Doxxed Personal Internet Information

Doxxed personal information is startling to many. There is a lot to be said about the amount of information available on the Internet.  Many are surprised on how their information got on the Internet and the ease with which public information and personal information can be retrieved and researched.  It goes without saying about how…

Cybersecurity Rule Setting the Mark

Cybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts.  Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing.  We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…

Data Security Negligence

Data security responsibilities are, at times, not met with the requisite level of diligence for compliance.  Standards for compliance, for many businesses, institutions, and service entities, are not as specified as one would be drawn to believe.  The disjuncture between responsibilities and efforts are becoming more evident with passing days as cyber incidents leave alarming…

Online Personal Information, What’s the Harm?

Personal Information is accessed so easily through the Internet that it causes concern for its privacy, handling of personally identifiable information (PII), and its correctness. With the use of a credit card and picking anyone’s name and selecting a state of some form of known or suggested relevance to an individual, anyone can acquire information on one’s profile. Whether…

Internet Speech and Defamation I

Internet speech has drawn concern for its limitless, it seems, availability for anyone to air their comments about something.  While there are certain protections for speech, the inherent lack of truth in the statements or the lack of concern for the truth in making such a statement online about someone, engenders a considerable amount of…

Data Security Practices

Data security practices are increasingly becoming a theme among management and employees in the administration of business and their daily work process.  The common element in data breaches is the element of human negligence, training or the underestimation of needed attention.   The extent that incidents are occurring, information technology personnel and operations personnel are finding…

Data Breach Notification and the Ransomware HIPAA Question

Notification of a data breach is a worrisome step of any governmental entity, association, medical office, law office, data management entity, and even of a school or university. The provisions that attempt to address this progressing act of cyber attempts to acquire data, of any sort, are evolving.   An initial reaction to an incident is…

Data Breach Insurance

Data breach insurance is becoming a growing concern and a topic for businesses to address their risk management administrative panoply. Considerations may sway a business towards a third-party insurance coverage or a first-party insurance coverage or both depending on the services provided.  Previously posted writing regarding the cyber insurance needs, we discussed the limits that…

Computer Abuse by Password Sharing

Computer abuse can occur by the simple act of password sharing to gain access to a computer and its network. Password sharing for use of a computer is seldom realized as a wrongful use.  It is as well not realized by many account holders that sharing their account passwords or access passwords is as well…

Defamation Online Issues

Defamation online in reviews posted by readers and comments stated in social media platforms throughout the United States and across its borders, raise legal questions. The aspects of posts in general also raise the issues of responsibility an individual has in controlling the content of one’s Facebook page or blog.  The Communication Decency Act, Section…

Online Contracts Consent and Choice of Law

Online contracts trip the line that draws on possible arguments for applying the choice of law principles.  Platform terms of service, though frequently updated, may not be providing appropriate notice to inform the public user.  Data collection practices of social media platforms for purposes of claimed efforts to provide enhanced services to the user public…

Internet Technology and Employer Internet of Things

Internet technology and the internet of things pervasive expansion in our everyday lives has become a crazy, a thing to do, and something to use by employers.  The risks of privacy are overlooked as well as liabilities when an employer goes too far.  The application of technological uses to keep track of employees, staying in…

Data Security Relevance to More than Just PII

Data security relevance is customarily popping up in everyday life, business, and in our system of society.  To think that billions use handheld devices for entertainment, staying informed of news, and to also be able to know where they are and where they are going, there is another segment of our network life infrastructure, growingly…

Internet of Things, Risks and Security

Internet of things and the interconnectedness of devices has inherent drawbacks.  Initially, the convenience of using interconnected devices overcomes the awareness of the lack of control over the information that is gathered about their use.  The convenience and allure of the novelty of Internet of Things catch everyone’s whim to acquire the latest. But unfortunately,…

Child Privacy and the Apps They Play

Child privacy while playing with apps is something to consider.  The Federal Trade Commission (FTC) has been concerned.  The aspect of how information, that is children’s personal information, is shared with advertisers and the related networks brings to mind the requirements of the Children Online Privacy Protection Act (COPPA). In 2013, the FTC amended the…

Cybersecurity Breach Aftermath with FTC

Cybersecurity and cybersecurity breach are difficult topics to discuss with clients because of the unknown variants and for their simple trepidation toward addressing the vulnerabilities and investing the capital for prevention and training.  From internal planning involving establishing a process to addressing external intrusion possibilities they tend to be cumbersome for a company’s administration to…

IP address and You

An IP address and you are central to how the Internet functions.  The IP address reveals information about you, your trends, location, and a whole lot more.  By use of an email, say sending an email, the recipient can learn your location.  Through the IP address your internet service provider can be learned as well.…

Cross Device Tracking

The Federal Trade Commission has noted that cross device tracking which is a consequence of the Internet of Things (IoT) falls essentially within its auspices.  Considering the concerns with transparency and the required notices to consumers, cross device tracking is just not getting attention for purposes of enhancing consumer protection.  The advertising industry representatives as…

Personal Identifiable Information under VPPA

Digital media law and the digital media industry wrestles with how courts define personal identifiable information under the Video Privacy Protection Act.  This definition is important to companies that stream deliver videos to customers. How broadly the court define the scope of liability will remain a concern with personal identifiable information under the VPPA. In…

Personal Data Privacy and Consumer Privacy Bill

Personal data privacy and Consumer Privacy Bill may meet to give people more control over their personal information is in the horizon. Concern however remains with companies and data brokers having discretion. The proposed Consumer Privacy Bill of Rights Act, sets some requirements on companies that process personal information. The idea is to establish some…

Internet Password Security

Internet password security is a growing concern about internet user’s privacy. Services provided address the management of passwords to enhance password security and privacy on the internet.  There are considerations.  Pros – they offer secure storage, sync usernames and passwords, help prevent password reuse with provide password reminders, identify emails used as identifiers, use email confirmation…

Spying On Emails

(Reuters) – Spying on emails has drawn the attention of the courts. A U.S. judge ordered Yahoo Inc to face a nationwide class-action lawsuit accusing it of illegally intercepting the content of emails sent to Yahoo Mail subscribers from non-Yahoo Mail accounts, and using the information to boost advertising revenue. In a decision late Tuesday…

Email Vulnerability

Email vulnerability to hackers has many cyber security experts concerned.  With the White house emails being hacked, along with the former Secretary of State’s in private servers, encrypted email system are too vulnerable to attack by sophisticated hackers who may be working for foreign powers. Obama carries a specially secured BlackBerry device for top-secret communications. It appears…