Data Security of ESI

Data security and the insecurity of electronically stored information (ESI) is ephemeral.  Data security is not as predictable as one would prefer to think.  Any anticipation of a data security incident or of its origin is absolutely unpredictable.  With every incident, the attention is always on possible external sources.  All too often, little effort is…

Cybersecurity Term Use

Cybersecurity term use may not be as clear as it is used in every day conversation.  Cybersecurity as a term has been bouncing around by many without carefully determining what it encompasses.  The same can be said of ‘data security,’ it’s sibling.  From an operational aspect advising client it is important that there be clear…

Consumer Data Privacy

Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches.  Essentially, privacy is desired by all. …

Data Breach Injury In fact

Data breaches catch all by surprise.  The data breach itself stifles the entity that had the breach.  But to anyone outside that wonders if they have been affected, their opportunity to claim is not that easy to depict.  Standing is an issue that has to be overcome.   The compromise of personal identifiable information (PII) has…

Trade Secrets as Data

Trade secrets are seldom considered as data.  Yet, data records are valuable for daily operations and service delivery and much more.  The valued of data gathered either for diagnostic, screening, marketing, or even predictive work, is crucial.  This data becomes a trade secret.  Database records fall victim to many who seek the potential value of…

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Consumer Privacy versus Data Economy Ecosystem

We all hear about privacy needing protection and we also read about the events that have led to infringements of privacy on the occurrence of data breaches.  Essentially, privacy is desired by all and many believe that it is an aspect of life that is common understanding and it is worth respect and consideration. The courts have…

Cyber Security Claims

Cyber security claims are seldom tempered with an entities acknowledgement of its insecurity of electronically stored information (ESI) and its handling of consumer personal identifying information (PII).  Their efforts and planning executed, though they may be diligent, cannot anticipate cyber incidents and breach incidents nor should their efforts to prevent them be overstated.  All attention…

Internet Cloud Options

Internet cloud options for data computing services are developing as the concept catches on.  Incidents of a breach, contract disputes, hacking, and ongoing lawsuits are serving the way for conditions to be highlighted.  Nascent, cloud computing contracts were conceived as a data storage solution for businesses, municipal entities, and state organizations.  So long as remote…

Trade Secrets in Databases

Database as a Trade Secret Trade secrets in database records fall victim to many who seek the potential value of stored records from a variety of entities, either from government agencies and competitor businesses, to also include medical and financial enterprises, and even from their own employer or client.  Intruding into another’s database is becoming…

Website Crawling and Data Scraping Thoughts

Website crawling and data scraping have burdened the growth of e-commerce as website owners are witnessing their data scraped.  The legal questions have lingered.  Many questions stand out.  The prevalence of crawling and scraping has become too of the norm for those using web content for business, research, or marketing purposes. The common theme is…