Believe it or not, there really can be a case of “computer fraud” that is NOT covered by the Computer Fraud and Abuse Act (CFAA). Surprised? Let me explain. The CFAA is an “access” crime that requires there to be an unlawful “access” to a computer by either accessing a computer “without authorization” or “exceed[ing] authorized access.” …
Author Archives: Shawn E. Tuma
Using Social Media in Your Law Practice – Presentation to Collin County Bar Association #ccba
Today I have the pleasure of speaking to a great group of Collin County lawyers in the Collin County Bar Association’s monthly general meeting about the practical and ethical considerations of using social media in a law practice as well as my own tips that I have learned by using social media in my practice. Here is are Prezi …
Two Step Data Breach Risk Test for Texas Businesses
Does your business have this digital information about other people? 1. last name + first name or first initial + social security number, driver’s license number, or other government issued identification, or account or card numbers + access codes, or 2. information that identifies an individual + concerns a health condition or healthcare If you answered …
Continue reading “Two Step Data Breach Risk Test for Texas Businesses”
Why do cyber criminals want your healthcare data?
During a recent presentation a member of the audience asked me why cyber criminals would want to steal a person’s healthcare data. It is easy to understand why they would want to steal payment card data — but healthcare data — not so obvious. Here is a great answer: A crook would love [healthcare data] because, “in the world …
Continue reading “Why do cyber criminals want your healthcare data?”
The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation
Data security is such a threat to businesses that it must be a key tenet of leadership for the C-Suite and the Boardroom. Over the last several years I have written and spoken extensively about the risks that businesses face from the threat of data breaches. (posts) One of the points I try to make is that …
Continue reading “The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation”
Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF
This morning I have the privilege of speaking at the Collin County Bench Bar Conference and talking with a tremendous group of Collin County Judges and Lawyers about the risks that lawyers, their clients, and their law practices face from data insecurity issues. Here is the Prezi presentation that I will be using – take …
Continue reading “Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF”
Using Social Media in Your Law Practice – Prezi Presentation
I recently had the pleasure of speaking to a great group of Collin County lawyers in the Collin County Bar Association’s Law Practice Management Section about the practical and ethical considerations of using social media in a law practice as well as my own tips that I have learned by using social media in my practice. Here …
Continue reading “Using Social Media in Your Law Practice – Prezi Presentation”
Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???
I recently had the pleasure of speaking to a great group of Plano, Frisco, McKinney, and other Collin County lawyers in the Collin County Bar Association’s Corporate Counsel Section about the current trends and risks involving data breach, computer fraud, corporate espionage and the overall threats to companies’ data and intellectual property, especially trade secrets. Here …
Continue reading “Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???”
Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu
Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story …
Continue reading “Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu”
The Legal Side of Data Breach and Third Party Risk (presentation slides)
I presented at the Institute of Internal Auditors 9th Annual Fraud Summit on The Legal Side of Data Breach and Third Party Risk. My co-presenter was Christopher Mitchell of Crowe Horwath. The following are the presentation slides used for my part of the presentation. Key Takeaway: Your company is still responsible for a data breach …
Continue reading “The Legal Side of Data Breach and Third Party Risk (presentation slides)”

You must be logged in to post a comment.