DNA privacy is not in everyone’s minds. All too many people are eager to learn of their genealogy to razzle dazzle their peers with some form of importance about their heritage. But what is at stake with millions of records being created by the processing of direct to consumer tests (DTC) requests is reliability, security,…
Data privacy of consumers has become a prevailing concern for many businesses and services related entities causing them to seek a balance for data privacy protection. As data accumulates with every activity in the digital world, retaining that information securely is a critical responsibility. Data privacy is critical with the process of sharing information for…
Internet claims about what people experience negatively from the their use of the Internet is paramount. Internet claims span from invasion of privacy, defamation, to misappropriating someone’s identity online. The Internet gives users a freedom that is immeasurable. It gives users more flexibility to express ideas and conduct activities. Its use generates data about what…
Data security and the insecurity of electronically stored information (ESI) is ephemeral. Data security is not as predictable as one would prefer to think. Any anticipation of a data security incident or of its origin is absolutely unpredictable. With every incident, the attention is always on possible external sources. All too often, little effort is…
Doxing personal information is a growing concern to all, to say the least. Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings. But what is doxing? Doxing ‘may’ occur when someone publishes online someone else’s personal…
Startup cyber insurance is not a common consideration as an entrepreneur sets out in to the marketplace. After all, data breaches are always thought of as someone else’s problem. But many business people soon realize that the concerns and possible fears are realistic. The need for cyber insurance is unfortunately getting credible publicity. The notion…
Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches. Essentially, privacy is desired by all. …
Startup technical issues vary depending on the business purpose. The Internet presence of a startup will not always be the same as for other startups and other startups may not always be the best example to follow. The technical aspects of a business surpass the threshold requirements of having a computer and a phone. Considering…
Business records are created every minute in business and in a variety of entities. Every call handled by receptionists, customer service, account managers, and even by management and executives creates a business record. Every transaction, document dispatch, email, scanning of information for sharing, all creates business records. Every function and every task, digitized, becomes a…
Startup Business criteria for the idea-person and the money-person, backing the venture, is always easily skewed toward “what’s the least that it will take to get going”. Going into the wild of business with the startup entrepreneurial spirit is fascinating and laudable. Many venture off with the chutzpa without seeking legal counsel and resort to…
Social media privacy trust is easily and all too often not evaluated by users. Social media usage in its carefree, beach-like social setting, is all about people enjoying keeping up with friends and sharing life events and experiences with friends. However, it has become blatantly clear that by using the platform to share with friends,…
Cyber security is increasingly a reported issue in the news. How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities. At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process. Cyber security incident…