Shawn E. Tuma

Presentations & Publications

Selected Presentations

Since the late ’90s, I have had the pleasure of being invited to speak on a variety of legal topics, many of which have included legal issues related to developing technology. These topics have included the creation and enforceability of electronic contracts and signatures, issues surrounding the Y2K concerns (that never really came to pass), employee Internet use policies for businesses and other organizations, and methods for using the Internet and other technology for increasing the profitability of existing businesses. More recently, I have given several presentations on computer fraud and cybercrime, cybersecurity, data protection and data breaches, corporate espionage and trade secret misappropriation, and social media law. The following are some of my recent presentations with links to the presentation slides (where possible):

  • Cyber Law 2016 & Beyond, International Conference on Cyberlaw, Cybercrime & Cybersecurity 2016 (New Delhi, India) (event info) (forthcoming 11/18/16)
  • Government Notification of Breach, Advanced Business Law Conference – TexasBarCLE (forthcoming 11/16)
  • Get the FUD Out of Cybersecurity!, ISACA CSX North America 2016  (Las Vegas) (event info) (forthcoming 10/18/16)
  • Cybersecurity Legal Issues Business & IT Leaders Should Know, ISSA North Texas Cyber Security Conference (event info) (forthcoming 10/7-8/16)
  • Cybersecurity and Data Privacy Law: What Small Businesses Need to Know, Crossroads Regional Cybersecurity Summit (event info) (forthcoming 10/4/16)
  • Cybersecurity Legal Issues Business & IT Leaders Should Know, SecureWorld – Dallas (event info) (slides) (9/27/16)
  • Cybersecurity Legal Issues: What You Really Need to Know, Tarleton State University Cybersecurity Summit 2016 (event info) (slides)
  • Leadership in Managing Cybersecurity and Data Loss, National Barn & Storage Rental Association’s National Conference (9/8/16)
  • Cybersecurity: Working with Outside Counsel and Outside Vendors, TexasBar CLE Advanced In-House Counsel Seminar (with Jason Smith and Ronald Chichester)
  • Federal Computer Fraud and Abuse Act & Texas Computer Hacking Laws, State Bar of Texas Annual Meeting (Intellectual Property Track) (6/17/16) (slides)
  • Leadership Through the Firestorm: Legal Counsel’s Role in Guiding Clients Through Cybersecurity and Data Loss, State Bar of Texas Annual Meeting (Paralegal Division) (6/17/16) (slides)
  • Corporate Governance Meets Cyber Risk: Not Just the IT Department’s Problem, Questions for Board Members to Ask and Actions to Take, Board Dynamics Breakfast Program Panel Discussion (with John Ansbach, Jarrett Kolthoff, Jack Pfeffer, and Shawn Tuma) (5/4/2016)
  • Cybersecurity: What the GC and CEO Need to Know, Dallas Bar Association Corporate Counsel Section (5/3/2016) (slides)
  • Cybersecurity Nuts and Bolts- What to do in case of a Breach (panel), US India Chamber of Commerce 2016 Annual Technology Conference (4/21/2016) (event information)
  • Cybersecurity & Computer Fraud – The Convergence,  Association of Certified Fraud Examiners (ACFE) Fort Worth Chapter Half-Day Seminar (4/20/2016) (slides)
  • Emerging Cyber Threats and Worldwide Cybersecurity Trends, 5th Annual Cyber Liabilities Insurance ExecuSummit, Uncasville, Connecticut (4/19/16) (event information)
  • Data Security Panel Discussion, InnoTech Dallas (4/6/16) (event information)
  • Cybersecurity: What Defense Lawyers Need to Know About Cyberliability, Cybercrime, and Cyber Insurance Coverage, International Association of Defense Counsel (IADC) (3/23/16) (Tuma’s slides)
  • Cybersecurity & Data Protection: What the GC & CEO Need to Know, GC Netweavers (3/10/16) (PowerPoint Slides / Slide Show).
  • SecureWorld International Webinar: Data Protection Pitfalls to Avoid, Co-Presenter with Aliki Liadis-Hall (Director of Compliance, North American Bancard), Jason Hart (CTO of Data Protection, Gemalto), Kim L. Jones (SVP & CISO, Vantiv), December 10, 2015
