Course Hero Logo

Product liability overview product liability is used

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 6 - 8 out of 8 pages.

Product Liability OverviewProduct liability is used by the suppliers to try and protect themselves from anywrongdoings that may occur from Amazon. Suppliers of cybersecurity products do this byinforming the purchaser of any warranty disclaimers and the limitations that have been placed ontheir product. It is highly encouraged that Amazon read and follow these specific directions prior
to utilizing anything from the supplier (Riedy & Hanus, 2017). Due to the seriousness of thedisclaimers that have been placed on the items, it is a standard practice that the United Statescourt system hold the supplier liable for any wrongdoings only if the product is used for itsintended purpose by Amazon. If Amazon is not willing to follow the directions and use theproduct as prescribed, then Amazon has no means to legally pursue any wrongdoings of thesupplier (Riedy & Hanus, 2017). There is however, the argument that Amazon may choose tofollow, which is the “cause-in-fact” argument. This can be used by Amazon to try and hold thesupplier liable for the wrongdoings that may have occurred. Due to the rapid movement ofcybersecurity products and the use of malicious activity, it would be very difficult for Amazon toproperly provide evidence to hold the supplier legally responsible for any data or financial losses(Riedy & Hanus, 2017).Summary and ConclusionsIn summary, suppliers of cybersecurity products are not immune to malicious activity andhave to make sure that they are able to provide the best product available for companies such asAmazon. That product must meet the high standards and needs to be able to be invulnerable tothe operational risks that many cybersecurity organizations face. By being able to do so, thesupplying organization is allowing Amazon the ability to limit financial losses, prevent PIIexposure of client data and building organizational and customer loyalty. If the situation were toarise where legal actions need to take place, the supplier will need to ensure that the warrantiesand disclaimers that have been placed on their products have been highlighted and this will allowfor contractual agreements to be preserved.
References:Cebula, J., Popeck, M. and Young, L. (2014). A Taxonomy of Operational Cyber SecurityRisks. Version 2. Retrieved fromon18 April, 2019Depillis, L. and Sherman I. (2019). Amazon’s Extraordinary Evolution: A Timeline.Retrieved from-timeline/index.htmlon 18 April, 2019NIST Cybersecurity Framework (CSF) Reference Tool. (2014). Retrieved fromon 18 April, 2019Prime Indexes. (2019). Cyber-security Industry Review. Retrieved fromon 18 April,2019Riedy, M. & Hanus, B. (2017). It is Just Unfair Using Trade Laws to “Out” SecuritySoftware Vulnerabilities.Loyola University Chicago Law Journal, 48, pgs.1099-1134.Retrieved from-4/12_Riedy%20(1099-1134)%20CROP.pdfon 18 April, 2019The Wall Street Journal. (2019). Amazon.com Inc. Retrieved fromon 18 April, 2019Upguard. (2016). What is Upguard? Retrieved from-is-upguardon 18 April, 2019
End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
na
Tags
Communications, Amazon com Inc, Operational risk

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture