CISA

CISA The U.S. Senate passed the Cybersecurity Information Sharing Act (“CISA,” S. 754). In passing it had to consider a variety of issues before it regarding the amendments to CISA.  The proposed amendments of CISA have one goal in common, to enhance privacy and strengthen the privacy. One of the issues was to clarify the…

Details

Developing Apps

Developing Apps Developing apps could be thrilling and troubling.  Of course, it is the thrilling aspect or expectation that drives the creative ideas.  But what is not thought of is the necessary planning that is crucial for it to be successful.  Simple creation is not enough.  Long before that, just the thought of an idea…

Details

Net Neutrality European Points

Net Neutrality European Points Net neutrality European points are going before the EU Parliament soon where several proposals will be weighed.  The concept of an open internet without restrictions on traffic, how the networks manage traffic and how traffic is categorized is being considered in the EU Parliament.  There is a draft regulation proposed expressing…

Details

Security of Internet of Things

The security of internet of things is unknowingly pervading our everyday life.  Items that can be remotely accessed for information, turned on to operate, adjust their operation settings, and process into a network are all fraught with vulnerabilities.  Security of internet of things is just becoming news worthy to some and ignored by great majority.…

Details

International Service of Lawsuits Via Email

International service of lawsuits via email is an option when the physical address of an international defendant is unknown.  According to the Hague Convention on the Service Abroad (Hague Convention), when the physical address is unknown the Hague Convention does not apply.  In practice, as long as the email address does not return an undeliverable…

Details

Internet is Changing Business Models

Internet is changing business models on daily business operational practices from brick-n-mortar constructs to digital information transfers, from a letter or phone call to a “textmail” or “e-mail.” The process has brought a down scaling in what used to be large administrative organizations to efficient self-employed entrepreneurs. The latter is the future and it is…

Details

Electronic Self-Publishing Considerations

Electronic self-publishing considerations are overlooked by many who venture on to electronic self-publishing.  The efforts to do so could be for self-publication or out of an egalitarian purpose of making materials easily available. The issues for self-publishing for those seeking to venture are immaterial to the purpose  Initial costs of publishing can be limited which is…

Details

eCommerce and the FTC

eCommerce and the FTC For businesses seeking to engage commercially in the realm of cyber space ‘eCommerce’, their eCommerce efforts will be under the eyes of the FTC – Federal Trade Commission. While it was established in the early 1900s, the FTC has been focused on protecting consumers and enforcing their rights. There has been…

Details

Electronic Stored Information Business and Email Records

Electronic Stored Information Business and Email Records are a fundamental element in today’s business environment along with email records.  Today the great majority of business runs on computing information that is stored and shared, transferred, and collaborated on within a network.  Technological network where electronic stored information (ESI) serves as business records and communications by email…

Details

Cloud Service Considerations – Business and Legal Issues

Software service – Data storage – Data Management – Internet Security Cloud service considerations – business and legal issues include many operational facets of a business’s management.   Each may have their own unique risks as well as benefits.  Cloud services are not new.  Remote access to business data has been part of business and…

Details

Business Risk and Trade Secret Misappropriation

Business Risk and Trade Secret Misappropriation Any enterprise large or small will experience business risk and trade secret misappropriation of some form or another. The offense of misappropriating trade secrets according to the Uniform Trade Secret Act (UTSA) is the ‘acquisition of a trade secret of another by a person who knows or has reason…

Details

Copyright Law and Fair Use Considerations

Copyright law and fair use considerations is seldom in the mindset of many who take video with background music and post them on the web.  Obviously, the many who do may not give time nor consideration how they are using the music which raises the issues of fair use considerations.   Owners of music oppose videos…

Details