I will pay for the following article Security, Crimes, Compliance and Continuity of IT in Enterprises. The work is to be 9 pages with three to five sources, with in-text citations and a reference page. The major priorities of modern online marketers because the loss of personal customer information/data may adversely affect the credibility and brand loyalty of the organization. Recently many leading online marketers have faced lawsuits as a result of the violations of the stated customer privacy policy. This paper will perform a study about security, crime, compliance, and continuity in Amazon.com with particular reference given to the firm’s data protection policy, information security vulnerabilities, risk management, network security, internal control and compliance.Amazon.com is a multinational e-commerce company headquartered in Seattle, Washington, United States. The company was founded by Jeff Bezos in 1994. Currently, Amazon is named as the world’s largest online retailer with a strong presence in the consumer electronics sector. Although the organization began its operations as an online bookstore, it quickly grew to a world’s leading retailer of CDs, MP3 downloads, video games, computer software, apparel, and food and toys. As Samhain (2014, p. 19) notes, Amazon Kindle e-book reader and cloud computing services are some of the widely recognized innovations of the company. In addition to offering shipping services to several countries, Amazon maintains distinct websites for countries including the US, UK, Canada, Spain, Italy, Germany, France, China, and Japan. The company’s fast and stable growth throughout its corporate history could be attributed to its innovativeness and strategic management efficiency. As of 2013, the company had revenues worth US$ 74.45 billion and a net income of US$ 274 million (Jar Creative, n.d.).Protecting data and business operations is of great significance today in the context of the growing intensity of malware attacks, personal data theft, and credit card fraud. According to Wallace (2013), recent experiences indicate that even the name and contact number of a customer can help hackers or intelligent people.