Privacy, Data Security & Mobile Threat Consulting by Industry Insider Rex M. Lee


"When using connected technology, is your organization violating confidentiality agreements, non-disclosure agreements ("NDAs"), industry & federal cyber security standards, federal information processing standards ("FIPS") and confidentiality laws that govern medical information, client attorney privilege and classified information?"


The answer is Yes according to T-Mobile.  In a shocking admission, T-Mobile admits that connected products such as smartphones and tablet PCs supported by the android OS and Apple iOS are Not private or secure forms of telecommunications and computing:


  • “We, too, remember a time before smartphones when it was reasonable to conclude that when you activated service with T-Mobile that only T-Mobile would have access to our personal information. However, with the Samsung Galaxy Note, the iPhone, and many other devices, there are indeed a variety of parties that may collect and use information.” — T-Mobile Privacy Team (FCC Consumer Complaint #423849 Filed by Rex M. Lee/Public Record).


T-Mobile's admission means that telecom related connected products supported by the android OS and Apple iOS are not private or secure so these products should not be used for confidential and protected telecommunications and computing governed by legal agreements, NDAs, industry & federal cyber security standards, federal information processing standards ("FIPS") and confidentially laws. 


In today's connected world, understanding privacy, cyber security and safety threats associated with connected technology supported by the android OS, Apple iOS and Microsoft Windows OS is a must. 


Connected products pose  numerous civil liberty, privacy, cyber security and safety threats due to predatory surveillance and data mining business practices rooted in Surveillance Capitalism.

Connected products as a whole are designed for consumerism which poses huge privacy, cyber security and safety threats to information, communications and data within a confidential & protected environment.


Understanding the threats posed by leaky connected technology is must for the defense industry, government, critical infrastructure, healthcare providers, legal professionals, media, educators and enterprise business.


My Smart Privacy (“MSP”) will help your organization understand the privacy, cyber security and safety threats posed by B.Y.O.D. programs, connected products, apps, widgets, intrusive content and predatory surveillance & data mining business practices employed by data driven technology providers.  


Google, Apple, Microsoft, Amazon and other tech giants have adopted a Surveillance Capitalism business model that is a threat to your organization's privacy, cyber security and safety due to indiscriminate surveillance and data mining business practices that are out of control.


Numerous data driven technology providers compete in many industries worldwide such as Google yet telecom providers such as AT&T, Verizon, T-Mobile and Sprint are allowing companies such as Google to surveil and data mine telecom subscribers via smartphones which poses huge privacy, cyber security and safety threats to business professionals.


MSP will help your organization understand:


  • How Much Confidential and Protected Information your Organization is Leaking via Intrusive Connected Technology


  • The Terms of Use that Support Connected Products


  • Intrusive Preinstalled ("Rooted") & Third-party Technology (Apps, Widgets, Etc.)


  • Surveillance Capitalism- The Business Model


  • Predatory Operating Systems ("OS")


  • How to Protect Confidential and Protected Personal & Professional Digital DNA


In today’s connected world, a single smartphone user can be simultaneously monitored, tracked and data mined by as many as 15 or more multinational companies who are responsible for the development of predatory surveillance and data mining technology associated with connected products supported by the android OS, Apple iOS and Microsoft Windows OS.


Additionally these companies intentionally develop addictive, intrusive, harmful and exploitive technology in order to surveil and data mine the product user for financial gain posing civil liberty, privacy, cyber security and safety threats to users and organizations.


Many of these data driven technology providers are enabled by the FTC and FCC to lawfully monitor, track & data mine telecommunication subscribers that include Board Members, Sr. Executives, Management, Employees, Legal Professionals, Healthcare Providers, Cyber Security Professionals, IT Professionals, Generals, Officers, Law Enforcement Officials, First Responders, Government Officials, Law Makers, Citizens, Children and the list goes on…..


MSP will help identify privacy, cyber security and safety threats posed by intrusive connected technology developed by data driven technology providers who employ predatory surveillance and data mining business practices rooted in Surveillance Capitalism.


MSP will help mitigate risks and exposure while helping organizations identify safe & secure technology, set best practices & policies associated with the use of connected technology.

MSP will educate your organization in regards to the Surveillance Capitalism business model in order to help your organization understand what technology should not be used within a confidential and protected environment.


Rex M. Lee- Privacy & Data Security Consultant and Technology Journalist


MSP founder Rex M. Lee is a wireless industry veteran with application development experience.  Mr. Lee's 35 years of experience can help your organization understand the privacy, cyber security and safety threats posed by intrusive connected technology.  Mr. Lee will also help your organization understand how to mitigate the threats.


Mr. Lee has submitted reports and analysis to the Department of Homeland Security for the DHS Study on Mobile Device Security published in April of 2017.  Mr. Lee has written numerous articles centered on privacy, cyber security and safety threats posed by connected products and services.


At the request of a U.S. Senator, Mr. Lee has authored a policy change proposal centered on an Electronic Bill of Rights that would protect connected product users from predatory surveillance and data mining business practices rooted in Surveillance Capitalism. 


Mr. Lee submitted information to two U.S. senators who were on the Judiciary Committee that interviewed Mark Zuckerberg during the Facebook Cambridge Analytica congressional hearings in the spring of 2018.


Mr. Lee has spoken at numerous trade shows centered on Critical Infrastructure (Utility, Public Safety, Oil & Gas, Government).


Contact Rex M. Lee at: RLee@MySmartPrivacy.comor (210) 639.6035
"Success From Experience"


Click on this button to read articles authored by Rex M. Lee:



Click on this button to learn more about MSP service offerings:





All Rights Reserved RML Business Consulting, LLC 2018

Site under Construction- We appreciate your patronage and patience as information is edited and new information is posted