Security Experts:

Gant Redmon's picture

Gant Redmon

Gant Redmon, Esq., is General Counsel & Vice President of Business Development at Co3 Systems. Gant has practiced law for nineteen years; fifteen of those years as in-house counsel for security software companies. Prior to Co3, Gant was General Counsel of Arbor Networks. In 1997, he was appointed membership on the President Clinton’s Export Counsel Subcommittee on Encryption. He holds a Juris Doctorate degree from Wake Forest University School of Law and a BA from the University of Virginia, and is admitted to practice law in Virginia and Massachusetts. Gant also holds the CIPP/US certification.

Recent articles by Gant Redmon

  • Proper use of Google Glass respecting law and privacy will be all about context. Context is different depending where you are. Are you in a public place, a private place, or a restricted place like a government installation?
  • In today's world, people are screaming “Privacy!” but it’s confusing who they’re screaming at. That’s why I thought I’d pen a timely guide to the current privacy outrage. Confusion stems from there being four plot lines going at the same time.
  • While you can’t do anything about the terms when using a product or service, you can decide whether or not to get into the contractual relationship in the first place and what information you share if you do click through.
  • Parenting, much like our legal system, is founded on three basic steps: 1) establish rules, 2) monitor compliance, and 3) modify non-compliant behavior.
  • In the spirit of "trust but verify", you may occasionally scroll through your kid’s email or Google+ account, or pick up their phone to glance at recent texts. One would think this behavior it protected by law. Surprisingly, wiretap laws don’t have carve outs for parental snooping.
  • By comparing what was creepy a few years back with what is creepy today and asking “why the change,” we will see the commonalities of creepiness and lessons for all who wish to make a successful business involving personal information.
  • Data breaches are not designed for your convenience, and keeping up with data breach notification laws and figuring out how they interact on a global basis is complicated.
  • The CSO is so critical for the CPO’s success that I guarantee that if you send this article to your CPO, they will take you out for a free lunch the next day.
  • A new amendment to Texas' breach notice law is designed to make it easier for Texas entities to comply with Texas law by giving those entities the choice of notifying under Texas law or the law of residents of other states.
  • What is unique to the Patriot Act compared to most other countries is the need for a court order. Most other countries allow their government authorities to go directly to the data host with administrative orders to produce data.
  • Being in a public place makes you fair game. So what makes a place private instead of public? This is where that famed “reasonable person” comes in.
  • When it comes to privacy policy, size matters. As a general rule, the longer it is, the more you’re hosed. But privacy statements don’t have to be a mystery.
  • When it comes to cybercrime, the police really can’t and aren’t going to protect residents of your town. The same goes for all towns and cities. Unless you’re talking a high six-figure theft, it's unlikely an officer will be assigned to your case.
  • Just like travel, incident response is a business responsibility. You need to understand and practice your plans, your responsibilities, your points of engagement and the tools you have at your disposal, to meet your goals in the most effective way.
  • Barack Obama played his cards right with the recent roll-out of the Executive Order for Improving Critical Infrastructure Cybersecurity. He succeeded where the Congress has thus far failed, and the biggest reason for that success is privacy.
  • As social media has become one big melting pot there are some implications that are being overlooked: portability, permanence and privacy.
  • Many employees think they have more privacy in the workplace than they actually do. After reading this article, you will see a few reasons why through three common privacy myths in the workplace.
  • You can have security without privacy, but you cannot have privacy without security. To have privacy, you must have security to protect things you wish not to share from those who are interested...
  • The holiday season is a time of giving. But savvy security and technology professionals such as yourselves know, both during the holidays and year-round, that not all giving is good.
  • What does privacy mean to folks in the US and the EU? In the EU, privacy is considered a fundamental right of the individual. Why do Europeans consider Americans inadequate when it comes to privacy?
  • Data breach notification laws are confusing and ever changing. Legislators trying to harmonize all the different state breach notification laws are going to have three big political challenges.