Internet Freedom

Internet freedom is surely under stated, considering the extent of communications and the amount of data shared and transmitted.  Among the billions of daily data bits transmitted among users, unfortunately there are abuses.  Internet freedom is taken for granted by millions of users that resort to the Internet for less than beneficial reasons.  Online fraud,…

Details

Startup Cyber Insurance

Startup cyber insurance is not a common consideration as an entrepreneur sets out in to the marketplace. After all, data breaches are always thought of as someone else’s problem. But many business people soon realize that the concerns and possible fears are realistic. The need for cyber insurance is unfortunately getting credible publicity. The notion…

Details

Cease Demand Letter Myths

Cease demand letters are an expected step before any legal action is taken. Most jurisdictions require a claimant to demonstrate mitigation efforts.  Courts respect a claimant’s attempt to resolve the issue of concern.  They also appreciate seeing an effort to minimize damages.  But what can be surmised by cease demand letters is not what is…

Details

Consumer Data Privacy

Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches.  Essentially, privacy is desired by all. …

Details

Startup Business Consumer Issues

Startup business consumer issues are not usually raised in discussions at the outset by entrepreneurs.  Consumer protection issues creep up as time goes by in their daily business process. But the reality bites, when startups encounter issues not thought through. If the startup is engaged in a business entails a contract or a detailed proposal…

Details

Business Records Handling

Business records are created every minute in business and in a variety of entities.  Every call handled by receptionists, customer service, account managers, and even by management and executives creates a business record.  Every transaction, document dispatch, email, scanning of information for sharing, all creates business records. Every function and every task, digitized, becomes a…

Details

Contracts Online, With Who?

Contracts online are formed every day without any thought to their import.  They may be enforceable or not.  Many parents allow their minors to use their parents’ credits cards or the debt card given to them by their parents to shop online, for say, school clothes. That mad rush for tax free holiday prior to…

Details

Startup Business -More than an Idea

Startup Business criteria for the idea-person and the money-person, backing the venture, is always easily skewed toward “what’s the least that it will take to get going”.  Going into the wild of business with the startup entrepreneurial spirit is fascinating and laudable.  Many venture off with the chutzpa without seeking legal counsel  and resort to…

Details

Cloud Data Path Thoughts

Data path is a factor, though seldom considered by business and entities alike, that comes up as a concern.  Cloud data services are used in a variety of sectors including government, hospitals, and a great number of service industries.  The concern with data path, in the cloud for the processing and accessing of data, is…

Details

Internet Computing Terms

Internet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few.  As these terms arise in conversation, contracts…

Details

Data Security Negligence

Data security responsibilities are, at times, not met with the requisite level of diligence for compliance.  Standards for compliance, for many businesses, institutions, and service entities, are not as specified as one would be drawn to believe.  The disjuncture between responsibilities and efforts are becoming more evident with passing days as cyber incidents leave alarming…

Details