Posts Tagged business

Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches

Last night I had the wonderful opportunity to present to IMA – The Association of Accountants and Financial Professionals in Business on the topic of Helping Businesses Prepare for Computer Fraud and Data Breaches. Here are the presentation slides. I was really impressed with the quality of this event on many levels — these folks […]

, , , , , , , , , , ,


Listen to Shawn Tuma discuss social media law issues for business on PlayMakers Talk Show via podcast

UPDATE: here is the podcast Shawn Tuma is a featured guest on this week’s PlayMaker’s Talk Show on 570 KLIF in Dallas, Texas. Shawn will discuss several social media law issues that are important for businesses and business owners to consider when using social media. The show airs at 4:00 p.m. today – Sunday, March […]

, , , , , , , , , , , , ,

Leave a comment

… there’s no such thing as too much lawyering.

This is one of those articles that I just can’t help but blog — why? Well, I’ll let you figure that part out and you can start right here: When a single case can make or break your business, there’s no such thing as too much innovation — or too much lawyering. via Ready to […]

, , , , , , , ,

1 Comment

Business Situational Awareness & Social Media

How can your employees’ social media usage be compromising your businesses’ assets? I have said it before: business and warfare are one in the same. The objectives are the same and the tactics are the same. Both require an understanding of situational awareness. What is situational awareness? Situational Awareness is the ability to identify, process, […]

, , , , , , , , , , ,


Mind Control, Human Hacking & the Computer Fraud and Abuse Act?

Here is a thought to ponder: Would it violate the Computer Fraud and Abuse Act to hack a person? Based on the broad definition of computer that is used in the Computer Fraud and Abuse Act I believe that the answer could be “yes.” Here is why: The CFAA applies to anything with a microchip […]

, , , , , , , , , , ,