Company Overview
Meridicom is a price leader in communications industry with its top of the line broadband, mobile and landline services. It has largest market share in landline and broadband but very small presence in mobile services. Its major competitors which include big mobile companies, cable TV operators and internet providers follow lead as per the prices set by Meridicom.
Case Assessment
Telzip, small company having 5% market share in landline, has challenged Meridicom by offering life time free broadband to business users who are willing to accept a long term contract. The customers largely being affected in this case are the business users which are currently paying around 450 Euros per year to Meridicom. Though the
…show more content…
Customer Care and Feedback
Meridicom should have customer care representatives that are more knowledgeable and responsive to the needs. Providers should support several contact methods including by telephone and email and facilities like “Call me” and “Schedule a call” on their webpages along with providing helpful information online like FAQs, tutorials, device manuals and other supportive documentation. Customer complaints should be dealt as soon as possible and feedback gathering mechanism should also be put in place.
Data Security
Given the competitive environment and the sensitivity of the data that the companies might be dealing with, data security and privacy is a major concern for the business users. As aspects of the business become more “digitized” and accessible through or gleaned from broadband use, the disclosure of previously private, personal information has made many businesses wary of the medium. Having used Meridicom services for a longer time, business users trust them more. Meridicom can question the data security being offered by the cheaper broadband alternatives and at the same time ensure that they promote the reliability and security of their network in handling the sensitive information pertaining to the business users.
Segmentation
Business strategy should be different for individual and business customers. Business customers value safer
The future of the telecommunication industry is an exciting future. No longer can these companies depend on telephone service plans to maintain profit. Each company needs to find other avenues, packages and services that can be sold to existing customers while attracting new customers. The companies
The consumer expects that when using a public computer for a specified task such as printing through a service, that the data or material is protected from other users including employees. When using a public computer for internet surfing, tax filing banking, etc. the general public user does not always think about the threats to security of their own personal information. It is important for the company to protect the users in addition to the users understanding the potential threats that exist when entering personal information.
In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.
After watching the video, I believe that the shooting was unjustified in a sense because the cop could have used his knowledge to defend himself in a different way. I do not believe that in the police academy, they say to shoot a person right away after being assaulted. It was obvious that the man was drunk and had no gun, so he decided to go grab another weapon instead to injure the officer. From my perspective, it looks like the cop was very scared and caught off guard to where he decided to use the gun he had in his hand without acting appropriately and fast. The cop had grabbed the gun from his pocket immediately as the drunk man ran away and seemed ready to use the gun. To me, this cop looked like an amateur and not equipped to think accordingly during this incident.
business data can be compromised due to unauthorized access or use which can lead to damage to reputation, brand and company’s physical assets
Vodafone is one of the most important players on the European telecommunications market. However, this does not mean that the company has an easy job at retaining its customers and at increasing its market share. The most important competitors of Vodafone are represented by Orange and Cosmote. The regulations in the business field determine these companies to provide similar products and services, at similar prices. Therefore, it is important that Vodafone focuses on its communications strategy in order to strengthen its position on the market.
In this paper we will look at defining the problem of data security and public administration. The reader will see the evidence gathered to get a better understanding of the problem of not securing data when sending it. The reader will learn different alternatives to how they can ensure the data is secure.
active in France since 1999.” (Marketline, 2012). By offering mobile phone service at a lower
As technology grows and information has become a critical asset companies currently are devoted their resource and money to protect their data as important as their finance and human resource assets.
While all of these technologies have enabled exciting changes and opportunities for businesses, they have also created a unique set of challenges for business managers. Chief among all concerns about technology is the issue of information security. It seems to be almost a weekly occurrence to see a news article about yet another breach of security and loss of sensitive data. Many people will remember high profile data breaches from companies such as T.J Maxx, Boston Market, Sports Authority, and OfficeMax. In the case of T.J. Maxx, a data breach resulted in the loss of more than 45 million credit and debit card numbers. In many of these incidents, the root cause is a lack of adequate security practices within the company. The same technologies that enable managers can also be used against them. Because of this, businesses must take appropriate steps to ensure their data remains secure and their communications remain
As technology and the Internet continue to exponentially grow, unscrupulous individuals continue to create new security risks for organizational privacy, confidentiality and data integrity. Because almost all network-based services and applications pose some level of security risk, personal and business information must protected through enhanced security systems and controls. Managed IT service providers often offer the highest levels of security that protect assets, maintain integrity, ensure availability and ensure confidentiality.
The use of information technology in business presents major security challenges, poses serious ethical question, and affects society in significant ways. Especially, the computer crime is a growing threat to society and is caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and the Internet and other networks. It presents a major challenge to the integrity, safety, and survival of most business systems.
Securing data that is sensitive for businesses is more important today because of how vulnerable data is, compared to what it has ever been. National security information, corporate trade secrets, social security numbers, personal medical records, and credit card information are all used, transmitted, and stored on the internet and other multimedia devices.
The business case presented focuses on insatiable demand amongst a growing population for a service built on dilapidated, poorly maintained infrastructure, against a backdrop of government deregulation in the telecoms sector. As of 1992, there were a mere 78k telephone lines for the 27m people living in 4.7m households (a population set to double over the coming 24 years), with users suffering success rates of just 25%. Demand was forecast to grow to 500k subscribers by 1996. The recent deregulation of the telecoms sector (via the break-up of TPTC into TPC and TTCL) and the formation of a regulator (TCC) had
The issue of privacy has become one of the hottest topics in information. Privacy deals with both ethical and legal aspects of the organisation. The right of individuals to be left alone and secure their personal papers or data by looking at the information that customers provide to the organisation website is secured that no one but the Royal Philip Electronics staff have access to the information and protect it from the outside people. This will give confidence to the customers that their information that has been corrected will be used explicitly for providing services and not for any other purposes.