Cloud Data Usage

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load.  Data is not static and neither is how it could be directed for load…

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Data Privacy

Data protection sought in daily entity operations and in its actual delivery of services, should coexist with the responsibilities for consumer data privacy.  This second piece follows its previous writing which addressed the coexistence of protection and privacy from an institutional perspective.  In furtherance of that theme, this piece will touch upon the organizational aspect involved to see…

Internet Computing Terms

Internet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few.  As these terms arise in conversation, contracts…

Business Data a Trade Secret

Business data in business could be considered a trade secret as it is an essential component of analysis and decision-making.  Businesses cannot compete without relevant data for their administration, process and service delivery.  Trade secrets in database records have value.  Such secrets are sought for competitive reasons. Intruding, a kind word for hacking, into another’s…

Data Security Negligence

Data security responsibilities are, at times, not met with the requisite level of diligence for compliance.  Standards for compliance, for many businesses, institutions, and service entities, are not as specified as one would be drawn to believe.  The disjuncture between responsibilities and efforts are becoming more evident with passing days as cyber incidents leave alarming…

Cyber Security Claims

Cyber security claims are seldom tempered with an entities acknowledgement of its insecurity of electronically stored information (ESI) and its handling of consumer personal identifying information (PII).  Their efforts and planning executed, though they may be diligent, cannot anticipate cyber incidents and breach incidents nor should their efforts to prevent them be overstated.  All attention…

Trade Secrets in Databases

Database as a Trade Secret Trade secrets in database records fall victim to many who seek the potential value of stored records from a variety of entities, either from government agencies and competitor businesses, to also include medical and financial enterprises, and even from their own employer or client.  Intruding into another’s database is becoming…

Website Crawling and Data Scraping Thoughts

Website crawling and data scraping have burdened the growth of e-commerce as website owners are witnessing their data scraped.  The legal questions have lingered.  Many questions stand out.  The prevalence of crawling and scraping has become too of the norm for those using web content for business, research, or marketing purposes. The common theme is…

Data Security Practices

Data security practices are increasingly becoming a theme among management and employees in the administration of business and their daily work process.  The common element in data breaches is the element of human negligence, training or the underestimation of needed attention.   The extent that incidents are occurring, information technology personnel and operations personnel are finding…

Data Breach Insurance

Data breach insurance is becoming a growing concern and a topic for businesses to address their risk management administrative panoply. Considerations may sway a business towards a third-party insurance coverage or a first-party insurance coverage or both depending on the services provided.  Previously posted writing regarding the cyber insurance needs, we discussed the limits that…

Computer Abuse by Password Sharing

Computer abuse can occur by the simple act of password sharing to gain access to a computer and its network. Password sharing for use of a computer is seldom realized as a wrongful use.  It is as well not realized by many account holders that sharing their account passwords or access passwords is as well…

Internet Security – Passwords’ Way into a Life

Internet account security and weak passwords are all too common when causes to cyber incidents are investigated.  The ease of use of one’s birthdate, anniversary, and the incredibly savvy use of ‘admin’ or ‘password’, not to mention ‘12345,’ has gotten many in a serious predicament.  Not following through on login processes and seeking shortcuts has…

Internet, Internet of Things and Cyber Threats

Internet of Things or “IoT,’ as commonly referred to, have proliferated our culture and will continue as they acquire growing attention with functionality and ease.  Their attraction is in their usefulness engendering efficiency, productivity, and an expectation of enhancing one’s fitness and along with self-awareness. The idea of IoT has brought the attention of platform…

Ransom Seeking Malware, What to know and Do

Ransom seeking malware is nefarious and it comes in different flavors.  The hedge of control is to hold hostage vital information within your network in exchange for compensation.  Healthcare providers, financial institutions, and government entities have been the victim.  Its variants and its methods are complicated means of affecting ways an entity accesses its information…

Internet of Things, Risks and Security

Internet of things and the interconnectedness of devices has inherent drawbacks.  Initially, the convenience of using interconnected devices overcomes the awareness of the lack of control over the information that is gathered about their use.  The convenience and allure of the novelty of Internet of Things catch everyone’s whim to acquire the latest. But unfortunately,…

Consumer Data Security Claims Monitored

Consumer data security claims by many businesses seek to settle the fears and doubts of many consumers engaging in electronic payments.  Those representations should be tempered with an accurate description of its practices to keep consumer information and transaction data secure.  Several agencies have been tasked with a different scope of authority.  Data security has…

Cyber Security Events and Lessons of 2015

The process of cyber security is an everyday occurrence in every entity, from government to small and large enterprises.  A handful of events took place in 2015, each shedding a lesson or two going forward.  Counseling clients on requirements always involves sharing best practices, despite them not being a guarantee.  But always the focus is…

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…

Cybercrime Considerations for Cases

There are cybercrime considerations for cases as well as there is a judicial learning curve when it comes to cybercrime and judges  are not alone.  Cybercrime harm cannot be assessed with the mindset of assessing punishment as if it was a physical criminal act without assessing the extenuating consequences of a cyber-criminal act.  In cases…

Cloud Technology Use for a ‘God View’

Uber’s cloud technology use for a ‘God view’ was exciting to experience among its employees.  With every innovative creation there is always the bit of excitement and a bit of dreaming of the capability devoid of cognition for security and for its ramifications.  To insert concepts of security and considerations of ramifications is a downer,…

Cybersecurity Breach Aftermath with FTC

Cybersecurity and cybersecurity breach are difficult topics to discuss with clients because of the unknown variants and for their simple trepidation toward addressing the vulnerabilities and investing the capital for prevention and training.  From internal planning involving establishing a process to addressing external intrusion possibilities they tend to be cumbersome for a company’s administration to…

