Under Armour (UA) is an American Manufacturing company, which manufactures sportswear, footwear and various casual apparel (Jensen et al. 2016). The company was founded by Kevin Plank in 1996. The report is based on a major data breach that occurred to MyFitnessPal, which is the fitness application of Under Armour. The data breach that had taken place within the application was meant to steal the private data of the users of the application. This report focusses on the various data breaches that have occurred and the ways to mitigate the risks of data breaches (Romanosky, Hoffman and Acquisti 2014).
Under Armour was founded by Kevin Plank in 1996 who was a formal football player associated with the University of Maryland. The company was initially named as KP Sports. They changed their name in the year, 2005. It was believed by Plank that the potential of Under Armour was for a long term growth that could be achievable due to the ability of the company in order to build a powerful brand in the market.
Under Armour has the world’s first connected health and fitness tracker system. The name of the application of Under Armour is MyFitnessPal (McGrath and Scanaill 2013). The application consists of several facilities such as track of the sleeping activities, activity of the fitness of an individual and nutrition. The application can also support the facility of setting and reach those goals, connect with the synced devices and thus follow friends. With the help of the application, users can set their fitness goals for a particular day and thus try to achieve them. The MyFitnessPal application is available on both the IOS and Android Platform. Devices can easily connect with UA HealthBox, UA Scale, UA Band and UA HeartRate. There are many other application such as MapMyFitness in order to combine the collected data and thus this would provide a view of the activity of an individual and their progress track. Users can also share their UA Record activity with the Apple’s heath application (Laing et al. 2014).
The health and fitness application of Under Armour was hit by a data breach attack. The attack on the data of the users had affected nearly 150 million people. The investigation on the activity of the data breach had indicated that the information that was affected included the usernames of the individuals, hashed passwords and email addresses of the users. The effect of the data breach could lead to the leak of many important information of the users such as the payment details of each user (Dehling et al. 2015).
The information security risk from the data breach on the application could lead the hackers to obtain the details of the payment of the users and other information such as their social security numbers and even their driving license numbers. The hackers could also get a hold of the bank details and the account numbers of the users. Due to this, the major risk that could have occurred is that the important documents of the users of the application would have been acquired by the hackers and hence their confidential data would have been prone to danger. These vital information could be leaked if hackers were able to penetrate into the entire system.
The IS risks that had affected the application could have a major impact on the business sector of Under Armour. It could also affect the reputation of the company. Users would not be able to keep their trust on the efficiency of the organization and thus would shift their focus on other competitors in the market. This would affect the business side of the organization as there customer base would fall down and thus their revenue would be affected (Ackerman 2013).
Audit Plan – Under Armour is an extremely successful and a powerful growing brand in the athletic clothing industry. The audit of the brand is meant to keep an overlook of the activities of the brand within the international market and the reaction of the consumers with the products offered by the brand. The main purpose of the audit is to look into the business procedures of the business and to understand their position in the international market. It is also necessary to look into the security implications that are made by Under Armour in order to ensure the confidentiality of the user data and thus secure their vital data (Gray et al. 2016).
The areas that would be needed to be outlined in the audit plan are: Promotion strategies, improvement of product categories, programs for marketing support and the security implications of the brand.
Promotion Strategies – UA also makes use of several channels in order to promote their brand in the international market. They make use of traditional and new media technology to reach out to the people. They market their products on the social media platform, online advertisements, online videos and other venues of advertising (Michaels and Greene 2013).
Improvement of Product Categories – UA has mainly focused on offering different kinds of products, which includes shoes, apparel and accessories. These products are available for all kinds of people in order to satisfy their different needs. They focus on delivering high quality products, which includes basket shoes, hiking shoes, sandals, boots, running shoes and many others. With the increase in demand of their products, UA has also expanded their lines of products in other areas that includes hunting, athletics, sports uniforms, jerseys and military wear (Biswas and Roy 2016).
