Skip to content
- August 5, 2013 - Yes, you can even hack a toilet! #IoT[Shawn Tuma]
- November 18, 2013 - You should know this > “What do connected cars and toilets have in common?”[Shawn Tuma]
- September 16, 2016 - You Could See This One Coming: Vibrator Company Sued for Tracking Usage[Shawn Tuma]
- September 18, 2016 - Cybersecurity and #IoT – Hackers Steal Over 100 Cars With a Laptop[Shawn Tuma]
- October 24, 2016 - Dyn, Krebs, and Mirai Botnet – the IoT Pandora’s Box is Open, Now What?[Shawn Tuma]
- October 27, 2016 - Shawn Tuma Discusses IoT DDoS Attack Against Dyn on WHDT World News[Shawn Tuma]
- December 12, 2016 - Top 3 CFAA Takeaways from Facebook v. Power Ventures Case in Ninth Circuit[Shawn Tuma]
- January 18, 2017 - How to Protect Yourself from Cell Phone Cyber Threats (WFAA TV Interview)[Shawn Tuma]
- March 10, 2017 - WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?[Shawn Tuma]
- March 14, 2017 - WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7[Shawn Tuma]
- August 6, 2017 - Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data[Shawn Tuma]
- August 7, 2017 - FUD and Voting Machine Hacking: An Important Point and Important Lesson[Shawn Tuma]
- August 10, 2017 - IoT Cybersecurity Improvement Act of 2017 proposed by Senate Cybersecurity Caucus[Shawn Tuma]
- January 4, 2018 - Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?[Shawn Tuma]
- October 31, 2018 - Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)[Shawn Tuma]
- December 2, 2019 - Why is the FBI Warning About Smart TVs?[Shawn Tuma]
- March 15, 2020 - How will the #COVID19 #coronavirus #coronapocolypse impact the future of how we do life?[Shawn Tuma]
- January 13, 2021 - A Shot Below the Belt: Hacker Seizes Control of Internet-Enabled Chastity Cages, Demands Ransom[Shawn Tuma]
- April 1, 2011 - CFAA Not Subject to Rule 9[Shawn Tuma]
- April 1, 2011 - Taking of Confidential Info Alone Not “Loss” Under CFAA[Shawn Tuma]
- April 4, 2011 - Does the CFAA Apply to Business Partners?[Shawn Tuma]
- April 5, 2011 - Former Employee’s Deletion of Data May Constitute CFAA “Damage”[Shawn Tuma]
- April 7, 2011 - Computer Fraud and Abuse Act Can Prohibit Employee From Deleting Emails[Shawn Tuma]
- April 11, 2011 - Is Confidential Information Less Valuable Than Copyrighted Material Under the Computer Fraud and Abuse Act?[Shawn Tuma]
- April 13, 2011 - Smartphones and the Computer Fraud and Abuse Act–Already Covered?[Shawn Tuma]
- April 22, 2011 - Basic Elements of a Computer Fraud and Abuse Act – “Fraud” Claim[Shawn Tuma]
- April 25, 2011 - New “Employment” Computer Fraud and Abuse Act case … but with a twist![Shawn Tuma]
- April 26, 2011 - Apple iTracking Case: will Apple be WINNING on Computer Fraud and Abuse Act claim?[Shawn Tuma]
- April 27, 2011 - Apple Should Win the Computer Fraud and Abuse Act Claims …[Shawn Tuma]
- April 28, 2011 - Holy CFAA Access News! The 9th Cir. join the 5th and 11th in United States v. Nosal[Shawn Tuma]
- April 28, 2011 - Bye Bye Brekka–Hello Nosal! Ninth Circuit Warms-up to Intended-Use Theory of “Access” Under the Computer Fraud and Abuse Act[Shawn Tuma]
- May 7, 2011 - Computer Use Policies – Do They Even Matter?[Shawn Tuma]
- May 11, 2011 - Facebooking at Work Does Not Violate Computer Fraud and Abuse Act[Shawn Tuma]
- May 12, 2011 - iTracking II: Apple Sued Again for Violating Computer Fraud and Abuse Act[Shawn Tuma]
- May 17, 2011 - Barter Services and Attorney Fees May Qualify As “Loss” Under Computer Fraud and Abuse Act[Shawn Tuma]
- May 20, 2011 - Proposed Amendment: Computer Fraud and Abuse Act (Senate Bill S 890)[Shawn Tuma]
- May 20, 2011 - Another Pregnancy Discrimination / Computer Fraud and Abuse Act Case?[Shawn Tuma]
- May 31, 2011 - Ninth Circuit: Speculative “Loss” Insufficient for Computer Fraud and Abuse Act[Shawn Tuma]
- June 3, 2011 - Citrin Lives! Dist. Ct. applies the agency theory of access in a post-Nosal Computer Fraud and Abuse Act case[Shawn Tuma]
- June 9, 2011 - Ex Wife Pretending to Be 17 Yr Old on Facebook Gets Hubby Arrested by FBI[Shawn Tuma]
- June 22, 2011 - Update: Recent Computer Fraud and Abuse Act Cases[Shawn Tuma]
- June 30, 2011 - An Adequate Disclaimer for Computer Fraud and Abuse Act?[Shawn Tuma]
- July 12, 2011 - 3 Recent Computer Fraud and Abuse Act Cases Worth Noting[Shawn Tuma]
- July 18, 2011 - “News of the World” Phone Hacks A Violation of Computer Fraud and Abuse Act?[Shawn Tuma]
- July 27, 2011 - Using a fake login to access a website may violate the Computer Fraud and Abuse Act[Shawn Tuma]
- July 27, 2011 - Senate Committee Hearing on Updating the Computer Fraud and Abuse Act[Shawn Tuma]
- July 27, 2011 - Improperly Sharing Website Login Info Could Be Federal Crime[Shawn Tuma]
- July 30, 2011 - Discussion of Problems with Proposed Cybercrime Legislation[Shawn Tuma]
- August 14, 2011 - Deputy Constable Indicted Under Computer Fraud and Abuse Act for Accessing Plate Info[Shawn Tuma]
- August 16, 2011 - “What Does CFAA Mean and Why Should I Care?”–A Primer on the Computer Fraud and Abuse Act for Civil Litigators[Shawn Tuma]
- September 1, 2011 - Minimizing the risk of employee data breach and privacy mischief in the cloud[Shawn Tuma]
- January 22, 2012 - Data Breach and Privacy Lawsuits Must Have Real Damages to Succeed[Shawn Tuma]
- November 23, 2012 - Beware of this PayPal Spear Phishing Scam – I Just Got One![Shawn Tuma]
- November 27, 2012 - Fifth Circuit Finds Company Not Liable for Alleged Violations of CFAA and ECPA by Its Regional Manager[Shawn Tuma]
- January 12, 2013 - What is the Proper Jurisdiction for an International Computer Fraud Lawsuit?[Shawn Tuma]
- February 4, 2013 - The Law and the Hacker – Podcast on the Computer Fraud and Abuse Act[Shawn Tuma]
- May 17, 2013 - Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches[Shawn Tuma]
- August 16, 2013 - The Indispensability of Cyber Counterintelligence[Shawn Tuma]
- October 24, 2013 - Combating Corporate Espionage Seminar – Prezi and a few thoughts[Shawn Tuma]
- November 5, 2013 - Read this explanation of cyber espionage and how it impacts YOUR company[Shawn Tuma]
- November 18, 2013 - You should know this > “What do connected cars and toilets have in common?”[Shawn Tuma]
- November 26, 2013 - So, your business has never had a data breach? Have you ever had an employee leave?[Shawn Tuma]
- February 20, 2014 - Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach[Shawn Tuma]
- March 8, 2014 - Yes, Texas is a good state for plaintiffs to bring a CFAA claim.[Shawn Tuma]
- April 15, 2014 - Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu[Shawn Tuma]
- April 28, 2014 - Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???[Shawn Tuma]
- May 3, 2014 - Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF[Shawn Tuma]
- May 19, 2014 - Here is a “Computer Fraud” Case that is NOT Covered by the Computer Fraud and Abuse Act![Shawn Tuma]
- October 2, 2014 - Podcast: CFAA, Shellshock and Cyber Security Research — What the Heck Do We Want?[Shawn Tuma]
- October 4, 2014 - Hackers’ Cracked 10 Financial Firms in Major Assault – Russian Officials Involved?[Shawn Tuma]
- October 7, 2014 - FBI Director Talks Cyber Espionage: Chinese Like “Drunk Burglar”[Shawn Tuma]
- October 7, 2014 - Podcast: DtR NewsCast of Hot Cyber Security Topics[Shawn Tuma]
- October 27, 2014 - Podcast: #DtR Episode on Lines in the Sand on “Security Research”[Shawn Tuma]
- November 25, 2014 - Automakers show more concern for hackers’ efforts to exploit vulnerabilities in car computer systems[Shawn Tuma]
- December 28, 2014 - Felony CFAA Conviction for Accessing Former Employer’s Data via Backdoor Upheld on Appeal[Shawn Tuma]
- February 4, 2015 - Will Changes to the CFAA Deter Hackers? | Norse DarkMatters[Shawn Tuma]
- March 10, 2015 - Private Investigators, You Are Not Immune From the Computer Hacking Laws[Shawn Tuma]
- March 12, 2015 - Is China responsible for all the hacking it has been blamed for? Not according to Norse.[Shawn Tuma]
- April 30, 2015 - Why Hackers Love Companies Who Use Social Media – The Point[Shawn Tuma]
- October 12, 2015 - In a first, Chinese hackers are arrested at the behest of the U.S. government – The Washington Post[Shawn Tuma]
- December 29, 2015 - Social Media Malware: What Is It and How do You Avoid It?[Shawn Tuma]
- February 18, 2016 - The #1 Current Cybersecurity Threat to Business in DFW (2/18/16)[Shawn Tuma]
- March 26, 2016 - 3 Key Takeaways About Texas’ Unauthorized Access Law[Shawn Tuma]
- April 1, 2016 - FBI Guidance: How to Respond to Ransomware[Shawn Tuma]
- April 26, 2016 - How a Small Law Firm was Used for an Extensive Cyberattack[Shawn Tuma]
- April 28, 2016 - 3 Important Points on Computer Use Policies[Shawn Tuma]
- June 16, 2016 - The CFAA is for Access of a Computer, Not Mere Possession[Shawn Tuma]
- June 18, 2016 - Tuma Discusses Hack of DNC Trump Research (Radio Interviews)[Shawn Tuma]
- June 30, 2016 - D CEO Magazine: Why Cybercriminals Are Targeting Law Firms[Shawn Tuma]
- July 18, 2016 - Former Cardinals exec sentenced to prison for hacking Astros[Shawn Tuma]
- August 9, 2016 - Shawn Tuma discusses how elections could be hacked on WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- December 3, 2016 - Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?[Shawn Tuma]
- December 12, 2016 - Top 3 CFAA Takeaways from Facebook v. Power Ventures Case in Ninth Circuit[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- January 18, 2017 - How to Protect Yourself from Cell Phone Cyber Threats (WFAA TV Interview)[Shawn Tuma]
- March 27, 2017 - Implications of DOJ Indictment of Russian & Canadian Hackers for Yahoo Breach?[Shawn Tuma]
- August 7, 2017 - FUD and Voting Machine Hacking: An Important Point and Important Lesson[Shawn Tuma]
- October 24, 2017 - What do we in the United States really want from our cyber laws?[Shawn Tuma]
- February 19, 2018 - Fifth Circuit Upholds CFAA Conviction for Former Employee’s Misuse Causing Damage Based on Circumstantial Evidence[Shawn Tuma]
- January 30, 2019 - Protect Your Company Against W-2 Business Email Compromise Attacks During Tax Season[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- April 2, 2021 - Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- Computer Fraud and Abuse Act
- February 12, 2011 - Why Would A Lawyer Waste Time Studying Social Media?[Shawn Tuma]
- April 1, 2011 - CFAA Not Subject to Rule 9[Shawn Tuma]
- April 4, 2011 - Does the CFAA Apply to Business Partners?[Shawn Tuma]
- April 5, 2011 - Former Employee’s Deletion of Data May Constitute CFAA “Damage”[Shawn Tuma]
- April 7, 2011 - Computer Fraud and Abuse Act Can Prohibit Employee From Deleting Emails[Shawn Tuma]
- April 11, 2011 - Is Confidential Information Less Valuable Than Copyrighted Material Under the Computer Fraud and Abuse Act?[Shawn Tuma]
- April 13, 2011 - Smartphones and the Computer Fraud and Abuse Act–Already Covered?[Shawn Tuma]
- April 22, 2011 - Basic Elements of a Computer Fraud and Abuse Act – “Fraud” Claim[Shawn Tuma]
- April 25, 2011 - New “Employment” Computer Fraud and Abuse Act case … but with a twist![Shawn Tuma]
- April 26, 2011 - Apple iTracking Case: will Apple be WINNING on Computer Fraud and Abuse Act claim?[Shawn Tuma]
- April 27, 2011 - Apple Should Win the Computer Fraud and Abuse Act Claims …[Shawn Tuma]
- April 28, 2011 - Holy CFAA Access News! The 9th Cir. join the 5th and 11th in United States v. Nosal[Shawn Tuma]
- April 28, 2011 - Bye Bye Brekka–Hello Nosal! Ninth Circuit Warms-up to Intended-Use Theory of “Access” Under the Computer Fraud and Abuse Act[Shawn Tuma]
- May 7, 2011 - Computer Use Policies – Do They Even Matter?[Shawn Tuma]
- May 11, 2011 - Facebooking at Work Does Not Violate Computer Fraud and Abuse Act[Shawn Tuma]
- May 12, 2011 - iTracking II: Apple Sued Again for Violating Computer Fraud and Abuse Act[Shawn Tuma]
- May 17, 2011 - Barter Services and Attorney Fees May Qualify As “Loss” Under Computer Fraud and Abuse Act[Shawn Tuma]
- May 20, 2011 - Proposed Amendment: Computer Fraud and Abuse Act (Senate Bill S 890)[Shawn Tuma]
- May 20, 2011 - Another Pregnancy Discrimination / Computer Fraud and Abuse Act Case?[Shawn Tuma]
- May 31, 2011 - Ninth Circuit: Speculative “Loss” Insufficient for Computer Fraud and Abuse Act[Shawn Tuma]
- June 3, 2011 - Citrin Lives! Dist. Ct. applies the agency theory of access in a post-Nosal Computer Fraud and Abuse Act case[Shawn Tuma]
- June 9, 2011 - Ex Wife Pretending to Be 17 Yr Old on Facebook Gets Hubby Arrested by FBI[Shawn Tuma]
- June 22, 2011 - Update: Recent Computer Fraud and Abuse Act Cases[Shawn Tuma]
- June 30, 2011 - An Adequate Disclaimer for Computer Fraud and Abuse Act?[Shawn Tuma]
- July 12, 2011 - 3 Recent Computer Fraud and Abuse Act Cases Worth Noting[Shawn Tuma]
- July 18, 2011 - “News of the World” Phone Hacks A Violation of Computer Fraud and Abuse Act?[Shawn Tuma]
- July 27, 2011 - Using a fake login to access a website may violate the Computer Fraud and Abuse Act[Shawn Tuma]
- July 27, 2011 - Senate Committee Hearing on Updating the Computer Fraud and Abuse Act[Shawn Tuma]
- July 27, 2011 - Improperly Sharing Website Login Info Could Be Federal Crime[Shawn Tuma]
- July 30, 2011 - Discussion of Problems with Proposed Cybercrime Legislation[Shawn Tuma]
- August 14, 2011 - Deputy Constable Indicted Under Computer Fraud and Abuse Act for Accessing Plate Info[Shawn Tuma]
