AXEL Network Products:

AXEL GO - share and store files securely.

LetMeSee - photo sharing app.

  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

AXEL.org

  • Network
  • Technology
  • Applications
  • Blog
  • About
    • Team
    • Press
    • Careers
    • Patents
  • Contact Us
  • Login
    • AXEL Go
    • AXEL Cloud

Legal

August 16, 2022

Your Privacy and The Internet of Things

The Internet of Things is a remarkable push to bring data collection to a broader range of devices. As technology becomes cheaper, smaller, and more powerful, the internet has found its way into unlikely places. The Internet of Things brings conveniences and insights into the lives of the layperson and the daily dealings of businesses all around the world. What can we gain from the Internet of Things? What happens when the Internet of Things turns its back on us?

What is the Internet of Things?

The Internet of Things is a distributed method of connecting mundane objects, or things, to smart devices and the internet at large. This is done by attaching sensors and transceivers to these objects and directing them to share information that may make end-user lives more convenient[1].

The classic example of an IoT-enabled device is a smart refrigerator. The utility of a refrigerator is bolstered by the inclusion of a few sensors and the ability to communicate. We can extend the lifespan of these refrigerators by predicting service needs and reporting points of failure as soon as they arise. Consumers are able to streamline their grocery shopping, saving time in their increasingly busy lives. 

The benefits of the Internet of Things on a consumer level are numerous. On a commercial grade, they are unparalleled. We can use IoT-enabled devices to drive down overhead costs by taking preventive measures when our servers and production devices ask for regular maintenance. Data points can be gathered from clients at trade shows or in our stores that can further create comfortable and lucrative transactions. Security methods such as intrusion detection and loss prevention can once again be in the hands of the business owner with IoT connectivity.

What are some common IoT Risks?

The Internet of Things relies on the deployment of additional points of internet access, a haphazard deployment of IoT-enabled devices in a workplace can result in easily-missed holes in the digital security fence of your workplace. Password protection and shoddy firmware can lead a savvy hacker directly into a company’s most private data. Ransomware attacks could ironically arrive through an unsecured security camera[2]. 

Beyond security issues, privacy itself may be at risk when adopting IoT-enabled devices. Smart doorbells, for example, give local law enforcement nearly unrestricted access to the video data passing through the connection between the camera and the end user. Bringing on a device that promises to bring the conveniences of the Internet of Things needs to be a process taken on carefully and with a careful eye on end-user agreements.

Inviting the internet into your company creates an interesting set of vulnerabilities that may not have existed before. One thing to be said about simple machines is that they are entirely secure from a digital standpoint. Adding sensors to the devices running your production infrastructure or connecting devices that previously could not communicate with the internet eventually requires more infrastructure than before.

The Internet of Things relies on edge computing solutions[3]. These are solutions that bring computing power and storage away from the cloud and closer to the place of business. This distributed method of computing brings power and stability to IoT-enabled devices, allowing them to gather and process more data without losing speed or increasing latency. Edge computing solutions come in hardware form, like additional servers, or a software form, like bespoke applications or computing protocols. By virtue of existing near your private data, these secondary computing solutions open up a workplace to cyber-attacks and privacy concerns.

How Does AXEL Go Protect You? 

The shortcomings of the Internet of Things should not scare workplaces away from the conveniences and the massive data-related insights that can come from the clever integration of sensors and transceivers. Like anything else, informed decision-making and a safety-first mindset will prevent the Internet of Things from eroding the privacy and security of a workplace.

Adding additional points of failure to a network means that a business’s privacy and security will find themselves quickly under fire. AXEL Go is a file sharing and storage service that is dedicated to protecting privacy and security wherever possible. Our decentralized server structure and cutting-edge AES 256-bit encryption offer top-of-the-line security in the face of ransomware and brute force attacks. AXEL Go also guarantees your privacy when using our IPFS servers. Only authorized users have access to the contents of your storage. Not even AXEL is able to peer into your end-to-end encrypted storage. 

As technology moves forward in innovative directions, AXEL Go is ready to provide the security and privacy required to keep making the internet a safe and convenient place. 

Try AXEL Go Today

AXEL Go is an incredibly versatile tool in the fight for cyber security. Implementing our decentralized, encrypted storage into a workplace will create a robust bulwark between sensitive workplace data and any clever exploits hackers can slip through the cracks.
AXEL Go is a file storage and sharing service designed to revolutionize how we think about security online. Our user experience design is focused on handing top-of-the-line security to any business of any size. Our AES-256 bit encryption and decentralized server structure thwart cyber attacks on big businesses as competently as it protects local operations. No matter how tight the budget for your practice may be, we are the perfect fit for secure, intuitive storage and file sharing. You can try AXEL Go premium for free for 14 days. See what security backed by our $10,000 guarantee can do for your business.


