was successfully added to your cart.



Data as Property

What is data?

By | CCPA, Cloud, CMMC, Data as Property, Legal, Privacy

Long before the internet, computer processors, ram, or hard drives much of the world’s data was composed of physically tangible and recognizable components.   Whether you were an artist that painted a celebrated canvas or a poet whose words filled the reader’s emotions or the engineer that drafted a suspension bridge, your data was composed and easily referenced as tangible items such as paper, ink, graphite, or paint. 

We protected our data in a number of ways limiting exposure of the content, registering content with agencies or groups with the intention to demonstrate ownership.  Often the data was physically protected under lock-and-key technologies whether in a building, a vault, or a case.  Beyond the registration of data with agencies or groups, controlling physical access to the data was critical and ensured the concepts and content was protected as property.

Yes, there were many individuals and groups that wanted to extract the value of your data but there was much more effort required to sequester, copy, manipulate, and extract value from the data of old.  Registration of your data with agencies and groups expanded to international partnerships with the ability to identify, prosecute, and protect the value of your data.  Beyond monetary value, the protection of government intellectual property and technology secrets held a top priority for countries around the world.  The flow of people in and out of the country was strictly monitored and employees received rigorous scrutiny before they were permitted within the ranks of the company.  With such physical barriers in place, significant and coordinated efforts were required to extract your data where nefarious state-actors exposed themselves to significant peril in order to locate, access, and photograph or outright steal the targeted data.  

The evolution of property rights gave way to clear ownership of your data in these tangible forms as the argument is traceable through time and physical parameters back to the owner.   Exposure of data in these tangible forms was limited to defined individuals where access tracking was easily understood, controlled, and connected to people, places, and things.

Think about it, everyone has experienced misplacing or worse the theft of your personal property at some point in time through your life.   Consider how you felt at that very moment when you could not find your keys, left the door of your home unlocked, walked into your office recently burglarized, or had your mobile phone taken when you were not watching?   How did you feel?

It is important to understand how our human condition drives our actions where that real fear, anger, and distrust motivates you to watch and protect those items.  Physical property, it’s value, and the related feelings drive us to guard the value our property implies.   In this case the protection of our data was in a perspective of physical property where the tangible nature invokes a direct emotional response.

Fast forward into the digital age.

I’ll ask you to think about the number of times over the past couple decades when you downloaded software applications, digital books, digital music, or anything of this nature from a site you found or a torrent reposit.  Did you have any sense that you were taking the value created by others?  Did you notice any emotional response at all? 

Now consider the form your data takes on today.  What is your data?  There is no paper, ink, graphite, or paint to identify and claim ownership. 

So, what is your data?  Most people think of their data as the form they entered it, such as, a phone number, employee name, or perhaps medical records where this is only the interpreted output of the primary components of your data.  Have you ever wondered how your words, pictures, drawings, or music actually end up in a form that can be captured, moved, modified, restored, or displayed?  More importantly do you ever wonder how you can clearly claim ownership over your data when you cannot see it or touch it? Do you think there is any legal recognition available that defines how you clearly own these artifacts you cannot see or touch?

How does the human condition respond to something that is so intangible as modern digital data?

The fact is we don’t respond, we don’t understand, and we have not yet been able to connect the protective emotional response triggered by physical property to intangible assets such as magnetic fields, electromagnetic waves, or packets of stored electrons.

This is your modern data.

  • Magnetic fields
  • Electromagnetic waves
  • Packets of electrons

No wonder it does not illicit an emotional response, when was the last time you worried about checking in on your ‘packets of electrons’?  You can’t see them or touch them and you need stuff made by other companies just to view or measure them.  What?  What is my data?

Consider a common experience of writing a document.  Your words, your copyright, your ideas are transferred from a keyboard into an application temporally holding your words, usually encoded as packets of electrons, until you save your writing for access at a later time.  If your computer stores information on a hard drive then your document will be saved in a sequence of magnetic fields.  How do you own a magnetic field?   If you send your document using a WIFI connection then your data is modulating electromagnetic waves, who owns the broadcast rights or more importantly what laws protect my ownership in transmission?  If you copy your document to your third-party cloud service it may be stored on a number solid-state drives as millions of packets of electrons, how do you recognize those electrons as your property on someone else’s system?

