學門類別
哈佛
- General Management
- Marketing
- Entrepreneurship
- International Business
- Accounting
- Finance
- Operations Management
- Strategy
- Human Resource Management
- Social Enterprise
- Business Ethics
- Organizational Behavior
- Information Technology
- Negotiation
- Business & Government Relations
- Service Management
- Sales
- Economics
- Teaching & the Case Method
最新個案
- A practical guide to SEC ï¬nancial reporting and disclosures for successful regulatory crowdfunding
- Quality shareholders versus transient investors: The alarming case of product recalls
- The Health Equity Accelerator at Boston Medical Center
- Monosha Biotech: Growth Challenges of a Social Enterprise Brand
- Assessing the Value of Unifying and De-duplicating Customer Data, Spreadsheet Supplement
- Building an AI First Snack Company: A Hands-on Generative AI Exercise, Data Supplement
- Building an AI First Snack Company: A Hands-on Generative AI Exercise
- Board Director Dilemmas: The Tradeoffs of Board Selection
- Barbie: Reviving a Cultural Icon at Mattel (Abridged)
- Happiness Capital: A Hundred-Year-Old Family Business's Quest to Create Happiness
Hydropack India Pvt. Ltd.: Resolving a Data Breach
內容大綱
In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology (IT) infrastructure. This had become crucial in the face of a product design leak resulting from an employee who had left Hydropack to join a rival company and taken valuable data with him in the process. The design that Hydropack had made was for a tender floated by a public sector company. The rival company had submitted the stolen design with a lower bid, putting Hydropack's own bid in jeopardy. Darekar now had to rise to the challenge and ensure that Hydropack implemented secure IT infrastructure and policy to avoid further data leaks in the future. His objective was to ensure that all of Hydropack's data in the form of designs and other confidential documents was suitably protected and accessible only to those who had authorized access.