Throughout my professional career I have had the pleasure of being invited to speak on a variety of legal topics, many of which have included legal issues related to developing technology. These topics have included the creation and enforceability of electronic contracts and signatures, issues surrounding the Y2K concerns (that never really came to pass), employee Internet use policies for businesses and other organizations, and methods for using the Internet and other technology for increasing the profitability of existing businesses. More recently, I have given several presentations on computer fraud and cyber crime, data security and data breaches, corporate espionage and trade secret misappropriation, and social media law. The following are some of my recent presentations with links to the presentation slides:
- Data Breach! Hacking! Corporate Espionage! — Are You Listening Yet??? (Prezi)
- Digital Information Law & Your Business, The Alternative Board (4/1/14) (slides)
- The Legal Side of Data Breach and Third Party Risk, Institute of Internal Auditors (IIA) 9th Annual Fraud Summit (3/28/14) (slides)
- Espionage & The Law, Institute of Internal Auditors (IIA) 2nd Annual IIA Super Conference (10/25/13)
- Combating Corporate Espionage – Data Breach (and the law) (10/24/13) (Prezi)
- The Law Online – Posting Gone Wild!, Parenting Paper<less Conference (10/19/13) (slides)
- Fraud 2.0 – Overview and Update of the Computer Fraud and Abuse Act and a Few Lessons About Data Breaches, Privacy, Data Security, and eCommerce Committee of the State Bar of Texas (8/28/13) (slides)
- Anatomy of a Data Breach – What To Do When The Unthinkable Occurs, Texas Dental Association & Smart Training LLC (7/31/13) (Prezi)
- Fraud 2.0 – Helping Businesses Prepare for Computer Fraud and Data Breaches, The IMA – Association of Accountants and Financial Professionals in Business (5/16/13) (slides)
- Social Media Law, PlayMaker’s Radio Talk Show (3/13) (audio recording)
- Social Media Law – It is Real and, Yes, Really Can Impact Your Business, MENG – Marketing Executives Networking Group (11/9/12) (slides)
- Fraud 2.0 – An Overview of the Laws that Help Businesses and Individuals Combat Computer Fraud, Association of Certified Fraud Examiners (ACFE) (11/8/12) (slides)
- Social Media Law – It is Real and, Yes, Really Can Impact Your Business, Social Media Breakfast – Dallas (8/30/12) (video)
- Social Media Law – The Legal Do’s and Don’ts of Social Media, TrustPoint Management Group (8/10/12) (slides)
- The Evolving Computer Fraud and Abuse Act – An Overview and Update of Recent Activity, Dallas Bar Association Computer Law Section (4/23/12) (slides)
- Computer Fraud and Abuse Act – A Lunch Sampler With a Little Something for Everyone, Dallas Bar Association Computer Law Section (8/22/11) (slides)
I am an avid writer which is the reason that I have decided to start blogging and, therefore, set up this website! While most of my writing has been informal, I have authored several published works. My publications have been cited by several courts (including the United States Court of Appeals for the Fifth Circuit), professional practice guides, and text books and are listed below:
- Texas Business Guide: Identifying and Protecting Trade Secrets Under the (New) Texas Uniform Trade Secrets Act (2014)
- “What Does CFAA Mean and Why Should I Care?” A Primer on the Computer Fraud and Abuse Act for Civil Litigators, The South Carolina Law Review, Volume 63, Number 1, Autumn 2011
- Law in Texas Literature: Texas Justice—Judge Roy Bean Style, The Review of Litigation, Volume 21, Number 3
- Contracting Over the Internet in Texas, Baylor Law Review, Volume 52, Number 2
- Municipalities & The Internet: A Few Legal Issues, Thurgood Marshall Law Review, Volume 27, Number 1
- It Ain’t Over ‘Til . . . A Post Y-2K Analysis of Y2K Litigation & Legislation, Texas Tech Law Review, Volume 31, Book IV
- Preserving Liberty: United States v. Printz and the Vigilant Defense of Federalism, Regent University Law Review, Volume 10, Number 1
Media & References
- ComputerWorld quoted me in A year after Swartz suicide, reform of anti-hacking law remains elusive — Calls for changing the Computer Fraud and Abuse Act have made little headway
- InsideCounsel quoted me in an article titled Decision Deepens Circuit Split on Scope of CFAA its June 2012 issue concerning the Computer Fraud and Abuse Act and the recent opinion by the Ninth Circuit Court of Appeals in U.S. v. Nosal.
- I was quoted concerning privacy and social media issues in an article entitled Who Owns Your LinkedIn Profile? It Might Not Be You that was published in Forbes, BNET, PC World, and other news sources.
- The United States Court of Appeals for the Fifth Circuit cited Law in Texas Literature: Texas Justice-Judge Roy Bean Style in the case Buntion v. Quarterman, 524 F.3d 664 (5th Cir. 2008).
- In 2003, when the issue of enforceability of contracts entered into over the Internet was still an issue, a Virginia Circuit Court cited Contracting Over the Internet in Texas in the case Trinity Homes, LLC v. Fang, 63 Va. Cir. 409 (Va. Cir. Ct. Nov. 13, 2003).
- In addition to the courts, my articles have been referenced by the Federal Sentencing Reporter, American Association of Law Schools Section on Contracts and cited in the following Law Review Journals: New York University Law Review, Harvard Journal on Legislation, Columbia Science and Technology Law Review, Texas Law Review, Michigan State University Journal of Medicine & Law, Drexel Law Review, Journal of Technology Law & Policy, McGeorge Law Review, Baylor Law Review, Fidelity Law Journal, University of Chicago Legal Forum, Seton Hall Constitutional Law Journal, Regent University Law Review, South Dakota Law Review