View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
Distributor has developed information system that reads data up and down supply chain
Store inventories of all retailers are low. You know retailers will be sending rush orders. You have overstocked on supply. You query manufacturers’ database and find finished goods are low. You increase your price claiming extra transportation costs, but increase was to increase your profit instead.
Competitor has large supply as well, and does not increase price, so you sell no product. You want to track competitor’s inventories, which can be estimated by watching on manufacturer side and comparing to decrease sales on retail side. You know what was made, sold, and left competitor’s inventory.
Your agreement with customers permits you to query their inventory levels, but only for orders they have with you. You are not to query orders they have with your competitors. A system has a flaw and allows you to query all orders.
Assume same agreement as situation C. One of your developers writes a program allowing you to exploit a hole in retailer’s security system. This gives you access to all of retailer’s sales, inventory, and order data.
Legal? Ethical? Smart? What’s the risk to you and your business?
How do you protect your systems and data in a supply chain?