Consumer Data Breach

Great Essays
In 2010, a Ponemon Institute study found that 85 percent of American companies fell victim to an organizational data breach during 2009 (Zurich, 2010, p. 2). The Ponemon Institute findings illustrate a necessity for businesses to expect to be a target for nefarious actors who seek to procure sensitive customer data. In the assignment scenario, the retail store unwittingly became a member in the growing percentage of organizations faced with customer data breaches. In an attempt to dissect and analyze the retail store’s customer data breach, I will begin this essay with the legal obligations and repercussions that the company faces, both criminal and civil. Secondly, I will attempt to distill, from the analysis, sound ethical responses …show more content…
Breach of fiduciary duty is a “failure to fulfill an obligation to act in the best interest of another party (customers). Plaintiffs may claim that federal privacy laws…and state consumer protection laws create fiduciary duties that are breached when data is lost or stolen” (Zurich, 2010, p. 6). Under breach of fiduciary duty, the retail store is liable if it fails to uphold the company’s duty to protect customers’ sensitive data because protecting customer data falls within the best interests of the customers. Finally, the retail store may face a breach of contract lawsuit. A breach of contract is a “failure to fulfill a condition of a contract. In the case of data breach claims, the contract in question may not be a (signed) physical document…plaintiffs may claim the defendant’s written privacy policy (protecting consumer data) is a contract” (Zurich, 2010, p. 6). If the retail store possessed a written policy, depicting their commitment to protect customers’ sensitive data, then exists the possibility of an impeding breach of contract grievance by the store’s …show more content…
Additionally, the store’s post-incident actions should be transparent and demonstrate a concern for victimized stakeholders, not just a concern for lost profit. The retail store’s first action should be to immediately contact and inform appropriate law enforcement authorities of the data breach (FTC, 2011, p. 23). Once law enforcement authorities are privy to the incident, the store should execute measures to ensure no additional customer data leaks from the company’s information system (Experian, 2014, p. 7). The store’s next step should be to contact all stakeholders (customers, credit card companies, credit bureaus…) whose sensitive data was potentially compromised. The notifications should be detailed enough to provide stakeholders with adequate information in order to enable the efficacy of their individual responses to minimize (or prevent) damages they incur from the breach. Additionally, the store should offer free credit monitoring services to customers in order to assist their actions to help abate or prevent damages suffered by the data breach (Experian, 2014, p.

Related Documents

  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    They also secured the data warehouse to prevent future attacks. Anthem also created a website: www.anthemfacts.com. The website would provide updated information about the breach. Anthem kept the affected population informed, but this didn’t prevent lawsuits to file against the company. Several lawsuits were filed, they alleged that the company didn’t have the proper data security to prevent and protect the customer’s personal…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    HIPAA Privacy Case Summary

    • 1514 Words
    • 7 Pages

    The first consumer value store (CVS) was founded in 1963 by two brothers Sidney Goldstein and Stanley and Ralph Hoagland as a partner. The store was first located in Lowell, Massachusetts and sold beauty and health supplies. In one year, the company had opened 17 stores. In 1967, the company started offering pharmaceuticals. Then ten years later the company engaged in expansion activities through acquisitions, mergers and store openings.…

    • 1514 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The chapter opened by discussing how digital information that people may think is hidden, or even destroyed, is often still accessible to the public. The authors described how the bits that store a given piece of information are never destroyed, but simply overwritten by other data when files are replaced or “deleted.” The descriptions of the people who sold their devices to people, only to have the people who bought their devices to discover personal identification information, “deleted” documents, and even credit card account…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    People that buy products or services online need to feel that their financial and personal information they have given to businesses is secure. Legal consequences of data privacy breaches: A company that stores personal data on their computers systems have a legal obligation to keep that data secure. If personal data is stolen during a cyber-attack and the company can be show to have been negligent in terms of keeping the personal data secure. Then the company could face prosecution under the Data Protection Act and receive a large fine. Malware With these the attacker can use malware to gain or change data malware is software specifically designed to gain access or damage a computer without the user from knowing there are various types of malware such:…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    For example, retailer can predict whether a shopper is a pregnant through analyzing her recent shopping records with other personal information. It is even possible for BDA to predict the due dates of the pregnant shopper. Then the following marketing activities for her will tend to recommend a series of maternity products. Other people, especially family members and close colleagues, are likely to learn she was pregnant before she had made this private information public, thereby leading to an embarrassing situation. In this case, the BDA played a role in breaching individual privacy, although the user of BDA didn’t mean to do…