- August 16, 2011 - “What Does CFAA Mean and Why Should I Care?”–A Primer on the Computer Fraud and Abuse Act for Civil Litigators[Shawn Tuma]
- August 20, 2011 - Presenting a CLE to the Dallas Bar Association on the Computer Fraud and Abuse Act[Shawn Tuma]
- August 24, 2011 - comScore Lawsuit and that Pesky Loss Requirement of the Computer Fraud and Abuse Act[Shawn Tuma]
- August 25, 2011 - Can hacking and stealing a CAR violate the Computer Fraud and Abuse Act?[Shawn Tuma]
- August 28, 2011 - Senate Judiciary Committee Hearing on Updating the Computer Fraud and Abuse Act[Shawn Tuma]
- August 29, 2011 - Can you get your attorneys’ fees under the Computer Fraud and Abuse Act?[Shawn Tuma]
- August 31, 2011 - Computer Fraud and Abuse Act – great tool for taming an employee that’s gone off the deep end![Shawn Tuma]
- September 1, 2011 - Minimizing the risk of employee data breach and privacy mischief in the cloud[Shawn Tuma]
- September 5, 2011 - Is a $5k loss required for each defendant under Computer Fraud and Abuse Act?[Shawn Tuma]
- September 6, 2011 - Hacking a car? Yes, really…and you thought I was kidding![Shawn Tuma]
- September 21, 2011 - iPhone Privacy Lawsuits Dismissed: Breach of Privacy Alone Is Not Injury[Shawn Tuma]
- October 21, 2011 - My Appearance on Capital Thinking Radio Show[Shawn Tuma]
- January 8, 2012 - Texas Lawyer: Computer Fraud and Abuse Act 101[Shawn Tuma]
- January 20, 2012 - Example of Effective Computer Acceptable Use Notice[Shawn Tuma]
- January 22, 2012 - Data Breach and Privacy Lawsuits Must Have Real Damages to Succeed[Shawn Tuma]
- February 2, 2012 - Seth’s Blog: An endless series of difficult but achievable hills[Shawn Tuma]
- February 4, 2012 - Holy Cow – Do You Think This Is A HIPAA Privacy Violation?[Shawn Tuma]
- February 13, 2012 - Mind Control, Human Hacking & the Computer Fraud and Abuse Act?[Shawn Tuma]
- February 14, 2012 - How Do You Violate the Computer Fraud and Abuse Act? SunPower Lawsuit Shows How![Shawn Tuma]
- February 16, 2012 - Share your password, do the time – lessons under the Computer Fraud and Abuse Act[Shawn Tuma]
- February 28, 2012 - Break Into A Home, Violate the Computer Fraud and Abuse Act?[Shawn Tuma]
- September 11, 2012 - [Shawn Tuma]
- September 13, 2012 - [Shawn Tuma]
- September 20, 2012 - 4 Takeaways From A Really Easy Computer Fraud And Abuse Act Case[Shawn Tuma]
- September 21, 2012 - Ninth Circuit Upholds $9.5 Million Facebook Privacy Settlement[Shawn Tuma]
- November 27, 2012 - Fifth Circuit Finds Company Not Liable for Alleged Violations of CFAA and ECPA by Its Regional Manager[Shawn Tuma]
- November 30, 2012 - [Shawn Tuma]
- December 4, 2012 - [Shawn Tuma]
- December 10, 2012 - More Tightening of the Computer Fraud and Abuse Act — Holding it to Rule 9(b) Heightened Pleading Standard[Shawn Tuma]
- December 11, 2012 - Current Employee May Have Violated Computer Fraud and Abuse Act by Downloading for Secret New Employer[Shawn Tuma]
- December 12, 2012 - Court Finds Insider Redirecting Domain Traffic Not “Interruption of Service” Under Computer Fraud and Abuse Act[Shawn Tuma]
- January 4, 2013 - Two Year Statute of Limitations for Computer Fraud and Abuse Act Accrued When Plaintiff “Suspected” Wrongdoing[Shawn Tuma]
- January 12, 2013 - What is the Proper Jurisdiction for an International Computer Fraud Lawsuit?[Shawn Tuma]
- January 22, 2013 - Can You Be Outraged By The Prosecution of Aaron Swartz Under CFAA But Not Sandra Teague?[Shawn Tuma]
- January 23, 2013 - District Court of Colorado Dismisses CFAA Claim for Failing to Adequately Plead Cause of Action and Loss[Shawn Tuma]
- January 24, 2013 - Court Implies Unknown “Backdoor Node” On Software Licensee’s Server To Monitor Infringement May Violate CFAA[Shawn Tuma]
- January 27, 2013 - Employment Agreement Restrictions Determined Whether Employees Exceeded Authorized Access Under Computer Fraud and Abuse Act[Shawn Tuma]
- January 27, 2013 - Another CFAA Case Dismissed Because Plaintiff Only Recited Elements in Complaint[Shawn Tuma]
- February 4, 2013 - The Law and the Hacker – Podcast on the Computer Fraud and Abuse Act[Shawn Tuma]
- February 5, 2013 - US Preparing to Do Digital Battle With Hackers – Will This Violate the Computer Fraud and Abuse Act?[Shawn Tuma]
- February 15, 2013 - Computer Fraud and Abuse Act Incorporates Traditional Principles of Tort Causation[Shawn Tuma]
- February 17, 2013 - Plaintiff’s CFAA Claim Dismissed Because of Simple Pleading Error[Shawn Tuma]
- February 17, 2013 - SC Magazine’s 2012 Data Breach Review Presentation[Shawn Tuma]
- February 18, 2013 - Court Finds Computer Fraud and Abuse Act Claim is Subject to Arbitration Agreement[Shawn Tuma]
- March 5, 2013 - Computer Fraud and Abuse Act Cases Update (March 6, 2013)[Shawn Tuma]
- March 8, 2013 - When leaving your job, make sure you do this if you really want to violate the Computer Fraud and Abuse Act![Shawn Tuma]
- July 25, 2013 - Car Hacking Is Very Real and Can Be Very Deadly — Watch This Video Of How To Do It[Shawn Tuma]
- August 5, 2013 - Yes, you can even hack a toilet! #IoT[Shawn Tuma]
- August 7, 2013 - Judge Grimm’s Important Guidance on Social Media Evidence Authentication[Shawn Tuma]
- August 28, 2013 - Presentation Slides: Overview and Update of the Computer Fraud and Abuse Act[Shawn Tuma]
- September 2, 2013 - Computer Fraud and Abuse Act Limitations Accrued With Awareness of Unauthorized Access–Not Identity of Perpetrator[Shawn Tuma]
- September 4, 2013 - Hackers continue to exploit vulnerabilities in car computer systems[Shawn Tuma]
- September 6, 2013 - 3 Steps to Enable Companies to Use the CFAA’s Remedies for Misuse of Computers and Info – Even in the 9th Cir[Shawn Tuma]
- September 27, 2013 - New #employment related #CFAA access case[Shawn Tuma]
- October 9, 2013 - Yes, Case Law Says It Really Is A CFAA Violation To DDoS A Website[Shawn Tuma]
- October 10, 2013 - District Court Finds Breach of Contractual Limits on Access Violates the CFAA[Shawn Tuma]
- October 13, 2013 - Loss and Damage Are Not Interchangeable Under CFAA–District Court Blows Right Past CFAA’s “Loss” Requirement in Sysco Corp. v. Katz[Shawn Tuma]
- October 14, 2013 - Hacker Sentenced to 5 Months Under CFAA for Hacking SodaHead.com Accounts[Shawn Tuma]
- October 24, 2013 - Combating Corporate Espionage Seminar – Prezi and a few thoughts[Shawn Tuma]
- October 31, 2013 - Check out the recent MyCase Blog featuring Shawn Tuma’s practice[Shawn Tuma]
- November 1, 2013 - Presentation slides for Parenting Paper<less Conference on Digital Information Law Issues[Shawn Tuma]
- November 11, 2013 - To all Veterans, thank you very much for[Shawn Tuma]
- November 18, 2013 - You should know this > “What do connected cars and toilets have in common?”[Shawn Tuma]
- January 16, 2014 - Tuma quoted in Computerworld article: “A year after Swartz suicide, reform of anti-hacking law remains elusive”[Shawn Tuma]
- January 17, 2014 - Aaron Swartz, Edward Snowden, Target Breach, Privacy and Data Security — What Do We Really Want?[Shawn Tuma]
- January 18, 2014 - Bloggers have the same First Amendment protections as journalists according to 9th Circuit[Shawn Tuma]
- January 22, 2014 - US v. Nosal Court Provides Guidance on Calculation of “Loss” Under the Computer Fraud and Abuse Act (CFAA)[Shawn Tuma]
- January 24, 2014 - Hunter Moore or Aaron Swartz: Do we hate the CFAA? Do we love the CFAA? Do we even have a clue?[Shawn Tuma]
- January 25, 2014 - The Indictment – Hunter Moore Prosecuted Under Computer Fraud and Abuse Act (CFAA)[Shawn Tuma]
- January 28, 2014 - Sixth Circuit: Unknown Access of a Remote Server Cannot Be Intentional, Thus Does Not Violate CFAA[Shawn Tuma]
- January 31, 2014 - No Senator Wyden, Whether the Computer Fraud and Abuse Act Applies to the CIA is Not a Simple Yes or No[Shawn Tuma]
- February 6, 2014 - Will Sprint’s Multiple Computer Fraud and Abuse Act Lawsuits Highlight the District Court Split on Loss Jurisprudence?[Shawn Tuma]
- February 20, 2014 - Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach[Shawn Tuma]
- March 8, 2014 - Yes, Texas is a good state for plaintiffs to bring a CFAA claim.[Shawn Tuma]
- March 12, 2014 - A Hacker Can Takeover A Car Through Its Computer System — What About An Airplane?[Shawn Tuma]
- March 24, 2014 - Why is PNC Bank Accusing Morgan Stanley of Corporate Espionage and Trade Secret Theft?[Shawn Tuma]
- March 28, 2014 - What did Sun Tzu teach about cybersecurity?[Shawn Tuma]
- May 3, 2014 - Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF[Shawn Tuma]
- May 8, 2014 - Two Step Data Breach Risk Test for Texas Businesses[Shawn Tuma]
- May 19, 2014 - Here is a “Computer Fraud” Case that is NOT Covered by the Computer Fraud and Abuse Act![Shawn Tuma]
- June 5, 2014 - Beckett Media Files Two “Data Scraping” Cases in Northern District of Texas – Will the CFAA Claims Survive? [Shawn Tuma]
- September 4, 2014 - Expect the Celebrity Nude Photo Hacker to be Prosecuted Under CFAA–Just Like Revenge-Porn King Hunter Moore[Shawn Tuma]
- September 11, 2014 - Does Data Security Have Your Healthcare Practice “On the Hook”?[Shawn Tuma]
- September 25, 2014 - Uncle Sam doesn’t have a clue on data privacy, cyber crime laws, and neither do we![Shawn Tuma]
- September 29, 2014 - No, the CFAA Does Not Require Taking Actions to Prevent the Hacking of Others[Shawn Tuma]
- October 2, 2014 - Podcast: CFAA, Shellshock and Cyber Security Research — What the Heck Do We Want?[Shawn Tuma]
- October 6, 2014 - Gov’t Contractors Must Notify of Data Breach Within 3 days[Shawn Tuma]
- October 7, 2014 - Podcast: DtR NewsCast of Hot Cyber Security Topics[Shawn Tuma]
- October 9, 2014 - 3 Steps the C-Suite Can Take to Strengthen Cyber Security[Shawn Tuma]
- October 9, 2014 - Are You Outraged By The CFAA Prosecution of Aaron Swartz But Not Sandra Teague?[Shawn Tuma]
- October 27, 2014 - Podcast: #DtR Episode on Lines in the Sand on “Security Research”[Shawn Tuma]
- November 6, 2014 - Are the Russians Strategically Positioned for Full Scale Cyber War with the US? (apparently they have been since 2011)[Shawn Tuma]
- November 14, 2014 - Platform Magazine Quotes Tuma Discussing CyberGard: The Public Relations Side of a Data Breach[Shawn Tuma]
- November 18, 2014 - Dang! “Loss” of Opportunity to Decide Interesting CFAA Issue, But “Loss” Analyisis is Good Too[Shawn Tuma]
- November 21, 2014 - Honored to be part of the Team: From 44 Felony Counts to One Misdemeanor, Plea Entered in U.S. v. Salinas CFAA Case[Shawn Tuma]
- December 15, 2014 - Is Sony Really “Defensively” DDoS’ing the Sites Hosting Its Content?[Shawn Tuma]
- December 23, 2014 - Yes! I finally get my $10mil “Inheritance”![Shawn Tuma]
- December 27, 2014 - Surprise! Surprise! Surprise! Hackers could control your car by attacking safety features[Shawn Tuma]
- December 28, 2014 - Felony CFAA Conviction for Accessing Former Employer’s Data via Backdoor Upheld on Appeal[Shawn Tuma]
- January 4, 2015 - Target’s data breach liabilities mount[Shawn Tuma]
- January 7, 2015 - Washington AG Seeks Data Breach Law That Ends Blanket Exemption for Encrypted Data[Shawn Tuma]
- January 18, 2015 - Update/Clarification: Washington AG Seeks Data Breach Law That Ends Blanket Exemption for Encrypted Data[Shawn Tuma]
- February 4, 2015 - Will Changes to the CFAA Deter Hackers? | Norse DarkMatters[Shawn Tuma]
- February 16, 2015 - Upcoming Webinar: Simple Ways to Effectively Use Social Media to Help Build Your Law Practice[Shawn Tuma]
- March 1, 2015 - Does the CFAA Apply to Lenovo’s SuperFish Malware Lawsuits?[Shawn Tuma]
- March 10, 2015 - Private Investigators, You Are Not Immune From the Computer Hacking Laws[Shawn Tuma]
- May 28, 2015 - UPDATE: “This is not a security breach.” Really? IRS hit by cyberattack, thousands of taxpayers’ information stolen[Shawn Tuma]
- May 29, 2015 - What is ‘cybersecurity law’? Orin Kerr’s 4 Categories[Shawn Tuma]
- July 9, 2015 - 12 Timeless Password Tips for Improved Security[Shawn Tuma]
- August 8, 2015 - Spam Arrest, LLC v. Replacements, Ltd., 2013 WL 4675919 (W.D. Wa. Aug. 29, 2013)[Shawn Tuma]
- August 18, 2015 - Those 3rd party IT audit provisions you[Shawn Tuma]
- September 2, 2015 - Fifth Circuit: Accessing Computer Per Later-Overturned Order Does Not Violate CFAA[Shawn Tuma]
- September 10, 2015 - Texas Broadens Unauthorized Access of Computer Law to Specifically Address Insider Misuse[Shawn Tuma]
- October 15, 2015 - Are you planning to go to SecureWorld-Dallas?[Shawn Tuma]
- October 25, 2015 - Would increasing CFAA penalties via the CISA Amendment really even help? I don’t think so.[Shawn Tuma]
- December 13, 2015 - What Do Cybersecurity, Brown M&M’s & Credit Ratings Have in Common?[Shawn Tuma]
- January 12, 2016 - Court Order Provides CFAA Authorization to Access Computer, Even if Later Overturned[Shawn Tuma]
- February 11, 2016 - Be Careful of Commentary on 7th Cir.’s Fidlar Tech CFAA “Intent to Defraud”Case[Shawn Tuma]
- February 12, 2016 - Departing Employee Taking Data from “Restricted” but Unsecured Folder Doesn’t Violate CFAA[Shawn Tuma]
- April 28, 2016 - 3 Important Points on Computer Use Policies[Shawn Tuma]
- May 2, 2016 - Middle School Hacker Case Impacts CFAA Reform Debate[Shawn Tuma]
- May 4, 2016 - Can a Company Remotely Wipe an Ex-Employee’s Device?[Shawn Tuma]
