Data Security of ESI

Data security and the insecurity of electronically stored information (ESI) is ephemeral.  Data security is not as predictable as one would prefer to think.  Any anticipation of a data security incident or of its origin is absolutely unpredictable.  With every incident, the attention is always on possible external sources.  All too often, little effort is…

Details

Internet Freedom

Internet freedom is surely under stated, considering the extent of communications and the amount of data shared and transmitted.  Among the billions of daily data bits transmitted among users, unfortunately there are abuses.  Internet freedom is taken for granted by millions of users that resort to the Internet for less than beneficial reasons.  Online fraud,…

Details

Cybersecurity Term Use

Cybersecurity term use may not be as clear as it is used in every day conversation.  Cybersecurity as a term has been bouncing around by many without carefully determining what it encompasses.  The same can be said of ‘data security,’ it’s sibling.  From an operational aspect advising client it is important that there be clear…

Details

Cyber Insurance Coverage

Cyber insurance coverage is a new phenomenon and seldom do courts deal with such.  But as the events occur with frequency, cyber incidents are indeed getting attention.  They are getting the attention of insurance carriers as well.  Two cases stand out that have set a precedent. Travelers Indem. Co. of Am. v. Portal Healthcare Sols.,…

Details

Cyber Security Claims Can be Deceptive

Cyber security is increasingly a reported issue in the news.  How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities.  At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process.  Cyber security incident…

Details

Cloud Technology Knowing All

Cloud technology may have the capability of detecting access, use, and process.  More can be known than originally expected.  The capability of this technological use is referred to as being able to see from above.  One such company that utilizes this type of technology is Uber. Uber’s cloud technology use for a ‘God view’ was…

Details

IoT Security

Internet of Things security claims have caught the attention of lawmakers and regulators. The Internet has been interesting to follow and work with as a realm of process and information exchange.  As the devices used to transmit information increase in our lives and work, protecting what is transmitted from unwanted eyes is not necessarily going…

Details

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Details

Business Data a Trade Secret

Business data in business could be considered a trade secret as it is an essential component of analysis and decision-making.  Businesses cannot compete without relevant data for their administration, process and service delivery.  Trade secrets in database records have value.  Such secrets are sought for competitive reasons. Intruding, a kind word for hacking, into another’s…

Details

Cybersecurity Rule Setting the Mark

Cybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts.  Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing.  We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…

Details

Data Security Negligence

Data security responsibilities are, at times, not met with the requisite level of diligence for compliance.  Standards for compliance, for many businesses, institutions, and service entities, are not as specified as one would be drawn to believe.  The disjuncture between responsibilities and efforts are becoming more evident with passing days as cyber incidents leave alarming…

Details

Cyber Security Claims

Cyber security claims are seldom tempered with an entities acknowledgement of its insecurity of electronically stored information (ESI) and its handling of consumer personal identifying information (PII).  Their efforts and planning executed, though they may be diligent, cannot anticipate cyber incidents and breach incidents nor should their efforts to prevent them be overstated.  All attention…

Details