Discuss about the Analysis of Security and Privacy Requirements.
Under Armour (UA) is an American Manufacturing company, which manufactures sportswear, footwear and various casual apparel (Jensen et al. 2016). The company was founded by Kevin Plank in 1996. The report is based on a major data breach that occurred to MyFitnessPal, which is the fitness application of Under Armour. The data breach that had taken place within the application was meant to steal the private data of the users of the application. This report focusses on the various data breaches that have occurred and the ways to mitigate the risks of data breaches (Romanosky, Hoffman and Acquisti 2014).
Under Armour was founded by Kevin Plank in 1996 who was a formal football player associated with the University of Maryland. The company was initially named as KP Sports. They changed their name in the year, 2005. It was believed by Plank that the potential of Under Armour was for a long term growth that could be achievable due to the ability of the company in order to build a powerful brand in the market.
Under Armour has the world’s first connected health and fitness tracker system. The name of the application of Under Armour is MyFitnessPal (McGrath and Scanaill 2013). The application consists of several facilities such as track of the sleeping activities, activity of the fitness of an individual and nutrition. The application can also support the facility of setting and reach those goals, connect with the synced devices and thus follow friends. With the help of the application, users can set their fitness goals for a particular day and thus try to achieve them. The MyFitnessPal application is available on both the IOS and Android Platform. Devices can easily connect with UA HealthBox, UA Scale, UA Band and UA HeartRate. There are many other application such as MapMyFitness in order to combine the collected data and thus this would provide a view of the activity of an individual and their progress track. Users can also share their UA Record activity with the Apple’s heath application (Laing et al. 2014).
The health and fitness application of Under Armour was hit by a data breach attack. The attack on the data of the users had affected nearly 150 million people. The investigation on the activity of the data breach had indicated that the information that was affected included the usernames of the individuals, hashed passwords and email addresses of the users. The effect of the data breach could lead to the leak of many important information of the users such as the payment details of each user (Dehling et al. 2015).
The information security risk from the data breach on the application could lead the hackers to obtain the details of the payment of the users and other information such as their social security numbers and even their driving license numbers. The hackers could also get a hold of the bank details and the account numbers of the users. Due to this, the major risk that could have occurred is that the important documents of the users of the application would have been acquired by the hackers and hence their confidential data would have been prone to danger. These vital information could be leaked if hackers were able to penetrate into the entire system.
The IS risks that had affected the application could have a major impact on the business sector of Under Armour. It could also affect the reputation of the company. Users would not be able to keep their trust on the efficiency of the organization and thus would shift their focus on other competitors in the market. This would affect the business side of the organization as there customer base would fall down and thus their revenue would be affected (Ackerman 2013).
Audit Plan – Under Armour is an extremely successful and a powerful growing brand in the athletic clothing industry. The audit of the brand is meant to keep an overlook of the activities of the brand within the international market and the reaction of the consumers with the products offered by the brand. The main purpose of the audit is to look into the business procedures of the business and to understand their position in the international market. It is also necessary to look into the security implications that are made by Under Armour in order to ensure the confidentiality of the user data and thus secure their vital data (Gray et al. 2016).
The areas that would be needed to be outlined in the audit plan are: Promotion strategies, improvement of product categories, programs for marketing support and the security implications of the brand.
Promotion Strategies – UA also makes use of several channels in order to promote their brand in the international market. They make use of traditional and new media technology to reach out to the people. They market their products on the social media platform, online advertisements, online videos and other venues of advertising (Michaels and Greene 2013).
Improvement of Product Categories – UA has mainly focused on offering different kinds of products, which includes shoes, apparel and accessories. These products are available for all kinds of people in order to satisfy their different needs. They focus on delivering high quality products, which includes basket shoes, hiking shoes, sandals, boots, running shoes and many others. With the increase in demand of their products, UA has also expanded their lines of products in other areas that includes hunting, athletics, sports uniforms, jerseys and military wear (Biswas and Roy 2016).
Programs for Marketing Support – The products of Under Armour are considered to be of high quality by their customers. There are a large number of products that are offered by the brand. The products of UA are sold in many places, which includes brand stores, online platforms and sporting stores. These provide a number of options and choices to the consumers. The marketing programs of UA could also be viewed on the television. The customers of UA are mostly connected with the brand on the social media platforms such as Google+, Instagram, Twitter, Facebook and many others. With the help of these kinds of marketing in the media, UA also encourages their consumers to participate in the marketing of their products.
