Ipad's Security Breach

Submitted by: Submitted by

Views: 196

Words: 1113

Pages: 5

Category: Business and Industry

Date Submitted: 12/15/2012 07:31 PM

Report This Essay

iPad’s Security Breach

Allison Foster

Instructor Steve Brown PhD

BUS 508 – Business Enterprise

May 28, 2011

iPad’s Security Breach

The purpose of this paper is to discuss the 2010 security breach Apple experienced with the product launch of the iPad (Syllabus, 2011, p.27). In detail this paper will (a) address is hacking into a Website ever justifiable, (b) develop a corporate ethics statement justifying hacking, (c) discuss the social accountability third party companies and consumer information, (d) determine what factors CEOs should consider when responding to security breach, and (e) create an email script to sent to AT&T customers concerning the security breach and action plan to resolve the issue.

In today’s environment, companies are charged with securing customer data. It is essential to the trust relationship between the company and consumer to know without doubt personal information is protected. “In many U.S. states and some countries, companies must reveal data breaches, even when no sensitive information is lost” (Cisco, 2011, p.1). According to Webster’s Dictionary, a security breach is described as an act from outside an organization that bypasses or contravenes security policies, practices, or procedures.

Website Hacking Justifiable or Not

There are many files a hacker can get from its source, whether a file with no importance information or one that contains personal information like address, social security number, credit card number or health information. Hackers use all types of technology to acquire data and information. Recently a parole officer was accused on unprofessional behavior and misconduct specifically violation of State policy. The parole officer was suspended during the State’s investigation regarding the allegations. During the investigation the State instructed the department’s IT Manager to hack into the work computer to retrieve all documents, emails, internet...