preview

Breach X Essay

Decent Essays

BREACH AT X

• What are the people, work processes and technology failure points that require attention?
• What practices led to the security breach in TJX and why did such a smart andprofitable organization as TJX face such a situation?
• Was TJX a victim of ingenious cyber crooks or did it create risk by cutting corners? Background a. Describe the company/department History
1. TJX was the largest apparel and home fashion retailer in United States in the off-price segment and is ranked 138th in fortune 500 companies in 2006.
2. TJX sold brand apparels at prices 20 to 70% lower than department or specialty stores
3. TJX has eight independent businesses under a common umbrella. They …show more content…

TJX currently have two main storage systems i.e. Framingham system and Watford system.
2. Watford system processed and stored information related to payment card transactions at T.J.Maxx in UK and Ireland. Framingham system processed and stored information pertaining to debit and credit card transactions of customers from all the other locations
3. TJX stored the driver’s license numbers and ID numbers such as SSN along withnames and addresses of customers who had returned goods. Financial Losses and related remedies:
1. TJX had booked a cost of $168 million for the data breach it had announced in February 2007.
2. $21 million is projected as a possible hit for 2008.
3. Three years of credit monitoring and identity theft insurance coverage for all the customers, whose identification information was compromised.
4. Offer vouchers to customers who shopped at TJX during security violation and who had incurred certain costs as a result of intrusion.
b. Describe the industry situation Customers
1. Many customers use credit and debit cards for their shopping.
2. Customers take security issues very seriously and file class actions in the court against the company in any such critical situations. Traditional Competitors
1. Department and specialty stores. Opportunities
1. Strong customer base and loyalty.
2. Availability of

Get Access