  • Privacy Issues in Structured Settlement Transactions, National Association of Settlement Purchasers (NASP) 2015 Conference, Las Vegas, NV (11/11/15)
  • Cybersecurity Trends – The Evolving Standard of Care for Companies and Management, SMU Law Review’s 23rd Annual General Counsel Symposium (10/30/15)
  • Cybersecurity Legal Trends: The Evolving Standard of Care for Companies and Management, SecureWorld – Dallas Expo (10/28/15) (slides)
  • Cybersecurity Panel, sponsored by WhitleyPenn, Lockton Companies, and Scheef & Stone, L.L.P. (10/27/2015)
  • Data Security and Privacy by Contract: Hacking Us All Into Business Associates, SMU Science & Technology Law Review’s Cybersecurity Symposium (10/23/15) (slides)
  • Above Compliance – Navigating the Cybersecurity Landscape in Financial Services (10/22/15) (slides)
  • Cybersecurity: Mission Impossible?, Sachse, Texas Chamber of Commerce (9/8/15)
  • The CFAA: Is It in Your Game Plan — It’s the Computer Fraud and Abuse Act, Useful Claim or Legal Oddity?, UT Law CLE, Non-Compete Camp 2015 (9/3/15) (slides)
  • Cybersecurity for Middle Market Executives: Bringing Attention to Ways Companies Can Manage Risk Within Their Organization, sponsored by WhitleyPenn, Lockton Companies, and Scheef & Stone, L.L.P. (8/26/2015)
  • Protecting Client Data, State Bar of Texas Annual Meeting San Antonio 2015 (6/19/15) (email to request slides)
  • Provisions of Cybersecurity Insurance Policies, State Bar of Texas Annual Meeting San Antonio 2015 (6/18/15) (slides)
  • Ignite SBOT, State Bar of Texas Annual Meeting San Antonio 2015 (5/18/15) (video)
  • Cybersecurity & Data Protection: Thinking About Risk & Compliance, Corporate Counsel Section, Collin County Bar Association (5/29/15) (slides)
  • Cybersecurity: Mission Impossible?, Murphy, Texas Chamber of Commerce (5/28/15) (slides)
  • Cybersecurity: Strategies for Compliance & Mitigation of Cyber Risk, Collin County Bench Bar Conference 2015 (5/16/15) (slides)
  • Keynote Presenter, The Most Current Cybersecurity Threats: Don’t Be the Next Victim, Annual ACFE Fraud Conference, Association of Certified Fraud Examiners (ACFE) (5/15/15) (slides)
  • Keynote Speaker: Business Cyber Risk: Threats, Compliance & Cyber Insurance, International Association of Insurance Professionals (DFW Chapter) (5/12/15)
  • Social Media Law: Rules, Gotchas, and Key Policies, Hubspot (national webinar) (4/17/15) (slides)
  • What’s Changed in Texas Privacy Law, Why It’s Important, and What Your Office Can Do To Ensure Compliance, Texas Dental Association webinar (4/17/15) (contact for slides)
  • Cybersecurity Threat Intelligence Sharing Panel Discussion with Congressman Michael McCaul, Chair of Homeland Security Committee, Panelist, University of Texas, Austin, Tx (4/9/15)
  • The Dark Net: Healthcare Practice Data at Risk, Texas Dental Association webinar (2/24/15) (contact for slides)
  • Simple Ways to Effectively Use Social Media to Help Build Your Law Practice, Legal Marketing Association (LMA) (webinar with Cordell Parvin) (2/15) (link)
  • Private Presentation on Overview of My Cybersecurity Practice (2/15) (link)
  • Cybersecurity | Data Privacy – The Impact on Your Law Practice, Making Your Practice Work Seminar, Collin County Bar Association (1/29/15) (link)
  • Private Presentation on Cybersecurity Strategy to Annual Board Meeting of major international corporation, Miami, Fla (12/14)
  • Walking the Straight and Narrow: Strategies to comply with state, federal, and international privacy laws (lawyers panel), Strengthening the Weak Link: Cyber Security Essentials for the C-Suite Conference, North Texas Crime Commission (10/16/14) (link)
  • Keeping Your Healthcare Practice “Off the Hook”  – Is Your Practice “On the Hook” Webinar Series for Texas Dental Association and Oklahoma Dental Association, Smart Training LLC (9/10/14) (slides available upon request)