Security Implications – Under Armour is dedicated towards securing the personal data of the user. They would only disclose the personal data of the user upon acknowledging them. The disclosure of the data of the user would be meant for the business purposes of the company. They share the personal data of the user with third parties only with the consent of the user (Zhou and Piramuthu 2014).
UA retains the personal data of the user as long as the user maintains an account with the organization. UA would provide their services to their consumers who have maintained their account with the company. They retain and thus use the personal data in order to conform to the legal obligations, enforce agreements and thus resolve any kind of disputes.
Objectives of the Audit Plan – The objectives of the plan of the audit includes the following:
Procedures for Auditing the Selected Areas – The main procedures, which should be implemented in order to audit the selected areas are:
Promotion Strategies – In order to improve the business scenarios, UA should highly focus on promoting their products on a wide basis. They should conduct a survey of the promotional strategies that are adopted by other competitors and thus implement new ways to promote their products.
Improvement of Product Categories – The Company should conduct a survey among their new and existing customers. They should understand the choices of the customers. Based on auditing the varying choices of the customers, UA should conduct implementations on improving their products.
Programs for Marketing Support – The current marketing strategies should be taken into consideration and based upon them, UA should provide offers to their customers. They should conduct polls within their customers. This would let them to know about the ways in which their customers would adopt techniques of purchasing their products (Armstrong et al. 2014).
Security Implications – The current strategies of security should be considered. Security is a major area of concern for UA. Hence, security experts should be consulted by the team at UA in order to check the systems, which are meant to protect the data of the users (Sametinger et al. 2015).
The questions for the conduction of the audit are:
Promotion Strategies –
Improvement of Product Categories –
Programs for Marketing Support –
Security Implications –
As Under Armour was affected by a serious data breach in which the vital data of the users was vulnerable to attacks, hence the security team of UA should follow some recommendations that could be followed in order to prevent such future attacks.
References
Ackerman, L., 2013. Mobile health and fitness applications and information privacy. Privacy Rights Clearinghouse, San Diego, CA.
Adolph, M., 2014. Big data, its enablers and standards. PIK-Praxis der Informationsverarbeitung und Kommunikation, 37(3), pp.197-204.
Armstrong, G., Adam, S., Denize, S. and Kotler, P., 2014. Principles of marketing. Pearson Australia.
Biswas, A. and Roy, M., 2016. A study of consumers’ willingness to pay for green products. Journal of Advanced Management Science Vol, 4(3).
Dehling, T., Gao, F., Schneider, S. and Sunyaev, A., 2015. Exploring the far side of mobile health: information security and privacy of mobile health apps on iOS and Android. JMIR mHealth and uHealth, 3(1).
Gray, S.E., Sekendiz, B., Norton, K., Dietrich, J., Keyzer, P., Coyle, I.R. and Finch, C., 2016. The development and application of an observational audit tool for use in Australian fitness facilities. Journal of Fitness Research, 5(1), p.29.
Jensen, J.A., Wakefield, L., Cobbs, J.B. and Turner, B.A., 2016. Forecasting sponsorship costs: marketing intelligence in the athletic apparel industry. Marketing Intelligence & Planning, 34(2), pp.281-298.
Laing, B.Y., Mangione, C.M., Tseng, C.H., Leng, M., Vaisberg, E., Mahida, M., Bholat, M., Glazier, E., Morisky, D.E. and Bell, D.S., 2014. Effectiveness of a smartphone application for weight loss compared with usual care in overweight primary care patients: a randomized, controlled trial. Annals of internal medicine, 161(10_Supplement), pp.S5-S12.
McGrath, M.J. and Scanaill, C.N., 2013. Wellness, fitness, and lifestyle sensing applications. In Sensor Technologies(pp. 217-248). Apress, Berkeley, CA.
Michaels, C.N. and Greene, A.M., 2013. Worksite wellness: increasing adoption of workplace health promotion programs. Health promotion practice, 14(4), pp.473-479.
Rodrigues, J.J., De La Torre, I., Fernández, G. and López-Coronado, M., 2013. Analysis of the security and privacy requirements of cloud-based electronic health records systems. Journal of medical Internet research, 15(8).
Romanosky, S., Hoffman, D. and Acquisti, A., 2014. Empirical analysis of data breach litigation. Journal of Empirical Legal Studies, 11(1), pp.74-104.
Sametinger, J., Rozenblit, J., Lysecky, R. and Ott, P., 2015. Security challenges for medical devices. Communications of the ACM, 58(4), pp.74-82.
Zhou, W. and Piramuthu, S., 2014, June. Security/privacy of wearable fitness tracking IoT devices. In Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on(pp. 1-5). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download