Citations

[1]Fruhlinger, Josh. 2022. “What Is Iot? The Internet Of Things Explained”. Network World. https://www.networkworld.com/article/3207535/what-is-iot-the-internet-of-things-explained.html.

[2]Iredale, Gwyneth. 2022. “Security & Privacy Issues In The Internet Of Things (Iot)”. 101 Blockchains. https://101blockchains.com/security-and-privacy-in-iot.

[3]Gold, Jon, and Keith Shaw. 2022. “What Is Edge Computing And Why Does It Matter?”. Network World. https://www.networkworld.com/article/3224893/what-is-edge-computing-and-how-it-s-changing-the-network.html.

Filed Under: Business, Culture, Cybersecurity, Legal, Privacy, Tech Tagged With: communication, customer data, cybercrime, data analytics, data privacy, data protection, data security, ddos, http, internet of things, iot, IPFS, marketing, Security, Social Media, technology

August 12, 2022

Personal Vehicle Telematics and Privacy Oversights

Our cars are collecting data without our consent. As vehicles have become more sophisticated, tracking information via the onboard diagnostic system (OBD) and built-in GPS has become commonplace. This data is loosely regulated, and that can create a massive privacy hole for consumers. This information can be pulled by insurance companies, mechanics, and whoever else has the authority to demand information from your car. This is rapidly becoming a privacy blindspot upon which we should shine a bright light and direct legislation.

Telematics, Privacy, and Your Vehicle

Telematics is the process of sending and receiving data related to the location and destination of vehicles on the move. In the past, this was typically reserved for fleet vehicles so companies could better track and direct workers to maximize productivity and minimize fuel consumption. Today, as the technology has become more affordable and personally helpful, telematics has found its way into newer vehicles. 

On its face, this information and coordination is a boon to the automotive world. Insurance companies could identify safe drivers, cities could better direct traffic, and the days of being lost on the road could disappear into history overnight. However, like with any technology, a more pernicious reality lies just beneath the surface. If unrestricted access to telematic data is given to too many parties, the vehicles trusted to shuttle us to and from work can easily become intrusive bundles of data weaponized against the driver or any passengers they may have had. Any private activity at any time can be extrapolated from the mere presence of a vehicle. Without oversight, insurance companies, civil courts, and law enforcement will pounce on this opportunity. Hackers plucking this information from servers holding onto this data for later use can easily dangle it over the heads of their targets with frightening precision and expedience.

Buckle Up Your Data

Anybody with a car will immediately understand how much information their vehicle can reveal about them. Everything from their home address to their grocery shopping habits can easily be laid bare once someone has access to location data. This information is sensitive and woefully under-legislated. 

Telematics law is a burgeoning legal framework since the innovations leading to the technology in vehicles have only recently been regularly included in automobiles heading to market. Many states simply defer to the Federal Trade Commission (FTC) and its already existing rules and regulations related to buying and selling the data of internet users. Clearly, this is insufficient. Many similarities exist between internet data and the telematic information collated by a private vehicle. Still, the degree to which drivers rely on their personal vehicles is entirely unlike the relationship they may have with their smartphones. It should also be noted that the collection and distribution of this private data, in many cases, may not be as simple to opt out of as data collection on the internet. Insurance companies and their massive lobbying power are also incentivized to obscure these oversights and push for legislation that will give them broader access to a driver’s private data than they already have. 

Citizens, privacy-minded or not, should push for legislation that covers these holes in privacy law. Telematic data belongs to more than just the driver of a vehicle. Passengers, family members, and children are inextricably tied to this data once they step foot in a car. Their privacy should not be waived simply because they decided to travel inside a vehicle. 

Protecting Your Privacy

AXEL understands that privacy comes first. Without privacy in the modern era, people are subjected to undue scrutiny from bad actors. Hackers, corrupt authority figures, and competitors always look for data that will give them a leg up on their perceived enemies. Any privacy oversights left unaddressed by legislation will inevitably turn against civilians and their best interests. 

When insurance companies offer customers discounts on premiums in exchange for unfettered access to private location data, eyebrows should be raised. Massive insurance companies act to maximize their profit by any means necessary. The overreach into their customers’ personal lives is not simply a business practice that trades the right to privacy for an opportunity to deny their customers’ claims. This represents a broader trend towards the unacceptable commodification and reduction of privacy.

