Professional Documents
Culture Documents
MBC Group12
MBC Group12
MBC Group12
BUSINESS
OVER CLOUD
PHASE 2 SUBMISSION
Submitted to:
Prof. Shilpi Jain
Submitted by:
Group 12
GROUP MEMBERS
Shubham Jadli 301050
Meenal Sharma 301141
Yatin Chopra 025039
Akansha Vashishth 301062
PHASE 2 MEMBERS CONTRIBUTIONS
Meenal Sharma Pricing mechanism and key business model for revenue generation (Part C)
COMPETITOR ANALYSIS
1. SMART WATCHES
2. WRIST BANDS
3. EARWEAR
Company
Most selling
Earware Smart Watch Earware
smart wearable
COMPETITOR ANALYSIS IN JAPAN
Company
State-of-the-art
design, user-friendly Wearable technology to help High Quality Premium
USP
products, reliability achieve fitness goals Products
and innovation
Most selling
smart Watches Wrist Band Earware
wearable
COMPETITOR ANALYSIS IN MALAYSIA
Company
State-of-the-art
Design, which is more in
design, user-friendly Cutting edge technology and
USP line with a traditional
products, reliability features
watch
and innovation
Most selling
smart Watches Watches Watches
wearable
APPLICATION
FEATURES
RELEVANT PUSH QUICK AND EASY ADVANCED SEARCH SECURE AND MULTIPLE
NOTIFICATIONS REGISTRATION CAPABILITY PAYMENT PROCESS
Can be used for Flash discounts and PROCESS
Filtering, sorting and wishlist If users have a quick and secure way to
sales, item availability etc. An easy and convenient features help ease the customer pay, they are more likely to complete the
They help in: registration process makes your journey and decision making. purchase and come back to you. Besides,
Improve customer experience app more accessible to users the use of one-click secure payment
Ensure maximum interaction increases the number and frequency of
chances purchases.
Effective and personalised
communication
TESTIMONIALS, PRODUCT
REVIEWS AND EFFECTIVE
CUSTOMER FEEDBACK
OFFLINE FUNCTIONALITY SYSTEM
APPLICATION
FEATURES
SCALABILITY
EMAIL-OPT INS
STABILITY PERSONALIZATIONS
PRICING MECHANISM
3 months $150
6 months $270
1 year $500
PRICING MECHANISM
Early bird offers at the start would be a cost which would ease out from 2nd year
companies
These companies are to supply products to us, and they can invest to get ownership
in exchange
These companies also are in the business and know the technicalities which could
help us
VENTURE FUNDING PARTNERS
Investment proposition: Fitness data Investment proposition: Product portfolio, Investment proposition: Patient
connection and tracking
market share and core proposition
Top 5 markets for wearable tech Top 5 markets with greatest sales
potential
USA MALAYSIA
SPAIN JAPAN
TURKEY INDIA
SINGAPORE EGYPT
SWITZERLAND KUWAIT
MARKET SIZE OF TARGET COUNTRIES
Growth in number of
wearable device users
segment
13.9 million units- 2022
INSIGHTS INTO TARGET MARKET
PRICE
(Preferred price range of $200-300): New product
(Preferred price range of $50-200): Used product
UTILITY
These products only have fitness or small technical uses
APPEARANCE
Products that align with how they want to be perceived by others
OTHERS:
PERSONAL 1. Hearable's
MEDICAL AND 2. Augmented
ASSISTED LIVING reality etc.
FASHION
TARGET MARKET SEGMENTS RELATIVE PRICE OF BRANDED AND LOW COST OEM WRISTBANDS
FIGURES IN MILLIONS
TARGET MARKET SEGMENTS MARKET FOR PERSONAL SMART ECGS, BPM, THERMOMETERS AND SLEEP
MONITORS
FIGURES IN MILLIONS
MARKET FOR CHILD TRACKERS (AGE 1‐8)
TARGET MARKET SEGMENTS
FIGURES IN MILLIONS
TARGET MARKET SEGMENTS GLOBAL VIEWPOINT
FIGURES IN BILLIONS
MARKET STRATEGY (India) MARKETING AND COMMUNICATION
CHANNELS
"TECH+HEALTH"
VALUE PROPOSITIONS
Employee wellness
MARKET STRATEGY (Malaysia) MARKETING AND COMMUNICATION
CHANNELS
SECURITY POLICY
Subscribing to AWS security hub
Automated, continuous security best practice checks
BACKUP PLAN
Will implement a 3rd party back up solution: Data encryption, restoration and auditing
Set up data access policy
Test the restore process: To make appropriate contingency plans
Follow compliance standards
IT Setup
Scalability
Software Packages to use
Features
Free CRM
Email Analytics
List Segmentation
Reporting Dashboards
Automated Workflows
Social Media Integration and Management
Paid Ad Tracking
Software Packages to use
Features
Cloud Based
Integrated Platform
Express legislation governing data protection or privacy Rules only deal with Sensitive personal data or
information of a person which include:
1. THE (INDIAN) CONTRACT ACT, 1872
Passwords
2. INFORMATION TECHNOLOGY ACT, 2000 Financial information such as bank account or credit card or debit
card or other payment instrument details
Physical, physiological and mental health condition
a. Payment of compensation and punishment for violation of Sexual orientation
Medical records and history
contractual terms
Biometric information
b. Section 43A : Negligent in implementing and maintaining
reasonable security practicesLiable to pay damages ( No
upper limit for compensation) Exceptions to rules (Govt ordered)
Sovereignty or integrity of India
c. Section 72A : Disclosure of information, knowingly and Defence of India
intentionally, without the consent. Punishable with Security of the State
imprisonment. Friendly relations with foreign States or
Public order
d. Section 65: Knowingly or intentionally conceals, destroys, or
To prevent incitement to the commission of any cognizable offence
alters any computer source code.Punishable with relating to above
imprisonment. For investigation of any offence
OUTSOURCING OF DATA SECURITY AND BACKUP
SERVICES
Data security and data backup is the utmost priority when working on an app which requires
the user to share their data with us. For users registering on LOOP we would require the
following 3rd party services for data protection.
APPI (Act on the Protection of Personal Information) APPI amended (2016) to include database containing details of
(Amended in 2016) more than 5,000 persons on any day in the past six months.
The Personal Data Protection Act 2010 (PDPA) NO Specific law for cybersecurity offences
Cross-sectoral framework for the protection of personal data
Enforcement agencies use existing legislation (Communications and
Multimedia Act 1998 (CMA), the Defamation Act 1957 and the Sedition
Electronic Business Act 1948, to combat cyberthreats
commerce transaction
Prior PDPA, data protection obligations were mainly
Strict requirements who collects or processes personal data due to confidentiality obligations, while personal
Enforced by the Commissioner of the Department of Personal Data information was protected through contractual
obligations or civil actions for breach of confidence.
European-style privacy law (Data Protection Directive 95/46/EC of the
European Union)
The Credit Reporting Agencies Act 2010 (Regulatory oversight of Ministry of
Constant development for identified gaps within the
finance)
PDPA when compared to personal data protection
Organisations possess technical and organisational security to safeguard data legislation in ASEAN member nations
ISO/IEC 27001 Information Security Management System (ISMS)
(International standard)
PDPA does not constrain government access to personal data