- May 6, 2016 - Three Takeaways from the Target Data Breach Ruling[Shawn Tuma]
- May 13, 2016 - Will Changes to the CFAA Deter Hackers?[Shawn Tuma]
- June 16, 2016 - The CFAA is for Access of a Computer, Not Mere Possession[Shawn Tuma]
- July 18, 2016 - Former Cardinals exec sentenced to prison for hacking Astros[Shawn Tuma]
- August 4, 2016 - Hackers could get inside your BRAIN | Daily Mail Online[Shawn Tuma]
- September 27, 2016 - Yahoo Data Breach: US Senators Demand Answers – Still Think You Don’t Have to Disclose and Notify?[Shawn Tuma]
- October 19, 2016 - Invitation to the Cyber Future Summit – 10/28/16 at SMU’s Bush Center[Shawn Tuma]
- December 3, 2016 - Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?[Shawn Tuma]
- December 12, 2016 - Top 3 CFAA Takeaways from Facebook v. Power Ventures Case in Ninth Circuit[Shawn Tuma]
- December 14, 2016 - Yahoo Discloses New Breach of 1 Billion User Accounts – This is Big![Shawn Tuma]
- December 24, 2016 - A Cybersecurity Night Before Christmas[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- January 20, 2017 - Trying to DDoS the White House Website to Protest Trump’s Inauguration Violates CFAA[Shawn Tuma]
- October 10, 2017 - Hacking Into A Company You Sold Can Get You Jail Time[Shawn Tuma]
- October 24, 2017 - What do we in the United States really want from our cyber laws?[Shawn Tuma]
- February 19, 2018 - Fifth Circuit Upholds CFAA Conviction for Former Employee’s Misuse Causing Damage Based on Circumstantial Evidence[Shawn Tuma]
- October 31, 2018 - Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- May 20, 2022 - Feds Will Not Charge Good Faith Security Research Under the CFAA[Shawn Tuma]
- CFAA Cases
- August 8, 2015 - Craigslist Inc. v. 3Taps Inc. (ND Ca. Aug. 16, 2013)[Shawn Tuma]
- August 8, 2015 - Custom Hardware Engineering & Consulting, Inc. v. Dowell (E.D. Missouri Jan 23, 2013)[Shawn Tuma]
- August 8, 2015 - Farmers Ins. Exchange v. Steele Ins. Agency, 2013 WL 3872950 (ED Ca. July 25, 2013)[Shawn Tuma]
- August 8, 2015 - Robinson v. New Jersey, 2013 WL 3894129 (D. NJ July 26, 2013)[Shawn Tuma]
- August 8, 2015 - PNY Technologies, Inc. v. Salhi, 2013 WL 4039030 (D. NJ Aug. 5, 2013)[Shawn Tuma]
- August 8, 2015 - Tech Systems, Inc. v. Pyles[Shawn Tuma]
- August 8, 2015 - United States v. Nosal, 2013 WL 4504652 (ND Ca. Aug. 15, 2013)[Shawn Tuma]
- August 8, 2015 - Phillips v. Executor of Estate of Arnold, 2013 WL 4458790 (WD Wa. Aug. 16, 2013)[Shawn Tuma]
- August 8, 2015 - Kramer v. Cash Link Systems, 715 F.3d 1082 (8th Cir. 2013)[Shawn Tuma]
- August 8, 2015 - Dalzell Management Co., Inc. v. Bardonia Plaza, LLC, 923 F. Supp.2d 590 (S.D.N.Y. Feb. 15, 2013)[Shawn Tuma]
- August 8, 2015 - Higgins v. NMI Enterprises, Inc., 2013 WL 4525635 (ED La. Aug. 26, 2013)[Shawn Tuma]
- August 8, 2015 - Dresser-Rand Co. v. Jones, 2013 WL 3810859 (E.D. Penn. July 23, 2013)[Shawn Tuma]
- August 8, 2015 - Wentworth-Douglass Hosp. v. Young & Novis Prof’l Ass’n, No. 10-CV-120-SM, 2012 WL 2522963, at *4 (D.N.H. June 29, 2012)[Shawn Tuma]
- August 8, 2015 - AirWatch LLC v. Mobile Iron, Inc., 2013 WL 4757491 (N.D. Ga. Sept. 4, 2013)[Shawn Tuma]
- August 8, 2015 - Mission Information Resources, Inc. v. Hult, 2013 WL 3776442 (D.N.H. July 17, 2013)[Shawn Tuma]
- August 8, 2015 - Sprint Nextel Corp. v. Simple Cell, Inc., 2013 WL 3776933 (D. Md. July 17, 2013)[Shawn Tuma]
- August 8, 2015 - Advanced Micro Devices, Inc. v. Feldstein, et al., 2013 WL 2666746 (D. Mass. June 10, 2013)[Shawn Tuma]
- August 8, 2015 - Mu Sigma, Inc. v. Affine, Inc., 2013 WL 3772724 (D.N.J. July 17, 2013)[Shawn Tuma]
- August 8, 2015 - Ocean Tomo, LLC v. Barney, 2013 WL 4804980 (N.D. Ill. Sept. 9, 2013)[Shawn Tuma]
- August 8, 2015 - Property Rights Law Group, P.C. v. Lynch, 2013 WL 4791485 (D. Hawaii Sept. 6, 2013)[Shawn Tuma]
- August 8, 2015 - RoadLink Workforce Solutions, L.L.C. v. Malpass, 2013 WL 5274812 (W.D. Wa. Sept. 18, 2013)[Shawn Tuma]
- August 8, 2015 - Pulte Homes, Inc. v. Laborers’ Intern. Union of North America, 648 F.3d 295 (6th Cir. 2011)[Shawn Tuma]
- August 8, 2015 - United States v. Cave, 2013 WL 3766550 (D. Neb. July 16, 2013)[Shawn Tuma]
- August 8, 2015 - Poller v. Bioscrip, Inc., 2013 WL 5354753 (S.D.N.Y. Sept. 25, 2013)[Shawn Tuma]
- August 8, 2015 - Dice Corporation v. Bold Technologies, 913 F. Supp.2d 389 (E.D. Mich. 2012) (reconsideration denied March 28, 2013)[Shawn Tuma]
- August 8, 2015 - Facebook, Inc. v. Power Ventures, Inc., 2013 WL 5372341 (N.D. Cal. Sept. 25, 2013)[Shawn Tuma]
- August 8, 2015 - Givaudan Fragrances Corp. v. Krivda, 2013 WL 5411475 (D.N.J. Sept. 26, 2013)[Shawn Tuma]
- August 8, 2015 - Capitol Audio Access, Inc. v. Umemoto, 2013 WL 5425324 (E.D. Cal. Sept. 27, 2013)[Shawn Tuma]
- August 8, 2015 - Danois v. i3 Archive Inc., 2013 WL 3556083 (E.D. Pa. July 12, 2013)[Shawn Tuma]
- August 8, 2015 - JBCHoldings NY, LLC v. Pakter, 931 F. Supp.2d 514 (S.D.N.Y. Mar. 20, 2013)[Shawn Tuma]
- August 8, 2015 - Sysco Corp. v. Katz, et al., 2013 WL 5519411 (N.D. Ill. Oct. 3, 2013)[Shawn Tuma]
- August 8, 2015 - In re Google Inc. Cookie Placement Consumer Privacy Litigation, 2013 WL 5582866 (D. Del. Oct. 9, 2013)[Shawn Tuma]
- August 8, 2015 - Vehicle Valuation Services v. DiMaria, et al., 2013 WL 5587089 (N.D. Ill. Oct. 10, 2013)[Shawn Tuma]
- August 8, 2015 - Beta Technology, Inc. v. Meyers, 2013 WL 5602930 (S.D. Tx. Oct. 10, 2013) (order denying motion to dismiss)[Shawn Tuma]
- August 8, 2015 - Matot v. CH, 2013 WL 5431586 (D. Or. Sept. 26, 2013)[Shawn Tuma]
- August 8, 2015 - United States v. Nosal, 930 F. Supp.2d 1051 (N.D. Ca. Mar. 12, 2013)[Shawn Tuma]
- August 8, 2015 - Brooks v. AM Resorts, LLC, 2013 WL 3343993 (E.D. Pa. July 3, 2013)[Shawn Tuma]
- August 8, 2015 - Envisn, Inc. v. Davis, 2013 WL 6571944 (D. Mass. Dec. 12, 2013)[Shawn Tuma]
- August 8, 2015 - Dice Corporation v. Bold Technologies, 12-2513, 13-1712 (6th Cir. Jan. 24, 2014)[Shawn Tuma]
- August 8, 2015 - Deman Data Systems, LLC v. Schessel, 2014 WL 408443 (M.D. Fla. Feb. 3, 2014)[Shawn Tuma]
- August 8, 2015 - Absolute Energy Solutions, LLC v. Trosclair, 2014 WL 360503 (S.D. Tex. Feb. 3, 2014)[Shawn Tuma]
- August 8, 2015 - New South Equipment Mats, LLC v. Keener, 2013 WL 5946371 (S.D. Miss. Nov. 5, 2013)[Shawn Tuma]
- August 8, 2015 - Pinnacle Ins. Solutions, LLC v. Kolbe, 2014 WL 1272212 (D. N.J. Mar. 27, 2014)[Shawn Tuma]
- August 8, 2015 - Tharpe v. Lawidjaja, 2014 WL 1268820 (W.D. Va. Mar. 26, 2014): Court’s dicta reaffirms that use of spyware can violate the CFAA and ECPA[Shawn Tuma]
- August 8, 2015 - Using Photos from Facebook Page Without Express Permission Does Not Violate CFAA[Shawn Tuma]
- August 8, 2015 - Lack of $5k Loss Leads to Dismissal of CFAA Claim Against Ex-Spouse for Surreptitious Computer Monitoring[Shawn Tuma]
- August 8, 2015 - US v. Nosal Court Orders Restitution of $827,983.25[Shawn Tuma]
- August 8, 2015 - Employers Receive Friendly Computer-Fraud-And-Abuse-Act Ruling From Louisiana Court[Shawn Tuma]
- August 8, 2015 - Using Single Individual Password to Access News Site to Share Info With Others is Not CFAA Interruption of Service[Shawn Tuma]
- August 10, 2015 - The CFAA Requires Access of a Computer — Not Just Access to Information[Shawn Tuma]
- January 12, 2016 - Court Order Provides CFAA Authorization to Access Computer, Even if Later Overturned[Shawn Tuma]
- February 11, 2016 - Be Careful of Commentary on 7th Cir.’s Fidlar Tech CFAA “Intent to Defraud”Case[Shawn Tuma]
- February 12, 2016 - Departing Employee Taking Data from “Restricted” but Unsecured Folder Doesn’t Violate CFAA[Shawn Tuma]
- May 4, 2016 - Can a Company Remotely Wipe an Ex-Employee’s Device?[Shawn Tuma]
- July 18, 2016 - Former Cardinals exec sentenced to prison for hacking Astros[Shawn Tuma]
- February 19, 2018 - Fifth Circuit Upholds CFAA Conviction for Former Employee’s Misuse Causing Damage Based on Circumstantial Evidence[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- Cyber Espionage
- October 27, 2013 - Video: How Does Calling Yourself a “Hacker” Impact Your Rights In Court?[Shawn Tuma]
- November 5, 2013 - Read this explanation of cyber espionage and how it impacts YOUR company[Shawn Tuma]
- November 18, 2013 - You should know this > “What do connected cars and toilets have in common?”[Shawn Tuma]
- November 26, 2013 - So, your business has never had a data breach? Have you ever had an employee leave?[Shawn Tuma]
- February 20, 2014 - Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach[Shawn Tuma]
- March 12, 2014 - A Hacker Can Takeover A Car Through Its Computer System — What About An Airplane?[Shawn Tuma]
- March 24, 2014 - Why is PNC Bank Accusing Morgan Stanley of Corporate Espionage and Trade Secret Theft?[Shawn Tuma]
- March 25, 2014 - 3 Steps for Obtaining Trade Secrets in Discovery[Shawn Tuma]
- March 28, 2014 - What did Sun Tzu teach about cybersecurity?[Shawn Tuma]
- April 15, 2014 - Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu[Shawn Tuma]
- April 28, 2014 - Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???[Shawn Tuma]
- May 3, 2014 - Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF[Shawn Tuma]
- May 20, 2014 - What is Corporate Espionage, Industrial Espionage, Cyber Espionage, and Economic Espionage? The DOJ Explains …[Shawn Tuma]
- August 31, 2014 - Yes, an Employee Really Can Steal Your Data and Then SLAPP You for It?[Shawn Tuma]
- September 22, 2014 - 3 Steps the C-Suite Can Take to Strengthen Cyber Security[Shawn Tuma]
- October 4, 2014 - Hackers’ Cracked 10 Financial Firms in Major Assault – Russian Officials Involved?[Shawn Tuma]
- October 7, 2014 - FBI Director Talks Cyber Espionage: Chinese Like “Drunk Burglar”[Shawn Tuma]
- February 14, 2015 - Business Guide: Identifying and Protecting Trade Secrets Under the Texas Uniform Trade Secrets Act[Shawn Tuma]
- March 10, 2015 - Private Investigators, You Are Not Immune From the Computer Hacking Laws[Shawn Tuma]
- March 12, 2015 - Is China responsible for all the hacking it has been blamed for? Not according to Norse.[Shawn Tuma]
- April 30, 2015 - Why Hackers Love Companies Who Use Social Media – The Point[Shawn Tuma]
- October 12, 2015 - In a first, Chinese hackers are arrested at the behest of the U.S. government – The Washington Post[Shawn Tuma]
- April 14, 2016 - Law Firm Cybersecurity: I Hate to Say I Told You So But …[Shawn Tuma]
- June 18, 2016 - Tuma Discusses Hack of DNC Trump Research (Radio Interviews)[Shawn Tuma]
- August 9, 2016 - Shawn Tuma discusses how elections could be hacked on WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- August 16, 2016 - Cyber security attorney Shawn Tuma tells us how our elections could be hacked – WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- March 7, 2017 - “Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?[Shawn Tuma]
- March 14, 2017 - WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7[Shawn Tuma]
- March 17, 2017 - The Ubiquity of Cyber[Shawn Tuma]
- March 27, 2017 - Implications of DOJ Indictment of Russian & Canadian Hackers for Yahoo Breach?[Shawn Tuma]
- February 25, 2022 - Increased Ransomware Threat in Wake of Russia Invasion of Ukraine — Shawn Tuma Discusses[Shawn Tuma]
- Texas Computer Crimes
- November 14, 2012 - Texas’ Amended Data Breach Notification Law[Shawn Tuma]
- September 10, 2015 - Texas Broadens Unauthorized Access of Computer Law to Specifically Address Insider Misuse[Shawn Tuma]
- March 26, 2016 - 3 Key Takeaways About Texas’ Unauthorized Access Law[Shawn Tuma]
- April 28, 2016 - 3 Important Points on Computer Use Policies[Shawn Tuma]
- December 3, 2016 - Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?[Shawn Tuma]
- March 11, 2017 - Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing[Shawn Tuma]
- March 27, 2017 - “Thank You” to 2 Legal Leaders that I Respect[Shawn Tuma]
- June 30, 2017 - Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law[Shawn Tuma]
- October 24, 2017 - What do we in the United States really want from our cyber laws?[Shawn Tuma]
- February 4, 2019 - Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update[Shawn Tuma]
- February 15, 2019 - Texas AG: Business Must Implement and Maintain Reasonable Cybersecurity Safeguards[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- November 25, 2020 - The Home Depot / State Attorneys General Settlement – My 1st and 2nd Thoughts[Shawn Tuma]
- April 2, 2021 - Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- Texas Computer Crimes Cases
- March 26, 2016 - 3 Key Takeaways About Texas’ Unauthorized Access Law[Shawn Tuma]
- April 28, 2016 - 3 Important Points on Computer Use Policies[Shawn Tuma]
- December 3, 2016 - Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?[Shawn Tuma]
- March 27, 2017 - “Thank You” to 2 Legal Leaders that I Respect[Shawn Tuma]
- June 30, 2017 - Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law[Shawn Tuma]
- February 4, 2019 - Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- April 2, 2021 - Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- October 23, 2011 - Cybersecurity risk — think its material? (hint: the SEC does!)[Shawn Tuma]
- December 9, 2012 - Executives of Public Companies Must Use Caution With Social Media – The SEC is Watching![Shawn Tuma]
- October 9, 2014 - 3 Steps the C-Suite Can Take to Strengthen Cyber Security[Shawn Tuma]
