Question :
Use the Internet or the Strayer Library to research existing articles related to personal information privacy violations adding customer database hacking and related privacy breaches. Be prepared to discuss.
"Information Protection and Privacy" Please respond to the subsequent:
Based on the e-Activity, determine the circumstances that contributed to the privacy violation, the consequence to the company to the breach, and management's response to the breach, showing the appropriateness of the response. Propose how the company may have presented the breach and / or responded another way once the breach was discovered. Give support for your rationale.
Assess the ethical considerations for information privacy, showing how these considerations should be addressed with a corporate policy.