Amazon Com Customers’ Information Security

Amazon.com: Customers’ Information Security Case Study

Amazon.com and security considerations

Amazon.com understands that clients care about the security of personal info. Amazon’s Privacy Notice provides customers with the knowledge that the company receives from them, and the way it is used. This firm makes use of Secure Sockets layer (SSL) software to encrypt prospects’ information (Smith, 2004). It also sends e-mail updates to clients to create awareness and inform them about any adjustments it makes.

301 licensed writers online

Amazon.com seeks authorized consultation from laws governing cloud computing, and therefore complies with the legislation. For instance, the regulation protects the customers’ knowledge from being disclosed to any third get together. Amazon keeps much less confidential data on the virtual servers and crucial in safe locations. The firm reveals only a few digits of a bank card quantity during confirmation of orders. It encourages customers to log off from their website after accessing data to protect unauthorized folks from accessing their accounts.

Plan strategies to handle methods growth

First, project managers should evaluate the existing system by interviewing customers so as to identify deficiencies. The second step is to outline the new management system requirements, in relation to the prevailing management techniques by proposing measures that may improve them. The third step is to design the proposed system. This should involve laying out plans related to physical construction, hardware, security issues including authorized and privacy elements, system operations, communication, and programming amongst others.

The fourth step is to develop the new system. The project managers should ensure that they get hold of, install the new packages and parts after training the users. The fifth step is to put the system into action, or use. The final step is to evaluate the brand new system after observing the way it operates. Organizations using the system should emphasize on excessive upkeep standards and ensure that the customers get periodic updates with regard to transformations within the new system.

Reference

Smith, G. E. (2004). Control and security of e-commerce. Hoboken, N.J: Wiley.

Reference

Bibliography

References

References

Unfortunately, your browser is just too old to work on this site.

Type Case Study
Pages 2
Words 307
Subjects
Tech & Engineering


Computer Security
Language 🇺🇸 English

Leave a Reply

Your email address will not be published. Required fields are marked *