Free

Explanation of Security Breach and Request for Formal Apology - Essay Example

Comments (0) Cite this document
Summary
The paper "Explanation of Security Breach and Request for Formal Apology" is aimed to apology about the security breach. The author of this paper investigated the issue and established that lab lock has malfunctioned and will make arrangements for a technician to repair the lock’s firmware…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92% of users find it useful
Explanation of Security Breach and Request for Formal Apology
Read TextPreview

Extract of sample "Explanation of Security Breach and Request for Formal Apology"

Explanation of Security Breach and Request for Formal Apology to Linda Luu Hello Roger, The security breach occurred while I was attendinga meeting to plan next month’s launch of the Bionic Leg event. As soon as I was informed of the breach, I investigated the issue and established that our lab lock has malfunctioned. In this regard, I will make arrangements for a technician to repair the lock’s firmware.
A month ago, the lock manufacturer sent me an email to warn me of the possibility that the lock could malfunction and to schedule for a technician to come and fix the lock’s firmware. No further queries were made on this issue following the current measures on cost-cutting, and the fact that the Head of Security was dismissed six weeks ago. I apologize for not informing you of the problem with the system on time. I am heavily involved in planning for the launch of the Bionic Leg event, a project that is critical to the company’s ongoing success, and that is why I have not had time to resolve the issue.
Linda is an important employee to our company because she is the most knowledgeable person in Canada in the field of bionics. Bob Loblaw is the only other person in the company who possesses similar expertise. Since they work together, there is a chance that if Linda were to leave then Bob would also leave. This would be a great loss for the company. Without the service of these two key employees, the Bionics Division would be forced to close. In the last three years, the company has been surviving on the revenues generated from the Bionics Division. Furthermore, we risk losing Linda to our main competitor, Bionic Works Co., which has been trying to poach her from us for quite some time. Her decision to stay is based on her loyalty to my leadership and because she enjoys working with our team.
To prevent Linda from leaving the company, we need to compromise company policy and fulfill her terms. I would like to ask you to apologize respectfully to Linda following the conversation you had with her recently. To avoid future misunderstandings, please avoid contacting Linda directly, either by phone or email; instead contact me and I will relay any messages you have for her. Also, I would appreciate if you treat all members of the lab team with full respect and dignity by using a polite tone. I am doing all this to restore the company’s profitability.
I would like to meet with you in person to discuss the steps we need to take to tighten security and avoid similar issues from occurring in the future.
Sincerely,
Kayla Campbell
Western Regional Director of Operations
Labs Inc. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Explanation of Security Breach and Request for Formal Apology Essay”, n.d.)
Explanation of Security Breach and Request for Formal Apology Essay. Retrieved from https://studentshare.org/business/1701835-explanation-of-security-breach-and-request-for-formal-apology
(Explanation of Security Breach and Request for Formal Apology Essay)
Explanation of Security Breach and Request for Formal Apology Essay. https://studentshare.org/business/1701835-explanation-of-security-breach-and-request-for-formal-apology.
“Explanation of Security Breach and Request for Formal Apology Essay”, n.d. https://studentshare.org/business/1701835-explanation-of-security-breach-and-request-for-formal-apology.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Explanation of Security Breach and Request for Formal Apology

IPad's Security Breach

...? Full Paper Hacking a Website Group of expert hackers breached Eidos Montreal website compromising 25,000 email addresses along with 350 resumes dated May 13 2011. The description of the incident was stated by the company as "Square Enix can confirm a group of hackers gained access to parts of our Eidosmontreal.com website as well as two of our product sites. We immediately took the sites offline to assess how this had happened and what had been accessed, then took further measures to increase the security of these and all of our websites, before allowing the sites to go live again"(Square enix confirms data lifted in website raids • the register ). Nonetheless, data associated with online e-commerce transactions and credit cards... given...
6 Pages(1500 words)Assignment

IPad's Security Breach

...? Full Paper Organized Hack A website of an organization d as ‘Square Enix’ was expansively penetrated by a group of experthackers on May 13 2011. The fundamental objective of ‘Square Enix’ is to hire skillful software developers, testers and creative thinkers to work on different projects related to game development. Likewise, the breach conceded 25,000 email addresses and 350 resumes. Later, the explanation regarding the hack was publicized in these following sentences by the victim as "Square Enix can confirm a group of hackers gained access to parts of our Eidosmontreal.com website as well as two of our product sites. We immediately took the sites offline to assess how this had happened and what had...
5 Pages(1250 words)Assignment

