Cloud Data Usage

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load.  Data is not static and neither is how it could be directed for load…

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Artificial Intelligence Liability

Liability, as an issue, seldom arises in common conversations.   When discussions in the work place occur, liability is not on the top of the list of issues.  Yet, there are a plethora of law firm ads about personal injury claims, insurance commercials, and medical malpractice issues.  From watching and reading ads you are left…

Consumer Privacy versus Data Economy Ecosystem

We all hear about privacy needing protection and we also read about the events that have led to infringements of privacy on the occurrence of data breaches.  Essentially, privacy is desired by all and many believe that it is an aspect of life that is common understanding and it is worth respect and consideration. The courts have…

Internet Computing Terms

Internet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few.  As these terms arise in conversation, contracts…

Cybersecurity Rule Setting the Mark

Cybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts.  Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing.  We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…

Internet Advertising Under FTC Eyes

Internet advertising has become intricate and keen.  Internet advertising may involve multiple participants.  The purpose is essentially to sway readers to purchase products by making representations that at times appear too good to be true.  That is what the Federal Trade Commission and the State of Connecticut determined prior to suing  LeanSpa.  The claims embraced…

Website Crawling and Data Scraping Thoughts

Website crawling and data scraping have burdened the growth of e-commerce as website owners are witnessing their data scraped.  The legal questions have lingered.  Many questions stand out.  The prevalence of crawling and scraping has become too of the norm for those using web content for business, research, or marketing purposes. The common theme is…

Data Security Practices

Data security practices are increasingly becoming a theme among management and employees in the administration of business and their daily work process.  The common element in data breaches is the element of human negligence, training or the underestimation of needed attention.   The extent that incidents are occurring, information technology personnel and operations personnel are finding…

Computer Abuse by Password Sharing

Computer abuse can occur by the simple act of password sharing to gain access to a computer and its network. Password sharing for use of a computer is seldom realized as a wrongful use.  It is as well not realized by many account holders that sharing their account passwords or access passwords is as well…

Advertising Disclosures

Advertising disclosures required by the Federal Trade Commission are addressing numerous issues with regard enhancing disclosures of sources of the statements being made in an advertisement.  As creativity increases so will the efforts for the FTC to find aspects, not to their liking.  As the FTC pursues companies using native advertisers or influencer programs, restrictions will…

Cloud Storage of Data Across Borders

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Data is not static and neither is how it be directed for load balancing.  It is not only stored, it is shared via transfers and as such it is accessed by users. How the data is accessed and…

Cloud Service Agreement Considerations – Business and Legal Issues II

Cloud service agreement considerations are many but few are addressed when cloud subscription services are sought.  In previous posts on this subject, the emphasis was on having an exit strategy[1] and embracing the possible regulatory requirements.[2]  A business’ or an institutions’ data could be at the mercy of the cloud service provider (CSP).  The growth…

Cloud Computing Service Considerations

Cloud computing service considerations are developing as the concept catches on.  Incidents of a breach, contract disputes, hacking, and ongoing lawsuits are serving the way for conditions to be highlighted.  Nascent, cloud computing contracts were conceived as a data storage solution for businesses, municipal entities, and state organizations.  So long as remote access was guaranteed,…

Trademark Nominative Fair Use and Confusion

Trademark use and the element of fair use in business snags many businesses trying to market their service or product, while seemingly using a competitor’s trademark. Liability may not be avoided by relying on the fair use defense.  Words and their message are usually held to a standard regarding the possibility of consumer confusion.  There…

Website Safe Harbor Copyright Notice Designation

Website safe harbor takedown requirements by the Copyright Office is soon to undergo changes.  According to the Copyright Office, it is the responsibility of a website owner or online service entity to make it easy for a copyright holder to contact the website regarding the possibility of content infringement.  The agent designation requirement[1] process form,…

Internet Security – Passwords’ Way into a Life

Internet account security and weak passwords are all too common when causes to cyber incidents are investigated.  The ease of use of one’s birthdate, anniversary, and the incredibly savvy use of ‘admin’ or ‘password’, not to mention ‘12345,’ has gotten many in a serious predicament.  Not following through on login processes and seeking shortcuts has…

