Call Us:+1-323-813-5979

Author Archives : Hansen Tong

Home  /  Author : Hansen Tong

16.Jul, 2020 0

Protecting E-Commerce Marketing Content and Photos Through Copyright Registration


At we regularly get calls from our e-com clients about unscrupulous businesses stealing/copying our client’s photos or marketing content.  As an online retailer your content IS the cornerstone of your business because it’s how you sell products and generally if your marketing content is good it wasn’t cheap to create.

28.May, 2020 0

Five US states that define data breach to include access

With the increasing incidences of consumer data breaches, entreaties for stronger data privacy protections and regulations have grown stronger. As per the US federal government’s reluctance to salvage the situation, many of the 50 US state governments appear to have taken the bull by its horn. These states’ have, through…

26.May, 2020 0

Relation of intermediary liability to data breaches

Intermediary liability refers to the legal culpability of internet intermediaries in respect of the illegitimate, illegal, or harmful activities carried out by their users. For such culpability to arise, such user(s) must have performed such illegitimate activity(ies) through the intermediary’s offered service. The responsibility thus devolves on intermediaries such as…

21.May, 2020 0

Building a good data protection program for your Business (Part 2)

Taking On-site security measure: Soon after the risks to data are collated, the next line of action would be to take appropriate physical data protection and damage measures. That can be achieved by making use of commercial record centers to store confidential hard copy documents and files. Such facilities keep…

19.May, 2020 0

Building a good data protection program for your Business (Part 1)

As governments around the world each race to put together updated data protection and privacy regulation frameworks that secures the interests of their citizens, one thing is for sure – businesses have no choice but to comply.  However, many businesses out there have developed cold feet, perhaps because the word…

14.May, 2020 0

Operationalizing data protection for business (Part 2)

Defining privacy policies and procedures: Amongst other things, most of today’s data privacy and protection laws and statutes require many businesses to update or create more privacy policies, in addition to the implementation of several privacy procedures. Data-centric businesses may thus have to, in operationalizing best data protection practices, create…

12.May, 2020 0

Operationalizing data protection for business (Part 1)

In today’s world, amongst humans, data shares a good-like characteristic: omnipresence. And as people become more conscious about how their data is dealt with, the need for concrete data protection and privacy frameworks that regulate corporate operations continue to grow. Nowadays, there is an irresistible need for operationalizing data protection…

7.May, 2020 0

What is considered personal Identifiable Information under privacy laws?

Under privacy laws, personal Identifiable Information (PII) refers to information capable of being solely used, or combined with others, to identify, locate, or contact an individual. The United States’ National Institute of Standards and Technology (NIST)’s Guide to Protecting the Confidentiality of Personally Identifiable Information defines PII as “information such…

5.May, 2020 0

Are disclosures mandatory for social media influencers?

Did you know that Cristiano Ronaldo earns more in revenue from his Instagram account than his football career? Yes, his account is one of the most followed on the planet, making him an outstanding social media influencer that every brand wants to partner with. But did you also know that…

16.Apr, 2020 0

Is Data Encryption More Secure or Less Secure?

In today’s world, almost nothing is secured. Everything you can think of, such as our lives, properties, and belongings, all need one form of security or the other. Even our digital properties/data – that are free from physical dangers – are not safe. This is where data encryption comes in….