Programs for Marketing Support – The products of Under Armour are considered to be of high quality by their customers. There are a large number of products that are offered by the brand. The products of UA are sold in many places, which includes brand stores, online platforms and sporting stores. These provide a number of options and choices to the consumers. The marketing programs of UA could also be viewed on the television. The customers of UA are mostly connected with the brand on the social media platforms such as Google+, Instagram, Twitter, Facebook and many others. With the help of these kinds of marketing in the media, UA also encourages their consumers to participate in the marketing of their products.
Security Implications – Under Armour is dedicated towards securing the personal data of the user. They would only disclose the personal data of the user upon acknowledging them. The disclosure of the data of the user would be meant for the business purposes of the company. They share the personal data of the user with third parties only with the consent of the user (Zhou and Piramuthu 2014).
UA retains the personal data of the user as long as the user maintains an account with the organization. UA would provide their services to their consumers who have maintained their account with the company. They retain and thus use the personal data in order to conform to the legal obligations, enforce agreements and thus resolve any kind of disputes.
Objectives of the Audit Plan – The objectives of the plan of the audit includes the following:
Procedures for Auditing the Selected Areas – The main procedures, which should be implemented in order to audit the selected areas are:
Promotion Strategies – In order to improve the business scenarios, UA should highly focus on promoting their products on a wide basis. They should conduct a survey of the promotional strategies that are adopted by other competitors and thus implement new ways to promote their products.
Improvement of Product Categories – The Company should conduct a survey among their new and existing customers. They should understand the choices of the customers. Based on auditing the varying choices of the customers, UA should conduct implementations on improving their products.
Programs for Marketing Support – The current marketing strategies should be taken into consideration and based upon them, UA should provide offers to their customers. They should conduct polls within their customers. This would let them to know about the ways in which their customers would adopt techniques of purchasing their products (Armstrong et al. 2014).
Security Implications – The current strategies of security should be considered. Security is a major area of concern for UA. Hence, security experts should be consulted by the team at UA in order to check the systems, which are meant to protect the data of the users (Sametinger et al. 2015).
The questions for the conduction of the audit are:
Promotion Strategies –
Improvement of Product Categories –
Programs for Marketing Support –
Security Implications –
As Under Armour was affected by a serious data breach in which the vital data of the users was vulnerable to attacks, hence the security team of UA should follow some recommendations that could be followed in order to prevent such future attacks.
Ackerman, L., 2013. Mobile health and fitness applications and information privacy. Privacy Rights Clearinghouse, San Diego, CA.
Adolph, M., 2014. Big data, its enablers and standards. PIK-Praxis der Informationsverarbeitung und Kommunikation, 37(3), pp.197-204.
Armstrong, G., Adam, S., Denize, S. and Kotler, P., 2014. Principles of marketing. Pearson Australia.
Biswas, A. and Roy, M., 2016. A study of consumers’ willingness to pay for green products. Journal of Advanced Management Science Vol, 4(3).
Dehling, T., Gao, F., Schneider, S. and Sunyaev, A., 2015. Exploring the far side of mobile health: information security and privacy of mobile health apps on iOS and Android. JMIR mHealth and uHealth, 3(1).
Gray, S.E., Sekendiz, B., Norton, K., Dietrich, J., Keyzer, P., Coyle, I.R. and Finch, C., 2016. The development and application of an observational audit tool for use in Australian fitness facilities. Journal of Fitness Research, 5(1), p.29.
Jensen, J.A., Wakefield, L., Cobbs, J.B. and Turner, B.A., 2016. Forecasting sponsorship costs: marketing intelligence in the athletic apparel industry. Marketing Intelligence & Planning, 34(2), pp.281-298.
Laing, B.Y., Mangione, C.M., Tseng, C.H., Leng, M., Vaisberg, E., Mahida, M., Bholat, M., Glazier, E., Morisky, D.E. and Bell, D.S., 2014. Effectiveness of a smartphone application for weight loss compared with usual care in overweight primary care patients: a randomized, controlled trial. Annals of internal medicine, 161(10_Supplement), pp.S5-S12.
