SlideShare a Scribd company logo
1 of 5
E-Commerce Website Security
Confidentiality ,[object Object]
The data should not be used or passed on to other companies without the customers consent.
If the customer data is used maliciously by hackers etc, the customers will not trust the company again and will stop buying from them which might cause the business to shut down.
This can also happen if the company server gets a virus or software bug which may be passed on to the customers computers when they are inputting their information, or the virus may take the information whilst it is being input to the server.,[object Object]

More Related Content

Similar to E-Commerce Security

Similar to E-Commerce Security (20)

What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
TECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptxTECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptx
 
What is information security and its types
What is information security and its typesWhat is information security and its types
What is information security and its types
 
What is Information Security and its types.pdf
What is Information Security and its types.pdfWhat is Information Security and its types.pdf
What is Information Security and its types.pdf
 
What is Information Security and its types.pdf
What is Information Security and its types.pdfWhat is Information Security and its types.pdf
What is Information Security and its types.pdf
 
What is Information Security and its types.pdf
What is Information Security and its types.pdfWhat is Information Security and its types.pdf
What is Information Security and its types.pdf
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Database Security
Database SecurityDatabase Security
Database Security
 
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
What Strategies Are Crucial for Ensuring eCommerce Security in the Digital Era?
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
GDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it EasyGDPR - Why it matters and how to make it Easy
GDPR - Why it matters and how to make it Easy
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
 
What is Secured Data Room.pdf
What is Secured Data Room.pdfWhat is Secured Data Room.pdf
What is Secured Data Room.pdf
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Importance of e-commerce data security when utilizing a distributed workforce
Importance of e-commerce data security when utilizing a distributed workforceImportance of e-commerce data security when utilizing a distributed workforce
Importance of e-commerce data security when utilizing a distributed workforce
 
How Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdfHow Can You Maintain Data Privacy in the Cloud.pdf
How Can You Maintain Data Privacy in the Cloud.pdf
 
Five ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudFive ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloud
 
How Document Scanning Ensures Data Security and Compliance.pdf
How Document Scanning Ensures Data Security and Compliance.pdfHow Document Scanning Ensures Data Security and Compliance.pdf
How Document Scanning Ensures Data Security and Compliance.pdf
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 

E-Commerce Security

  • 2.
  • 3. The data should not be used or passed on to other companies without the customers consent.
  • 4. If the customer data is used maliciously by hackers etc, the customers will not trust the company again and will stop buying from them which might cause the business to shut down.
  • 5.
  • 6. This also means that the data should not change from the original so it is accurate and reliable.
  • 7. People entering details wrong, making mistakes can lead to data being stored incorrectly in the company system.
  • 8. This can also happen when data is being copied and transmitted.
  • 9.
  • 10. It is also ensuring that the data stays safe and accurate so it is available when it is needed.
  • 11.
  • 12. Passwords etc should be used so that others can not gain access to the data which may be personal such as names and bank details of customers and of the business.
  • 13. Personal data should not be accessed by people outside the business such as other customers etc, and only to people who need it such as the administrators of the business.