You are on page 1of 2

Case Study

Shirts Inside a Box of a Gaming Console

1. If you are one of the owners of NinjaMoves, what could you done or suggest
preventing this from happening?

A strong security culture not only interacts with the day-to-day procedures, but also

defines how security influences the things that your organization provides to others.

Those offerings may be products, services, or solutions, but they must have security

applied to all parts and pieces. A sustainable security culture is persistent. It is not a once-

a-year event but embedded in everything you do.

2. Give that main culprit on this situation is the courier service, does your group think
that NinjaMoves can still be held legally liable? What laws did they violate?
The Agreement and Business Law Act, which covers the transporter's risk for misfortune

or harm to all items while they are with the transporter the Buyer Ensures Act (CGA),

which covers some other misfortunes if the transporter does not finish the conveyance

with sensible ability or care. At the point when you sort out to have something freighted

or couriered to you if there is misfortune or harm you do not need to demonstrate its

motivation. All carriage contracts should be recorded as a hard copy. You and the

transporter should examine and concede to the conditions of the agreement. Their risk for

misfortune or harm relies upon the sort of agreement you pick. You can browse four sorts

of transporter contracts. All carriage contracts must be in writing. You and the carrier

must discuss and agree on the terms of the contract. Their liability for loss or damage

depends on the type of contract you choose. You can choose from four types of carrier

contracts.

This study source was downloaded by 100000836560341 from CourseHero.com on 02-28-2022 00:41:36 GMT -06:00

https://www.coursehero.com/file/114019500/2-Activity-1-TECHNOdocx/
3. Using your mobile phones and Internet connection, name at least one (1)
technopreneur enterprise that gives prime value on the safety of its purchase, data,
and privacy.
Keep security programming flow on all gadgets that interface with the web: what you

look for on the web and where you shop and live, has esteem – much the same as cash.

Own your online presence: Use security and protection settings on sites. Similarly,

likewise with email, portable solicitations for individual information or prompt activity

are.

This study source was downloaded by 100000836560341 from CourseHero.com on 02-28-2022 00:41:36 GMT -06:00

https://www.coursehero.com/file/114019500/2-Activity-1-TECHNOdocx/
Powered by TCPDF (www.tcpdf.org)

You might also like