Data Stolen: Search For Papers, People, and Interests
Data Stolen: Search For Papers, People, and Interests
edu
https://www.academia.edu/19991879/_8_data_stolen?auto=download 1/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
https://www.academia.edu/19991879/_8_data_stolen?auto=download 2/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
https://www.academia.edu/19991879/_8_data_stolen?auto=download 3/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
https://www.academia.edu/19991879/_8_data_stolen?auto=download 4/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
https://www.academia.edu/19991879/_8_data_stolen?auto=download 5/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
• •
Whether you win or lose, it costs you—and utation for fairness—one painstaki
there’s bound to be a lot of media coverage.” over decades by Brett’s father.
“Aren’t we required to disclose this to our “Well, the decision may soon be
customers immediately?” Frank inquired. hands,” said Sally. “I was reviewing
“Three of the states in which you operate re- accounts, and one very interes
quire immediate disclosure, and the other cropped up: Dave Stevens, evenin
three do not,” Darrell noted. “But from what I chor at KCDK-TV. Apparently, we
understand, you don’t know what role, if any, home theater for him.” She turne
Flayton’s
identified has in this possible
a pattern. crime.
There seems toAbebank has
a corre- “Stories like thishis
Brett shifted always
jaw, leak someh
pushed bac
lation between cards with fraudulent activity and stood. “So if I understand thi
and cards used to make purchases at Flayton’s we have circumstantial but stron
https://www.academia.edu/19991879/_8_data_stolen?auto=download 6/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
and cards used to make purchases at Flayton s. we have circumstantial but stron
That could be a coincidence. At this time, we that a breach has occurred, we
Download Bulk Download Library
have noactual ofShare
evidence a data breach at former employees who might or m
Flayton’s. None.” involved, some states that require w
“What are we supposed to do?” Brett pressed. feds who want us to shut up, and
“Doing nothing is not an option. Not for me.” personality among the victims. If w
“That is exactly what you should do,” Dar- we’ll probably get sued; if we don
rell asserted. He turned to Sally. “Your com- will eventually leak. The feds may
munication strategy should be not to talk to petrators if we give them time, bu
anyone. If youthat
simply confirm do Flayton’s
get a callhas
from the
been media,
contacted guarantee.
on the line,Noand
matter what, ourwil
competitors re
by law enforcement authorities regarding an ning promotional specials to lure
investigation about which you have been away first chance they get. And I a
given no information and with which you are ing if I can ever look a customer
cooperating fully. Refer them to the Secret the eye again. Did I miss anything?
Service. They don’t tell anybody anything.” Brett leaned forward and put b
“That may work for now,” Brett acknowl- firmly on the table. His eyes met th
edged, “but, Sally, I want you to anticipate the member of his team. He knew—an
next steps. However we communicate eventu- them all. “The one thing I’m sure of
ally, I want to offer straight talk, not spin.” Flayton name means something to
Darrell sat down. employees, and to our customers. W
Brettsearch
online knew last
there were
night noturned
had easy answers. His
up a recent to decide what to do. Today.”
survey documenting that customers are reluc-
tant to shop in stores known to have data How should the Flayton Electron
breaches. Darrell was arguing that Flayton’s respond to the crisis? • Four comm
could be vulnerable simply by trying to do the offer expert advice.
right thing and getting the news out quickly. See Case Commentary
Yet, the company’s future depended on its rep-
Case Commentary
by James E. Lee
Case Commentary
by Bill Boni
https://www.academia.edu/19991879/_8_data_stolen?auto=download 8/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
by Bill Boni
Download Bulk Download Library Share
How should theFlayton Electronics team respond to the
Most senior executives have the insight and tomers, who had invested heavily
the measurement tools to assess potential the best protection technology ava
damage from tangible disasters such as floods we could access their core busin
and fires. That’s not often the case when it using just a smartphone and the In
comes to information security, including pre- To prevent and cope with dat
vention of and planning for data theft.“Let the you need peopl e on hand with
technical staff handle that” tends to be the de- expertise to match wits with
fault strategy, with responsibility relegated to cyber criminals and to understa
nonsenior IT or corporate-security manage- tems they’re targeting. Data prot
ment. Businesses that are serious about pro- necessarily a core competency of e
tecting their data and preserving the data’s or a traditional loss-prevention tea
value should have a high-level official, such as dispensable are knowledge of the
a director or a vice president of information privacy statutes and regulation
protection, who serves not merely as a man- ability to gather and preserve sou
ager but as
Seven a senior
years ago,champion in this area.
I was appointed Motor- evant
team evidence. Youaccountants,
of lawyers, can assemblea
ola’s first-ever corporate information security enced digital-forensic investigator
officer. As a data-protection leader, I am re- enforcement or defense agenci
sponsible for the firm’s information and IT external sources such as law fir
You need people on hand environment globally and for having a com- accounting firms, and consulta
prehensive strategy for risk management. digital specialization.
with the digital expertise
One useful strategy component is to require Armed with facts from experts, y
to match wits with tech- every new initiative to identify, in the initial sembled, Flayton’s should put la
idea phase, the data that might be involved— ment on notice that the compan
savvy cyber criminals. and their value. This mandate builds appro- serve customers and maintain its
priate safeguards right into the projects Flayton’s can’t afford to wait ind
Download CaseCommentary
Bulk Download Library Share
by John Philip Coghlan
https://www.academia.edu/19991879/_8_data_stolen?auto=download 10/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
Case Commentary
by Jay Foley
https://www.academia.edu/19991879/_8_data_stolen?auto=download 12/13
10/28/2019 (16) (PDF) [8] data stolen | Annis Paramita Dilla - Academia.edu
About Press Blog People Papers Job Board Advertise We're Hiring! Help Center
https://www.academia.edu/19991879/_8_data_stolen?auto=download 13/13