Presentation Slides: Overview and Update of the Computer Fraud and Abuse Act

Today I had the opportunity to present to the Privacy, Data Security, and eCommerce Committee of the State Bar of Texas on an overview and update of recent cases and issues for the Computer Fraud and Abuse Act. Here are the presentation slides and, of course, feel free to let me know if you have any …

The Indispensability of Cyber Counterintelligence

You already know what a threat hacking and data breaches are to your business, right? Good. In that case, you will appreciate the following post from my friends at SpearTip about cyber counterintelligence. Here’s a little teaser: If your organization is not yet retaining a provider that specializes in this technique, referred to as “Cyber …

Judge Grimm’s Important Guidance on Social Media Evidence Authentication

Excellent materials for using social media evidence in court.

Yes, you can even hack a toilet! #IoT

Ahhh yes, hacking toilet now seems to be possible … and you folks thought I was crazy a few years ago for blogging about hacking a car, a home, or even hacking a human … but as you know see, you can even hack a toilet. Can you just imagine the frustration caused by a …

Car Hacking Is Very Real and Can Be Very Deadly — Watch This Video Of How To Do It

It is really quite simple: Modern cars are controlled by computers — everything, from the accelerator to the brakes to the steering to the windows to the locks — take over the computer, you take complete control over the car. The idea of hacking a car is no longer fantasy. It is real. It can …

Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches

Last night I had the wonderful opportunity to present to IMA – The Association of Accountants and Financial Professionals in Business on the topic of Helping Businesses Prepare for Computer Fraud and Data Breaches. Here are the presentation slides. I was really impressed with the quality of this event on many levels — these folks …

When leaving your job, make sure you do this if you really want to violate the Computer Fraud and Abuse Act!

TAKEAWAY: Do not access your former employer’s computer system without its consent after you no longer work there. New employers, do not encourage or permit your new employees to do this either. There has been much debate over the last couple of years over whether an employee violates the Computer Fraud and Abuse Act by wrongfully accessing …

Computer Fraud and Abuse Act Cases Update (March 6, 2013)

Here are some recent Computer Fraud and Abuse Act (“CFAA”) cases that have been decided (or published) over the last couple of weeks: Tracfone Wireless, Inc. v. Cabrera, 883 F. Supp.2d 1220 (S.D. Fla. July 11, 2012). Defendant and former employee who engaged in selling stolen TracFone Prepaid Phones violated the unauthorized access with intent …

Court Finds Computer Fraud and Abuse Act Claim is Subject to Arbitration Agreement

TAKEAWAY: A Computer Fraud and Abuse Act claim that touches matters covered by an arbitration agreement is arbitrable. In Torbit, Inc. v. Datanyze, Inc., 2013 WL 572613 (N.D. Cal. Feb. 13, 2013), the defendant moved to compel arbitration of a Computer Fraud and Abuse Act claim under an arbitration agreement that provided that “all claims …

SC Magazine’s 2012 Data Breach Review Presentation

Here is an excellent presentation from SC Magazine that will help business leaders understand what a major threat data breach is to business: 2012 Data breach review – SC Magazine.