Please respond to the following:

Reading Time: < 1 minute

  • Review the article / video below, which sets the stage for your discussion response.
  • Based on the video, did the company presented in the video allow a breach of security based on the laws and ideas discussed in the text? Why or why not? What was done to help remedy the situation, and was it enough based on the legal standard? What legal steps should the company take (or should the company have taken) to avoid personal identity or information from being compromised? Be sure to support your response.

please no paper.