- December 14, 2014 - #SonyHack shows there are no “safe secrets” in the corporate world – what do you do?[Shawn Tuma]
- December 17, 2014 - #SonyHack: Will Executives’ Embarrassing Emails Better Motivate Cybersecurity Change?[Shawn Tuma]
- December 30, 2014 - Boards Had Better Start Paying Attention to Cybersecurity[Shawn Tuma]
- May 1, 2015 - Will Officers & Directors Be Held Legally Responsible for Companies’ Data Breaches and Cybersecurity Incidents?[Shawn Tuma]
- May 13, 2015 - Cybersecurity is a Top Concern for Corporate General Counsel[Shawn Tuma]
- December 8, 2015 - SecureWorld Webinar: Data Protection Pitfalls to Avoid[Shawn Tuma]
- December 13, 2015 - What Do Cybersecurity, Brown M&M’s & Credit Ratings Have in Common?[Shawn Tuma]
- December 19, 2015 - Dear Santa: Shawn Tuma’s Cybersecurity Christmas Wish[Shawn Tuma]
- January 13, 2016 - Cybersecurity Legal Year in Review – #DtSR Podcast[Shawn Tuma]
- February 5, 2016 - Managing Cybersecurity Risks for Boards of Directors[Shawn Tuma]
- February 8, 2016 - 3 Key Points the Board Needs to Know About Cybersecurity[Shawn Tuma]
- February 16, 2016 - 4 Ways to Engage Executives in Cyber Risk[Shawn Tuma]
- March 18, 2016 - Why Cybersecurity Incidents Are Legal Events[Shawn Tuma]
- April 1, 2016 - FBI Guidance: How to Respond to Ransomware[Shawn Tuma]
- May 19, 2016 - Computer Use Policies – Are Your Company’s Illegal According to the NLRB?[Shawn Tuma]
- July 1, 2016 - Cybersecurity: How Long Should An Incident Response Plan Be?[Shawn Tuma]
- September 14, 2016 - Cybersecurity Legal Issues: What you really need to know (slides)[Shawn Tuma]
- September 27, 2016 - SecureWorld Presentation: Cybersecurity Legal Issues: What You Really Need to Know[Shawn Tuma]
- October 30, 2016 - Yes, Officers & Directors Can Be Held Personally Liable for Their Company’s Data Breach – Here’s Why[Shawn Tuma]
- December 1, 2016 - Home Depot Data Breach Shareholder Derivative Suit Against Directors Fails[Shawn Tuma]
- December 23, 2016 - New York Cybersecurity Regulations Delayed, Being Revised[Shawn Tuma]
- January 23, 2017 - Improving Your Cybersecurity Plan, Explained by Paul Ferrillo in WSJ[Shawn Tuma]
- March 15, 2017 - Critical Steps Companies Must Take to Comply with New York’s Cybersecurity Rules – Ethical Boardroom[Shawn Tuma]
- April 23, 2017 - Does Board Oversight of Cybersecurity Mean Directors Must Become Cybersecurity Experts?[Shawn Tuma]
- August 21, 2017 - Uber’s Settlement With FTC Emphasizes Companies’ Need for Cyber Risk Management Programs[Shawn Tuma]
- December 5, 2017 - Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies[Shawn Tuma]
- December 14, 2017 - The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years![Shawn Tuma]
- March 19, 2018 - Do data breaches have consequences? Will Equifax CIO serve jail time for insider trading?[Shawn Tuma]
- June 1, 2018 - Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom[Shawn Tuma]
- September 21, 2018 - 5 Key Things In-House Counsel Can Do to Help Their Businesses’ Cybersecurity[Shawn Tuma]
- September 14, 2019 - Sharing the Load: What are Chief Privacy Officers, Chief Information Security Officers, and General Counsel Doing in Real Life to Divide Up Roles and Responsibilities? (conference panel discussion)[Shawn Tuma]
- April 21, 2022 - Is This the Next Evolution of Cyber Risk Governance? The SEC Is About To Force CISOs Into America’s Boardrooms[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- January 26, 2023 - Shareholders Can Sue Corporate Officers for Breach of Duty of Oversight in landmark Ruling — CISOs and CPOs, You Listening?[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- November 17, 2020 - Free Virtual Event: Reimagine Your Company Operating Again After a Ransomware Attack (DBU Tech Symposium)[Shawn Tuma]
- December 10, 2020 - ***URGENT*** MEMO TO: “The IT Guy” RE: Securing RDP Access–Changing the RDP Port Does Not Work![Shawn Tuma]
- December 17, 2020 - Working From Home During COVID-19? Five Things You Should be Doing–But Probably Are Not–To Be More Cyber Secure (publication)[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- May 4, 2021 - Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle[Shawn Tuma]
- June 4, 2021 - Ransomware Attacks! The 5 Best Practices the White House Urges all Businesses to Take to Mitigate Them[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- June 21, 2021 - Ransomware Payments May Be Tax-Deductible[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 14, 2021 - Ransomware! What is it and how do you better protect against it?[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- October 8, 2021 - The INSIDERS Podcast – Cybersecurity with Shawn Tuma[Shawn Tuma]
- October 8, 2021 - Facebook Outage: Shawn Tuma’s WFAA Interview from the deck at #NetDiligence[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- February 25, 2022 - Increased Ransomware Threat in Wake of Russia Invasion of Ukraine — Shawn Tuma Discusses[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 17, 2023 - FBI, CISA, MS-ISAC Joint Cybersecurity Advisory – #StopRansomware: LockBit 3.0[Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- January 19, 2013 - This Is Why Your Business Needs Cyber Insurance Coverage[Shawn Tuma]
- May 11, 2015 - Cybersecurity Keynote Address at International Association of Insurance Professionals Event[Shawn Tuma]
- September 18, 2015 - Cyber Insurance, You Need to Know if You Have It, and Your Lawyer Darn Sure Does![Shawn Tuma]
- December 15, 2015 - Why Lawyers Need to Understand Cyber Insurance for Their Clients[Shawn Tuma]
- April 13, 2016 - What Does the Travelers Case Really Mean for Cyber Insurance?[Shawn Tuma]
- October 22, 2016 - Cyber Insurance: Social Engineering Not Covered Under “Computer Fraud” Insurance Provision[Shawn Tuma]
- March 12, 2017 - Target Data Breach: What Has It Cost? What Has Insurance Covered?[Shawn Tuma]
- March 25, 2017 - SecureWorld Post: 4 Key Cyber Insurance Takeaways for Companies from Spec’s v. Hanover Lawsuit[Shawn Tuma]
- September 21, 2018 - 5 Key Things In-House Counsel Can Do to Help Their Businesses’ Cybersecurity[Shawn Tuma]
- October 15, 2018 - Trump and Kanye West Bring Emphasis to #CyberAware Cybersecurity Awareness Month With Password Example[Shawn Tuma]
- November 27, 2018 - Cyber Insurance – A Better Way to Help Small Businesses Manage Cyber Risk[Shawn Tuma]
- April 2, 2019 - ***URGENT*** MEMO TO: “THE IT GUY” RE: #RANSOMWARE / WIPING DATA[Shawn Tuma]
- September 14, 2019 - Making Sure It’s Covered: Cyber Insurance — What are the Practical Things In-House and Outside Attorneys Need to Know? (conference panel discussion)[Shawn Tuma]
- April 15, 2020 - Attend Tuma’s Upcoming Webinar: Understanding How Cyber Insurance Impacts Your Incident Response Planning[Shawn Tuma]
- April 30, 2020 - Two Cyber Insurance Issues Service Providers Should Discuss with Their Clients[Shawn Tuma]
- May 22, 2020 - Cybersecurity Legal Issues in the Heart of the Covid-19 Pandemic[Shawn Tuma]
- June 3, 2020 - Ransomware is the single greatest risk your company faces – here’s why[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- July 14, 2020 - With ransomware attacks increasing, cyber insurance now seen as a necessity, not a luxury (publication)[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- December 9, 2020 - 2 Critical Cyber Insurance Issues All Companies Must Consider Now, Before an Incident![Shawn Tuma]
- December 10, 2020 - ***URGENT*** MEMO TO: “The IT Guy” RE: Securing RDP Access–Changing the RDP Port Does Not Work![Shawn Tuma]
- December 15, 2020 - We need more humility in cybersecurity[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 2, 2021 - Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update[Shawn Tuma]
- April 23, 2021 - Nearly half of all businesses hit by cyber attacks in 2020 — 3 steps to help prepare your business[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- May 4, 2021 - Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- October 8, 2021 - The INSIDERS Podcast – Cybersecurity with Shawn Tuma[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 10, 2023 - The White House Cybersecurity Plan – the Devil is in the Details[Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- May 20, 2016 - Tips for Parents to Help Keep Kids Safe Online[Shawn Tuma]
- June 18, 2016 - Tuma Discusses Hack of DNC Trump Research (Radio Interviews)[Shawn Tuma]
- June 30, 2016 - D CEO Magazine: Why Cybercriminals Are Targeting Law Firms[Shawn Tuma]
- July 1, 2016 - Cybersecurity: How Long Should An Incident Response Plan Be?[Shawn Tuma]
- August 9, 2016 - Shawn Tuma discusses how elections could be hacked on WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- August 12, 2016 - Cybersecurity Thought for Today: Good vs Great?[Shawn Tuma]
- August 16, 2016 - Cyber security attorney Shawn Tuma tells us how our elections could be hacked – WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- September 7, 2016 - Brazzers porn hack: more than just account holders exposed–what does this mean for your company?[Shawn Tuma]
- September 8, 2016 - Cybersecurity Incident Response Checklist[Shawn Tuma]
- September 14, 2016 - Cybersecurity Legal Issues: What you really need to know (slides)[Shawn Tuma]
- September 16, 2016 - You Could See This One Coming: Vibrator Company Sued for Tracking Usage[Shawn Tuma]
- September 18, 2016 - Cybersecurity and #IoT – Hackers Steal Over 100 Cars With a Laptop[Shawn Tuma]
- September 23, 2016 - Yahoo Data Breach – Some Facts & Questions (i.e., was it really the Russians?)[Shawn Tuma]
- September 27, 2016 - SecureWorld Presentation: Cybersecurity Legal Issues: What You Really Need to Know[Shawn Tuma]
- October 5, 2016 - Kim Kardashian’s Lesson on the Relationship Between Physical and Cybersecurity[Shawn Tuma]
- October 8, 2016 - WHTD World News Interview: How to Protect Yourself After the Yahoo Attack[Shawn Tuma]
- October 19, 2016 - Invitation to the Cyber Future Summit – 10/28/16 at SMU’s Bush Center[Shawn Tuma]
- October 25, 2016 - Shawn Tuma Discusses Government Scanning of Yahoo Emails on WHDT World News[Shawn Tuma]
- October 27, 2016 - Shawn Tuma Discusses IoT DDoS Attack Against Dyn on WHDT World News[Shawn Tuma]
- October 30, 2016 - Yes, Officers & Directors Can Be Held Personally Liable for Their Company’s Data Breach – Here’s Why[Shawn Tuma]
- November 18, 2016 - Eye Opener Morning Show Guest Shawn Tuma Discusses Adult Friend Finder Data Breach[Shawn Tuma]
- November 21, 2016 - Holiday Shopping Cybersecurity Tips on WFAA TV Interviewing Shawn Tuma[Shawn Tuma]
- November 29, 2016 - Complimentary SecureWorld Webinar – 2016 Breaches: Lessons Learned[Shawn Tuma]
- December 7, 2016 - What do holiday charities, school weather closings, social media and ransomware have in common?[Shawn Tuma]
- December 10, 2016 - Cybersecurity: First World Problems or Existential Threat[Shawn Tuma]
- December 23, 2016 - New York Cybersecurity Regulations Delayed, Being Revised[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- January 18, 2017 - How to Protect Yourself from Cell Phone Cyber Threats (WFAA TV Interview)[Shawn Tuma]
- January 23, 2017 - Improving Your Cybersecurity Plan, Explained by Paul Ferrillo in WSJ[Shawn Tuma]
- January 28, 2017 - Happy Data Privacy Day![Shawn Tuma]
- January 28, 2017 - Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day![Shawn Tuma]
- February 2, 2017 - 3 Critical Cybersecurity Steps Your Company Must Take[Shawn Tuma]
- February 6, 2017 - David Beckham’s Exposed Emails Exemplify Shame Hacking Threat[Shawn Tuma]
- March 7, 2017 - “Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?[Shawn Tuma]
- March 10, 2017 - WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?[Shawn Tuma]
- March 11, 2017 - Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing[Shawn Tuma]
- March 13, 2017 - WikiLeaks’ Vault7 CIA Hacking Tools Release Conundrum: The Politicization of Intelligence[Shawn Tuma]
- March 14, 2017 - WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7[Shawn Tuma]
- March 17, 2017 - The Ubiquity of Cyber[Shawn Tuma]
- March 17, 2017 - Are Smaller Healthcare Practices Required to Report a #Ransomware or Potential Data Breach?[Shawn Tuma]
- March 23, 2017 - Quiz: How much do you know about cybersecurity?[Shawn Tuma]
- March 27, 2017 - Implications of DOJ Indictment of Russian & Canadian Hackers for Yahoo Breach?[Shawn Tuma]
- April 1, 2017 - April Fools’ Meme Illustrates Privacy Difference Between Opt-In and Opt-Out[Shawn Tuma]
- May 18, 2017 - #CyberAvengers – Ransomware is Spreading Like Worms: Are You Ready?[Shawn Tuma]
- May 19, 2017 - CGTN America interviews Shawn Tuma about #WannaCry #ransomware attacks[Shawn Tuma]
- June 13, 2017 - New Hacking Technique Revealed, Viruses in Online Video Subtitles[Seth Tuma]
- June 14, 2017 - #CyberAvengers: Fixing the Federal IT Mess Before it is Too Late[Shawn Tuma]
- June 16, 2017 - #CyberAvengers: Ransomware Spreading Like Crazy Worms[Shawn Tuma]
- June 27, 2017 - #CyberAvengers: 9 Ways to Declare Independence from Hacking[Shawn Tuma]
- July 13, 2017 - #CyberAvengers: Cyber Hygiene and Government–Industry Cooperation for Better Cybersecurity[Shawn Tuma]
- August 6, 2017 - Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data[Shawn Tuma]