AXEL Go is committed to protecting the privacy of its users and the interests of the internet at large. Our end-to-end encryption, password-protected secure fetch, and decentralized server structure are engineered to provide personal privacy from every angle. AXEL Go will never request access to private data in exchange for discounts, and our servers are designed to keep prying eyes out of our client’s storage no matter what.

Create a Private Space Online

AXEL Go is an incredibly versatile tool in the fight for cyber security. Implementing our decentralized, encrypted storage into a workplace will create a robust bulwark between sensitive workplace data and any clever exploits hackers can slip through the cracks.

AXEL Go is a file storage and sharing service designed to revolutionize how we think about security online. Our user experience design is focused on handing top-of-the-line security to any size business. Our AES-256 bit encryption and decentralized server structure thwart cyber attacks on big businesses as competently as it protects local operations. No matter how tight the budget for your practice may be, we are the perfect fit for secure, intuitive storage file sharing. You can try AXEL Go premium for free for 14 days. See what security backed by our $10,000 guarantee can do for your business.


Citations

“Research Shows Data Privacy Concerns For Telematics Policies”. 2022. Actuarialpost.Co.Uk. https://www.actuarialpost.co.uk/article/research-shows-data-privacy-concerns-for-telematics-policies-18317.htm.

Leefeldt, Ed. 2022. “The Witness Against You: Your Car”. Forbes Advisor. https://www.forbes.com/advisor/car-insurance/telematics-data-privacy/.

“The Surveillance State Has Invaded Our Cars. Why Don’T We Care?”. 2022. Fast Company. https://www.fastcompany.com/90389104/the-surveillance-state-has-invaded-our-cars-why-dont-we-care.

Filed Under: Business, Culture, Cybersecurity, Legal, Privacy, Tech Tagged With: communication, customer data, cybercrime, data analytics, data privacy, data protection, data security, ddos, http, IPFS, marketing, Security, Social Media, technology

January 14, 2022

How Law Firms Should Handle Cybercrime

Law firms are extremely unique places of business. They don’t rely on releasing products, but on a specific service that requires the collection of confidential information from clients. Further, because law firms typically serve multiple clients at a time, they hold a wealth of information on both corporations and individuals. And this knowledge isn’t run-of-the-mill company fun facts; it’s the scandalous, salacious, highly-confidential information that would cause chaos if publicly revealed. 

Unfortunately, cybercriminals have realized this, and have taken decisive action. In the past few years, law firms have become a prime target for cybercriminal organizations because of their combination of valuable data and relatively lax cybersecurity. This culminated in a 2020 attack by REvil, a notorious ransomware gang, on Grubman Shire Meiselas & Sacks, demanding a USD $42 million ransom for the near-terabyte of stolen data [1]. Overall, 29% of firms recorded a security breach in 2020, according to an ABA survey [2].

It’s clear that law firms are a top target of cybercriminal gangs. Therefore, it’s important to stay informed on these gangs’ strategies, and the best ways to prevent cyberattacks.

How do Cybercriminals Attack Firms

Although cybercriminal organizations typically have “go-to” strategies, there isn’t one specific way that all law firms are attacked. Whether it be with phishing emails, malware, or even insider attacks, there are a variety of ways that law firms can be targeted. While large firms were mostly targeted a few years ago, cybercriminals have recently shifted their priorities. Due to the global crackdown on ransomware gangs, these diabolical organizations started to target small and mid-size firms, avoiding the publicity (and government attention) that an attack on large firms would bring. In fact, mid-size law firms have become the prime target for cybercriminals [3]. After all, these firms still have loads of valuable information, but likely have much less stringent cybersecurity measures.

Concerningly, fewer than half of all law firms use simple security measures like two-factor authorization and file encryption [2]. With a significant portion of firms having no cybersecurity protection beyond usernames and passwords, it’s no wonder that cybercriminal gangs have raked in money from desperate firms. In 2021, the average ransomware payment was USD $140,000, a massive figure for small and mid-size firms [3]. Unfortunately, if an unprepared firm is hit with ransomware, there is typically no other option but to pay the cybercriminals to unlock their encryption and return the stolen data. That’s why the best defense against cyberattacks is preparation.

Legal and Moral Obligations

While there is no federal law requiring law firms to have certain cybersecurity precautions, some individual states and industries do regulate firms’ cybersecurity practices. For example, firms that handle financial data may be subject to the Sarbanes-Oxley Act of 2002, a law that mandates stringent recordkeeping and reporting [4]. Further, certain states like New York and California have more cybersecurity regulations on their books. For example, New York’s Stop Hacks and Improve Electronic Data Security (SHIELD) Act mandates prompt public disclosure in the event of a security breach [4]. These regulations ultimately help firms stay prepared for cyberattacks, while also serving the public interest if a cyberattack were to occur. Failure to follow these regulations could lead to investigations, lawsuits, fines, and an overall loss of public trust.