    • 103 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Target Breach

    • 1769 Words
    • 8 Pages

    Most people can remember the Target breach, whether they were affected by it or not. Personally, this was the first big data breach that I remember, and I was one of the millions affected by it. While I do not shop at Target often of course I bought one thing from the store during the time of the breach. I was a nervous wreck, my wife was even worse. Luckily the only thing affected was our nerves and not our personal identities.…

    • 1769 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    On June 6th, 2013 The Guardian and the Washington Post revealed the fact that the NSA had access to customer information on Apple, Microsoft, and Google computer products. The information obtained by the NSA was allegedly used to prevent any terrorist actions. However, the NSA has “[built] up a store of information on millions of US citizens, regardless of whether or not they are ‘persons of interest’ to the agency” (Brown). Although terrorist plots are a legitimate threat to America, the U.S government has overstepped its boundaries by violating the citizen’s of America’s fourth amendment right to privacy.…

    • 544 Words
    • 3 Pages
    Superior Essays
  • Superior Essays

    Wells Fargogo Case Study

    • 1061 Words
    • 5 Pages

    Wells Fargo has recently been in the spotlight recently for unethical behavior of employees, as well as socially irresponsible behavior at the corporate level. It was recently disclosed that Wells Fargo employees opened up millions of fraudulent accounts, both for banking and credit cards, in the names of unsuspecting customers (Bryan, 2016a). These accounts were opened without explicit consent of the customers involved so that sales goals could be met. Sales goals were attached to incentives for employees, so motivation was provided to employees that had the means to commit these fraudulent actions. Soon after these revelations came to the public’s attention, it was also discovered that Wells Fargo was violating laws and regulations regarding…

    • 1061 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Many companies have and will share consumer financial information with their affiliates. The information that is released can be very sensitive and personal about the consumers. Sine the year of 1991 there has been financial occurrences with banks that have created troubles for consumers. As a result of shared consumer financial information, congress passed the Gramm-Leach-Bliley Act (GLBA) to protect consumer financial privacy that requires companies that are classified as financial institutions that offer consumers financial products or services to explain their information-sharing policies and practices to their customers. The GLBA applies to all businesses that provide financial products or services co-consumers such as check cashing businesses,…

    • 902 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Introduction This article, Building A “Backdoor” To The iPhone: An Ethical Dilemma, discusses Tim Cook, CEO of Apple, ethical dilemma to safeguard its customer’s trust and digital privacy or assist the U.S. government and the Federal Bureau of Investigation (FBI) to gain access to an iPhone device used by a terrorist to commit a heinous crime against society in the city of San Bernardino, California. In addition, evaluate methods in which managers with power and responsibilities characterized by Badaracco, an ethics professor at Harvard University, as the “dirty-hands problem” and the “right-versus-right” difficulties where “the moral dilemmas of management are, at bottom, clashes among different, conflicting moralities, among very different…

    • 1298 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    I conclude that the overall results of the total data records breached means that if more than one organization has all our sensitive information such as our full names, social security numbers, date of birth, credit card numbers, and etc. then we are more likely have a higher risk of getting exposed more than once if the organization’s database is maliciously attacked. To continually increase awareness in data breach protection best practices will help Businesses and other organizations to lower the risk and minimize the impact of data breach in the future as technology continues…

    • 952 Words
    • 4 Pages
    Improved Essays