Internet Information

Internet information has allowed millions to enhance their learning and allow them to share information.  It has also allowed for the sharing of specious and harmful information.  Advertising and marketing industries have benefited and will continue to benefit into the future by this medium of information, surpassing the television. Yet, what is concerning to many…

Details

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Details

Data Privacy

Data protection sought in daily entity operations and in its actual delivery of services, should coexist with the responsibilities for consumer data privacy.  This second piece follows its previous writing which addressed the coexistence of protection and privacy from an institutional perspective.  In furtherance of that theme, this piece will touch upon the organizational aspect involved to see…

Details

Business Data a Trade Secret

Business data in business could be considered a trade secret as it is an essential component of analysis and decision-making.  Businesses cannot compete without relevant data for their administration, process and service delivery.  Trade secrets in database records have value.  Such secrets are sought for competitive reasons. Intruding, a kind word for hacking, into another’s…

Details

Doxxed Personal Internet Information

Doxxed personal information is startling to many. There is a lot to be said about the amount of information available on the Internet.  Many are surprised on how their information got on the Internet and the ease with which public information and personal information can be retrieved and researched.  It goes without saying about how…

Details

Data Security Negligence

Data security responsibilities are, at times, not met with the requisite level of diligence for compliance.  Standards for compliance, for many businesses, institutions, and service entities, are not as specified as one would be drawn to believe.  The disjuncture between responsibilities and efforts are becoming more evident with passing days as cyber incidents leave alarming…

Details

Internet Mugshot Publishing Curtailed

Internet mugshot published online haunts a person for years with embarrassment.  For many, as well, the mugshots do not bear a meaningful purpose for others throughout the Internet to know.  What remains is the ill circumstance of having future employment out of reach or present employment terminated, for the inadvertent past event. The harm lingers…

Details

Online Personal Information, What’s the Harm?

Personal Information is accessed so easily through the Internet that it causes concern for its privacy, handling of personally identifiable information (PII), and its correctness. With the use of a credit card and picking anyone’s name and selecting a state of some form of known or suggested relevance to an individual, anyone can acquire information on one’s profile. Whether…

Details

Trade Secrets in Databases

Database as a Trade Secret Trade secrets in database records fall victim to many who seek the potential value of stored records from a variety of entities, either from government agencies and competitor businesses, to also include medical and financial enterprises, and even from their own employer or client.  Intruding into another’s database is becoming…

Details

Internet Speech Immunity

Internet speech immunity exceptions are sought frequently by individuals and businesses who are affected by someone else’s comments about them via an online site.  Online sites are today’s marketplace of ideas to enhance the “competition of the market.”[1]  And so, the claim usually asserted is a defamation claim directed to the website from where the…

Details

Data Security Practices

Data security practices are increasingly becoming a theme among management and employees in the administration of business and their daily work process.  The common element in data breaches is the element of human negligence, training or the underestimation of needed attention.   The extent that incidents are occurring, information technology personnel and operations personnel are finding…

Details

Data Breach Notification and the Ransomware HIPAA Question

Notification of a data breach is a worrisome step of any governmental entity, association, medical office, law office, data management entity, and even of a school or university. The provisions that attempt to address this progressing act of cyber attempts to acquire data, of any sort, are evolving.   An initial reaction to an incident is…

Details