  • Social Media Law: It is Real and, Yes, Really Can Impact Your Business, Marketing Executives Networking Group (MENG) (national webinar) (8/14/14) (slides)
  • Using Social Media in Your Law Practice, 3rd Annual Outstanding Women Lawyers’ Roundtable (6/6/14) (Prezi)
  • Combating Corporate Espionage, Cyber Fraud and Data Breaches: Case Studies and The Law , Dallas CPA Society Convergence 2014 (5/8/14) (slides available upon request)
  • Combating Cyber Fraud, Data Breaches & Corporate Espionage, Renaissance Executive Forums (5/8/14) (slides)
  • Cyber Fraud, Data Breaches, Corporate Espionage: How They Impact Your Law Practice, Collin County Bench Bar Conference (5/3/14) (Prezi)
  • Using Social Media in Your Law Practice, Collin County Bar Association, General Bar (5/16/14) (Prezi)
  • Using Social Media in Your Law Practice, Collin County Bar Association, Law Practice Management Section (4/28/14) (Prezi)
  • Data Breach! Hacking! Corporate Espionage! — Are You Listening Yet???, Collin County Bar Association, Corporate Counsel Section (4/25/14) (Prezi)
  • Digital Information Law & Your Business, The Alternative Board (4/1/14) (slides)
  • The Legal Side of Data Breach and Third Party Risk, Institute of Internal Auditors (IIA) 9th Annual Fraud Summit (3/28/14) (slides)
  • Espionage & The Law, Institute of Internal Auditors (IIA) 2nd Annual IIA Super Conference (10/25/13) (slides available upon request)
  • Combating Corporate Espionage – Data Breach (and the law) (10/24/13) (Prezi)
  • The Law Online – Posting Gone Wild!, Parenting PaperLess (slides)
  • Fraud 2.0 – Overview and Update of the Computer Fraud and Abuse Act and a Few Lessons About Data Breaches, Privacy, Data Security, and eCommerce Committee of the State Bar of Texas (8/28/13) (slides)
  • Anatomy of a Data Breach – What To Do When The Unthinkable Occurs, Texas Dental Association & Smart Training LLC (7/31/13) (Prezi)
  • Fraud 2.0 – Helping Businesses Prepare for Computer Fraud and Data Breaches, The IMA – Association of Accountants and Financial Professionals in Business (5/16/13) (slides)
  • The Dark Side of Social Media, 1st Tuesday Connections (4/13)
  • Social Media Law, PlayMaker’s Radio Talk Show (3/13) (audio recording)
  • Social Media Law – It is Real and, Yes, Really Can Impact Your Business, MENG – Marketing Executives Networking Group (11/9/12) (slides)
  • Fraud 2.0 – An Overview of the Laws that Help Businesses and Individuals Combat Computer Fraud, Association of Certified Fraud Examiners (ACFE) (11/8/12) (slides)
  • Social Media Law – It is Real and, Yes, Really Can Impact Your Business, Social Media Breakfast – Dallas (8/30/12) (video)
  • Social Media Law – The Legal Do’s and Don’ts of Social Media, TrustPoint Management Group (8/10/12) (slides)
  • The Evolving Computer Fraud and Abuse Act – An Overview and Update of Recent Activity, Dallas Bar Association Computer Law Section (4/23/12) (slides)
  • Computer Fraud and Abuse Act – A Lunch Sampler With a Little Something for Everyone, Dallas Bar Association Computer Law Section (8/22/11) (slides)

Very early presentations – just for fun!

  • Internet Law: An Expedition (2/20/2001) (slides)
  • E-Contracting: The Basic Rules (2/2/2001) (slides)
  • Contracting Over the Internet, B2B and B2C E Commerce Seminar (Feb. 2000)
  • e-Government 2000 Fall Forum – Municipalities & The Internet (Fall 2000) (paper)
  • Shifting Paradigms: Practicing Law in the Information Age – A Post-Y2K Analysis of Y2K Litigation (4/1/2000)
  • Contracting Over the Internet in Texas, Dallas Bar Association (Feb. 2000)

Podcasts & Radio


I am an avid writer which is the reason that I have decided to start blogging and, therefore, set up this website! While most of my writing has been informal, I have authored several published works. My publications have been cited by several courts (including the United States Court of Appeals for the Fifth Circuit), professional practice guides, and textbooks and are listed below:

Media & References

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: