Injunctions Public Interest
Considering public interest
DetailsAI or artificial intelligence is applied delivering services in so many service areas. We see AI at store registers replacing cashiers. There is AI in customer service call centers stylizing call trees before we actually speak to a human being. Banking services implement AI in your banking process. AI is also being used to…
DetailsData security and the insecurity of electronically stored information (ESI) is ephemeral. Data security is not as predictable as one would prefer to think. Any anticipation of a data security incident or of its origin is absolutely unpredictable. With every incident, the attention is always on possible external sources. All too often, little effort is…
DetailsInternet freedom is surely under stated, considering the extent of communications and the amount of data shared and transmitted. Among the billions of daily data bits transmitted among users, unfortunately there are abuses. Internet freedom is taken for granted by millions of users that resort to the Internet for less than beneficial reasons. Online fraud,…
DetailsContracts online are formed every day without any thought to their import. They may be enforceable or not. Many parents allow their minors to use their parents’ credits cards or the debt card given to them by their parents to shop online, for say, school clothes. That mad rush for tax free holiday prior to…
DetailsStartup business usually starts before they start. May sound confusing but, the planning should be deemed as the start. Also, people get to start spreading the word before they start. That makes sense. People want others to know what they are embarking on and how their venture will be a good service or a good…
DetailsStartup Business criteria for the idea-person and the money-person, backing the venture, is always easily skewed toward “what’s the least that it will take to get going”. Going into the wild of business with the startup entrepreneurial spirit is fascinating and laudable. Many venture off with the chutzpa without seeking legal counsel and resort to…
DetailsCyber security is increasingly a reported issue in the news. How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities. At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process. Cyber security incident…
DetailsCloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern. Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load. Data is not static and neither is how it could be directed for load…
DetailsInternet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few. As these terms arise in conversation, contracts…
DetailsCybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts. Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing. We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…
Details