View allAdvertisingAdvertising DisclosuresAIAnti-CompetitionAnti-competitive AgreementsAnti-SLAPPAntitrust LawArtificial Intelligencebroadband telecommunicationsBroadcast Rightscell technologyCloud DataCloud Data ManagementCommunications Decency ActComputer AbuseComputer AccessComputer Access AbuseComputer LawComputer processConsumer PrivacyConsumer Protection LawContractsCopyright LawCyber securityCyber Security InsuranceCyberbullyingCybercrimeCybersquattingData Breach NotificationData CollectionData Protection LawDeceptive AdvertisingDeceptive Business PracticesDefamationDefamatory commentsDigital Media LawDomainsDoxingDoxxedEcommerce LawEconomic Espionage ActelectricityFalse Light PublicityFCCFirst AmendmentFree SpeechFreedom of ExpressionFTCHIPAAIdea PatentIntellectual PropertyIntellectual Property LawInternational Copyright LawInternational Internet LawInternet ContractsInternet GovernanceInternet LawInternet Law LawyerInternet of ThingsInternet PrivacyInternet SecurityInvasion of privacyLa RedLibelLinel Per SelitigationMalwareMarketing LawMedia & Entertainment LawMedia LawMedias SocialesMobile CommerceMobile CommereceMusic PerformancenewsNoticiasOnline Defamation LawOnline HarassmentOnline ServicesPassword Sharingpatent lawPatentsPersonal InformationPlanningPrivacyProteccion de dataRansomwareright-of-waySection230Social Media Account InformationSocial Media/PrivacySoftware PatentSoftware PatentsStandingTechnology ManagementTerms of ServiceTrade SecretsTrademark LawUncategorizedunfair business practicesutilityVideo PerformanceWireless telecommunications

Data Privacy

Data privacy of consumers has become a prevailing concern for many businesses and services related entities causing them to seek a balance for data privacy protection.  As data accumulates with every activity in the digital world, retaining that information securely is a critical responsibility.  Data privacy is critical with the process of sharing information for…

Details

Software Distinctions and Ideas

Software distinctions from existing software presents a hiccup to many developers with novel ideas.  Software considerations to push for a patent will encounter nuances that need to be addressed.  The approval process has been presenting hurdles for software patent filings.  The hurdles are more about what contribution is being offered by the idea rather than…

Details

Cybersecurity Term Use

Cybersecurity term use may not be as clear as it is used in every day conversation.  Cybersecurity as a term has been bouncing around by many without carefully determining what it encompasses.  The same can be said of ‘data security,’ it’s sibling.  From an operational aspect advising client it is important that there be clear…

Details

Business Records Handling

Business records are created every minute in business and in a variety of entities.  Every call handled by receptionists, customer service, account managers, and even by management and executives creates a business record.  Every transaction, document dispatch, email, scanning of information for sharing, all creates business records. Every function and every task, digitized, becomes a…

Details

Startup Business -More than an Idea

Startup Business criteria for the idea-person and the money-person, backing the venture, is always easily skewed toward “what’s the least that it will take to get going”.  Going into the wild of business with the startup entrepreneurial spirit is fascinating and laudable.  Many venture off with the chutzpa without seeking legal counsel  and resort to…

Details

Trade Secrets as Data

Trade secrets are seldom considered as data.  Yet, data records are valuable for daily operations and service delivery and much more.  The valued of data gathered either for diagnostic, screening, marketing, or even predictive work, is crucial.  This data becomes a trade secret.  Database records fall victim to many who seek the potential value of…

Details

Cloud Data Path Thoughts

Data path is a factor, though seldom considered by business and entities alike, that comes up as a concern.  Cloud data services are used in a variety of sectors including government, hospitals, and a great number of service industries.  The concern with data path, in the cloud for the processing and accessing of data, is…

Details

IoT Security

Internet of Things security claims have caught the attention of lawmakers and regulators. The Internet has been interesting to follow and work with as a realm of process and information exchange.  As the devices used to transmit information increase in our lives and work, protecting what is transmitted from unwanted eyes is not necessarily going…

Details

Cloud Data Usage

Cloud storage of data for business brings efficiencies and as well could bring unbeknown reasons for concern.  Transmitting data through varied network in daily process comes with numerous issues regarding security, privacy and the amount that is being transmitted, i.e., load.  Data is not static and neither is how it could be directed for load…

Details

Cybersecurity Responsibility

Cyber aspects of business functions involving the Internet, email network systems, and cloud platform usage are related to the need for data security.  Cybersecurity responsibilities are, at times, not met with the requisite level of diligence for compliance in managing data and transfers in daily work process.  Standards for compliance, for many businesses, institutions, and…

Details

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Details