- August 7, 2017 - FUD and Voting Machine Hacking: An Important Point and Important Lesson[Shawn Tuma]
- September 21, 2017 - #CyberAvengers: Tips for responding to #cyberattacks and lessons on #cybersecurity survival[Shawn Tuma]
- September 22, 2017 - Does blasting the SEC for failing to act on warnings help cybersecurity?[Shawn Tuma]
- October 12, 2017 - Third-Party Risk in Cybersecurity Exemplified by North Korea’s Stealing of US War Plans[Shawn Tuma]
- October 13, 2017 - Cybersecurity Is a Human Nature Problem[Shawn Tuma]
- October 13, 2017 - Hacked F-35 Fighter Info from Australian Contractor Exemplifies Third-Party Risk in Cybersecurity[Shawn Tuma]
- October 17, 2017 - Checklist for Good Cyber Hygiene[Shawn Tuma]
- October 24, 2017 - What do we in the United States really want from our cyber laws?[Shawn Tuma]
- October 25, 2017 - The #CyberAvengers Playbook (free download)[Shawn Tuma]
- October 26, 2017 - #CyberAvengers: A National Cybersecurity Action Plan is a Serious Priority[Shawn Tuma]
- October 27, 2017 - 3 Legal Points for InfoSec Teams to Consider Before an Incident[Shawn Tuma]
- October 29, 2017 - Lost Unencrypted USB of Heathrow Airport Security Files Exemplifies Poor Cyber Hygiene[Shawn Tuma]
- November 10, 2017 - Facebook Requesting Your Nudies to Combat Revenge Porn – My Comments on TV[Shawn Tuma]
- November 27, 2017 - Tips for Staying #CyberSecure While Shopping Online for #BlackFriday and #CyberMonday Deals[Shawn Tuma]
- December 5, 2017 - Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies[Shawn Tuma]
- December 14, 2017 - The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years![Shawn Tuma]
- January 4, 2018 - Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?[Shawn Tuma]
- January 28, 2018 - Happy Data Privacy Day![Shawn Tuma]
- February 3, 2018 - House panel to DHS, FBI: help small biz with cybersecurity – start with good cyber hygiene[Shawn Tuma]
- March 23, 2018 - Can your company do business without its computer system? Let’s ask Atlanta![Shawn Tuma]
- March 27, 2018 - Data is the hot potato![Shawn Tuma]
- June 1, 2018 - Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom[Shawn Tuma]
- July 16, 2018 - Did hackers record you watching porn? New scam using key elements of phishing and shame hacking[Shawn Tuma]
- October 6, 2018 - “Hacked” Facebook Account — or Cloned?[Shawn Tuma]
- October 16, 2018 - Key Lesson All Business Leaders Can Learn From the Anthem Data Breach Case[Shawn Tuma]
- October 31, 2018 - Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)[Shawn Tuma]
- January 30, 2019 - Protect Your Company Against W-2 Business Email Compromise Attacks During Tax Season[Shawn Tuma]
- February 1, 2019 - The Most Important Lesson You Are Not Hearing About Apple’s iOS FaceTime Glitch[Shawn Tuma]
- February 11, 2019 - Cyberbullying of Children is a Heartbreaking Problem that Parents Have a Role in Preventing[Shawn Tuma]
- April 2, 2019 - ***URGENT*** MEMO TO: “THE IT GUY” RE: #RANSOMWARE / WIPING DATA[Shawn Tuma]
- August 19, 2019 - Was the ransomware attack on 20+ Texas local governments an attack on a single service provider? [UPDATE: YES!][Shawn Tuma]
- December 31, 2019 - 2 Decades Later: Cyber Risk Isn’t Y2K–It Is An Unsolved Risk That You Must Take Seriously[Shawn Tuma]
- January 7, 2020 - Is #ShameHacking Coming Next? Hackers Breach Search Engine for Japanese Sex Hotels[Shawn Tuma]
- March 9, 2020 - Is ransomware the coronavirus of the cyber world?[Shawn Tuma]
- April 3, 2020 - Understanding the Cyber and Privacy Risks of Zoom and Tips For Using It More Securely[Shawn Tuma]
- April 15, 2020 - Attend Tuma’s Upcoming Webinar: Understanding How Cyber Insurance Impacts Your Incident Response Planning[Shawn Tuma]
- April 30, 2020 - Two Cyber Insurance Issues Service Providers Should Discuss with Their Clients[Shawn Tuma]
- May 22, 2020 - Cybersecurity Legal Issues in the Heart of the Covid-19 Pandemic[Shawn Tuma]
- June 3, 2020 - Ransomware is the single greatest risk your company faces – here’s why[Shawn Tuma]
- June 9, 2020 - Think your company’s IT is too sophisticated to be hit with a ransomware attack? Think again.[Shawn Tuma]
- June 17, 2020 - Think Your Company is Too Pretty To Be Hit With A Ransomware Attack? Think Again.[Shawn Tuma]
- July 14, 2020 - With ransomware attacks increasing, cyber insurance now seen as a necessity, not a luxury (publication)[Shawn Tuma]
- July 15, 2020 - What Can Happen if You Do Not Notify Following a Data Breach?[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- November 17, 2020 - Free Virtual Event: Reimagine Your Company Operating Again After a Ransomware Attack (DBU Tech Symposium)[Shawn Tuma]
- November 25, 2020 - The Home Depot / State Attorneys General Settlement – My 1st and 2nd Thoughts[Shawn Tuma]
- November 28, 2020 - 1 More Reason Why Your Company Faces Awful Ransomware Odds[Shawn Tuma]
- December 3, 2020 - Think your company is too sophisticated to be hit with a ransomware attack? Ask Advantech …[Shawn Tuma]
- December 9, 2020 - 2 Critical Cyber Insurance Issues All Companies Must Consider Now, Before an Incident![Shawn Tuma]
- December 9, 2020 - Think your company is too sophisticated to be hit with a successful cyber attack? Ask FireEye …[Shawn Tuma]
- December 10, 2020 - ***URGENT*** MEMO TO: “The IT Guy” RE: Securing RDP Access–Changing the RDP Port Does Not Work![Shawn Tuma]
- December 15, 2020 - We need more humility in cybersecurity[Shawn Tuma]
- December 17, 2020 - Working From Home During COVID-19? Five Things You Should be Doing–But Probably Are Not–To Be More Cyber Secure (publication)[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 23, 2021 - Nearly half of all businesses hit by cyber attacks in 2020 — 3 steps to help prepare your business[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- May 4, 2021 - Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle[Shawn Tuma]
- June 4, 2021 - Ransomware Attacks! The 5 Best Practices the White House Urges all Businesses to Take to Mitigate Them[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- June 21, 2021 - Ransomware Payments May Be Tax-Deductible[Shawn Tuma]
- July 8, 2021 - Shawn Tuma Discusses Kaseya Ransomware Attack[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 14, 2021 - Ransomware! What is it and how do you better protect against it?[Shawn Tuma]
- July 15, 2021 - Shawn Tuma Discusses The Rise of Cybersecurity Problems on KLIF Morning News[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- October 8, 2021 - The INSIDERS Podcast – Cybersecurity with Shawn Tuma[Shawn Tuma]
- October 8, 2021 - Facebook Outage: Shawn Tuma’s WFAA Interview from the deck at #NetDiligence[Shawn Tuma]
- January 13, 2022 - Ransomware Attack Forces Company Into Bankruptcy[Shawn Tuma]
- February 25, 2022 - Increased Ransomware Threat in Wake of Russia Invasion of Ukraine — Shawn Tuma Discusses[Shawn Tuma]
- March 1, 2022 - Why does cyber warfare involving Russia and Ukraine increase the risk of cyberattacks against your business?[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- April 21, 2022 - Is This the Next Evolution of Cyber Risk Governance? The SEC Is About To Force CISOs Into America’s Boardrooms[Shawn Tuma]
- October 28, 2022 - “Data is the hot potato!” and data minimization lessons from the FTC’s Drizly case[Shawn Tuma]
- November 8, 2022 - “Data is the hot potato!” — some data governance lessons from the Twitter Whistleblower Testimony[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 17, 2023 - FBI, CISA, MS-ISAC Joint Cybersecurity Advisory – #StopRansomware: LockBit 3.0[Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- January 26, 2017 - ALERT: Prepare Your Company for the Season of W-2 Email Scams[Shawn Tuma]
- February 24, 2017 - Business Email Compromise Explained in Less than 4 Minutes (Video)[Shawn Tuma]
- March 12, 2017 - Good Article on Cybersecurity Basics[Shawn Tuma]
- March 14, 2017 - WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7[Shawn Tuma]
- March 17, 2017 - Are Smaller Healthcare Practices Required to Report a #Ransomware or Potential Data Breach?[Shawn Tuma]
- March 23, 2017 - Quiz: How much do you know about cybersecurity?[Shawn Tuma]
- March 27, 2017 - Implications of DOJ Indictment of Russian & Canadian Hackers for Yahoo Breach?[Shawn Tuma]
- June 13, 2017 - New Hacking Technique Revealed, Viruses in Online Video Subtitles[Seth Tuma]
- June 14, 2017 - #CyberAvengers: Fixing the Federal IT Mess Before it is Too Late[Shawn Tuma]
- June 16, 2017 - #CyberAvengers: Ransomware Spreading Like Crazy Worms[Shawn Tuma]
- June 27, 2017 - #CyberAvengers: 9 Ways to Declare Independence from Hacking[Shawn Tuma]
- July 13, 2017 - #CyberAvengers: Cyber Hygiene and Government–Industry Cooperation for Better Cybersecurity[Shawn Tuma]
- September 22, 2017 - Does blasting the SEC for failing to act on warnings help cybersecurity?[Shawn Tuma]
- October 17, 2017 - Checklist for Good Cyber Hygiene[Shawn Tuma]
- October 24, 2017 - What do we in the United States really want from our cyber laws?[Shawn Tuma]
- October 27, 2017 - 3 Legal Points for InfoSec Teams to Consider Before an Incident[Shawn Tuma]
- October 29, 2017 - Lost Unencrypted USB of Heathrow Airport Security Files Exemplifies Poor Cyber Hygiene[Shawn Tuma]
- November 10, 2017 - Facebook Requesting Your Nudies to Combat Revenge Porn – My Comments on TV[Shawn Tuma]
- November 27, 2017 - Tips for Staying #CyberSecure While Shopping Online for #BlackFriday and #CyberMonday Deals[Shawn Tuma]
- December 5, 2017 - Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies[Shawn Tuma]
- December 14, 2017 - The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years![Shawn Tuma]
- January 4, 2018 - Y2K18? Are #Spectre and #Meltdown the Y2K Apocalypse, Eighteen Years Late?[Shawn Tuma]
- January 24, 2018 - Allscripts EHR Ransomware Attack is Huge–How Will it Impact Healthcare Practices?[Shawn Tuma]
- January 26, 2018 - Helpful FTC Guidance on Cybersecurity for Small and Midsize Companies[Shawn Tuma]
- January 28, 2018 - Happy Data Privacy Day![Shawn Tuma]
- February 3, 2018 - House panel to DHS, FBI: help small biz with cybersecurity – start with good cyber hygiene[Shawn Tuma]
- March 19, 2018 - Do data breaches have consequences? Will Equifax CIO serve jail time for insider trading?[Shawn Tuma]
- March 23, 2018 - Can your company do business without its computer system? Let’s ask Atlanta![Shawn Tuma]
- March 27, 2018 - Data is the hot potato![Shawn Tuma]
- April 16, 2018 - Cyber Risk Management and Attorney-Client Privilege in Cybersecurity Discussed on Business Security Weekly[Shawn Tuma]
- June 1, 2018 - Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom[Shawn Tuma]
- July 16, 2018 - Did hackers record you watching porn? New scam using key elements of phishing and shame hacking[Shawn Tuma]
- September 21, 2018 - 5 Key Things In-House Counsel Can Do to Help Their Businesses’ Cybersecurity[Shawn Tuma]
- October 6, 2018 - “Hacked” Facebook Account — or Cloned?[Shawn Tuma]
- October 15, 2018 - Trump and Kanye West Bring Emphasis to #CyberAware Cybersecurity Awareness Month With Password Example[Shawn Tuma]
- October 16, 2018 - Key Lesson All Business Leaders Can Learn From the Anthem Data Breach Case[Shawn Tuma]
- January 30, 2019 - Protect Your Company Against W-2 Business Email Compromise Attacks During Tax Season[Shawn Tuma]
- February 1, 2019 - The Most Important Lesson You Are Not Hearing About Apple’s iOS FaceTime Glitch[Shawn Tuma]
- April 2, 2019 - ***URGENT*** MEMO TO: “THE IT GUY” RE: #RANSOMWARE / WIPING DATA[Shawn Tuma]
- September 14, 2019 - Sharing the Load: What are Chief Privacy Officers, Chief Information Security Officers, and General Counsel Doing in Real Life to Divide Up Roles and Responsibilities? (conference panel discussion)[Shawn Tuma]
- December 17, 2019 - Ransomware + Publicize Victim Companies + Expose Stolen Data = Bad Cyber Extortion Trifecta[Shawn Tuma]
- January 7, 2020 - Is #ShameHacking Coming Next? Hackers Breach Search Engine for Japanese Sex Hotels[Shawn Tuma]
- February 29, 2020 - Healthcare Providers – Are You Prepared for Hackers to Tell Your Patients About Your Ransomware and Data Breach?[Shawn Tuma]
- March 9, 2020 - Is ransomware the coronavirus of the cyber world?[Shawn Tuma]
- March 15, 2020 - How will the #COVID19 #coronavirus #coronapocolypse impact the future of how we do life?[Shawn Tuma]
- April 15, 2020 - Attend Tuma’s Upcoming Webinar: Understanding How Cyber Insurance Impacts Your Incident Response Planning[Shawn Tuma]
- April 30, 2020 - Two Cyber Insurance Issues Service Providers Should Discuss with Their Clients[Shawn Tuma]
- May 22, 2020 - Cybersecurity Legal Issues in the Heart of the Covid-19 Pandemic[Shawn Tuma]
- June 3, 2020 - Ransomware is the single greatest risk your company faces – here’s why[Shawn Tuma]
- June 9, 2020 - Think your company’s IT is too sophisticated to be hit with a ransomware attack? Think again.[Shawn Tuma]
- July 14, 2020 - With ransomware attacks increasing, cyber insurance now seen as a necessity, not a luxury (publication)[Shawn Tuma]
- July 29, 2020 - Why did Lifespan Health face such a stiff HIPAA penalty for a stolen laptop? (publication)[Shawn Tuma]
