Internet Speech Modification

Internet speech modification is a concern for all who are concrned about their free speech being infringed.  Self-Modification by social media platforms has struggled to ensure that the Internet is acceptable to all cultures, religions, political persuasion, and to all values of countries.  This exercise in Internet Governance is tall and detailed and comes under…

Details

Internet Communications Issues

The Internet, in its ubiquitous appeal in our lives, branches beyond the desktop and into giving users greater mobility and an array of freedom.  It as well gives users more flexibility to express ideas and conduct activities.  Its use generates data about what the users access, shares, comments on, and what the user buys and…

Details

Online Defamation  

Online defamation has become all-too common.  From the individual to the business they all have become subject of ill comments online.  Many, espousing their belief in their First Amendment right to free speech, have misused that right.  Doing so, they claim immunity from defamation claims. Many claim truth, they were privileged, or that their statement…

Details

IoT Security

Internet of Things security claims have caught the attention of lawmakers and regulators. The Internet has been interesting to follow and work with as a realm of process and information exchange.  As the devices used to transmit information increase in our lives and work, protecting what is transmitted from unwanted eyes is not necessarily going…

Details

Internet Information

Internet information has allowed millions to enhance their learning and allow them to share information.  It has also allowed for the sharing of specious and harmful information.  Advertising and marketing industries have benefited and will continue to benefit into the future by this medium of information, surpassing the television. Yet, what is concerning to many…

Details

Cloud Data Usage

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load.  Data is not static and neither is how it could be directed for load…

Details

Cybersecurity Responsibility

Cyber aspects of business functions involving the Internet, email network systems, and cloud platform usage are related to the need for data security.  Cybersecurity responsibilities are, at times, not met with the requisite level of diligence for compliance in managing data and transfers in daily work process.  Standards for compliance, for many businesses, institutions, and…

Details

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Details

Artificial Intelligence Liability

Liability, as an issue, seldom arises in common conversations.   When discussions in the work place occur, liability is not on the top of the list of issues.  Yet, there are a plethora of law firm ads about personal injury claims, insurance commercials, and medical malpractice issues.  From watching and reading ads you are left…

Details

Consumer Privacy versus Data Economy Ecosystem

We all hear about privacy needing protection and we also read about the events that have led to infringements of privacy on the occurrence of data breaches.  Essentially, privacy is desired by all and many believe that it is an aspect of life that is common understanding and it is worth respect and consideration. The courts have…

Details

Internet Computing Terms

Internet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few.  As these terms arise in conversation, contracts…

Details

Cybersecurity Rule Setting the Mark

Cybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts.  Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing.  We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…

Details