Cybersecurity, Internet of things in the Last Quarter

Cybersecurity and internet of things did capture Capitol Hill in this last quarter of 2015, pardon the football metaphor, and needless to say net-neutrality as well.  With physical objects being interconnected and collecting user data and sharing data as well, regulators and privacy groups saw the improved efficiency accompanied with the torment of loss privacy…

Cloud Service Use and Having an Exit Strategy

Cloud service uses, methods and liability considerations are all involved in an appropriately devised exit strategy for any enterprise.  This could be in the form of a backup method for redundancy in service delivery or data management.  For many businesses, the cloud use transitioning process is key for being able to maintain reliable services.  Minimizing…

Identity Theft Event Responses

Identity theft laws in states may vary by state but a notice requirement is common among them.  The frequency and extent of data breaches is staggering with the Identity Theft Resource Center (ITRC) recording over 700 breaches so far recorded in 2015 affecting roughly 200 million records.  The previous year, the ITRC recorded for 2014…

Cybersecurity Buzz in Washington

Cybersecurity is at issue and a buzz in Washington with a bit of urgency and cluelessness.  From addressing anti-hacking methods to cyber security threat sharing, Congress, federal agencies, and the White House are trying to flatten their learning curve.  Private companies have been drawn in to give their two-bits and compare notes on cyber security…

Internet Technology and Encryption

Internet technology and encryption is placed at the forefront of the debate about how to process, store, secure, report, you get the picture, of communication that are otherwise deemed private.  The discussion embraces the ideas of using back-door means for law enforcement to peruse and search for possible suspects of the terror and their plots…

Trade Secrets Act Update

Trade secret law and practice is about to change if Congress pursues the “Defend” Trade Secrets Act with the current provisions.  Not only will the practice change, rights as well as competition, may be affected for the worse.  The attention that this legislative activity is getting regarding trade secrets is scant to say the most.  …

Consumer Harm in Data Breach Cases

Consumer harm in data breach cases is a critical element to be proven.  Many cases are dismissed when standing is not established.   Commonly, the claims raised assert that some sort of reasonable and appropriate security measures to protect personal identifiable information in a company’s networks was not implemented. Any failure to do such is arguably…

Cloud Access Security Broker

As service providers and developers seek to encourage cloud service adoption, the role of a cloud access security broker, i.e., CASB, is seen as central to the effort.  The efforts to arrive at standard practices for cloud data security processes, are essential operational benefits of employing a CASB.  The role of a CASB is enhanced…

Standing in Data Breach Cases

After years of hesitation to find standing in data breach cases, federal courts are now viewing factors to base standing.  When the matter has been the disclosure of personally identifiable information (PII), the courts have not found standing in data breach cases because they required evidence of actual usage of that PII.  The actual suffering…

CISA

CISA The U.S. Senate passed the Cybersecurity Information Sharing Act (“CISA,” S. 754). In passing it had to consider a variety of issues before it regarding the amendments to CISA.  The proposed amendments of CISA have one goal in common, to enhance privacy and strengthen the privacy. One of the issues was to clarify the…

Security of Internet of Things

The security of internet of things is unknowingly pervading our everyday life.  Items that can be remotely accessed for information, turned on to operate, adjust their operation settings, and process into a network are all fraught with vulnerabilities.  Security of internet of things is just becoming news worthy to some and ignored by great majority.…

Internet is Changing Business Models

Internet is changing business models on daily business operational practices from brick-n-mortar constructs to digital information transfers, from a letter or phone call to a “textmail” or “e-mail.” The process has brought a down scaling in what used to be large administrative organizations to efficient self-employed entrepreneurs. The latter is the future and it is…

Balancing Privacy and Encryption

There is no perfect security when balancing privacy and encryption. However, companies storing and collecting data are obliged to focus on higher protection levels. End user controls are receiving greater attention as events increase in frequency. The unfortunate aspect is the prevalence of naiveté about security among users of smartphones, laptops, tablets, and cloud applications.…

Data Protection Harm

Data Protection Law – Consumer Protection Law Data protection harm has become key in courts determining standing in data breach cases.  Data protection harm was analyzed in a case involving breaches and hacking of personal information.  The 7th Circuit’s attention was drawn where it reversed a district court ruling holding that where future harm suffices…

Internet Privacy – Florida Privacy Protection Act

Internet Privacy Law – Florida Internet Privacy Law The flow of information from internet usage and ‘ Internet of Things’  is easily accompanied with its collection and systemic use for other purposes. Digital profiles are created with every online user’s key stroke, site visited, and key word used. In 2015, the Florida Legislature addressed many…

Cyber Security and Assessing Cyber Liability – An Internet Law Lawyer’s comment

Cyber security is an aspect of insurance that new and growing and with it there is the need to assess liability and the needs of the business.  Securing insurance coverage for cyber-attack events should address your cyber liability. Considerations should address monitoring, risk assessment to prevent gaps in coverage, lower deductibles with the use of…

Encrypting Websites

Encrypting news websites is being pursued to enhance the privacy of readers. The Washington Post wants readers to feel safe from monitoring eyes. Intelligence agencies are routinely seeking to monitor readership and their internet access. But when social media sites and newspaper sites exert efforts to protect its readership and users, they thwart governmental agencies…

Email Vulnerability

Email vulnerability to hackers has many cyber security experts concerned.  With the White house emails being hacked, along with the former Secretary of State’s in private servers, encrypted email system are too vulnerable to attack by sophisticated hackers who may be working for foreign powers. Obama carries a specially secured BlackBerry device for top-secret communications. It appears…