Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Review the internship activity, “Industry: Retail” (this can be found in the “Re

ID: 3859593 • Letter: R

Question

Review the internship activity, “Industry: Retail” (this can be found in the “Read, Study, Practice” section under Reading Content in WileyPLUS, Chapter 4). Hannah Shaw, marketing director for Caesars Entertainment in Las Vegas has asked us to review Customer Relationship Management (CRM) security policies to ensure the security of their customer data. Research CRM security policies online and reflect on the following: What are some necessary elements to a well-rounded security policy for Caesars Entertainment?

Explanation / Answer

Customer Relationship Management tools are excellent tools for managing relationships.
There are many important concerns that need to be addressed in order to maintain the privacy and efficiency of the
Customer Relationship Management (CRM) security policy for Caesars Entertainment.

In Caesars Entertainment They have recently chosen Salesforce.com as their CRM tool.
Their goal is to create a very unique experience to their customers.Physical mesure,technical measure,social measure

Here we consider three types of security measures known as

I think Information Security will require physical measures like (physically locked doors, security guards, etc.),
First and foremost, physical, technical, and administrative measures must be in place to ensure that if a threat is present
, data isn’t compromised.Biometric scanning is also used to provide an added physical security measure.

Incase of technical measures (firewalls, authentication methods, etc.),
but am not sure of the right balance of these.
An information resource's vulnerability is the possibility that the system will be harmed by a threat.
Salesforce.com maintains data thoroughly and securely.

social measures (training) A threat to an information resource is any danger to which a system may be exposed.
The exposure of an information resource is the harm, loss, or damage that can result if a threat compromises that resource.
The data center maintains 24 hour support as well as security services.External threats such as weather can also affect
the reliability and security of data.

After considering these requirements, provide a report to me that outlines how I can create a well-rounded security
policy for Caesars Entertainment that will protect the data we hold on our customers.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote