GPS privacy has been litigated and it remains unresolved. GPS, aka global positioning system, alone can locate a device. The GPS identifier and the device’s Internet Protocol identification, (IP address) can provide greater identifying capability of the actual user. The IP address information can reveal a user’s location by city, the region, the state, along with…
Startup cloud service is becoming a key aspect in the business data management. Startup business cloud service could save considerable amount of money for a startup. The decision however should consider the terms of service, quality of service evaluation, and any transitioning conditions. The latter is troubling for many startup businesses and even ongoing established…
Privacy is at risk with extensions of technology’s “potential” use. Technology offers the potential of delivering a means to monitor every person’s movement and track and collect recorded human daily events. Is that necessary? What are the consequences? There are consequences and those consequences must be assessed in balance with the potential harm to society.…
Startup cyber insurance is not a common consideration as an entrepreneur sets out in to the marketplace. After all, data breaches are always thought of as someone else’s problem. But many business people soon realize that the concerns and possible fears are realistic. The need for cyber insurance is unfortunately getting credible publicity. The notion…
Cease demand letters are an expected step before any legal action is taken. Most jurisdictions require a claimant to demonstrate mitigation efforts. Courts respect a claimant’s attempt to resolve the issue of concern. They also appreciate seeing an effort to minimize damages. But what can be surmised by cease demand letters is not what is…
Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches. Essentially, privacy is desired by all. …
Startup business consumer issues are not usually raised in discussions at the outset by entrepreneurs. Consumer protection issues creep up as time goes by in their daily business process. But the reality bites, when startups encounter issues not thought through. If the startup is engaged in a business entails a contract or a detailed proposal…
Contracts online are formed every day without any thought to their import. They may be enforceable or not. Many parents allow their minors to use their parents’ credits cards or the debt card given to them by their parents to shop online, for say, school clothes. That mad rush for tax free holiday prior to…
Startup Business criteria for the idea-person and the money-person, backing the venture, is always easily skewed toward “what’s the least that it will take to get going”. Going into the wild of business with the startup entrepreneurial spirit is fascinating and laudable. Many venture off with the chutzpa without seeking legal counsel and resort to…
Social media privacy trust is easily and all too often not evaluated by users. Social media usage in its carefree, beach-like social setting, is all about people enjoying keeping up with friends and sharing life events and experiences with friends. However, it has become blatantly clear that by using the platform to share with friends,…
Liability, as an issue, seldom arises in common conversations. When discussions in the work place occur, liability is not on the top of the list of issues. Yet, there are a plethora of law firm ads about personal injury claims, insurance commercials, and medical malpractice issues. From watching and reading ads you are left…
Internet computing terms are commonly mentioned in a law firm’s discussions where the practice focuses on issues in the market engaging the Internet, and among other aspects, e.g., computing, e-commerce, data protection, software development, application development, data management infrastructure, cloud processing, and cyber security, to mention as few. As these terms arise in conversation, contracts…