Article "Surveillance Capitalism- The Need For an Electronic Bill Of Rights" by Rex M. Lee:

All Rights Reserved RML Business Consulting, LLC 2018

Site under Construction

Privacy, Data Security & Mobile Threat Consulting by Industry Insider Rex M. Lee

TM.

Connected products such as smartphones have been on the market for over 10 years and yet individuals, businesses and government entities still do not understand how the products work or the business model that supports the products.


Smartphones and other connected products supported by the android OS, Apple iOS, and Microsoft Windows OS are supported by indiscriminate surveillance and data mining business practices rooted in Surveillance Capitalism.

Connected products supported by voice automated technology such Amazon Alexa, Google Assistant, Apple Siri, and Microsoft Cortana are also supported by indiscriminate surveillance and data mining business practices rooted in Surveillance Capitalism.

Any connected product or service supported by a Surveillance Capitalism business model enables the product developers and their partners the ability to monitor, track and data mine the product user for financial gain at the expense of the product user’s civil liberties, privacy, cyber security and safety.

Surveillance Capitalism poses numerous civil liberty, privacy, cyber security and safety threats to the product user whether the product user is an individual, business professional, government official, civil servant, law maker, doctor, attorney or child.


Connected products such as smartphone are intentionally designed to enable all product developers the ability to monitor, track and data mine the product user for financial gain.  This may sound OK in regards to consumerism but products such as smartphones and connected PCs supported by the android OS, Apple iOS and Microsoft Windows OS are being used within a confidential and protected environment.


Confidential and protected environments are governed by employment confidentiality agreements, non-disclosure agreements ("NDAs"), industry and federal cyber security standards, federal information processing standards ("FIPS") and confidentiality laws that govern medical information, client attorney privilege, and classified information.


According to T-Mobile, connected products supported by the android OS and Apple iOS do not provide private, secure or safe telecommunications and computing:


  • “We, too, remember a time before smartphones when it was reasonable to conclude that when you activated service with T-Mobile that only T-Mobile would have access to our personal information. However, with the Samsung Galaxy Note, the iPhone, and many other devices, there are indeed a variety of parties that may collect and use information.” — T-Mobile Privacy Team (FCC Consumer Complaint #423849 Filed by Rex M. Lee/Public Record).


The T-Mobile admission means that anyone who uses a connected product supported by the android OS and Apple iOS within a confidential and protected environment is in violation of legal agreements such as NDAs, cyber security & information processing standards and confidentiality laws that protect medical information, client attorney privilege and classified information due to the fact that numerous unauthorized third-parties are monitoring, tracking and data mining the product user.


In today's connected world, understanding civil liberty, privacy, cyber security and safety threats associated with connected technology supported by the android OS, Apple iOS and Microsoft Windows OS is a must. 

My Smart Privacy ("MSP") will help individuals and organizations understand the privacy, cyber security and safety threats posed by B.Y.O.D. programs, connected products, apps, widgets, intrusive content and indiscriminate surveillance & data mining business practices employed by data driven technology providers. 

MSP will help individuals and organizations understand:

  • Surveillance Capitalism- The Business Model


  • How Much Confidential and Protected Information Data Driven Technology Providers are Collecting, Using, Sharing, Selling and Aggregating for Financial Gain

  • The Terms of Use that Support Connected Products


  • Intrusive Preinstalled ("Rooted") & Third-party Technology (Apps, Widgets, Etc.)


  • Predatory Operating Systems ("OS")


  • How to Protect Confidential and Protected Personal & Professional Information known as a Person's "Digital DNA"


  • What Products and Services are Supported by Predatory Surveillance and Data Mining Business Practices Rooted in Surveillance Capitalism


  • How Data Driven Technology Providers are Exploiting the Individual and Organization's Personal and Professional Digital DNA for Financial Gain


MSP will help individuals and organizations identify privacy, cyber security and safety threats posed by intrusive connected technology developed by data driven technology providers who employ indiscriminate surveillance and data mining business practices rooted in Surveillance Capitalism.

MSP will help mitigate threats while helping individuals and organizations identify safe and secure technology.  MSP will help organizations set best practices and policies associated with the use of connected technology for official business.

To learn more contact Rex M. Lee at: RLee@MySmartPrivacy.comor (210) 639.6035

"Success From Experience"