preview

Internet Technology, Marketing, and Security: Security Breach Faced by Sony Corporation

Best Essays

Internet Technology, Marketing, and Security:
Security Breach Faced by Sony Corporation

BUS 508: Contemporary Business
Assignment 4
Strayer University
November 25, 2011

Introduction
In the global marketplace, to attract the customers and provide relevant information to the customers, internet is used by most of firms as a promotional tool. In this, web-sites, social networking sites, etc. are used by the firms to communicate with the customers. Although, many security tools and techniques are used by the firms to secure the data of firm and customers, yet, some security breaches are also faced by the firms due to technical advancement. For this paper, Sony Corp. is selected that has faced security breach. Sony Corporation is a …show more content…

Search engine marketing: Search engine marketing is also used by Sony Corporation to promote its products among the customers. In this, the firm increases its visibility in search engine result pages or web pages through using appropriate key words. It is conducted by the company through search engine optimization, paid inclusion, paid placement, etc. It helps the firm to attract customers through providing needed information about the products (The Sony Brand, 2010).
So, above discussed internet marketing strategies are used by Sony Corporation to attract potential customers and communicate with them effectively.

Security Policy and Response of Firm on Security Breach
To secure the data of customers and software information of the firm, Sony group privacy policy is used by Sony Corporation. In this, to win confidence and trust of the customers, appropriate use and security control tools are focused by the firm under this security policy. Management of the firm believes to give priority to the protection of personal information of the customers and limits the use of it for vague purposes. Additionally, Sony Global Information Security Policy and related rules & standards are also implemented by the firm to ensure the security of data and information at the workplace (Computer Security Division, 2009).
Principles and

Get Access