- November 3, 2020 - Podcast: Unboxing a phishing email from the World Health Organization with Shawn Tuma[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- November 17, 2020 - Free Virtual Event: Reimagine Your Company Operating Again After a Ransomware Attack (DBU Tech Symposium)[Shawn Tuma]
- November 18, 2020 - ASPR Warns Ransomware Threat is Persistent, as Actors Leak More Data[Shawn Tuma]
- November 25, 2020 - The Home Depot / State Attorneys General Settlement – My 1st and 2nd Thoughts[Shawn Tuma]
- November 28, 2020 - 1 More Reason Why Your Company Faces Awful Ransomware Odds[Shawn Tuma]
- December 3, 2020 - Think your company is too sophisticated to be hit with a ransomware attack? Ask Advantech …[Shawn Tuma]
- December 4, 2020 - Simple Mistakes – Not Always “The Hackers” – Can Cause Substantial Data Breaches[Shawn Tuma]
- December 9, 2020 - 2 Critical Cyber Insurance Issues All Companies Must Consider Now, Before an Incident![Shawn Tuma]
- December 9, 2020 - Think your company is too sophisticated to be hit with a successful cyber attack? Ask FireEye …[Shawn Tuma]
- December 10, 2020 - ***URGENT*** MEMO TO: “The IT Guy” RE: Securing RDP Access–Changing the RDP Port Does Not Work![Shawn Tuma]
- December 15, 2020 - We need more humility in cybersecurity[Shawn Tuma]
- December 17, 2020 - Working From Home During COVID-19? Five Things You Should be Doing–But Probably Are Not–To Be More Cyber Secure (publication)[Shawn Tuma]
- December 20, 2020 - Shawn Tuma Included in “Raise the Cybersecurity Curtain – Cybersecurity Leaders Quotes”[Shawn Tuma]
- January 13, 2021 - A Shot Below the Belt: Hacker Seizes Control of Internet-Enabled Chastity Cages, Demands Ransom[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 23, 2021 - Nearly half of all businesses hit by cyber attacks in 2020 — 3 steps to help prepare your business[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- May 4, 2021 - Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle[Shawn Tuma]
- May 17, 2021 - Shawn Tuma Guest on Burress Law, Life & Friends Podcast[Shawn Tuma]
- June 4, 2021 - Ransomware Attacks! The 5 Best Practices the White House Urges all Businesses to Take to Mitigate Them[Shawn Tuma]
- June 10, 2021 - MFA Could Have Prevented the Ransomware Attack on Colonial Pipeline, According to its CEO[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- June 21, 2021 - Ransomware Payments May Be Tax-Deductible[Shawn Tuma]
- July 2, 2021 - URGENT – Kaseya MSP Management Software Used to Drop Ransomware Encryptor[Shawn Tuma]
- July 8, 2021 - Shawn Tuma Discusses Kaseya Ransomware Attack[Shawn Tuma]
- July 9, 2021 - Kaseya Ransomware Attack – Yet Another Lesson in Humility and the Need for Resilience Preparation[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 14, 2021 - Ransomware! What is it and how do you better protect against it?[Shawn Tuma]
- July 15, 2021 - Shawn Tuma Discusses The Rise of Cybersecurity Problems on KLIF Morning News[Shawn Tuma]
- July 20, 2021 - StopRansomware.gov – the U.S. Government’s One-Stop Resource for Ransomware[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- October 8, 2021 - The INSIDERS Podcast – Cybersecurity with Shawn Tuma[Shawn Tuma]
- October 8, 2021 - Facebook Outage: Shawn Tuma’s WFAA Interview from the deck at #NetDiligence[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- January 13, 2022 - Ransomware Attack Forces Company Into Bankruptcy[Shawn Tuma]
- February 25, 2022 - Increased Ransomware Threat in Wake of Russia Invasion of Ukraine — Shawn Tuma Discusses[Shawn Tuma]
- March 1, 2022 - Why does cyber warfare involving Russia and Ukraine increase the risk of cyberattacks against your business?[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- April 21, 2022 - Is This the Next Evolution of Cyber Risk Governance? The SEC Is About To Force CISOs Into America’s Boardrooms[Shawn Tuma]
- October 26, 2022 - OCR Guidance on HIPAA Security Rule Security Incident Procedures for National Cybersecurity Awareness Month[Shawn Tuma]
- October 28, 2022 - “Data is the hot potato!” and data minimization lessons from the FTC’s Drizly case[Shawn Tuma]
- November 1, 2022 - OCR Releases Video Guidance on Recognized Security Practices for National Cybersecurity Awareness Month[Shawn Tuma]
- November 8, 2022 - “Data is the hot potato!” — some data governance lessons from the Twitter Whistleblower Testimony[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- December 15, 2022 - Dental Practice Responses to Online Reviews Cost $23,000 Settlement with OCR for Impermissible Disclosure of PHI[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- January 26, 2023 - Shareholders Can Sue Corporate Officers for Breach of Duty of Oversight in landmark Ruling — CISOs and CPOs, You Listening?[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 10, 2023 - The White House Cybersecurity Plan – the Devil is in the Details[Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 17, 2023 - FBI, CISA, MS-ISAC Joint Cybersecurity Advisory – #StopRansomware: LockBit 3.0[Shawn Tuma]
- March 20, 2023 - HHS Releases HPH Sector Cybersecurity Framework Implementation Guide to Help Healthcare Organizations Leverage NIST Cybersecurity Framework[Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- June 8, 2011 - Personal Data Privacy and Security Act of 2011[Shawn Tuma]
- June 25, 2011 - Privacy and Cyber Legislation Pending in the 112th Congress[Shawn Tuma]
- March 10, 2013 - Courts Showing Greater Respect for Data Privacy – United States v. Cotterman[Shawn Tuma]
- March 11, 2013 - Podcast Discussing Data Privacy and Information Security Implications of United States v. Cotterman – Now Available![Shawn Tuma]
- March 15, 2013 - Law360 article quotes Shawn Tuma on data privacy significance of U.S. v. Cotterman[Shawn Tuma]
- February 19, 2014 - Is Your Business Following the 3 Steps the FTC is Requiring for Using Data Service Providers?[Shawn Tuma]
- February 20, 2014 - Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach[Shawn Tuma]
- March 12, 2014 - A Hacker Can Takeover A Car Through Its Computer System — What About An Airplane?[Shawn Tuma]
- March 27, 2014 - 3 Important Questions Your Company Must Answer After A Data Breach[Shawn Tuma]
- March 28, 2014 - What did Sun Tzu teach about cybersecurity?[Shawn Tuma]
- March 29, 2014 - The Legal Side of Data Breach and Third Party Risk (presentation slides)[Shawn Tuma]
- April 15, 2014 - Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu[Shawn Tuma]
- April 28, 2014 - Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???[Shawn Tuma]
- May 3, 2014 - Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF[Shawn Tuma]
- May 5, 2014 - The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation[Shawn Tuma]
- May 7, 2014 - Why do cyber criminals want your healthcare data?[Shawn Tuma]
- May 8, 2014 - Two Step Data Breach Risk Test for Texas Businesses[Shawn Tuma]
- May 28, 2014 - 3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach[Shawn Tuma]
- August 31, 2014 - Yes, an Employee Really Can Steal Your Data and Then SLAPP You for It?[Shawn Tuma]
- September 11, 2014 - Does Data Security Have Your Healthcare Practice “On the Hook”?[Shawn Tuma]
- September 22, 2014 - 3 Steps the C-Suite Can Take to Strengthen Cyber Security[Shawn Tuma]
- September 22, 2014 - Data Breach Judgment: Will Home Depot Be the One to “Get It”?[Shawn Tuma]
- September 25, 2014 - Uncle Sam doesn’t have a clue on data privacy, cyber crime laws, and neither do we![Shawn Tuma]
- October 7, 2014 - FBI Director Talks Cyber Espionage: Chinese Like “Drunk Burglar”[Shawn Tuma]
- October 13, 2014 - “Defense wins championships” when preparing for the inevitable data breach[Shawn Tuma]
- October 15, 2014 - Yes, I will mention this post in tomorrow’s seminar on data breach! “Who’s Gonna Get It?”[Shawn Tuma]
- October 31, 2014 - Excellent info from Travelers: Company Data Security Policy & Standards[Shawn Tuma]
- November 14, 2014 - After this judge’s ruling, do you finally see value in passwords? | CSO Online[Shawn Tuma]
- December 3, 2014 - Check out my first post on Norse’s DarkMatters > Sony Hack: Where Do We Die First?[Shawn Tuma]
- December 14, 2014 - #SonyHack shows there are no “safe secrets” in the corporate world – what do you do?[Shawn Tuma]
- December 15, 2014 - DarkMatters: The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks[Shawn Tuma]
- December 30, 2014 - Boards Had Better Start Paying Attention to Cybersecurity[Shawn Tuma]
- January 6, 2015 - Three Takeaways from the Target Data Breach Ruling – Norse DarkMatters[Shawn Tuma]
- January 18, 2015 - Update/Clarification: Washington AG Seeks Data Breach Law That Ends Blanket Exemption for Encrypted Data[Shawn Tuma]
- January 28, 2015 - Happy Data Privacy Day![Shawn Tuma]
- January 30, 2015 - 7 Ideas for Security Leaders – What Do You Think About My Suggestion?[Shawn Tuma]
- February 4, 2015 - Will Changes to the CFAA Deter Hackers? | Norse DarkMatters[Shawn Tuma]
- February 5, 2015 - Executives & Board: The conversation security leaders need to have about Amy Pascal’s departure[Shawn Tuma]
- February 14, 2015 - Business Guide: Identifying and Protecting Trade Secrets Under the Texas Uniform Trade Secrets Act[Shawn Tuma]
- February 17, 2015 - New Podcast: #DtSR Episode 130 – Where Law and Cyber Collide[Shawn Tuma]
- February 21, 2015 - Low Hanging Fruit Can Make a Pretty Good Cybersecurity Pie[Shawn Tuma]
- March 5, 2015 - Practical ways your company’s contracts can help improve its cybersecurity odds[Shawn Tuma]
- March 10, 2015 - Private Investigators, You Are Not Immune From the Computer Hacking Laws[Shawn Tuma]
- March 14, 2015 - Cyber Law is (the new) Practical Business Law[Shawn Tuma]
- March 27, 2015 - A Few Thoughts on the Consumer Litigation Settlement in the Target Data Breach Case[Shawn Tuma]
- March 31, 2015 - Useful Info on Cyber Security Definitions for Common Jargon & Acronyms[Shawn Tuma]
- April 30, 2015 - Why Hackers Love Companies Who Use Social Media – The Point[Shawn Tuma]
- May 1, 2015 - Will Officers & Directors Be Held Legally Responsible for Companies’ Data Breaches and Cybersecurity Incidents?[Shawn Tuma]
- May 11, 2015 - Cybersecurity Keynote Address at International Association of Insurance Professionals Event[Shawn Tuma]
- May 13, 2015 - Cybersecurity is a Top Concern for Corporate General Counsel[Shawn Tuma]
- May 14, 2015 - Cybersecurity Presentation at ACFE 25th Annual DFW Fraud Conference[Shawn Tuma]
- May 14, 2015 - Bleak Cybersecurity Future: Data Breaches on Track to Cost Companies $2.1 Trillion[Shawn Tuma]
- May 15, 2015 - Speaking on Cybersecurity Law, Risk & Compliance at Collin County Bench Bar Conference in Austin! #CCBBF[Shawn Tuma]
- May 19, 2015 - Cybersecurity Risk: Law and Trends – Ethical Boardroom Article[Shawn Tuma]
- May 21, 2015 - FTC Gives Good Reason to Not (Try to) Hide Data Breaches[Shawn Tuma]
- May 26, 2015 - “This is not a security breach.” Really? IRS hit by cyberattack, thousands of taxpayers’ information stolen[Shawn Tuma]
- May 29, 2015 - What is ‘cybersecurity law’? Orin Kerr’s 4 Categories[Shawn Tuma]
- June 29, 2015 - Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water[Shawn Tuma]
- August 3, 2015 - Why Your Company Needs a Breach Response Plan: Key Decisions You Must Make Following A Data Breach[Shawn Tuma]
- August 6, 2015 - Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)[Shawn Tuma]
- August 12, 2015 - Rocky Dhir Interviews Shawn Tuma About Cybersecurity for Lawyers at State Bar of Texas 2015 Annual Meeting[Shawn Tuma]
- November 19, 2015 - Is your business prepared to respond this quickly to a data breach?[Shawn Tuma]
- November 20, 2015 - Cover the Basics for Securing Your Network — Shawn Tuma’s Book Contribution[Shawn Tuma]
- November 24, 2015 - Texas Super Lawyers Honors Shawn Tuma[Shawn Tuma]
- November 27, 2015 - FTC v. LabMD: I always give ’em a fair trial before I hang ’em.[Shawn Tuma]
- December 8, 2015 - CISA: Same Old Issues, Different Day? [Shawn Tuma]
- December 8, 2015 - SecureWorld Webinar: Data Protection Pitfalls to Avoid[Shawn Tuma]
- December 13, 2015 - What Do Cybersecurity, Brown M&M’s & Credit Ratings Have in Common?[Shawn Tuma]
- December 19, 2015 - Dear Santa: Shawn Tuma’s Cybersecurity Christmas Wish[Shawn Tuma]
- January 13, 2016 - Cybersecurity Legal Year in Review – #DtSR Podcast[Shawn Tuma]
- January 16, 2016 - Learning From the Sony Hack: Where Do We Die First?[Shawn Tuma]
- January 28, 2016 - What is Data Privacy Day and How are You Observing It?[Shawn Tuma]
- February 5, 2016 - Managing Cybersecurity Risks for Boards of Directors[Shawn Tuma]
- February 10, 2016 - EU – U.S. Privacy Shield Summary & Fact Sheet for Businesses[Shawn Tuma]
- February 13, 2016 - The #1 Reason NIST Cybersecurity Framework is Becoming the Standard[Shawn Tuma]
- February 18, 2016 - The #1 Current Cybersecurity Threat to Business in DFW (2/18/16)[Shawn Tuma]
- February 22, 2016 - UPDATE (FBI admits): #AppleVsFBI – Just 1 iPhone? In 1977 it was Just 1 Pen Register[Shawn Tuma]
- February 23, 2016 - Making Sense of #AppleVsFBI Issues: #DtSR Podcast[Shawn Tuma]
- February 24, 2016 - The “Legal” Reason the FBI’s Password Blunder Could Kill its Case in #AppleVsFBI[Shawn Tuma]
- February 25, 2016 - Apple’s Legal Response in Less Than 300 Words #AppleVsFBI[Shawn Tuma]
- March 18, 2016 - Why Cybersecurity Incidents Are Legal Events[Shawn Tuma]