Online Contracts Consent and Choice of Law

Online contracts trip the line that draws on possible arguments for applying the choice of law principles.  Platform terms of service, though frequently updated, may not be providing appropriate notice to inform the public user.  Data collection practices of social media platforms for purposes of claimed efforts to provide enhanced services to the user public…

Internet, Internet of Things and Cyber Threats

Internet of Things or “IoT,’ as commonly referred to, have proliferated our culture and will continue as they acquire growing attention with functionality and ease.  Their attraction is in their usefulness engendering efficiency, productivity, and an expectation of enhancing one’s fitness and along with self-awareness. The idea of IoT has brought the attention of platform…

Internet Technology and Employer Internet of Things

Internet technology and the internet of things pervasive expansion in our everyday lives has become a crazy, a thing to do, and something to use by employers.  The risks of privacy are overlooked as well as liabilities when an employer goes too far.  The application of technological uses to keep track of employees, staying in…

Social Media Self-Modification

Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under criticism for being too heavy handed towards exercising censorship.  Though easy to say, it becomes difficult to…

Internet of Things, Risks and Security

Internet of things and the interconnectedness of devices has inherent drawbacks.  Initially, the convenience of using interconnected devices overcomes the awareness of the lack of control over the information that is gathered about their use.  The convenience and allure of the novelty of Internet of Things catch everyone’s whim to acquire the latest. But unfortunately,…

Privacy Issue of FCC over ISPs

Privacy is a late to-come-by issue of the Federal Communications Commission (FCC) as Internet Service Providers (ISP) were reclassified.  As part of the push for net neutrality, ISPs were soon to be treated as common carriers by the FCC.  This has left the door open for broadband providers to access customer information that is proprietary…

Music Access Going Offline

Music Access in time past was always a concern for the nostalgic music enthusiast, especially the desire to hold on to music treasures from one’s growing up years. There was the concerned about scratching and breaking and not being able to find another issue.  The digital innovation has liberated the music industry allowing for creative…

Cyber Security Events and Lessons of 2015

The process of cyber security is an everyday occurrence in every entity, from government to small and large enterprises.  A handful of events took place in 2015, each shedding a lesson or two going forward.  Counseling clients on requirements always involves sharing best practices, despite them not being a guarantee.  But always the focus is…

Child Privacy and the Apps They Play

Child privacy while playing with apps is something to consider.  The Federal Trade Commission (FTC) has been concerned.  The aspect of how information, that is children’s personal information, is shared with advertisers and the related networks brings to mind the requirements of the Children Online Privacy Protection Act (COPPA). In 2013, the FTC amended the…

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…

Cybercrime Considerations for Cases

There are cybercrime considerations for cases as well as there is a judicial learning curve when it comes to cybercrime and judges  are not alone.  Cybercrime harm cannot be assessed with the mindset of assessing punishment as if it was a physical criminal act without assessing the extenuating consequences of a cyber-criminal act.  In cases…

Cloud Technology Use for a ‘God View’

Uber’s cloud technology use for a ‘God view’ was exciting to experience among its employees.  With every innovative creation there is always the bit of excitement and a bit of dreaming of the capability devoid of cognition for security and for its ramifications.  To insert concepts of security and considerations of ramifications is a downer,…

Digital Economy Fighting Copyright Piracy

Digital economy partnerships drawing close to fight copyright piracy have struck a chord that could have a significant impact to prevent Internet digital media piracy.  The piracy of digital media is an international cottage industry costing billions.  From content creators, ISPs, advertising agencies, network systems, and search engines, to data managers, and e-payment platforms, have…

Advertising Guidelines from FTC

Advertising guidelines from the Federal Trade Commission underscore the deceptive features of ‘native’ advertising.  Prior to Christmas the FTC released its “Enforcement Policy Statement on Deceptively Formatted Advertisements.”  The attention was towards the use of native advertising which is ‘dressed’ or ‘tailored’ to appear as if it is an actual editorial.  The FTC notes the…

Internet Freedom of Speech at Risk

Internet freedom of speech is not given the attention it merits while the EU ponders on its EU Data Protection Regulation.  Many rightfully fear that censorship is looming near and is nearer than one imagines.  While the General Data Protection Regulation (GDPR) has lingered since the 1990s, many countries have followed the EU aspiration of…

Internet Technology and Encryption

Internet technology and encryption is placed at the forefront of the debate about how to process, store, secure, report, you get the picture, of communication that are otherwise deemed private.  The discussion embraces the ideas of using back-door means for law enforcement to peruse and search for possible suspects of the terror and their plots…

