that occurred.

Equifax is an agency based on the reporting of consumer credit information. The data breach within the Equifax systems that occurred in mid-May had involved many of the sensible personal information of people such as name, social security number, date of birth, information of license and credit card numbers (Gressin, 2017).

The scope of the document is to discuss about the ethical and legal framework based on the Equifax Data Breach activity and the policies that were violated within this breach.

Guidance Sections-Three Issues

Based on the Equifax Data Breach, it could be concluded that there were some forms of breach within various policies:

Security based Policy – The incident of Equifax violated the policy of security of the users. This had also introduced the potential of hackers for further breach of data leading to exposure of sensitive information, social security numbers and various other details.

Security and Privacy should go hand-in-hand in order to support each other for the betterment of information security systems (Solomon, 2016).

Timing of Notifying Stakeholders – Equifax had discovered heir breach of data on July 29, but they had reported the matter at a time gap of more than a month on September 7. Customers should know about the breach of data within a few hours. This would enable for a better form of measure, which they could have taken. There should be some form of pre-set processes that should be enable the company in order to notify their customers of the breach on their data.

Violation of Government Policies – The response from the Government side in regards to the Equifax data breach was ambiguous. These Governments have a high level of expertise in dealing with the issues related to capabilities related to situations based on emergency response systems. Though the organizations are mostly held responsible for the breach of data, there should be a proper assistance from the Government to secure the IT systems within the organization (De Pauw & Vermeersch, 2017).

Roles and Responsibilities - Mini Security Policy

In the wake of the Equifax data breach, it could be discussed that data breach within any organization is a high matter of concern, both for the customers as well as the organization. Proper form of encryption standards should be set within the organization. There should also be a proper mechanism of privacy, which is also an important value.

Information and Assistance

Based on the discussion, there should also be clear set rules within an organization and governments based on the notification of incidents. As companies promise to provide high level of security within their systems, hence they should develop proper form of real-time notification systems, which would be able to provide guidance to their customers. The government should also provide assistance to organizations in dealing with the aspect of security measures (Berghel, 2017).

Conclusion

Based on the above discussion, it could be concluded that the Equifax systems should have taken proper measures in order to protect the incident of data breach. Proper form of technical expertise should be taken in order to ensure a proper and secure environment.

Reference

Berghel, H. (2017). Equifax and the Latest Round of Identity Theft Roulette. Computer, (12), 72-76.

De Pauw, E., & Vermeersch, H. (2017). The acceptance of new security oriented technologies: a ‘framing’experiment. In Surveillance, Privacy and Security (pp. 52-70). Routledge.

Gressin, S. (2017). The Equifax data breach: What to do. Federal Trade Commission, Washington, DC.

Solomon, M. G. (2016). Fundamentals of information systems security. Jones & Bartlett Publishers.


Buy Mktg5004 Business Research Methods - Assessment Answers Online


Talk to our expert to get the help with Mktg5004 Business Research Methods - Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for Mktg5004 Business Research Methods - Assessment Answers Assignment Help Online


Copyright © 2009-2023 UrgentHomework.com, All right reserved.