- April 1, 2016 - FBI Guidance: How to Respond to Ransomware[Shawn Tuma]
- April 14, 2016 - Law Firm Cybersecurity: I Hate to Say I Told You So But …[Shawn Tuma]
- April 25, 2016 - 1 Step to Improve Your Company’s Cybersecurity Today[Shawn Tuma]
- April 26, 2016 - How a Small Law Firm was Used for an Extensive Cyberattack[Shawn Tuma]
- April 27, 2016 - Start with Cybersecurity Basics: Confirmed by Verizon’s 2016 Data Breach Report[Shawn Tuma]
- April 28, 2016 - 3 Important Points on Computer Use Policies[Shawn Tuma]
- April 29, 2016 - The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks[Shawn Tuma]
- May 4, 2016 - Can a Company Remotely Wipe an Ex-Employee’s Device?[Shawn Tuma]
- May 5, 2016 - An ounce of cybersecurity prevention …[Shawn Tuma]
- May 6, 2016 - Three Takeaways from the Target Data Breach Ruling[Shawn Tuma]
- May 7, 2016 - Legal’s role is to protect companies from their data[Shawn Tuma]
- May 9, 2016 - Four Security Issues All Business Contracts Should Address[Shawn Tuma]
- May 13, 2016 - Will Changes to the CFAA Deter Hackers?[Shawn Tuma]
- May 18, 2016 - Cyber Law Update on #DtSR Podcast with Los, Santarcangelo and Tuma[Shawn Tuma]
- May 19, 2016 - Computer Use Policies – Are Your Company’s Illegal According to the NLRB?[Shawn Tuma]
- June 30, 2016 - D CEO Magazine: Why Cybercriminals Are Targeting Law Firms[Shawn Tuma]
- July 1, 2016 - Cybersecurity: How Long Should An Incident Response Plan Be?[Shawn Tuma]
- August 9, 2016 - Shawn Tuma discusses how elections could be hacked on WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- August 12, 2016 - Cybersecurity Thought for Today: Good vs Great?[Shawn Tuma]
- September 7, 2016 - Brazzers porn hack: more than just account holders exposed–what does this mean for your company?[Shawn Tuma]
- September 8, 2016 - Cybersecurity Incident Response Checklist[Shawn Tuma]
- September 10, 2016 - Tarleton State University Cybersecurity Summit 2016 (9/13/16)[Shawn Tuma]
- September 14, 2016 - Cybersecurity Legal Issues: What you really need to know (slides)[Shawn Tuma]
- September 16, 2016 - You Could See This One Coming: Vibrator Company Sued for Tracking Usage[Shawn Tuma]
- September 23, 2016 - Yahoo Data Breach – Some Facts & Questions (i.e., was it really the Russians?)[Shawn Tuma]
- September 25, 2016 - Data Breach Litigation: Who’s Gonna Get It? Will it be Yahoo! (or Verizon)?[Shawn Tuma]
- September 27, 2016 - Yahoo Data Breach: US Senators Demand Answers – Still Think You Don’t Have to Disclose and Notify?[Shawn Tuma]
- September 27, 2016 - SecureWorld Presentation: Cybersecurity Legal Issues: What You Really Need to Know[Shawn Tuma]
- September 29, 2016 - Cybersecurity Lessons Learned from SecureWorld #SWDAL16 Conference[Shawn Tuma]
- October 10, 2016 - Video: Cybersecurity Legal Issues – What you really need to know (Shawn Tuma)[Shawn Tuma]
- October 24, 2016 - Dyn, Krebs, and Mirai Botnet – the IoT Pandora’s Box is Open, Now What?[Shawn Tuma]
- October 25, 2016 - Shawn Tuma Discusses Government Scanning of Yahoo Emails on WHDT World News[Shawn Tuma]
- November 11, 2016 - 7 Strategies To Win the Cyber “Space Race” – Cybersecurity Policy Ideas for Trump Administration[Shawn Tuma]
- November 29, 2016 - Complimentary SecureWorld Webinar – 2016 Breaches: Lessons Learned[Shawn Tuma]
- December 18, 2016 - Ashley Madison & FTC Settle Data Breach Case – Does Your Company Have These Cybersecurity Shortcomings?[Shawn Tuma]
- December 23, 2016 - New York Cybersecurity Regulations Delayed, Being Revised[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- January 20, 2017 - Trying to DDoS the White House Website to Protest Trump’s Inauguration Violates CFAA[Shawn Tuma]
- January 23, 2017 - Improving Your Cybersecurity Plan, Explained by Paul Ferrillo in WSJ[Shawn Tuma]
- January 28, 2017 - Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day![Shawn Tuma]
- February 2, 2017 - 3 Critical Cybersecurity Steps Your Company Must Take[Shawn Tuma]
- February 6, 2017 - David Beckham’s Exposed Emails Exemplify Shame Hacking Threat[Shawn Tuma]
- March 7, 2017 - “Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?[Shawn Tuma]
- March 11, 2017 - Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing[Shawn Tuma]
- March 13, 2017 - WikiLeaks’ Vault7 CIA Hacking Tools Release Conundrum: The Politicization of Intelligence[Shawn Tuma]
- March 14, 2017 - WHDT World News Interviews Shawn Tuma about WikiLeaks’ CIA Vault7[Shawn Tuma]
- March 15, 2017 - Critical Steps Companies Must Take to Comply with New York’s Cybersecurity Rules – Ethical Boardroom[Shawn Tuma]
- March 17, 2017 - Are Smaller Healthcare Practices Required to Report a #Ransomware or Potential Data Breach?[Shawn Tuma]
- March 19, 2017 - 5 Key Takeaways from Verizon’s GC on Lessons Learned from Yahoo Deal[Shawn Tuma]
- March 25, 2017 - “Is the CIA spying on me?” “What do I do?” (radio interviews)[Shawn Tuma]
- March 27, 2017 - Implications of DOJ Indictment of Russian & Canadian Hackers for Yahoo Breach?[Shawn Tuma]
- March 30, 2017 - #DtSR Podcast: Latest Issues in Law and Cybersecurity[Shawn Tuma]
- April 13, 2017 - #DtSR Podcast: Guest Host on Newscast[Shawn Tuma]
- April 13, 2017 - 3 More Key Cybersecurity Takeaways General Counsel Should Learn Learn from Yahoo[Shawn Tuma]
- April 23, 2017 - Does Board Oversight of Cybersecurity Mean Directors Must Become Cybersecurity Experts?[Shawn Tuma]
- May 15, 2017 - Webinar: Global reaching Cybersecurity Regulations in New York, will they impact your company?[Shawn Tuma]
- May 18, 2017 - #CyberAvengers – Ransomware is Spreading Like Worms: Are You Ready?[Shawn Tuma]
- June 10, 2017 - OCR Issues Cyberattack Response Checklist and Infographic[Shawn Tuma]
- June 23, 2017 - Kevin OKeefe and Shawn Tuma’s Conversation About Lawyers and Blogging at #SBOT17[Shawn Tuma]
- June 29, 2017 - #cybersecurity is not an just an IT issue, it is a business risk issue[Shawn Tuma]
- August 6, 2017 - Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data[Shawn Tuma]
- August 10, 2017 - IoT Cybersecurity Improvement Act of 2017 proposed by Senate Cybersecurity Caucus[Shawn Tuma]
- August 21, 2017 - Uber’s Settlement With FTC Emphasizes Companies’ Need for Cyber Risk Management Programs[Shawn Tuma]
- August 22, 2017 - Key Points of Delaware’s New Data Breach Notification Law[Shawn Tuma]
- September 13, 2017 - Incident Response – 3 Takeaways from the Equifax Breach[Shawn Tuma]
- September 14, 2017 - Musings about the Equifax Data Breach[Shawn Tuma]
- September 27, 2017 - Why do data breach disclosures often take too long? Let’s ask the SEC Chairman.[Shawn Tuma]
- September 29, 2017 - How Cybersecurity is Impacting People’s Rights (Regent University Symposium)[Shawn Tuma]
- October 3, 2017 - Checklist: Managing Third-Party Risk in #Cybersecurity[Shawn Tuma]
- October 11, 2017 - NIST Cybersecurity Guidance for Small Business Likely Forthcoming[Shawn Tuma]
- October 24, 2017 - What do we in the United States really want from our cyber laws?[Shawn Tuma]
- October 27, 2017 - 3 Legal Points for InfoSec Teams to Consider Before an Incident[Shawn Tuma]
- December 1, 2017 - National data breach notification law proposed by Senate Commerce Committee members (includes jail?)[Shawn Tuma]
- December 5, 2017 - Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies[Shawn Tuma]
- January 26, 2018 - Helpful FTC Guidance on Cybersecurity for Small and Midsize Companies[Shawn Tuma]
- January 29, 2018 - State data breach notification law mishmash would get worse with proposed NC and SD legislation — is instant notification by clairvoyant next?[Shawn Tuma]
- February 3, 2018 - House panel to DHS, FBI: help small biz with cybersecurity – start with good cyber hygiene[Shawn Tuma]
- February 7, 2018 - Uber CISO’s Testimony Clarifies Payment to Hackers was Not Legitimate Use of Bug Bounty Program[Shawn Tuma]
- February 8, 2018 - Uber’s CISO Makes Case for Uniform National Data Breach Notification Law[Shawn Tuma]
- February 10, 2018 - What is “reasonable cybersecurity” and how do courts view it? (SecureWorld interviews)[Shawn Tuma]
- February 28, 2018 - Marine corp data breach lesson: human error is often the cause and is preventable[Shawn Tuma]
- March 3, 2018 - Security Weekly guest Shawn Tuma discusses “what is reasonable cybersecurity?”[Shawn Tuma]
- March 7, 2018 - Down the Security Rabbithole Podcast #DtSR with Los and Tuma talking all things #cybersecurity[Shawn Tuma]
- March 27, 2018 - Data is the hot potato![Shawn Tuma]
- April 16, 2018 - Cyber Risk Management and Attorney-Client Privilege in Cybersecurity Discussed on Business Security Weekly[Shawn Tuma]
- May 4, 2018 - What does it mean to “hack back” and is it a good idea?[Shawn Tuma]
- June 1, 2018 - Why do you need a cyber attorney? Shawn Tuma explains in Ethical Boardroom[Shawn Tuma]
- September 21, 2018 - 5 Key Things In-House Counsel Can Do to Help Their Businesses’ Cybersecurity[Shawn Tuma]
- October 17, 2018 - Come to our session at #PSR18 – Vendor Risk Management: Maintaining Relationships While Limiting Liability[Shawn Tuma]
- October 31, 2018 - Scientists warn brain implants can be hacked and used to control people (and you thought I was kidding?)[Shawn Tuma]
- November 27, 2018 - Cyber Insurance – A Better Way to Help Small Businesses Manage Cyber Risk[Shawn Tuma]
- February 4, 2019 - Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update[Shawn Tuma]
- February 15, 2019 - Texas AG: Business Must Implement and Maintain Reasonable Cybersecurity Safeguards[Shawn Tuma]
- August 19, 2019 - Was the ransomware attack on 20+ Texas local governments an attack on a single service provider? [UPDATE: YES!][Shawn Tuma]
- February 29, 2020 - Healthcare Providers – Are You Prepared for Hackers to Tell Your Patients About Your Ransomware and Data Breach?[Shawn Tuma]
- March 6, 2020 - Explaining Third Party Cyber Risk and the Role of Contracts to Business Lawyers[Shawn Tuma]
- June 18, 2020 - Cyber Insurance Becoming a Necessity, No Longer a Luxury for Prepared Companies (publication)[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- July 1, 2020 - ***URGENT*** MEMO TO: “The IT Guy” / MSP After Ransomware Attack[Shawn Tuma]
- July 15, 2020 - What Can Happen if You Do Not Notify Following a Data Breach?[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- November 17, 2020 - Free Virtual Event: Reimagine Your Company Operating Again After a Ransomware Attack (DBU Tech Symposium)[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 2, 2021 - Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- October 26, 2022 - OCR Guidance on HIPAA Security Rule Security Incident Procedures for National Cybersecurity Awareness Month[Shawn Tuma]
- October 28, 2022 - “Data is the hot potato!” and data minimization lessons from the FTC’s Drizly case[Shawn Tuma]
- November 1, 2022 - OCR Releases Video Guidance on Recognized Security Practices for National Cybersecurity Awareness Month[Shawn Tuma]
- November 8, 2022 - “Data is the hot potato!” — some data governance lessons from the Twitter Whistleblower Testimony[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- December 15, 2022 - Dental Practice Responses to Online Reviews Cost $23,000 Settlement with OCR for Impermissible Disclosure of PHI[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 10, 2023 - The White House Cybersecurity Plan – the Devil is in the Details[Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 20, 2023 - HHS Releases HPH Sector Cybersecurity Framework Implementation Guide to Help Healthcare Organizations Leverage NIST Cybersecurity Framework[Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- Data Breach
- June 25, 2011 - Privacy and Cyber Legislation Pending in the 112th Congress[Shawn Tuma]
- July 22, 2011 - Data Breach – Who’s Gonna Get It?[Shawn Tuma]
- August 30, 2011 - The legal influence of today’s CIO[Shawn Tuma]
- August 31, 2011 - Computer Fraud and Abuse Act – great tool for taming an employee that’s gone off the deep end![Shawn Tuma]
- September 1, 2011 - Minimizing the risk of employee data breach and privacy mischief in the cloud[Shawn Tuma]
- September 11, 2011 - Key Points of New California Data Breach Law – A Model for Others?[Shawn Tuma]
- September 13, 2011 - Guarding Against the Inside Job (Part 1 of 2)[Shawn Tuma]
- September 20, 2011 - Guarding Against Idiocy (2 of 2)[Shawn Tuma]
- September 22, 2011 - Data Risk Help For Small Businesses That Need It Most[Shawn Tuma]
- September 25, 2011 - We Are The Biggest Security Risk To Our Companies[Shawn Tuma]
- October 23, 2011 - Cybersecurity risk — think its material? (hint: the SEC does!)[Shawn Tuma]
- February 13, 2012 - Mind Control, Human Hacking & the Computer Fraud and Abuse Act?[Shawn Tuma]
- March 31, 2012 - Want to be Creeped Out or Creeped On? “Girls Around Me” Shows Dangers of Sharing TMI on Social Media[Shawn Tuma]
- November 14, 2012 - Texas’ Amended Data Breach Notification Law[Shawn Tuma]
- January 17, 2013 - Is Your Mobile Device Secure? Find Out With the FCC’s New Tool[Shawn Tuma]
- January 19, 2013 - This Is Why Your Business Needs Cyber Insurance Coverage[Shawn Tuma]
- January 20, 2013 - Have you ever tried to physically destroy a hard drive?[Shawn Tuma]
- January 31, 2013 - Responsiveness and Responsibility Are Considered in Assessing Data Breach Fines[Shawn Tuma]
