The law develops by the process of incrementalism. That is, it is a slow, gradual development, step by tiny step. In the United States, judicial decisions that fill the gaps in between the constitutional and statutory law and helps those bodies of law evolve. Each case sets a precedent, or foundation, upon which the reasoning for…
Category: Digital Information Law
Managing Cybersecurity Risks for Boards of Directors
In his latest Ethical Boardroom article, Shawn Tuma explains why it is important for board members to have an active role in their company’s cybersecurity preparation and tells them several key steps they can take to do so. Tuma also explains why cybersecurity is as much a legal issue and business issue as it is…
How Scheef & Stone’s clients can benefit from Mackrell International
Scheef & Stone, L.L.P. is proud to be a member of Mackrell International. This video offers a short explanation of how Mackrell International works and how it can benefit our clients worldwide.
Learning From the Sony Hack: Where Do We Die First?
Note: this article was previously posted on Norse’s DarkMatters. Where do we die first? For leaders of companies doing business in the digital world (i.e., all companies) this is the question you should be asking yourself when it comes to cyber security and crisis planning. Where does your company die first? The Sony hack shows why…
Cybersecurity Legal Year in Review – #DtSR Podcast
Do not miss this podcast discussing key cybersecurity legal events from 2015. Shawn Tuma joined the DtSR Gang [Rafal Los (@Wh1t3Rabbit), James Jardine (@JardineSoftware), and Michael Santarcangelo (@Catalyst)] on the Down the Security Rabbit Hole podcast. In this episode… Most important cybersecurity-related legal developments of 2015 Tectonic Shift that occurred with “standing” in consumer data…
Social Media Malware: What Is It and How do You Avoid It?
Guest Post by Cassie Phillips You can’t have spent more than a week on the internet without hearing about malware and its adverse effects on your computer or even your smartphone (smartphone malware is on the rise as well). Perhaps you’ve even had to spend half a day cleaning it off your computer yourself. It…
Why Lawyers Need to Understand Cyber Insurance for Their Clients
Cybersecurity, data breach, cyber attacks, and cyber insurance. Unless you live under a rock, you have heard of it. You better hope your lawyer has too! Shawn Tuma argues that the minimum standard of care for lawyers practicing in 2015-16 requires a basic understanding of cyber insurance. He recently explained that argument, along with his co-author…
Texas Super Lawyers Honors Shawn Tuma
Texas Super Lawyers recognized Shawn Tuma as one of the top Intellectual Property Litigation Attorneys in Texas for 2015. Mr. Tuma’s integrity, intensity, and drive for excellence have helped him become a nationally recognized thought-leader in cybersecurity, computer fraud, and information law. In addition to being recognized by Texas Super Lawyers, Mr. Tuma was recently honored by being named…
Why I am involved with the DFW Technology Prayer Breakfast
It’s all about the feeling! Read more about what I mean right here: Why I am involved with the DFW Technology Prayer Breakfast — Shawn Tuma | DFW Technology Prayer Breakfast
Employee Viewing Information Without Authorization Triggers Data Breach Notification Obligation for Credit Union
An employee of Golden State Credit Union viewed member account information, containing Personally Identifiable Information (PII), without having the requisite authority to view such accounts. This action — alone — was sufficient to trigger the notification requirement of the California data breach notification law, at great expense and frustration for the Credit Union, which offered…