Data Security of ESI

Data security and the insecurity of electronically stored information (ESI) is ephemeral.  Data security is not as predictable as one would prefer to think.  Any anticipation of a data security incident or of its origin is absolutely unpredictable.  With every incident, the attention is always on possible external sources.  All too often, little effort is…

Details

Doxing Personal Information

Doxing personal information is a growing concern to all, to say the least.  Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings.  But what is doxing? Doxing ‘may’ occur when someone publishes online someone else’s personal…

Details

Startup Cyber Insurance

Startup cyber insurance is not a common consideration as an entrepreneur sets out in to the marketplace. After all, data breaches are always thought of as someone else’s problem. But many business people soon realize that the concerns and possible fears are realistic. The need for cyber insurance is unfortunately getting credible publicity. The notion…

Details

Consumer Data Privacy Versus Data Economy

Consumer data privacy versus the data economy concern has had recurring attention and does not seem to stop. There are too many occurrences of loose transfers of consumer data.  From a consumer perspective, it appears it has been ignored as a result of the cycle of benefit and compromises, along with the cyber vulnerabilities, and…

Details

Consumer Data Privacy

Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches.  Essentially, privacy is desired by all. …

Details

Startup Technical Issues

Startup technical issues vary depending on the business purpose. The Internet presence of a startup will not always be the same as for other startups and other startups may not always be the best example to follow.  The technical aspects of a business surpass the threshold requirements of having a computer and a phone.  Considering…

Details

Contracts Online, With Who?

Contracts online are formed every day without any thought to their import.  They may be enforceable or not.  Many parents allow their minors to use their parents’ credits cards or the debt card given to them by their parents to shop online, for say, school clothes. That mad rush for tax free holiday prior to…

Details

Startup Business – Planning the Start

Startup business usually starts before they start.  May sound confusing but, the planning should be deemed as the start.  Also, people get to start spreading the word before they start.  That makes sense.  People want others to know what they are embarking on and how their venture will be a good service or a good…

Details

Cyber Insurance Coverage

Cyber insurance coverage is a new phenomenon and seldom do courts deal with such.  But as the events occur with frequency, cyber incidents are indeed getting attention.  They are getting the attention of insurance carriers as well.  Two cases stand out that have set a precedent. Travelers Indem. Co. of Am. v. Portal Healthcare Sols.,…

Details

Trade Secrets as Data

Trade secrets are seldom considered as data.  Yet, data records are valuable for daily operations and service delivery and much more.  The valued of data gathered either for diagnostic, screening, marketing, or even predictive work, is crucial.  This data becomes a trade secret.  Database records fall victim to many who seek the potential value of…

Details

Cloud Data Path Thoughts

Data path is a factor, though seldom considered by business and entities alike, that comes up as a concern.  Cloud data services are used in a variety of sectors including government, hospitals, and a great number of service industries.  The concern with data path, in the cloud for the processing and accessing of data, is…

Details

Cloud Technology Knowing All

Cloud technology may have the capability of detecting access, use, and process.  More can be known than originally expected.  The capability of this technological use is referred to as being able to see from above.  One such company that utilizes this type of technology is Uber. Uber’s cloud technology use for a ‘God view’ was…

Details