In addition to federal and state laws, law firms must also follow the American Bar Association’s (ABA) Model Rules of Professional Conduct. One rule states that lawyers must take

Reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client [4].

Additionally, the ABA requires firms to reasonably inform clients about the status of a cyberattack. While the term “reasonable efforts” is certainly open to interpretation, the ABA is clear: It’s an ethical obligation for firms to prepare for cyberattacks. In today’s digital world, handling client data unsafely isn’t only irresponsible; it’s immoral.

What Can Law Firms Do?

So, we know that law firms are ethically, and in some cases legally, required to take reasonable precautions for cyberattacks. But what exactly can firms, particularly small and mid-size, do? Businesses like this simply can’t afford the cybersecurity infrastructure of large firms, with dedicated staff and numerous expensive programs. Thankfully, providing strong protection from cybercrime is simple and inexpensive.

The best way to prevent data breaches and ransomware attacks is to cultivate a culture of security in the workplace. Specifically, this means embracing simple safeguards like two-factor authorization and file encryption. Just taking these two precautions vastly lowers the risk of a successful cyberattack. Additionally, having yearly (or even twice-a-year!) training on cybersecurity risks helps create a culture of security as well. Think about it: Phishing emails are typically well-disguised. But if all employees know the difference between an innocent work email and a nefarious phishing attempt, your firm will be significantly safer.

Finally, in the unfortunate case that a firm is hit with a cyberattack, it’s extremely useful to have an incident response plan. As a cyberattack is occurring, every minute counts, and having a specific plan can be the difference between a devastating data breach and a failed attempt. If employees know what to do immediately, whether it be turning off all computers, shutting down Wi-Fi, or calling a trusted expert, firms can minimize the risk, or at least lessen the impact, of a surprise cyberattack. Unfortunately, just 34% of firms maintain an incident response plan [2]. While this is an increase from past years, this shows there is still a long way to go regarding cybersecurity at law firms.

About AXEL

Law firms will continue to be targeted by nefarious cybercriminals. Thankfully, AXEL is prepared. At AXEL, we believe that privacy is a human right, and that your information deserves the best protection. That’s why we created AXEL Go, a secure file sharing software. AXEL Go uses military-grade encryption, blockchain technology and decentralized servers to ensure it’s the best file transfer software on the market. Whether you need cloud video storage or cloud file management, AXEL Go is the secure file hosting solution. If you’re ready to try the best file sharing app for PC and mobile devices, try two free weeks of AXEL Go here.

[1] Shankar, AJ. “Council Post: Ransomware Attackers Take Aim at Law Firms.” Forbes. Forbes Magazine, March 11, 2021. https://www.forbes.com/sites/forbestechcouncil/2021/03/12/ransomware-attackers-take-aim-at-law-firms/

[2] Loughnane, John. “2020 Cybersecurity.” Americanbar.org. American Bar Association, October 19, 2020. https://www.americanbar.org/groups/law_practice/publications/techreport/2020/cybersecurity/

[3] Dalton, Brian. “Law Firms Stagger through Ransomware Attacks.” Above the Law, November 2, 2021. https://abovethelaw.com/2021/11/law-firms-stagger-through-ransomware-attacks/

[4] “5 Cybersecurity Risks and 3 Obligations for Law Firms.” The National Law Review, July 8, 2021. https://www.natlawreview.com/article/5-key-data-privacy-and-security-risks-arise-when-organizations-record-job-interviews

Filed Under: Cybersecurity, Legal, Professional Tagged With: cybercrime, cybersecurity, law firm, legal tech, Privacy, ransomware, small business

December 10, 2021

INTERVIEW: How COVID Changed the Courtroom (and the Future of Law)

When COVID-19 struck the United States in January of 2020, every industry in the United States (and, really, the world) was shaken. It forced everything from mom-and-pop restaurants to the largest law firms to send employees home, left to their own devices to figure out how to run a business from miles away. This problem was particularly evident for those in the legal industry. As the pandemic continued into April, firms began to take drastic measures in response to decreased demand for legal services. Many law firms opted for pay cuts, in an attempt to save as many jobs as possible. However, some firms were still forced to lay off paralegals, attorneys, and other legal professionals[1].