Assignment 4: ipad security breach

...and it occurred as Goatse Security to exploited vulnerabilities of this network. AT&T was made aware of the breach and the security hole was closed. The above scenario has a potential of straining and even breaking ties between business partners. In this situation, Apple has remained silent over the issue leaving its partner AT&T to fight to contain the damaged public relations (PR) and to apologize for the mishap. This is because the problem resulted from AT&T operating the server without strong security controls. Victimised businesses/organisations are forced to use a lot of resources to win the trust of their customers once again. According to Tate...
5 Pages(1250 words)Essay

IPad's Security Breach

...?iPad's Security Breach Introduction A security hole in Apple’s iPad, stormed the technology industry about the threats which can affect an individual or an entire nation. AT&T, the service provider for Apple iPad accounted for a security breach as the email-ids’ of more than 1,00,000 users got exposed by a group of hackers called Goatse Security. The group claims to work for the betterment of the society with the aim to expose the security vulnerabilities of different gadgets (NPR, 2011). This issue has a great impact on the technological industry as leakage of information and personal data is an unethical practice under law which can create serious threat if not dealt seriously by the security authority. This report is concerned... , n.d.)....
5 Pages(1250 words)Coursework

IPad's Security Breach

...? Running Head: iPad’s SECURITY BREACH AT&T‘s iPad’s Security Breach of Introduction In June 2004, Apple suffered an embarrassment when a security breach exposed personal details of its iPad’s owners, among them influential politicians, businessmen, corporate CEOs, and the U.S military (Tate, 2011). This hacking was the work of a website security group called Goatse Security, which shared the iPad’s users IDs and personal information with a media firm called Gawker Media, LLC (Tate, 2011). However, the website security firm informed AT&T of the security...
4 Pages(1000 words)Essay

Apology

...? Socrates’ Apology Socrates was a Greek Athenian thinker, famous for his work on philosophy,including some plays and also as the tutor of pupils like Plato. The Apology is a document written by Plato in which he has noted down the apology Socrates made when he was put on trial due to certain accusations put against him. There is also another version written by Xenophon, but it is not considered as authentic since he was not present during the time of the trial even though Plato was. In fact, Plato himself was mentioned twice by Socrates in his apology. We cannot be sure of Xenophon’s text because it is all a result of word of mouth, but then he has added some more...
5 Pages(1250 words)Essay

The Security Breach at Nelm

... The Security Breach at Nelm The security breach at Nelm has resulted in data being acquired by un ized users tapping into the system and gaining access to sensitive files. There is a concern that an insider is gaining the information on the advertising campaign and making it available to the Erm Company. There is also the possibility that an outsider has taken advantage of the system configuration and its security flaws to gain unauthorized access to the data. Nelm has taken the first step by appointing a head security officer that should report directly to the board of directors. However, there are serious flaws in the system configuration and the access control. The first concern should be that an insider might be acquiring... the...
2 Pages(500 words)Case Study

IPad's Security Breach

...of security breaches in the future. In the internet age, this may be hard to attain as hackers are continuously updating their information and developing alternate methods. The CEO in this case, will also have to develop a continuous plan where he hires or creates a team for the specific purpose of preventing hacking attempts in the future (Office of the Privacy Commission, 2008). Email Script Subject: Apologies for Security Breach at AT&T Dear Customer, Recently, Gawker Media released a news blog regarding the security breach at AT&T for its iPad users. After analyzing the situation, we discovered that the...
5 Pages(1250 words)Research Paper

Sony PlayStation Network security breach

...and efforts. Sony also emphasized on the lawmakers to enact the more strict guidelines for the protection of personal information (Carlson, 2011). Officials other than the U.S lawmakers are also concerned with the issue of data breaching. States regulators in U.S and privacy officials in foreign countries have also concerns about the Sony’s network security and demanded the explanation from the Company management. Attorney General George Jepsen refrained and said that Network’s users were not intimated promptly (Carlson, 2011). References: Brice, E.C. (2011). The Sony PlayStation Network Breach – Yet Another Lesson in Crisis Communication, Available from...
4 Pages(1000 words)Essay

Sony Playstation Security Breach

..., and the House Commerce. They however declined the invitation. Mary Bono Mack, the sub-committee chairman, expressed her dismay at the mode of disclosure opted for by Sony. The company had chosen to disclose the security breach on its PlayStation blog, and she termed Sony’s actions as “an effort without enthusiasm and efforts.” Sony also emphasized on the lawmakers to enact the more strict guidelines for the protection of personal information (Homeland Security Digital Library, 2011). Other officials apart from U.S lawmakers also raised their concerns with the issue of data breaching. These were mostly state regulators in U.S and also privacy officials in foreign...
8 Pages(2000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Explanation of Security Breach and Request for Formal Apology for FREE!

Contact Us