Consumer Harm in Data Breach Cases

Consumer harm in data breach cases is a critical element to be proven.  Many cases are dismissed when standing is not established.   Commonly, the claims raised assert that some sort of reasonable and appropriate security measures to protect personal identifiable information in a company’s networks was not implemented. Any failure to do such is arguably…

Cross Device Tracking

The Federal Trade Commission has noted that cross device tracking which is a consequence of the Internet of Things (IoT) falls essentially within its auspices.  Considering the concerns with transparency and the required notices to consumers, cross device tracking is just not getting attention for purposes of enhancing consumer protection.  The advertising industry representatives as…

Fate of the Internet

Life has changed with the Internet but it will change even more as the fate of the Internet is in court hands once again. The U.S. Court of Appeals for the D.C. Circuit will determine how Internet providers will change how we use the internet, what content will be permitted, and how we access and…

Copyright Basis

Copyright basis draws the question of whether copyright law is based on government granting a monopoly, if you will, vis-à-vis against any other potential entrepreneur.  Many see it that way and tend to deny copyrights having a proprietary property right for the creator of the work.  Historically the value of crafting an idea composed was…

Website Defamation Immunity

Website operators, either as defendants or plaintiffs have resorted to Section 230 of the Communications Decency Act (CDA) to determine website defamation immunity and defamation liability.  Under the Section 230, blogs or forums, for instance, benefit from website immunity from tort liability if the information was from a third-party.  That third-party could be a subscriber,…

CISA

CISA The U.S. Senate passed the Cybersecurity Information Sharing Act (“CISA,” S. 754). In passing it had to consider a variety of issues before it regarding the amendments to CISA.  The proposed amendments of CISA have one goal in common, to enhance privacy and strengthen the privacy. One of the issues was to clarify the…

Net Neutrality European Points

Net Neutrality European Points Net neutrality European points are going before the EU Parliament soon where several proposals will be weighed.  The concept of an open internet without restrictions on traffic, how the networks manage traffic and how traffic is categorized is being considered in the EU Parliament.  There is a draft regulation proposed expressing…

Security of Internet of Things

The security of internet of things is unknowingly pervading our everyday life.  Items that can be remotely accessed for information, turned on to operate, adjust their operation settings, and process into a network are all fraught with vulnerabilities.  Security of internet of things is just becoming news worthy to some and ignored by great majority.…

Personal Data Privacy and Consumer Privacy Bill

Personal data privacy and Consumer Privacy Bill may meet to give people more control over their personal information is in the horizon. Concern however remains with companies and data brokers having discretion. The proposed Consumer Privacy Bill of Rights Act, sets some requirements on companies that process personal information. The idea is to establish some…

Trademark Free Riding

Many brands in a strong competitive industry have the challenge of trademark free riding posed by not necessarily their own competitors.  Company brands struggle against other entities that are not necessarily in their industry, benefiting by their use of a similar if not identical mark from the reputation they have tried to build. This “free-riding”…

Internet Privacy – Florida Privacy Protection Act

Internet Privacy Law – Florida Internet Privacy Law The flow of information from internet usage and ‘ Internet of Things’  is easily accompanied with its collection and systemic use for other purposes. Digital profiles are created with every online user’s key stroke, site visited, and key word used. In 2015, the Florida Legislature addressed many…

Right To be Forgotten and Personal Information

The right to be forgotten and the availability of personal information is being debated in the European Union.  Google has been restricted by the EU high Court from having personal information accessible in its search process respecting the right to be forgotten. Yet, while information is not available about people on search vehicles provided by…

Internet Freedom – Could it be at Risk?

Internet Freedom – Internet Regulation – Internet Law Internet freedom and it regulation is foreseen as the Administration is seeking to not renew the contract with ICANN.  to shifting as Few know that the U.S. Department of Commerce’s (USDC) contract with the Internet Corporation for Assigned Names and Numbers (ICANN) ends September 2015. ICANN would…

Internet of Things and Google

Internet of things and Google is the theme underlining Google establishing an internet of things (Iot) central system called Brillo. Google Brillo is designed to run on and connect multiple low-power devices, connecting anything from a washing machine to a rubbish bin and linking in with existing Google technologies. The move is an expansion of the company’s…