McGrath, M.J. and Scanaill, C.N., 2013. Wellness, fitness, and lifestyle sensing applications. In Sensor Technologies(pp. 217-248). Apress, Berkeley, CA.
Michaels, C.N. and Greene, A.M., 2013. Worksite wellness: increasing adoption of workplace health promotion programs. Health promotion practice, 14(4), pp.473-479.
Rodrigues, J.J., De La Torre, I., Fernández, G. and López-Coronado, M., 2013. Analysis of the security and privacy requirements of cloud-based electronic health records systems. Journal of medical Internet research, 15(8).
Romanosky, S., Hoffman, D. and Acquisti, A., 2014. Empirical analysis of data breach litigation. Journal of Empirical Legal Studies, 11(1), pp.74-104.
Sametinger, J., Rozenblit, J., Lysecky, R. and Ott, P., 2015. Security challenges for medical devices. Communications of the ACM, 58(4), pp.74-82.
Zhou, W. and Piramuthu, S., 2014, June. Security/privacy of wearable fitness tracking IoT devices. In Information Systems and Technologies (CISTI), 2014 9th Iberian Conference on(pp. 1-5). IEEE.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Analysis Of Security And Privacy Requirements. Retrieved from https://myassignmenthelp.com/free-samples/analysis-of-security-and-privacy-requirements.
"Analysis Of Security And Privacy Requirements." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/analysis-of-security-and-privacy-requirements.
My Assignment Help (2019) Analysis Of Security And Privacy Requirements [Online]. Available from: https://myassignmenthelp.com/free-samples/analysis-of-security-and-privacy-requirements
[Accessed 01 April 2020].
My Assignment Help. 'Analysis Of Security And Privacy Requirements' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/analysis-of-security-and-privacy-requirements> accessed 01 April 2020.
My Assignment Help. Analysis Of Security And Privacy Requirements [Internet]. My Assignment Help. 2019 [cited 01 April 2020]. Available from: https://myassignmenthelp.com/free-samples/analysis-of-security-and-privacy-requirements.
For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.
Answer: Introduction The essay aims at providing an insight into the fact as to how remuneration has been one of the factors for motivation within society. A distinct system for compensation ensures in employee motivation that further results in the increase of the productivity. The essay focuses on relationship between motivation and the level of the pay. Bolman and Deal (2017) put across in the study that most business acts like an in...Read More
Answer: Introduction BlueScope Steel Limited is one of the leading Australian manufacturing company that face challenges in terms of their information system (BlueScope Corporate, 2019). Therefore, the study will propose a new information system that should be developed by the BlueScope Steel Limited of Australia in the future. In order to determine this, various procedures related to this manufacturing company such as the critical success fa...Read More
Answer: Samsung is a global conglomerate that has its origins in South Korea and the headquarter of the organization is located in Samsung Town, Seoul. Samsung company comprises of different types of affiliated businesses that are united under brand of Samsung. Samsung was established in the year 1938 by Lee Byung-chul. The operations of the company had started with trading business and in the next few years Samsung had been able to diversify it...Read More
Answer: Nowadays, there are different challenges for the financial company is to retain the valuable and talented workforces. The management can control the issue of workforces to prevent from quitting the company within no time to higher extent. However, it cannot put complete full stop on it. This essay discusses the key challenges in attracting and retaining a workforce in the financial sector. In this week, different weeks discussion...Read More
Answer: Introduction The primary goal of every business firm is to make a profit (Aitken, Frino, McCorry, & Swan, 2018). The executives or top administrators of any company must therefore continuously find ways of optimizing business functions to minimize cost while maximizing profit (Cao, Hwang, Li, & Zomaya, 2013). For maximum productivity, the workforce must be motivated and skillful in doing all the necessary business activities to ...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I got a 100 on my paper. Thank you for answer on such a short notice. It was a stiff price overall they responded and had me finish before my deadline!!!
My assignment you did was really excellent and I really like it. I will use this one again. thanks
this is the final assignment for this subject and did everything well and got a D grade for the subject.
this is the final group assignment and needed to upload on Turnitin. I could do my part really well and got a hd for this subject. great work guys.