Data Security of ESI

Data security and the insecurity of electronically stored information (ESI) is ephemeral.  Data security is not as predictable as one would prefer to think.  Any anticipation of a data security incident or of its origin is absolutely unpredictable.  With every incident, the attention is always on possible external sources.  All too often, little effort is…

Startup Business Cloud Use Issues

Startup business cloud service is becoming a key aspect in the data management requirements of many entities.  Startup business cloud service could save considerable amount of money for a startup.  Cloud service of data process becomes, for many, their central component for their data. The decision to use a cloud service, however, should consider the…

Consumer Data Privacy

Consumer data privacy concerns have taken a prominent position among the list of concerns over our economy and laws. We all hear about digital data privacy needing protection and we also read about the events that have led to infringements of consumer data privacy on the occurrence of data breaches.  Essentially, privacy is desired by all. …

Business Records Handling

Business records are created every minute in business and in a variety of entities.  Every call handled by receptionists, customer service, account managers, and even by management and executives creates a business record.  Every transaction, document dispatch, email, scanning of information for sharing, all creates business records. Every function and every task, digitized, becomes a…

Startup Business -More than an Idea

Startup Business criteria for the idea-person and the money-person, backing the venture, is always easily skewed toward “what’s the least that it will take to get going”.  Going into the wild of business with the startup entrepreneurial spirit is fascinating and laudable.  Many venture off with the chutzpa without seeking legal counsel  and resort to…

Data Breach Injury In fact

Data breaches catch all by surprise.  The data breach itself stifles the entity that had the breach.  But to anyone outside that wonders if they have been affected, their opportunity to claim is not that easy to depict.  Standing is an issue that has to be overcome.   The compromise of personal identifiable information (PII) has…

Trade Secrets as Data

Trade secrets are seldom considered as data.  Yet, data records are valuable for daily operations and service delivery and much more.  The valued of data gathered either for diagnostic, screening, marketing, or even predictive work, is crucial.  This data becomes a trade secret.  Database records fall victim to many who seek the potential value of…

Business Data a Trade Secret

Business data in business could be considered a trade secret as it is an essential component of analysis and decision-making.  Businesses cannot compete without relevant data for their administration, process and service delivery.  Trade secrets in database records have value.  Such secrets are sought for competitive reasons. Intruding, a kind word for hacking, into another’s…