Data Security of ESI

Data security and the insecurity of electronically stored information (ESI) is ephemeral.  Data security is not as predictable as one would prefer to think.  Any anticipation of a data security incident or of its origin is absolutely unpredictable.  With every incident, the attention is always on possible external sources.  All too often, little effort is…

Cyber Security Claims Can be Deceptive

Cyber security is increasingly a reported issue in the news.  How entities report their cyber incident, depends on their own preparedness and willingness to confront unacknowledged vulnerabilities.  At times it is a matter of employee negligence, lack of training, failure of the entity to have in place stop-gaps and a detection process.  Cyber security incident…

Internet Cybersecurity and Data Security

Internet news events are reported daily about computer abuse, hacking, data theft and malware, nationally and internationally.  The concept of cybersecurity, as a term, appears bounced around by writers, scholars, politicians, and news media, short of carefully determining what it encompasses and how cybersecurity relates to the Internet.  Around the world the term is used…

Cybersecurity Rule Setting the Mark

Cybersecurity rule ideas, so far, have been piecemeal throughout the United States despite the numerous efforts.  Opposite to the European Union’s efforts through their General Data Protection Regulation (GDPR) initiative, in the U.S. we have no such thing.  We do have bolstering amendments to Gramm-Leach-Bliley Act, embodied in the Consumer Data Security and Notification Act…