Doxxed Personal Internet Information

Doxxed personal information is startling to many. There is a lot to be said about the amount of information available on the Internet.  Many are surprised on how their information got on the Internet and the ease with which public information and personal information can be retrieved and researched.  It goes without saying about how…

Cybersecurity Rule Setting the Mark

Cybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts.  Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing.  We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…

Data Security Negligence

Data security responsibilities are, at times, not met with the requisite level of diligence for compliance.  Standards for compliance, for many businesses, institutions, and service entities, are not as specified as one would be drawn to believe.  The disjuncture between responsibilities and efforts are becoming more evident with passing days as cyber incidents leave alarming…

Online Personal Information, What’s the Harm?

Personal Information is accessed so easily through the Internet that it causes concern for its privacy, handling of personally identifiable information (PII), and its correctness. With the use of a credit card and picking anyone’s name and selecting a state of some form of known or suggested relevance to an individual, anyone can acquire information on one’s profile. Whether…

Internet Speech and Defamation I

Internet speech has drawn concern for its limitless, it seems, availability for anyone to air their comments about something.  While there are certain protections for speech, the inherent lack of truth in the statements or the lack of concern for the truth in making such a statement online about someone, engenders a considerable amount of…

Internet Information the Malady of Doxing, “You’ve been Doxed”

Internet information that is available to read on the Internet about someone or anyone to see is startling.  There is a lot to be said about the amount of information available on the Internet.  Many are surprised on how their information got on the Internet and the ease with which public information and personal information…

Data Breach Insurance

Data breach insurance is becoming a growing concern and a topic for businesses to address their risk management administrative panoply. Considerations may sway a business towards a third-party insurance coverage or a first-party insurance coverage or both depending on the services provided.  Previously posted writing regarding the cyber insurance needs, we discussed the limits that…

Data Breach Case Standing and Relevance of Harm

Data breach case standing is the critical element in determining the case’s viability to continue along with the relevance of harm incurred.  As data security breach occurrences amount with frequency, the menu of their handling also adds to the list of settled and or filed. The usual person is petrified when hearing that his or…

Computer Abuse by Password Sharing

Computer abuse can occur by the simple act of password sharing to gain access to a computer and its network. Password sharing for use of a computer is seldom realized as a wrongful use.  It is as well not realized by many account holders that sharing their account passwords or access passwords is as well…

Cloud Storage of Data Across Borders

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Data is not static and neither is how it be directed for load balancing.  It is not only stored, it is shared via transfers and as such it is accessed by users. How the data is accessed and…

Cloud Service Agreement Considerations – Business and Legal Issues II

Cloud service agreement considerations are many but few are addressed when cloud subscription services are sought.  In previous posts on this subject, the emphasis was on having an exit strategy[1] and embracing the possible regulatory requirements.[2]  A business’ or an institutions’ data could be at the mercy of the cloud service provider (CSP).  The growth…

Defamation Online Issues

Defamation online in reviews posted by readers and comments stated in social media platforms throughout the United States and across its borders, raise legal questions. The aspects of posts in general also raise the issues of responsibility an individual has in controlling the content of one’s Facebook page or blog.  The Communication Decency Act, Section…

Cloud Computing Service Considerations

Cloud computing service considerations are developing as the concept catches on.  Incidents of a breach, contract disputes, hacking, and ongoing lawsuits are serving the way for conditions to be highlighted.  Nascent, cloud computing contracts were conceived as a data storage solution for businesses, municipal entities, and state organizations.  So long as remote access was guaranteed,…

Internet Security – Passwords’ Way into a Life

Internet account security and weak passwords are all too common when causes to cyber incidents are investigated.  The ease of use of one’s birthdate, anniversary, and the incredibly savvy use of ‘admin’ or ‘password’, not to mention ‘12345,’ has gotten many in a serious predicament.  Not following through on login processes and seeking shortcuts has…

