Doxing Personal Information

Doxing personal information is a growing concern to all, to say the least.  Personal information online is common, however, with the Internet being so prevalent. Many records are found online, such as, voting, property ownership, even bankruptcies, and new business filings.  But what is doxing? Doxing ‘may’ occur when someone publishes online someone else’s personal…

Business Records Handling

Business records are created every minute in business and in a variety of entities.  Every call handled by receptionists, customer service, account managers, and even by management and executives creates a business record.  Every transaction, document dispatch, email, scanning of information for sharing, all creates business records. Every function and every task, digitized, becomes a…

Internet Cloud Options

Internet cloud options for data computing services are developing as the concept catches on.  Incidents of a breach, contract disputes, hacking, and ongoing lawsuits are serving the way for conditions to be highlighted.  Nascent, cloud computing contracts were conceived as a data storage solution for businesses, municipal entities, and state organizations.  So long as remote…

Data Breach Insurance

Data breach insurance is becoming a growing concern and a topic for businesses to address their risk management administrative panoply. Considerations may sway a business towards a third-party insurance coverage or a first-party insurance coverage or both depending on the services provided.  Previously posted writing regarding the cyber insurance needs, we discussed the limits that…

Computer Abuse by Password Sharing

Computer abuse can occur by the simple act of password sharing to gain access to a computer and its network. Password sharing for use of a computer is seldom realized as a wrongful use.  It is as well not realized by many account holders that sharing their account passwords or access passwords is as well…

Data Security and the Internal and External Cyber – Insecurity

Data security and the insecurity of electronically stored information (ESI) is ephemeral and any anticipation of its occurrence or origin is absolutely unpredictable.  All attention is always on the external incidents but little is focused on the internally sourced infraction.  Seldom do entities envision the internally sourced incident.  The risk from internal unauthorized access to…