How does that work?  I just saved my documents onto a third-party cloud service!  Let me see, so the corporation that is the service, who is recognized as an individual under the law just collected all my data as packets of electrons into the hardware that they own.  This hardware is stored on their real estate and housed inside a company building.  So where in our legislative construct does it outline that packets of electrons can be defined as my property with all the protection afforded my stuff under property law?

The reality is we are decades away from a level of recognized ownership of these intangible components, as supported by codified or precedent law.  You are living in the wild-wild-west right now where this data has significant value to capture, sell, or hold for ransom while business leaders and our judiciary are yet to become fully cognizant of the immediate negative impact to our nation, economy, and privacy.

You are not alone.  In business the majority of business owners and c-suite executives view this intangible data management as a cost-center and lack the emotional triggers that would normally drive a detailed review in the delivery of systems.   They often push towards lower cost solutions and third-party service providers in an effort to further reduce expenditures.  How many leaders do you think actually completed a detailed review to interpret how the current legislative systems, codified law and precedent law describes and protects the ownership of the magnetic fields, electromagnetic waves, and packets-of-electrons?   Given the insanity around us with data theft, ransomware, and international espionage I would say very few.

If your data is no longer in a tangible form how do you claim ownership? How do the Terms and Conditions of third-party services describe your data?  How do third-party services describe their liability, accountability, and indemnification responsibility when your data is impacted?  You may have enough trouble just protecting data across your local networks let alone considering the vast number of employees and potentially, foreign nationals, working at these third-party sites.

Business owners, c-suite executives, and CEO’s must take this seriously and acquire the essential basic education within this discipline in order to properly interrogate corporate decisions that involve your most valuable asset, your corporate data.

My Cloud Data Is Never Deleted

By | Cloud, CMMC, Data as Property, Legal

Over the past decade, as a result of millions of dollars of marketing effort,  business decisions were made and the push to the cloud began.  It took business owners a while to follow the herd as individuals flocked to free 3rd party cloud services but eventually the desire to reduce corporate expenses won and data exchange, storage, and cybersecurity was handed over to cloud companies.

Let’s face it, most people do not have the training or domain knowledge to understand exactly what is happening once they click the Save button on their document or spreadsheet application.   Most people understand the value of what they can see or touch or hold behind locked doors but few understand or perceive the value of the One’s and Zero’s that make up the data that is their document.

That data in its state as a file does not bear the tangible components of the physical world so we don’t apply any emotional value and subsequently don’t have the alarm bells ringing when it disappears from our control.

Tell me the last time you checked for your keys to your apartment, condo, home, or car.  How often in a day do we look for or think about where those keys reside?   These tangible physical objects have a value meaning in our lives so we guard and control them to the best of our ability.

What about my data?  In a business all of your data is your intellectual property which has unmistakable value yet we copy, save, hold, and forget this data inside other companies!  To compound the issue, these companies refuse to take any responsibility for the loss or theft of this information.  We don’t give it a second thought and how can we when this invisible intangible information is transacted and managed in ways most people do not understand.

Currently there are no codified laws or precedent established cases to guide legislation in defining that an intangible magnetic field is property of its creator.  This action and subsequent laws will take decades to argue in the courts all the while you are subjected to data theft, exposure, and loss due to a legacy internet architecture that was never designed for this level of commercialization.

It is more important today then ever before that you consider how you control and protect your Data, your Research, your HR records, your C-SUITE conversations, your Clients right to privacy, when you consider just following the herd.  Remember your company will end up being the accountable party providing restitution for breaches that impact your clients when your cloud provider fails, and they will.

I was prompted to write this article as I read through a ZNet article “New Windows 10 tool: This free Microsoft app helps you recover deleted or corrupted data…For photos, documents, videos and more, Windows File Recovery supports many file types to help ensure that your data is not permanently lost.”

So tell me your Cloud provider can’t already do the same thing?  8 years ago I was able to recover data on a dead hard-drive which included documents, spreadsheets and photos.

