Question? Call Us  +1 (817) 546-4770

MKTG5004 Business Research Methods

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

MKTG5004 Business Research Methods

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

MKTG5004 Business Research Methods

0 Download3 Pages / 611 Words

Course Code: MKTG5004
University: Curtin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Question:

This is the first case study for the course, we looked into and discussed Edward Snowden. We will now look at another case that has happened to the general public – Equifax data breach!!
Highlight at least three policies that you feel were violated in this case and address the policies that need to be in place to prevent those violations from occurring in the future. Make sure to include enough detail that it could be amended to an existing policy and clear enough that any/all employees know what the new policy addresses.
Part 1:
The beginning of your paper explaining the three issues you want to address and why. Follow APA guidelines for paper format and make sure to check spelling/grammar prior to submitting.
Part 2:
Write your mini-security policy following the template in textbook addressing the three issues you identified.

Answer:

Introduction:
The main purpose of this report is to discuss about the sensitive issue based on the Equifax data breach activity that occurred.
Equifax is an agency based on the reporting of consumer credit information. The data breach within the Equifax systems that occurred in mid-May had involved many of the sensible personal information of people such as name, social security number, date of birth, information of license and credit card numbers (Gressin, 2017).
The scope of the document is to discuss about the ethical and legal framework based on the Equifax Data Breach activity and the policies that were violated within this breach.
Guidance Sections-Three Issues
Based on the Equifax Data Breach, it could be concluded that there were some forms of breach within various policies:
Security based Policy – The incident of Equifax violated the policy of security of the users. This had also introduced the potential of hackers for further breach of data leading to exposure of sensitive information, social security numbers and various other details.
Security and Privacy should go hand-in-hand in order to support each other for the betterment of information security systems (Solomon, 2016).
Timing of Notifying Stakeholders – Equifax had discovered heir breach of data on July 29, but they had reported the matter at a time gap of more than a month on September 7. Customers should know about the breach of data within a few hours. This would enable for a better form of measure, which they could have taken. There should be some form of pre-set processes that should be enable the company in order to notify their customers of the breach on their data.
Violation of Government Policies – The response from the Government side in regards to the Equifax data breach was ambiguous. These Governments have a high level of expertise in dealing with the issues related to capabilities related to situations based on emergency response systems. Though the organizations are mostly held responsible for the breach of data, there should be a proper assistance from the Government to secure the IT systems within the organization (De Pauw & Vermeersch, 2017).
Roles and Responsibilities – Mini Security Policy
In the wake of the Equifax data breach, it could be discussed that data breach within any organization is a high matter of concern, both for the customers as well as the organization. Proper form of encryption standards should be set within the organization. There should also be a proper mechanism of privacy, which is also an important value.
Information and Assistance
Based on the discussion, there should also be clear set rules within an organization and governments based on the notification of incidents. As companies promise to provide high level of security within their systems, hence they should develop proper form of real-time notification systems, which would be able to provide guidance to their customers. The government should also provide assistance to organizations in dealing with the aspect of security measures (Berghel, 2017).
Conclusion
Based on the above discussion, it could be concluded that the Equifax systems should have taken proper measures in order to protect the incident of data breach. Proper form of technical expertise should be taken in order to ensure a proper and secure environment.
Reference
Berghel, H. (2017). Equifax and the Latest Round of Identity Theft Roulette. Computer, (12), 72-76.
De Pauw, E., & Vermeersch, H. (2017). The acceptance of new security oriented technologies: a ‘framing’experiment. In Surveillance, Privacy and Security (pp. 52-70). Routledge.
Gressin, S. (2017). The Equifax data breach: What to do. Federal Trade Commission, Washington, DC.
Solomon, M. G. (2016). Fundamentals of information systems security. Jones & Bartlett Publishers.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 3 pages

PAY 2 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). Business Research Methods. Retrieved from https://myassignmenthelp.com/free-samples/mktg5004-business-research-methods/case-study-of-equifax-data-breach.html.

“Business Research Methods.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/mktg5004-business-research-methods/case-study-of-equifax-data-breach.html.

My Assignment Help (2021) Business Research Methods [Online]. Available from: https://myassignmenthelp.com/free-samples/mktg5004-business-research-methods/case-study-of-equifax-data-breach.html[Accessed 18 December 2021].

My Assignment Help. ‘Business Research Methods’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Business Research Methods [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/mktg5004-business-research-methods/case-study-of-equifax-data-breach.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

Experience ultimate convenience when you avail the assignment help services in Aus from MyAssignmenthelp.com. When you seek help from us, our writing service will put an end to your struggle permanently. You would not have to be satisfied with mediocre grades as long as you have us by your side. Receive perfectly written tasks from us as per your convenience.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »