Data Security of ESI

Data security and the insecurity of electronically stored information (ESI) is ephemeral.  Data security is not as predictable as one would prefer to think.  Any anticipation of a data security incident or of its origin is absolutely unpredictable.  With every incident, the attention is always on possible external sources.  All too often, little effort is…

Details

Doxing Personal Information

Doxing personal information is a growing concern to all, to say the least.  Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings.  But what is doxing? Doxing ‘may’ occur when someone publishes online someone else’s personal…

Details

Internet Freedom

Internet freedom is surely under stated, considering the extent of communications and the amount of data shared and transmitted.  Among the billions of daily data bits transmitted among users, unfortunately there are abuses.  Internet freedom is taken for granted by millions of users that resort to the Internet for less than beneficial reasons.  Online fraud,…

Details

Consumer Data Privacy Versus Data Economy

Consumer data privacy versus the data economy concern has had recurring attention and does not seem to stop. There are too many occurrences of loose transfers of consumer data.  From a consumer perspective, it appears it has been ignored as a result of the cycle of benefit and compromises, along with the cyber vulnerabilities, and…

Details

Consumer Data Privacy

Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches.  Essentially, privacy is desired by all. …

Details

Startup Business Consumer Issues

Startup business consumer issues are not usually raised in discussions at the outset by entrepreneurs.  Consumer protection issues creep up as time goes by in their daily business process. But the reality bites, when startups encounter issues not thought through. If the startup is engaged in a business entails a contract or a detailed proposal…

Details

Startup Technical Issues

Startup technical issues vary depending on the business purpose. The Internet presence of a startup will not always be the same as for other startups and other startups may not always be the best example to follow.  The technical aspects of a business surpass the threshold requirements of having a computer and a phone.  Considering…

Details

Contracts Online, With Who?

Contracts online are formed every day without any thought to their import.  They may be enforceable or not.  Many parents allow their minors to use their parents’ credits cards or the debt card given to them by their parents to shop online, for say, school clothes. That mad rush for tax free holiday prior to…

Details

Startup Business -More than an Idea

Startup Business criteria for the idea-person and the money-person, backing the venture, is always easily skewed toward “what’s the least that it will take to get going”.  Going into the wild of business with the startup entrepreneurial spirit is fascinating and laudable.  Many venture off with the chutzpa without seeking legal counsel  and resort to…

Details

Social Media Privacy Trust

Social media privacy trust is easily and all too often not evaluated by users.  Social media usage in its carefree, beach-like social setting, is all about people enjoying keeping up with friends and sharing life events and experiences with friends.  However, it has become blatantly clear that by using the platform to share with friends,…

Details

Cyber Security Claims Can be Deceptive

Cyber security is increasingly a reported issue in the news.  How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities.  At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process.  Cyber security incident…

Details

Cloud Data Path Thoughts

Data path is a factor, though seldom considered by business and entities alike, that comes up as a concern.  Cloud data services are used in a variety of sectors including government, hospitals, and a great number of service industries.  The concern with data path, in the cloud for the processing and accessing of data, is…

Details