Doxing Personal Information

Doxing personal information is a growing concern to all, to say the least.  Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings.  But what is doxing? Doxing ‘may’ occur when someone publishes online someone else’s personal…

Details

Doxing Information

Doxing information is not a household term.  It is slowly becoming part of the daily conversation especially by people who have had their personal information publicized online. Internet information that is available to read on the Internet about anyone is surprising.  The Internet hosts way too much information.  All users are contributing to its data. …

Details

Cybersecurity Term Use

Cybersecurity term use may not be as clear as it is used in every day conversation.  Cybersecurity as a term has been bouncing around by many without carefully determining what it encompasses.  The same can be said of ‘data security,’ it’s sibling.  From an operational aspect advising client it is important that there be clear…

Details

Consumer Data Privacy Versus Data Economy

Consumer data privacy versus the data economy concern has had recurring attention and does not seem to stop. There are too many occurrences of loose transfers of consumer data.  From a consumer perspective, it appears it has been ignored as a result of the cycle of benefit and compromises, along with the cyber vulnerabilities, and…

Details

Consumer Data Privacy

Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches.  Essentially, privacy is desired by all. …

Details

Startup Technical Issues

Startup technical issues vary depending on the business purpose. The Internet presence of a startup will not always be the same as for other startups and other startups may not always be the best example to follow.  The technical aspects of a business surpass the threshold requirements of having a computer and a phone.  Considering…

Details

Contracts Online, With Who?

Contracts online are formed every day without any thought to their import.  They may be enforceable or not.  Many parents allow their minors to use their parents’ credits cards or the debt card given to them by their parents to shop online, for say, school clothes. That mad rush for tax free holiday prior to…

Details

Data Breach Injury In fact

Data breaches catch all by surprise.  The data breach itself stifles the entity that had the breach.  But to anyone outside that wonders if they have been affected, their opportunity to claim is not that easy to depict.  Standing is an issue that has to be overcome.   The compromise of personal identifiable information (PII) has…

Details

Social Media Privacy Trust

Social media privacy trust is easily and all too often not evaluated by users.  Social media usage in its carefree, beach-like social setting, is all about people enjoying keeping up with friends and sharing life events and experiences with friends.  However, it has become blatantly clear that by using the platform to share with friends,…

Details

Cyber Security Claims Can be Deceptive

Cyber security is increasingly a reported issue in the news.  How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities.  At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process.  Cyber security incident…

Details

Internet Content Hurting Others

Internet content hurting others is all too common with the freedom to do so.  What can a person do? immunity has been a thorn to those who have been the subject of comments on the web.  Cyberbullying, on line harassment, and libel has had a long-lasting impact on those who have been the subject of the content…

Details

Cloud Technology Knowing All

Cloud technology may have the capability of detecting access, use, and process.  More can be known than originally expected.  The capability of this technological use is referred to as being able to see from above.  One such company that utilizes this type of technology is Uber. Uber’s cloud technology use for a ‘God view’ was…

Details