COSTS OF A BREACH
No customer will buy a product from a website that cannot guarantee privacy of his/her credit card or bank account information. The customers of iPremier expect that their financial data remains safe from theft and fraud, and linkage to the iPremier website will not infect their computers with viruses or hostile code. High end customers in particular do not want their personal information, shopping habits and preferences to be released to outside parties. Customers do not want any cookies or other privacy compromising code unknowingly planted on their machine. The worst problem iPremier could face is the high corporate liability if it fails to protect the customer data stored internally.
Companies that suffer theft of customer information incur significant direct and indirect expenses. According to ‘Fourth Annual US Cost of Data Breach Study 2008-2009’ conducted by the Ponemon Institute, the cost of a data breach and response could be identified by four cost centers: Detection and Discovery, Escalation, Notification and Ex-Post Response. The study also says that “In addition to the these four process related activities, most companies experience opportunity costs associated with the breach incident, which results from diminished trust or confidence by present and future
References: Dr. Ponemon, Larry. (2008). Fourth Annual US Cost of Data Breach Study. TJX Companies. Retrieved May 9, 2010, from http://en.wikipedia.org/wiki/TJX_Companies. Federal Financial Institutions Examination Council (FFIEC). (July 2006). Information Security. Trusted Information Sharing Network. (June 2006). Managing DoS Attacks. Retrieved May 9, 2010, from http://www.dbcde.gov.au/__data/assets/pdf_file/0013/41314/DoS_CIO_Executive_Summary.pdf.