So tell me your Cloud provider, their employees, and hackers can’t access your data even after you hit delete.  What happens to those hard-drives that fail, do you think your Cloud provider cares?  Even it they do there are tools to extract your data.

Let’s pause for a moment and consider just the top 20% of your corporate data you need to protect from 3rd party exposure.

  • Law firms cannot protect your Client – Solicitor Privilege through the use of 3rd party services such as Email or Cloud or Chat tools
  • HR departments hold precious personally identifiable information if exposed may result in identity theft or fraud
  • C-SUITE consider conversations that involve M&A, HR, Litigation between board members and leadership, if you are publicly traded this could spell disaster
  • Financial Services cannot protect your privacy and guard your social security, banking, and tax return data through Cloud services

Now let’s pause and take a breath.  It’s not the end of the world, although today it may seem like it, there are simple, easy, and cost effective ways you can protect your data, remove third party exposure and treat your digital data just like physical property.

Connect with me on linked in or subscribe to our blog posts to learn more.  The more we talk and share details about this issue the less scary it is to come up with an actionable plan that does not require years of technical knowledge or tens of thousands of dollars.

Would it be Weird to get Paid for Surfing?

By | Cloud, Data as Property

Wouldn’t it be nice if you could get paid while you surf on the web, drive your car down the street, or walk through the mall?  What if you could earn a little money every time you read an article online, click an ad, punch in directions on your GPS or texted photos to your family?

The world is changing and the reality is you will be paid in the future.  Consider that the most successful, fastest growing companies in the world are getting rich from tracking and selling all your online transactions, daily movements, and personal connections.  We posted a short article last week with a link outlining how telcos get rich from data.

Yesterday, former Presidential Candidate Andrew Yang, the only candidate to address data privacy and propose that data should be owned by the individual, during his campaign  announced the Data Dividend Project to fight for people’s data rights

LA TIMES  further explains the issues faced globally:

  • Whenever you sign up for a new social media service or website, or download an app onto your phone or computer, you’ll typically see some long disclaimer language written in legalese. You scroll through it quickly and click the “I agree” button.
  • This fine print is known as a privacy policy. It essentially lays out (sometimes in the most convoluted way possible) how the site or app can use or share your data. The problem is, no one actually reads the language. You just click “yes” and hope for the best, since that’s the price you pay for a free website or app or social media network. It seems like a pretty sweet deal. But that’s not the deal we’re getting.
  • Our phones and computers can track our every movement and action, while Facebook and Google log every like or click on their sites. There are numerous ways in which our data are collected, used, shared and sold by countless businesses. The largest tech companies profit most.
  • Facebook is now worth $650 billion, with annual revenue of $70 billion. Google is worth nearly $1 trillion, with annual revenue of $160 billion. The business of these companies is primarily based on advertising directed at us, built on the backs of our data.
  • They are also influencing our actions and attitudes by feeding us information that maximizes our engagement on those platforms. We ourselves have become the product, and we are being sold to those with the means to buy access to every detail of our behavior — and to shape what we do next.
  • This needs to stop. The data generated by our activities should be owned by us. We​ should decide​ what is being done with that information. ​And if anyone is making money on our data, it should be us.”

Cicer One was created by Bob Embleton after he spent months reading the fine print that is typically ignored and realizing that no one really owns their most valuable asset and we often surrender it without consideration of the consequence.  SCUTE was created to offer enterprises the ability to protect their data as property and enable them to offer their customers a safe and private exchange of data.  SCUTE provides protection from the powerful algorithms that are constantly scanning, monetizing, and storing forever the secrets that could sink an enterprise if they fall into the hands of a competitor or foreign government.

For the readers who don’t indifferently shrug their shoulders and want to begin to take ownership of their data as their property you can:

  • Contact us to be put on the mailing list to be notified as we create data reimbursement solutions.
  • Schedule a demo to discuss how we enable protection of your data today.
  • Mention the Data Independence Day by July 4, 2020 and we’ll give you an additional 75% discount on the first year of our patented disaster recovery service