The Conundrum I’ve noticed an interesting conundrum: cybersecurity programs operating without consulting a privacy attorney. When I first realized that cybersecurity was being implemented without consulting a privacy attorney, I thought, “how?” and “why?” How would...
News & Updates

What do you mean by “Where is my data”?
You may have recently been instructed to “know where your data is located” or maybe you’ve been asked “where is your data”? The location of your data refers to the physical location. Somewhere a machine is sitting in a room, storing your information. These machines...

How to Protect Data
Asking how to protect data is similar to asking “which is the best lock?”. Typically, a variety of security measures are recommended to create layers of protection. The first step in protecting data is identifying your assets and vulnerabilities. Begin by listing...
A Trail of Bread Crumbs in the Cloud: Metadata.
What is Metadata? Metadata is the extra information added to or imbedded in the users’ input. An example would be when you take a picture and the location is automatically attached to the photo. This is great when you want to organize your personal photos by date or...
Privacy in the Cloud aka “Stranger Danger!”
Shortly after I was taught how to turn on a computer, I was taught that nothing on the computer is private. My computer education went something like this: learn to walk, learn to turn on the computer, learn to use a floppy disk, learn to write code. Somewhere...

Lisa M. Angelo
I’m an attorney passionate about helping businesses use technology responsibly. For many years I listened to people describe a disconnect between lawyers and technology. My goal has been to bridge the gap. Please enjoy this blog about cyber law; where technology and the law intersect.