StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Amazon's Data Assurance Policies - Assignment Example

Cite this document
Summary
The paper “Amazon’s Data Assurance Policies” overviews 4 stages in the brand’s transaction process. The customer can learn its policies for purchasing, billing, shipping, and returns before ordering. And recommendations on the correct and safe use of the site to maintain confidentiality…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Amazons Data Assurance Policies
Read Text Preview

Extract of sample "Amazon's Data Assurance Policies"

Download file to see previous pages

Amazon’s customers receive immediate notification of whether the transaction has been successful.  This is done first immediately online, giving them an opportunity to keep a printed record as well as being stored in their account history, which is viewable online.  An electronic mail is also sent to the customer as a further notification and security measure. In a credit card transaction there are three stages to processing an order; namely, authentication of the cardholder, authorization for the transaction from the card issuer, and eventually settlement by the card issuer with Amazon.

  Once the card issuer authorizes the transaction Amazon will send a confirmation to the customer.  In a successful credit card transaction for an existing customer the following information assurance policies are embedded within Amazon’s order processing system to safeguard customers, Amazon and the card issuer against the risk of identity theft: Amazon’s information assurance policies ensure that it does not collect any data from customers that is not required either to facilitate online transactions or to improve the quality of their experience whilst on the site.

  For example, behind the scenes, Amazon ensures that all credit card numbers are transferred to and stored on a computer that is not accessible by network or modem or connected to the Internet.  This is done via a one-way interface.  This acts as another layer of protection from internal security risks as most staff will have no reason to access that server. Often the weakest point in the information assurance policy is interaction with the end-user, as an organization relies on the end-user to keep personal data accurate and safeguard against threats to the integrity of network systems to which they have access.

  Amazon’s success here is mixed.  For example, customers are forced to keep their personal data accurate in order to be authenticated for purchasing from the site and Amazon does not collect personal data for any other reason. 

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Amazon's Data Assurance Policies Assignment Example | Topics and Well Written Essays - 750 words”, n.d.)
Amazon's Data Assurance Policies Assignment Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/e-commerce/1510974-amazon-essay
(Amazon'S Data Assurance Policies Assignment Example | Topics and Well Written Essays - 750 Words)
Amazon'S Data Assurance Policies Assignment Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/e-commerce/1510974-amazon-essay.
“Amazon'S Data Assurance Policies Assignment Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/e-commerce/1510974-amazon-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Amazon's Data Assurance Policies

EBay and Amazon - Customer Service Delivery

EBay (www.... bay.... om) and Amazon (www.... mazon.... om) are Internet based possession processing services.... The companies offer a format for transactional sales in new and second hand products from retailers and private sellers.... EBay offers an auction-based sales service, where the retailer or private seller can present their item to purchasers....
12 Pages (3000 words) Case Study

Bumble Products and Services Company E-Commerce Proposal

A widely connected public networks which transmit data using the packet switching mechanisms with the help of Internet Protocol (IP) (Forouzan, 2003).... The paper contains an E-Commerce proposal for Bumble Products and Services Company which is venturing into e-commerce with an attitude to synchronization of all its operations and create a standard for getting the jobs done....
10 Pages (2500 words) Term Paper

Importance of Managers for the Success of an Organization

In the paper “Importance of Managers for the Success of an Organization” the author analyzes success of the employees in their duties.... He states that a business will depend on the strength of its managers to succeed.... Good managers influence employees to success....  … The author claims that in case of the absence of a managerial structure, human resources in the organization may find it so hard to figure out whom they ought to report to officially....
9 Pages (2250 words) Assignment

The Disappearing Data Center

There is also a challenge in handling large data files of invoices and… Orders processing speed is not as expected and lead to frequent complaints from the clients.... The main challenges in the organization are slow transmission to and from its smaller subsidiaries.... The upper side is that implementing a new strategy to solve the issues will hand more opportunities to the company from her satisfied clients. Availability of Along with the energy consideration, the environment in which the source lies must not pose to the stability of the energy supplied to the host platform....
4 Pages (1000 words) Case Study

Governance and Service Level Agreement Issues in a Cloud Environment

hellip; data integrity refers to the correctness of data that requires dealing with risks regarding portability, data format, as well as change management.... Usually, cloud computing technology along with data governance services are provided by a third-party vendor to the organization.... Therefore, data governance and management plans need to be identified and specified by the client organization and the cloud computing service provider in order to not only control the data but also managing a breach in data security....
11 Pages (2750 words) Coursework

Security, Crimes, Compliance and Continuity of IT in Enterprises

om with particular reference given to the firm's data protection policy, information security vulnerabilities, risk management, network security, internal control and compliance.... nbsp;  … Amazon is the world's largest online retailer with huge databases and servers containing a pool of sensitive business data/information.... The major priorities of modern online marketers because the loss of personal customer information/data may adversely affect the credibility and brand loyalty of the organization....
9 Pages (2250 words) Case Study

Magic Quadrant for Data Warehouse Database Management Systems

Consistent relation of information Easy access to information Make the management to formulate and apply policies and procedures Manage incoming data from non-integrated sources – This means that data from multiple unrelated sources requires a plan to convert electronic data, manage imaging and document inputs, manage workflow, and manage the analysis of data.... … The paper “Magic Quadrant for data Warehouse Database Management Systems ” is a potent example of an assignment on information technology....
9 Pages (2250 words) Assignment

Environmental Impact of Oil Sands

The paper "Environmental Impact of Oil Sands" states that oil sands provide a perfect opportunity of keeping up with the increased demand for energy in the world.... nbsp;Energy in the form of oil, coal, natural gas, and other alternatives is needed to meet the growing energy demands of the world....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us