Social Media Privacy Trust

Social media privacy trust is easily and all too often not evaluated by users.  Social media usage in its carefree, beach-like social setting, is all about people enjoying keeping up with friends and sharing life events and experiences with friends.  However, it has become blatantly clear that by using the platform to share with friends,…

Details

Trade Secrets as Data

Trade secrets are seldom considered as data.  Yet, data records are valuable for daily operations and service delivery and much more.  The valued of data gathered either for diagnostic, screening, marketing, or even predictive work, is crucial.  This data becomes a trade secret.  Database records fall victim to many who seek the potential value of…

Details

Cyber Security Claims Can be Deceptive

Cyber security is increasingly a reported issue in the news.  How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities.  At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process.  Cyber security incident…

Details

Cloud Data Path Thoughts

Data path is a factor, though seldom considered by business and entities alike, that comes up as a concern.  Cloud data services are used in a variety of sectors including government, hospitals, and a great number of service industries.  The concern with data path, in the cloud for the processing and accessing of data, is…

Details

Crawling Websites for Data

Crawling websites for data has burdened the growth of ecommerce as website owners witnessing their data scraped.  The legal questions have lingered.  Many questions stand out.  The prevalence of crawling and scraping has become too of the norm for those using web content for business, research, or marketing purposes. The common theme is that website…

Details

Internet Information

Internet information has allowed millions to enhance their learning and allow them to share information.  It has also allowed for the sharing of specious and harmful information.  Advertising and marketing industries have benefited and will continue to benefit into the future by this medium of information, surpassing the television. Yet, what is concerning to many…

Details

Cloud Data Usage

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load.  Data is not static and neither is how it could be directed for load…

Details

Cybersecurity Responsibility

Cyber aspects of business functions involving the Internet, email network systems, and cloud platform usage are related to the need for data security.  Cybersecurity responsibilities are, at times, not met with the requisite level of diligence for compliance in managing data and transfers in daily work process.  Standards for compliance, for many businesses, institutions, and…

Details

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Details

Artificial Intelligence Liability

Liability, as an issue, seldom arises in common conversations.   When discussions in the work place occur, liability is not on the top of the list of issues.  Yet, there are a plethora of law firm ads about personal injury claims, insurance commercials, and medical malpractice issues.  From watching and reading ads you are left…

Details

Data Privacy

Data protection sought in daily entity operations and in its actual delivery of services, should coexist with the responsibilities for consumer data privacy.  This second piece follows its previous writing which addressed the coexistence of protection and privacy from an institutional perspective.  In furtherance of that theme, this piece will touch upon the organizational aspect involved to see…

Details

Internet Computing Terms

Internet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few.  As these terms arise in conversation, contracts…

Details