I thought you may like an invitation to attend two complimentary webinars that I will be doing this coming week: YOURS, MINE, OURS: Protecting the Data Gathered and Exchanged in Litigation, Association of Certified E-Discovery Specialists (ACEDS) Monday, August 7, 2017 @ 12:00 CDT LINK for more information FULL VIDEO (see below) Securing IoT Data: Compliance,…
Category: Cyber Trial Law
Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law
Before leaving his employment at Merritt Hawkins & Associates (MHA), Larry Gresham allegedly accessed MHA’s computer network and copied 400 of MHA’s proprietary files and then deleted hundreds of files in an attempt to hide his activities. A jury found Gresham’s actions violated the Harmful Access by Computer Act (HACA), Texas unauthorized access law (i.e., “hacking…
Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing
Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it…
Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day!
What better way is there to celebrate Data Privacy Day than by learning more about the most recent list of Cybersecurity & Data Privacy Law Trailblazers as published by the National Law Journal? If you are so inclined, here you go: Trailblazers!
Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?
Should a claim for [YOU GUESS] have been included in this lawsuit? See my thoughts below and share your thoughts. The Allegations Behind the Lawsuit A legal team led by Gloria Allred made news by suing Toyota (and others) on behalf of a Frisco, Texas pastor and his wife, Tim and Claire Gautreaux, alleging that a…
Can Parties be Excluded from the Courtroom in Trade Secrets Cases?
The Texas Supreme Court recently addressed the question of when a competitor’s corporate representative can be excluded from the courtroom in a trade secrets case.
Explaining why Ashley Madison evidence was excluded
In this video, Shawn Tuma explains why the Ashley Madison court ruled that the plaintiffs cannot use evidence the hackers stole from Ashley Madison’s database. Here is a link to the Order.
Cyber Trial Lawyer Lesson: Stick With the Chronological Story
There is a well-known rule among experienced trial lawyers: when presenting your case, you always tell your story of the case in a chronological order unless there is an exceptional reason not to. The problem is, for most of us, the deeper we get into a case and the further into the weeds we get,…
You must be logged in to post a comment.