Texas Bar Journal 2023 Cybersecurity & Data Privacy Year in Review

I am happy that I was able to provide the Texas Bar Journal’s 2023: The Year In Review – Cybersecurity & Data Privacy Update which addressed the following issues: how the Texas “hacking laws” and issue of “consent” impact the discovery of evidence of child pornography whether sending a malicious phishing email violates “hacking laws” …

Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update

Shawn Tuma provided the Texas Bar Journal’s 2022: The Year In Review – Cybersecurity & Data Privacy Update which addressed the following issues: updated Texas cyber event notification requirements for Texas state banks Texas AG enforcement of data protection laws federal and state hacking laws former owner of company accessing company network attorney immunity for …

Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update

Shawn Tuma provided the Texas Bar Journal’s 2021: The Year In Review – Cybersecurity & Data Privacy Update which addressed the following issues: updated Texas data breach notification requirements federal and state hacking laws whistleblower claims for reporting cybersecurity deficiencies within an organization authority of consent for search warrants and password protected devices Read more …

Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update

Shawn Tuma provided the Texas Bar Journal’s 2020 year-end Cybersecurity & Data Privacy Update which addressed the following issues: online impersonation hacking laws authority of consent for search warrants and password protected devices ransomware attacks Read more here (LINK / PDF DOWNLOAD). Check out these articles: 2 Critical Cyber Insurance Issues All Companies Must Consider …

Texas Bar Journal 2019 Cybersecurity & Data Privacy Update

The Texas Bar Journal’s 2019 year-end Cybersecurity & Data Privacy Update was once again provided by Shawn Tuma and addressed the following issues: Texas’ New Data Breach Notification Requirements effective January 1, 2020 Whether website scraping allegations are sufficient to invoke Texas and federal “hacking” laws Whether viewing pictures on another’s cellphone violates Texas “hacking” law Cyber …

Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update

The Texas Bar Journal’s year-end update on Cybersecurity & Data Privacy law was once again provided by Shawn Tuma and addressed the following issues: Lawyers’ Cybersecurity and Data Breach Obligations that are required under Texas law and the ABA’s Ethics Opinion 483 titled Lawyers’ Obligations Afteran Electronic Data Breach or CyberattackWhether an IT service provider’s …

Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law

Before leaving his employment at Merritt Hawkins & Associates (MHA), Larry Gresham allegedly accessed MHA’s computer network and copied 400 of MHA’s proprietary files and then deleted hundreds of files in an attempt to hide his activities. A jury found Gresham’s actions violated the Harmful Access by Computer Act (HACA), Texas unauthorized access law (i.e., “hacking …

“Thank You” to 2 Legal Leaders that I Respect

There are many ways to honor someone. For me, one of the greatest privileges is knowing that others have found some value or usefulness in my work, especially by referencing it to others. What is unfortunate, however, is when you did not learn about it for quite some time and realize you never properly thanked …

Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?

Should a claim for [YOU GUESS] have been included in this lawsuit? See my thoughts below and share your thoughts. The Allegations Behind the Lawsuit A legal team led by Gloria Allred made news by suing Toyota (and others) on behalf of a Frisco, Texas pastor and his wife, Tim  and Claire Gautreaux, alleging that a …

3 Important Points on Computer Use Policies

IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today’s businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are …