While the demand for legal services subsided at the beginning of the pandemic, there was no decrease in the need for legal services[1]. After all, the pandemic provided a bevy of new legal questions that attorneys and clients alike had to ponder. So, while people weren’t speaking with lawyers during the height of the COVID-19 pandemic, a backlog of people needing legal help was growing quickly. Although business was down during the height of the pandemic, two attorneys, Nancy Rapoport and Joe Tiano Jr. predicted that the pandemic would only cause temporary struggles for the legal industry, while also forcing old-school firms to innovate.

Nancy is the Garman Turner Gordon Professor of Law at the William S. Boyd School of Law, University of Nevada, Las Vegas (UNLV), and Joe is a former lawyer turned businessman who founded Legal Decoder, a legal tech software that optimizes efficiency and pricing uncertainty. Together, they authored The Legal Industry’s Second Chance to Get it Right, which foresaw the legal industry’s comeback in February 2021, and they offered their insight on the future of law in an exclusive interview with AXEL. 

How COVID Changed the Courtroom

“All of the stuff that we thought we knew about the practice of law has been wrong,” Rapoport says. Regarding the pandemic, she says, “it gave us a chance to rethink what a law practice should be.” While nearly every industry had to learn new things like Zoom meetings at the beginning of the pandemic, legal professionals faced unique challenges.

“The inability to read a witness’s or deponent’s body language … Doing it over Zoom is a challenge,” Tiano said. “You can’t read body language. It’s kind of hard to see inflections … It had to be an enormous hurdle for any lawyers who’ve been practicing the same way for decades.”

In addition to these remote depositions, the COVID-19 pandemic introduced new ethical dilemmas for legal professionals as well.

“There are now cases saying ‘Lawyers, stop texting your clients’ answers.'” says Rapoport. She describes a case where attorneys would communicate with witnesses during testimony through email, an impossible task to pull off in a physical courtroom. “No one does that because it’s unethical, but now we have to come up with all of these new ways of dealing with court and mediations, bringing people into separate rooms, dealing with witnesses.”

The Legal Industry’s New Challenges

Even before COVID-19, some observers predicted a radical change in how firms charge their clients[2]. For years, law firms big and small have used the “Billable Hour” model, a simple formula where a firm charges the client a certain cost per hour. Put simply, “[the billable hour] is the economic model upon which a law firm operates,” Tiano says.

After the pandemic hit and the demand for legal services dropped, many predicted that this radical change would finally occur. However, the industry-wide shift to alternative pricing agreements never came, even with the massively decreased demand for legal services at the beginning of the pandemic. But why didn’t alternative pricing become the norm, especially in a time as volatile and tumultuous as the pandemic? As Rapoport humorously puts it, “the billable hour is easy for lawyers because we’re not good at math.”

But just because it’s the most common pricing agreement doesn’t mean it’s the most efficient. “If we used data and we figured out other ways to value delivery of services, we’d all be better off,” Rapoport says. “[The billable hour model] encourages piling on of work, and it encourages slow work, neither of which a good lawyer should want to do. But if that’s the reward system, it’s very hard to break away from that. I would love to see people use data better, to rethink how they adjust the value to clients.” As Tiano succinctly puts it, “there’s a fallacy that every hour is equal in value.”

In addition to the continued use of the billable hour, law firms also face new challenges related to the rise of at-home work. “One of our biggest worries is how the newest professionals are going to get trained and socialized,” Rapoport says. A common problem among many offices since the pandemic, the lack of socialization for new employees can affect everything from office camaraderie to firm loyalty. And with at-home work becoming more and more normalized, these anxieties that firms and businesses face are unlikely to go away any time soon.

Finally, as the pandemic wanes and legal demand increases, law firms face a unique problem: “One of the biggest challenges that firms are having today is keeping their personnel, because they have too much work,” Tiano says. Although the legal industry started to bounce back when COVID vaccines became readily available, the industry soon came across new problems. The sheer amount of work has caused firms to lose personnel, risking the continuation of the legal industry’s comeback after COVID-19.

Legal Tech: Tool or Replacement?

Rapoport and Tiano see the benefits of legal software as complementary, but are skeptical about the technology replacing skilled lawyers regarding the ever-growing legal tech industry. As Rapoport says, “there are some things that computers are better at than lawyers … They can do things all day long in nanoseconds.” There is no shame in using the tools available to lawyers, especially if it helps increase efficiency. However, Rapoport warns that “if we’re not careful about how we use technology, we’re going to create a generation of untrained professionals who will become senior without knowing how to do things.”