Online Contracts Consent and Choice of Law

Online contracts trip the line that draws on possible arguments for applying the choice of law principles.  Platform terms of service, though frequently updated, may not be providing appropriate notice to inform the public user.  Data collection practices of social media platforms for purposes of claimed efforts to provide enhanced services to the user public…

Internet, Internet of Things and Cyber Threats

Internet of Things or “IoT,’ as commonly referred to, have proliferated our culture and will continue as they acquire growing attention with functionality and ease.  Their attraction is in their usefulness engendering efficiency, productivity, and an expectation of enhancing one’s fitness and along with self-awareness. The idea of IoT has brought the attention of platform…

Internet Technology and Employer Internet of Things

Internet technology and the internet of things pervasive expansion in our everyday lives has become a crazy, a thing to do, and something to use by employers.  The risks of privacy are overlooked as well as liabilities when an employer goes too far.  The application of technological uses to keep track of employees, staying in…

Social Media Self-Modification

Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under criticism for being too heavy handed towards exercising censorship.  Though easy to say, it becomes difficult to…

Ransom Seeking Malware, What to know and Do

Ransom seeking malware is nefarious and it comes in different flavors.  The hedge of control is to hold hostage vital information within your network in exchange for compensation.  Healthcare providers, financial institutions, and government entities have been the victim.  Its variants and its methods are complicated means of affecting ways an entity accesses its information…

Data Security Relevance to More than Just PII

Data security relevance is customarily popping up in everyday life, business, and in our system of society.  To think that billions use handheld devices for entertainment, staying informed of news, and to also be able to know where they are and where they are going, there is another segment of our network life infrastructure, growingly…

Data Security Breaches Settled and Filed

Data security breaches are becoming too common for comfort and ease as we engage in daily as participants in the marketplace.  Companies, governmental institutions, nonprofits, and organizations are quickly learning that cyber incidents could be a day away.  If they claim that their information is secure their claim can be checked and they can be…

Internet Service Providers New Privacy Rules

Internet service providers (ISP) are being pressured for enhanced privacy practices by the Federal Communications Commission (FCC).  Commissioner Wheeler’s proposal issued March 11th seeks to regulate ISPs and their handling of consumer information to heighten consumer privacy protection.  The FCC issued its draft Notice of Proposed Rulemaking (NPRM) focusing on ISPs and not on websites,…

Internet of Things, Risks and Security

Internet of things and the interconnectedness of devices has inherent drawbacks.  Initially, the convenience of using interconnected devices overcomes the awareness of the lack of control over the information that is gathered about their use.  The convenience and allure of the novelty of Internet of Things catch everyone’s whim to acquire the latest. But unfortunately,…

Consumer Data Security Claims Monitored

Consumer data security claims by many businesses seek to settle the fears and doubts of many consumers engaging in electronic payments.  Those representations should be tempered with an accurate description of its practices to keep consumer information and transaction data secure.  Several agencies have been tasked with a different scope of authority.  Data security has…

Right of Publicity

Publicity of one’s identity without permission frequently happens to sports figures, actors, and to possibly world record holders, including Hacky Sack world, records holders.  The latter persona is the type actually who filed a district court action in Illinois claiming invasion of privacy and false advertising.  As argued, a commercial ran showing that an individual…

Privacy Issue of FCC over ISPs

Privacy is a late to-come-by issue of the Federal Communications Commission (FCC) as Internet Service Providers (ISP) were reclassified.  As part of the push for net neutrality, ISPs were soon to be treated as common carriers by the FCC.  This has left the door open for broadband providers to access customer information that is proprietary…

Child Privacy and the Apps They Play

Child privacy while playing with apps is something to consider.  The Federal Trade Commission (FTC) has been concerned.  The aspect of how information, that is children’s personal information, is shared with advertisers and the related networks brings to mind the requirements of the Children Online Privacy Protection Act (COPPA). In 2013, the FTC amended the…

How Private is our Privacy

Privacy may not be as private as we would consider, and not much more than what we are capable of to keep private, as long as we live a cyber life.  Take for instance, the wearables that caught the craze throughout 2015 and became a popular item to buy at Christmas and other items that…