Back in early 2012, I wrote a blog post about whether hacking a human would violate the federal Computer Fraud and Abuse Act. Shortly after publishing it, I received a call from a guy in Austin who said: "dude, someone finally gets it, I need your help!" ... I responded that I was a lawyer, … Continue reading Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)
Are you at IAPP - International Association of Privacy Professionals P.S.R. #PSR18 in Austin? If so, please come to our Thursday 10:30 - 11:30 session on Vendor Risk Management: Maintaining Relationships While Limiting Liability in Lone Star Ballroom A, Level 3. It should be great as I get to be with great panelists Tami Dokken and Melissa Krasnow and we will have Mark Smith as our … Continue reading Come to our session at #PSR18 – Vendor Risk Management: Maintaining Relationships While Limiting Liability
Cybersecurity is a team sport and many people within a business must work together to help effectively manage their businesses' cyber risk. In-house counsel plays a critical role in this process. A recent Law360 article (subscription required) identified the following key things they can do: Develop, implement, and table-top test an incident response plan Advise … Continue reading 5 Key Things In-House Counsel Can Do to Help Their Businesses’ Cybersecurity
In my latest article in Ethical Boardroom article, I explain some of the not-so-obvious reasons why you need an experienced cyber attorney on your team: Why you need a cyber attorney (Spring 2018) Here are other Ethical Boardroom (@EthicalBoard) articles that I have written or contributed to that are also available for free: Cybersecurity: A Fiduciary Duty … Continue reading Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom
There is more and more talk about companies hacking back against those who attack them in cyber space and whether allowing them to take such measures is a good idea. Right now, hacking back, or active defense, as it is often called, is illegal under the federal unauthorized access law, the Computer Fraud and Abuse … Continue reading What does it mean to “hack back” and is it a good idea?