“We’ve got to make sure technology augments what lawyers do, rather than replacing the skills that lawyers uniquely bring to the table,” Tiano says. “It’s very difficult to counsel a client from a legal, psychological perspective if you’re a piece of software.”

However, just because Rapoport and Tiano see legal tech as a complementary tool for quality attorneys does not mean that technology won’t replace second-rate lawyers. Rapoport warns: “For lawyers who are good counselors, there’s no software in the world that replaces that. For lawyers that fill in the blanks, their days are numbered.”

The Future of Law

Legal tech is unlikely to replace every lawyer any time soon. As Tiano says, “I don’t see technology replacing lawyers. I see it amplifying what lawyers can do and supplementing their processes.” But just because your next traffic court lawyer is unlikely to be a software program doesn’t mean legal tech can’t help lawyers increase efficiency. Legal tech saves firms and clients both time and money. It’s a valuable tool that, when used correctly, can help clients and firms in a myriad of ways.

[1] Wittenberg, Daniel. “The Pandemic’s Dramatic Effect on the Business of Law.” Americanbar.org. American Bar Association, October 28, 2020. https://www.americanbar.org/groups/litigation/publications/litigation-news/business-litigation/the-pandemics-dramatic-effect-the-business-law/

[2] Ambrogi, Bob. “Guest Post: Beating the Alternative – Why the Billable Hour Is the Truest Representation of Cost.” LawSites, August 25, 2021. https://www.lawsitesblog.com/2021/08/guest-post-beating-the-alternative-why-the-billable-hour-is-the-truest-representation-of-cost.html

Filed Under: Business, Legal Tagged With: business, coronavirus, covid, future, law firm, legal, legal tech

December 3, 2021

Enron, Ethics, and the Fight for Privacy

In the modern history of business, few names are as synonymous with corruption, deceit and greed as Enron. For years, the Texas-based energy giant engaged in rampant, systematic accounting fraud, covering up massive losses through shady, illegal business practices. After years of abnormally high stock prices, the massive fraud of Enron was uncovered in 2001. Following these revelations, on December 2, 2001, Enron filed for bankruptcy. It was a swift downfall for a formerly massive energy corporation. However, many executives and insiders were aware of Enron’s deceptive accounting practices before the public knew, and took decisive (and illegal) action[1].

In mid-2001, Enron announced a massive USD $638 million loss in its third quarter, shocking investors. Following this report, accountants at Arthur Andersen, Enron’s auditor, began shredding documents related to the fraud[2]. Andersen did this to hide Enron’s documents from the Securities and Exchange Commission (SEC). However, revelations of this illegal shredding came out quickly, and Arthur Andersen, the company itself, was convicted of obstruction of justice. And because the SEC did not allow felons to hold Certified Public Accountant (CPA) licenses, this ruling effectively put Arthur Andersen out of business, costing 85,000 innocent employees their jobs[2].

Arthur Andersen’s illegal paper shredding was one of the most infamous aspects of the Enron scandal, highlighting how far the auditing agency went to protect its client. Unfortunately, this illegal act caused tens of thousands of innocent employees who knew nothing about Enron’s blatant fraud to lose their jobs. However, there’s more to the story than just deception and fraud. Enron and Arthur Andersen’s actions highlight just how important ethics are when handling clients’ documents.

AXEL’s Layers of Protection

Here’s the thing: Protecting your clients and their privacy isn’t an inherently bad thing. After all, that’s exactly what a business should do for its customers. Arthur Andersen, unfortunately, just went way too far, breaking laws and ethics to protect its client. A business ought to do everything in its power to protect its client, while also upholding the law and ethics. And that’s exactly what AXEL does. In fact, AXEL even “shreds” documents too, but we do it to protect you from cybercriminals, not the feds.

Whenever you use AXEL’s network, your documents are split up into digital shards and sent to dozens of different servers across the world. This shredding technique keeps your files safe because even if a hacker compromises a single server, they don’t have access to the full file. This means your file remains whole for you, but separate and illegible for any potential cybercriminals. It’s a vital part of AXEL’s decentralized technology, giving users another layer of protection against cybercrime.

Privacy isn’t the Problem

When Arthur Andersen shredded Enron’s documents, that was an explicitly illegal and unethical act. The accounting firm knew that Enron’s numbers were fudged, and were trying to cover their tracks, as well as Enron’s. However, the problem with Arthur Andersen isn’t what they did. It’s why they did it. Doing everything to keep your client’s files private is perfectly ethical. Doing everything to keep your client’s files private because you know they committed illegal acts is absolutely unethical. So what can we learn from Enron and Arthur Andersen’s actions? Well, if you commit illegal acts, you’re probably going to get caught. But more importantly, there’s nothing wrong with desiring privacy.

