Online Terms of Service Agreements in Contract Law

The Importance of Online Terms of Service Agreements in Contract Law Online Terms of Service agreements (TOS) found in contracts must have the following elements to be considered legal and enforceable: Parties to the contract must have the legal ability to enter a contract known as contractual capacity.  A contract can only be used for transactions that are… Read More »

Greg Palmer

Safe Harbor and State of Texas Breach Notification Laws

The Concept of Safe Harbor The concept of “Safe Harbor” refers to specific actions, example; encryption of private data, that an individual or an organization can take to show a good-faith effort in complying with the law. This good-faith effort provides a person or organization “Safe Harbor” against prosecution under the law (Grama, 2015, pg.253). The State of… Read More »

Greg Palmer

Section 409 of the Sarbanes-Oxley Act (SOX)

Section 409 of the Sarbanes-Oxley Act (SOX) Section 409 of the Sarbanes-Oxley Act (SOX) states that organizations that are subject to SOX are required to disclose to the public, on an urgent basis, information on material changes in their financial condition or operations. The disclosures must to be presented in terms that are easy to understand and supported… Read More »

Greg Palmer

Health Information Privacy Complaint Consent

Health Information Privacy Complaint According to the Health Information Privacy Complaint Form OMB No. 0990-0269, Complaint Consent Form, The Department of Health and Human Services’ (HHS) Office for Civil Rights (OCR) has the authority to collect and receive material and information about a complainant, including personnel and medical records may be relevant to an investigation of a person’s… Read More »

Greg Palmer

Access Control List – ACL, DACL, SACL, ACE

Access Control List – ACL, DACL, SACL, ACE Solomon (2014) states that an Access Control List (ACL) is a list of access control rules that can be applied to a specific object. ACL’s that are used in in Windows are considered discretionary so they are also known as Discretionary Access Control Lists (DACL).  DACL’s consists of one or… Read More »

Greg Palmer

Adobe Flash Player Vulnerabilities-Sharp Increase Since 2005

Adobe Flash Player Vulnerabilities Zaharia (2015) states that over 3 million developers use Flash to create interactive content. Flash is primarily used to display text, graphics, and animations for video games and applications, allows audio and video streaming, and it can capture mouse, keyboard, microphone and camera input. Flash is deeply integrated into web browsers and is used… Read More »

Greg Palmer