Legal, Compliance
Echoing what was stated in the README, this is not legal advice. Seek professional legal advice.
US Business Structures
These are commons business structures you may encounter:
- Sole Proprietorships
- Partnerships
- Corporations
- S Corporations
- Limited Liability Company (LLC)
These two resources should help point you in a direction:
- https://www.sba.gov/business-guide/launch-your-business/choose-business-structure
- https://www.irs.gov/businesses/small-businesses-self-employed/business-structures
Equally important are state requirements. You'll want to check your state's website for either:
- Secretary of State
- Department of State
for further details.
TIP: No matter what route you take, be sure to document and write down the key details of your business like business licenses, EIN's, dates, when renewals are due, addresses, etc.
Depending on your situation you may have some, none, or more of these details.
Keeping them on hand in a notes application or a password manager will save you a ton of time whenever you need to recall the specifics for whatever it may be.
Compliance Standards
- MPAA
- https://www.motionpictures.org/what-we-do/safeguarding-creativity/additional-resources/
- This details configurations and considerations in securing your hardware and any client data or intellectual property you may be handling.
- CIS Benchmarks
- https://www.cisecurity.org/cis-benchmarks/
- These help you configure a workstation for general use depending on the data you'll be handling
- Summary:
- MFA on everything
- Ensure Kernel / OS protections are on and working
- macOS
- Windows
- Firmware Password (see your UEFI/BIOS documentation)
- Secure Boot
- Full Disk Encryption
- Controlled Folder Access
- Isolatied Browsing
- Run as standard users instead of admin / root
- Ensure firewall is blocking unwanted INBOUND connections
- All OUTBOUND connections on untrusted networks are (ideally) protected with a VPN back to a trusted network
VPN should not to be confused with a personal / public VPN service used for privacy.
Keep in mind these recommendations are general and considered more as a 'default' for production computing rather than a complete security solution.