For years, anti-privacy activists and lawmakers have repeated a slogan: “If you have nothing to hide, you have nothing to fear.” This Orwellian saying has especially gained popularity in today’s era of mass surveillance, where nearly everything we do is being recorded in some form. Taking a walk outside? There will be cameras to keep an eye on you on street corners. Staying in to go online shopping? Your computer will remember every single search and click. With surveillance taking place inside and outside our homes, it’s easy to forget how much we’re being tracked by governments, businesses and advertisers. With the sheer amount of surveillance occurring in our everyday lives, who can blame anyone who is searching for more privacy?

However, just because this surveillance is happening doesn’t mean it has to stay this way. At AXEL, we believe privacy is a human right. That’s why all of our products and technologies are made with one focus in mind: Privacy. Nearly every popular online space is controlled by a few megacorporations that have shown time and again that they don’t care about privacy. They collect data about you, track you, and know every detail about your life. However, this bleak reality doesn’t have to be our future as well. A better, more private digital future is possible. And AXEL is leading that charge.

Keep Your Clients Safe (Legally)

Whether it’s a small business, massive corporation or mid-sized law firm, it’s their responsibility to protect their clients. Of course, that responsibility ends once a client asks you to break the law like Enron, but a business or firm ought to do everything to protect its customers. And in today’s digital age, protecting customers means protecting them online as well. From ransomware to data leaks, there are a variety of digital threats that are ever-present. Clients and customers don’t only give money to a business; they give them their trust as well. It’s up to businesses and firms to uphold that trust by recognizing digital threats and taking appropriate precautions.

One way to take action is to use AXEL Go, the innovative, secure file-sharing software. AXEL Go uses 256-bit encryption, blockchain technology and decentralized servers to ensure it’s the best file sharing storage software on the market. Whether you need cloud video storage or cloud file management, AXEL Go is the secure file hosting solution. There are a variety of cloud storage options available to businesses and individuals, but none can match the security and simplicity of AXEL Go. If you’re ready to take back your data security, get two free weeks of AXEL Go here.

[1] Bondarenko, Peter. “Enron Scandal: Downfall and Bankruptcy.” Encyclopædia Britannica. Encyclopædia Britannica, Inc., November 30, 2021. https://www.britannica.com/event/Enron-scandal/Downfall-and-bankruptcy

[2] Dowell, Steve. “The Decline and Fall of Arthur Andersen.” ToughNickel. ToughNickel, February 24, 2015. https://toughnickel.com/industries/The-Decline-and-Fall-of-Arthur-Andersen

Filed Under: Business, Cybersecurity, Legal Tagged With: business, cybersecurity, ethics, Privacy, small business

September 17, 2021

Convenient or Monopolistic? Epic’s Challenge to Apple’s “Walled Garden”

On August 13, 2020, Epic Games, the developer and publisher of the massively popular online game Fortnite, tried something that most companies would be too scared to do. They picked a fight with Apple. On that day, Epic announced a 20% discount on “V-Bucks,” Fortnite’s in-game currency, but only if they purchase it directly from Epic, rather than through Apple’s App Store.

This was an intentional violation of Apple’s terms of service, as Apple takes a 30% commission of all in-app purchases, and Epic wanted that extra money for itself. Within hours, Apple took Fortnite off the App Store for violating its terms of service, with a lawsuit by Epic quickly following [1].

On September 10, 2021, that lawsuit received a ruling. The judge sided with Apple on nine of ten counts, but ordered Apple to loosen restrictions on alternative payment options [2]. However, Apple CEO Tim Cook still stated that, even if an app uses a non-Apple payment option, Apple would still invoice the 30% commission [3]. So, what’s next? Epic appealed the ruling, but for now, Apple still maintains tight control over the apps on its App Store. Ultimately, this case highlights the uniqueness of Apple’s software philosophy, and how its relationships with third-party developers frequently draw ire.

A Walled Garden

For years, Apple’s software philosophy has been described as a “walled garden.” This means that Apple’s software is simple, secure, and easy to use for the consumer. However, Apple also strongly dissuades or even forbids users and developers from leaving their walled garden. Apple states that this approach is necessary to protect its users, and also to differentiate itself from Android, a competitor with a more open ecosystem [4]. Ultimately, this leads to increased simplicity for the user, along with increased dependence on Apple software. So while this approach does protect users from dubious third parties, it also entraps users into Apple’s ecosystem as well.

