Upcoming Webinar: Anatomy of a Data Breach

I am looking forward to presenting a (free) webinar for healthcare professionals on “Anatomy of a Data Breach.” The webinar is free because it is being brought to you by the great folks at SmartTraining, LLC. You can learn more about the topics that will be covered on this page. It will be from 12:00 PM …

Car Hacking Is Very Real and Can Be Very Deadly — Watch This Video Of How To Do It

It is really quite simple: Modern cars are controlled by computers — everything, from the accelerator to the brakes to the steering to the windows to the locks — take over the computer, you take complete control over the car. The idea of hacking a car is no longer fantasy. It is real. It can …

Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches

Last night I had the wonderful opportunity to present to IMA – The Association of Accountants and Financial Professionals in Business on the topic of Helping Businesses Prepare for Computer Fraud and Data Breaches. Here are the presentation slides. I was really impressed with the quality of this event on many levels — these folks …

Deactivating Your Facebook While in Litigation May Be Destruction of Evidence

TAKEAWAY: Deactivating your Facebook account while in litigation may be destroying evidence that could be sanctioned by the court for spoliation of evidence. In Gatto v. United Air Lines, Inc., et al., 2:10-cv-01090 (D. NJ Mar. 25, 2013), the district court entered an order finding that the Defendants would be entitled to an instruction at trial …

Listen to Shawn Tuma discuss social media law issues for business on PlayMakers Talk Show via podcast

UPDATE: here is the podcast Shawn Tuma is a featured guest on this week’s PlayMaker’s Talk Show on 570 KLIF in Dallas, Texas. Shawn will discuss several social media law issues that are important for businesses and business owners to consider when using social media. The show airs at 4:00 p.m. today – Sunday, March …

Law360 article quotes Shawn Tuma on data privacy significance of U.S. v. Cotterman

BrittonTuma partner Shawn Tuma was quoted extensively about last weeks’  United States v. Cotterman opinion in a recent Law360.com article titled “9th Circ. Pioneers Laptop Search Limits in Border Case”. Here are excerpts of what Tuma had to say: “The court is raising the level of the expectation of privacy in data closer to that of someone’s …

Doing stupid (and illegal) things and posting videos of it on social media is, well, stupid.

Forrest Gump summed it up nicely: “stupid is as stupid does.” Thank you Forrest. It looks like these teenagers just may get a chance to learn about this from their “gallon smashing” antics. Read more and watch the video: Teens accused of ‘gallon smashing’ at local store. These teens are also about to learn one of …

Podcast Discussing Data Privacy and Information Security Implications of United States v. Cotterman – Now Available!

You can now listen to the podcast for Courts Showing Greater Respect for Data Privacy – United States v. Cotterman. Click HERE! For a recap, here is my discussion of this podcast and who participated: I finished a fantastic Skype discussion of the Cotterman opinion with with Rafal Los (@Wh1t3Rabbit) and Mike Schearer (@theprez98). As you may recall from The Law and …

Courts Showing Greater Respect for Data Privacy – United States v. Cotterman

TAKEAWAY: Data privacy is gaining respect within the judiciary, as it should because in many ways, data is the new currency and is worthy of protection. On March 8, 2013 the Ninth Circuit Court of Appeals (en banc) handed down a watershed case with significant privacy implications: United States v. Cotterman, No. 09-10139 (9th Cir. Mar. 8, …

When leaving your job, make sure you do this if you really want to violate the Computer Fraud and Abuse Act!

TAKEAWAY: Do not access your former employer’s computer system without its consent after you no longer work there. New employers, do not encourage or permit your new employees to do this either. There has been much debate over the last couple of years over whether an employee violates the Computer Fraud and Abuse Act by wrongfully accessing …