Amazon.com: Customers Information Security

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

Amazon.com and security concerns

Amazon.com understands that customers care about the security of private information. Amazons Privacy Notice provides customers with the information that the company receives from them, and how it is used. This company uses Secure Sockets layer (SSL) software to encrypt customers data (Smith, 2004). It also sends email updates to customers to create awareness and inform them about any changes it makes.

Amazon.com seeks legal consultation from regulations governing cloud computing, and hence complies with the law. For instance, the law protects the customers data from being disclosed to any third party. Amazon keeps less confidential data on the virtual servers and the most important in secure places. The company reveals very few digits of a credit card number during confirmation of orders. It encourages customers to sign off from their website after accessing data to protect unauthorized people from accessing their accounts.

Plan methods to manage systems development

First, project managers should evaluate the existing system by interviewing customers in order to identify deficiencies. The second step is to define the new management system requirements, in relation to the existing management systems by proposing measures that can improve them. The third step is to design the proposed system. This should involve laying out plans related to physical construction, hardware, security issues including legal and privacy aspects, system operations, communication, and programming among others.

The fourth step is to develop the new system. The project managers should ensure that they obtain, install the new programs and components after training the users. The fifth step is to put the system into action, or use. The last step is to evaluate the new system after observing how it operates. Organizations using the system should emphasize on high maintenance standards and ensure that the users get periodic updates with regard to transformations in the new system.

Reference

Smith, G. E. (2004). Control and security of e-commerce. Hoboken, N.J: Wiley.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!