While Apple claims that its walled garden approach is to offer increased security and simplicity for its users, there are other reasons why Apple uses this philosophy. Because Apple has full control of its ecosystem, it can enforce practically any rule it wants. This includes a 30% commission on in-app purchases. Unfortunately, for third-party developers, this means putting up with Apple’s demands or risk getting kicked out of the garden. And that’s exactly what happened with Epic Games.

The Legal Argument

The main conflict of Epic Games vs. Apple focused on whether Apple’s walled garden approach violates antitrust law. Specifically, Apple’s requirement to force users to only purchase in-game items through the App Store, rather than through another party, was used as evidence of monopolistic behavior [2]. On the other hand, Apple argued that they are free to do business (or not do business) with any other company, and that their restriction of third-party payment services was within their rights as a business. Simply put, this case pitted first-party hardware and third-party software developers against one another.

Ultimately, the court ruled with Apple on nine of ten counts, with Epic stating their intention to appeal their decision [2]. In the one ruling against Apple, Judge Yvonne Gonzalez Rogers stated that “Apple created a new and innovative platform which was also a black box. It enforced silence to control information and actively impede users from obtaining the knowledge to obtain digital goods on other platforms. Apple has used this lack of knowledge to exploit its position [2].” However, because the judge ruled in favor of Apple in the other nine counts, few changes are likely to occur.

While there was potential for a landmark ruling that would shake Apple to its core, the actual ruling that was handed down will likely not have a massive effect on either company. The only change Apple must make is to allow developers to use third-party payment services. However, nothing is stopping Apple from collecting the 30% commission from those third-party developers. Ultimately, while this court ruling had the potential for massive change, the judge’s ruling ensured that Apple’s walled garden philosophy will continue.

Security and Your Rights

While Apple argued that its App Store policies were there to protect users, we know that isn’t the main reason for those restrictive rules. Simply put, the purpose of Apple’s walled garden approach is to keep users locked into the Apple ecosystem. While some users do prefer this method, and it can protect users from unsavory third-party developers, it still infringes upon the rights of consumers.

Unfortunately, this philosophy is all too common with Big Tech companies. Sacrificing privacy is a big win for Big Tech, but a huge loss for privacy rights. Corporations continue to collect hoards of personal data to sell to advertisers, while your privacy is violated. With Amazon, Google, and others offering endless new ways to collect your data, it’s fair to ask: Are you the customer, or the product?  

Thankfully, there are businesses that prioritize security and personal rights. That’s where AXEL comes in. AXEL believes that privacy is a human right. With this in mind, we created AXEL Go, a secure file-sharing and storage software. Offering industry-leading encryption and decentralized blockchain technology, AXEL Go is the best way to protect yourself or your business from unauthorized cybercriminals. With AXEL Go, there’s no compromise between security and privacy rights. After all, our business is protecting your data, not collecting it. If you’re ready to try the most secure file-sharing and storage software, get two free weeks of AXEL Go here. 

[1] Statt, Nick. “Apple Just Kicked Fortnite off the App Store.” The Verge. August 13, 2020. https://www.theverge.com/2020/8/13/21366438/apple-fortnite-ios-app-store-violations-epic-payments.

[2] Newman, Daniel. “Does The Epic Ruling Open The Door For Apple’s Competition?” Forbes. September 16, 2021. https://www.forbes.com/sites/danielnewman/2021/09/16/does-the-epic-ruling-open-the-door-for-apples-competition/.

[3] Adorno, José. “Apple Can Still Charge Its App Store 30% Fee Even after Epic Ruling, Analysts Say.” 9to5Mac. September 14, 2021. https://9to5mac.com/2021/09/14/apple-can-still-charge-its-app-store-30-fee-even-after-epic-ruling-analysts-say/.


[4] Beres, Damon. “All the New Ways Apple Is Trying to Take Over Your Life.” Slate Magazine. June 08, 2021. https://slate.com/technology/2021/06/apple-wwdc-ios15-new-features-walled-garden.html.

Filed Under: Business, Legal Tagged With: apple, big tech, law, lawyer, privacy law

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • AXEL News Update
  • AXEL Events
  • Biggest Hacks of 2022 (Part 2)
  • Biggest Hacks of 2022 (Part 1)
  • The State of Government Cybersecurity 2022

Recent Comments

  • Anonymous on Five Simple Security Tricks

Footer

Sitemap
© Copyright 2023 Axel ®. All Rights Reserved.
Terms & Policies
  • Telegram
  • Facebook
  • Twitter
  • YouTube
  • Reddit
  • LinkedIn
  • Instagram
  • Discord
  • GitHub