- February 4, 2013 - The Law and the Hacker – Podcast on the Computer Fraud and Abuse Act[Shawn Tuma]
- February 14, 2013 - [Shawn Tuma]
- May 17, 2013 - Presentation: Helping Businesses Prepare for Computer Fraud and Data Breaches[Shawn Tuma]
- July 26, 2013 - Upcoming Webinar: Anatomy of a Data Breach[Shawn Tuma]
- August 5, 2013 - Yes, you can even hack a toilet! #IoT[Shawn Tuma]
- August 16, 2013 - The Indispensability of Cyber Counterintelligence[Shawn Tuma]
- November 18, 2013 - You should know this > “What do connected cars and toilets have in common?”[Shawn Tuma]
- November 26, 2013 - So, your business has never had a data breach? Have you ever had an employee leave?[Shawn Tuma]
- January 17, 2014 - Aaron Swartz, Edward Snowden, Target Breach, Privacy and Data Security — What Do We Really Want?[Shawn Tuma]
- January 19, 2014 - Executives – Are You Ready to Lead Your Company Through a Data Breach?[Shawn Tuma]
- January 23, 2014 - Breach Notifications Should Focus On Preserving The Customer Relationship First, Then On Legal Requirements[Shawn Tuma]
- January 29, 2014 - Data Security Involves Human Behavior and, Therefore, Is More an Art, Than a Science[Shawn Tuma]
- February 6, 2014 - The SEC Will Begin Looking at Companies’ IT Security and Data Breach Response Policies[Shawn Tuma]
- February 20, 2014 - Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach[Shawn Tuma]
- March 27, 2014 - 3 Important Questions Your Company Must Answer After A Data Breach[Shawn Tuma]
- March 28, 2014 - What did Sun Tzu teach about cybersecurity?[Shawn Tuma]
- March 29, 2014 - The Legal Side of Data Breach and Third Party Risk (presentation slides)[Shawn Tuma]
- April 15, 2014 - Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu[Shawn Tuma]
- April 28, 2014 - Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???[Shawn Tuma]
- May 3, 2014 - Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF[Shawn Tuma]
- May 5, 2014 - The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation[Shawn Tuma]
- May 7, 2014 - Why do cyber criminals want your healthcare data?[Shawn Tuma]
- May 8, 2014 - Two Step Data Breach Risk Test for Texas Businesses[Shawn Tuma]
- May 28, 2014 - 3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach[Shawn Tuma]
- June 25, 2014 - Supreme Court: Private Information Is Worthy of Protection, Even on Cell Phones[Shawn Tuma]
- September 11, 2014 - Does Data Security Have Your Healthcare Practice “On the Hook”?[Shawn Tuma]
- September 22, 2014 - 3 Steps the C-Suite Can Take to Strengthen Cyber Security[Shawn Tuma]
- September 22, 2014 - Data Breach Judgment: Will Home Depot Be the One to “Get It”?[Shawn Tuma]
- September 25, 2014 - Uncle Sam doesn’t have a clue on data privacy, cyber crime laws, and neither do we![Shawn Tuma]
- October 2, 2014 - Podcast: CFAA, Shellshock and Cyber Security Research — What the Heck Do We Want?[Shawn Tuma]
- October 4, 2014 - Hackers’ Cracked 10 Financial Firms in Major Assault – Russian Officials Involved?[Shawn Tuma]
- October 6, 2014 - Gov’t Contractors Must Notify of Data Breach Within 3 days[Shawn Tuma]
- October 7, 2014 - Podcast: DtR NewsCast of Hot Cyber Security Topics[Shawn Tuma]
- October 8, 2014 - Publix hasn’t had a data breach but is already seeking PR help in case it does — good or bad?[Shawn Tuma]
- October 13, 2014 - “Defense wins championships” when preparing for the inevitable data breach[Shawn Tuma]
- October 15, 2014 - Yes, I will mention this post in tomorrow’s seminar on data breach! “Who’s Gonna Get It?”[Shawn Tuma]
- October 25, 2014 - Stop lying to yourself — your business is not prepared for data breach risk[Shawn Tuma]
- October 27, 2014 - Podcast: #DtR Episode on Lines in the Sand on “Security Research”[Shawn Tuma]
- October 31, 2014 - Excellent info from Travelers: Company Data Security Policy & Standards[Shawn Tuma]
- November 6, 2014 - The Art of Cybersecurity: How Sun Tzu Masterminded the Home Depot Data Breach[Shawn Tuma]
- December 3, 2014 - Check out my first post on Norse’s DarkMatters > Sony Hack: Where Do We Die First?[Shawn Tuma]
- December 14, 2014 - #SonyHack shows there are no “safe secrets” in the corporate world – what do you do?[Shawn Tuma]
- December 17, 2014 - #SonyHack: Will Executives’ Embarrassing Emails Better Motivate Cybersecurity Change?[Shawn Tuma]
- December 30, 2014 - Boards Had Better Start Paying Attention to Cybersecurity[Shawn Tuma]
- January 6, 2015 - Three Takeaways from the Target Data Breach Ruling – Norse DarkMatters[Shawn Tuma]
- January 18, 2015 - Update/Clarification: Washington AG Seeks Data Breach Law That Ends Blanket Exemption for Encrypted Data[Shawn Tuma]
- January 28, 2015 - Happy Data Privacy Day![Shawn Tuma]
- January 30, 2015 - 7 Ideas for Security Leaders – What Do You Think About My Suggestion?[Shawn Tuma]
- February 5, 2015 - Executives & Board: The conversation security leaders need to have about Amy Pascal’s departure[Shawn Tuma]
- February 12, 2015 - No Standing for Fear of Future Harm: Another Consumer Data Breach Class Action Dismissed[Shawn Tuma]
- February 21, 2015 - Low Hanging Fruit Can Make a Pretty Good Cybersecurity Pie[Shawn Tuma]
- March 27, 2015 - A Few Thoughts on the Consumer Litigation Settlement in the Target Data Breach Case[Shawn Tuma]
- May 1, 2015 - Will Officers & Directors Be Held Legally Responsible for Companies’ Data Breaches and Cybersecurity Incidents?[Shawn Tuma]
- May 13, 2015 - Cybersecurity is a Top Concern for Corporate General Counsel[Shawn Tuma]
- May 14, 2015 - Cybersecurity Presentation at ACFE 25th Annual DFW Fraud Conference[Shawn Tuma]
- May 14, 2015 - Bleak Cybersecurity Future: Data Breaches on Track to Cost Companies $2.1 Trillion[Shawn Tuma]
- May 19, 2015 - Cybersecurity Risk: Law and Trends – Ethical Boardroom Article[Shawn Tuma]
- May 21, 2015 - FTC Gives Good Reason to Not (Try to) Hide Data Breaches[Shawn Tuma]
- May 22, 2015 - Excellent information and great company: check out AllClear ID’s “Resources” page[Shawn Tuma]
- May 22, 2015 - CareFirst cyberattack causes data breach of more than 1 million members[Shawn Tuma]
- May 26, 2015 - “This is not a security breach.” Really? IRS hit by cyberattack, thousands of taxpayers’ information stolen[Shawn Tuma]
- May 27, 2015 - Really??? Proposed legislation would allow companies to keep some data breaches secret[Shawn Tuma]
- May 28, 2015 - Presentation tomorrow – Collin County Bar Ass’n Corporate Counsel Section – here’s the question:[Shawn Tuma]
- May 31, 2015 - Businesses Beware: You need to understand and adopt EMV / Chip-and-PIN Technology[Shawn Tuma]
- June 29, 2015 - Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water[Shawn Tuma]
- August 3, 2015 - Why Your Company Needs a Breach Response Plan: Key Decisions You Must Make Following A Data Breach[Shawn Tuma]
- August 6, 2015 - Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)[Shawn Tuma]
- August 12, 2015 - Rocky Dhir Interviews Shawn Tuma About Cybersecurity for Lawyers at State Bar of Texas 2015 Annual Meeting[Shawn Tuma]
- August 13, 2015 - Employee Viewing Information Without Authorization Triggers Data Breach Notification Obligation for Credit Union[Shawn Tuma]
- August 15, 2015 - Employee Retaining Stored Patient List on Personal Laptop Triggers Data Breach Obligation[Shawn Tuma]
- October 26, 2015 - Excellus Blue Cross Blue Shield’s big data breach and the security lessons we all need to learn[Shawn Tuma]
- November 19, 2015 - Is your business prepared to respond this quickly to a data breach?[Shawn Tuma]
- November 20, 2015 - Cover the Basics for Securing Your Network — Shawn Tuma’s Book Contribution[Shawn Tuma]
- January 8, 2016 - SuperValu Data Breach Class Action Dismissed for Lack of Harm[Shawn Tuma]
- January 9, 2016 - Michaels Data Breach Class Action Dismissed for Lack of Harm[Shawn Tuma]
- January 13, 2016 - Cybersecurity Legal Year in Review – #DtSR Podcast[Shawn Tuma]
- January 16, 2016 - Learning From the Sony Hack: Where Do We Die First?[Shawn Tuma]
- February 5, 2016 - Managing Cybersecurity Risks for Boards of Directors[Shawn Tuma]
- February 16, 2016 - 4 Ways to Engage Executives in Cyber Risk[Shawn Tuma]
- March 18, 2016 - Why Cybersecurity Incidents Are Legal Events[Shawn Tuma]
- April 25, 2016 - 1 Step to Improve Your Company’s Cybersecurity Today[Shawn Tuma]
- April 26, 2016 - How a Small Law Firm was Used for an Extensive Cyberattack[Shawn Tuma]
- April 29, 2016 - The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks[Shawn Tuma]
- May 6, 2016 - Three Takeaways from the Target Data Breach Ruling[Shawn Tuma]
- July 1, 2016 - Cybersecurity: How Long Should An Incident Response Plan Be?[Shawn Tuma]
- September 7, 2016 - Brazzers porn hack: more than just account holders exposed–what does this mean for your company?[Shawn Tuma]
- September 8, 2016 - Cybersecurity Incident Response Checklist[Shawn Tuma]
- September 14, 2016 - Cybersecurity Legal Issues: What you really need to know (slides)[Shawn Tuma]
- September 16, 2016 - You Could See This One Coming: Vibrator Company Sued for Tracking Usage[Shawn Tuma]
- September 24, 2016 - Video: What to do if you have a Yahoo account (Tuma on WFMJ News)[Shawn Tuma]
- September 25, 2016 - Data Breach Litigation: Who’s Gonna Get It? Will it be Yahoo! (or Verizon)?[Shawn Tuma]
- September 27, 2016 - Yahoo Data Breach: US Senators Demand Answers – Still Think You Don’t Have to Disclose and Notify?[Shawn Tuma]
- September 27, 2016 - SecureWorld Presentation: Cybersecurity Legal Issues: What You Really Need to Know[Shawn Tuma]
- September 28, 2016 - Shawn Tuma Discusses Yahoo Data Breach on KURV 710 News Talk Radio[Shawn Tuma]
- September 29, 2016 - Cybersecurity Lessons Learned from SecureWorld #SWDAL16 Conference[Shawn Tuma]
- October 10, 2016 - Video: Cybersecurity Legal Issues – What you really need to know (Shawn Tuma)[Shawn Tuma]
- October 21, 2016 - Why is Healthcare Data So Valuable to Cyber Criminals?[Shawn Tuma]
- October 30, 2016 - Yes, Officers & Directors Can Be Held Personally Liable for Their Company’s Data Breach – Here’s Why[Shawn Tuma]
- November 18, 2016 - Eye Opener Morning Show Guest Shawn Tuma Discusses Adult Friend Finder Data Breach[Shawn Tuma]
- December 1, 2016 - Home Depot Data Breach Shareholder Derivative Suit Against Directors Fails[Shawn Tuma]
- December 14, 2016 - Porn, Politics & Cybersecurity: Are We Seeing Shame Hacking with Texas Elector?[Shawn Tuma]
- December 18, 2016 - Ashley Madison & FTC Settle Data Breach Case – Does Your Company Have These Cybersecurity Shortcomings?[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- January 26, 2017 - ALERT: Prepare Your Company for the Season of W-2 Email Scams[Shawn Tuma]
- January 28, 2017 - Happy Data Privacy Day![Shawn Tuma]
- January 28, 2017 - Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day![Shawn Tuma]
- February 2, 2017 - Stolen Laptop + 3,800 PHI Records = $3.2 Millon Penalty[Shawn Tuma]
- February 6, 2017 - David Beckham’s Exposed Emails Exemplify Shame Hacking Threat[Shawn Tuma]
- February 21, 2017 - Verizon Requires $350 Million Discount and Yahoo Share in Data Breach Liability — Good Deal?[Shawn Tuma]
- March 7, 2017 - “Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?[Shawn Tuma]
- March 11, 2017 - Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing[Shawn Tuma]
- March 19, 2017 - 5 Key Takeaways from Verizon’s GC on Lessons Learned from Yahoo Deal[Shawn Tuma]
- April 2, 2017 - National data breach notification law pros and cons? What do you think?[Shawn Tuma]
- April 13, 2017 - 3 More Key Cybersecurity Takeaways General Counsel Should Learn Learn from Yahoo[Shawn Tuma]
- August 22, 2017 - Key Points of Delaware’s New Data Breach Notification Law[Shawn Tuma]
- September 13, 2017 - Incident Response – 3 Takeaways from the Equifax Breach[Shawn Tuma]
- September 14, 2017 - Musings about the Equifax Data Breach[Shawn Tuma]
- September 27, 2017 - Why do data breach disclosures often take too long? Let’s ask the SEC Chairman.[Shawn Tuma]
- December 1, 2017 - National data breach notification law proposed by Senate Commerce Committee members (includes jail?)[Shawn Tuma]
- January 28, 2018 - Happy Data Privacy Day![Shawn Tuma]
- January 29, 2018 - State data breach notification law mishmash would get worse with proposed NC and SD legislation — is instant notification by clairvoyant next?[Shawn Tuma]
- February 8, 2018 - Uber’s CISO Makes Case for Uniform National Data Breach Notification Law[Shawn Tuma]
- February 10, 2018 - What is “reasonable cybersecurity” and how do courts view it? (SecureWorld interviews)[Shawn Tuma]
- February 28, 2018 - Marine corp data breach lesson: human error is often the cause and is preventable[Shawn Tuma]
- March 16, 2018 - Do data breaches have consequences? Law firm closes due to irreparable damages to its reputation[Shawn Tuma]
- March 19, 2018 - Do data breaches have consequences? Will Equifax CIO serve jail time for insider trading?[Shawn Tuma]
- March 27, 2018 - Data is the hot potato![Shawn Tuma]
- January 7, 2020 - Is #ShameHacking Coming Next? Hackers Breach Search Engine for Japanese Sex Hotels[Shawn Tuma]
- February 29, 2020 - Healthcare Providers – Are You Prepared for Hackers to Tell Your Patients About Your Ransomware and Data Breach?[Shawn Tuma]
- June 3, 2020 - Ransomware is the single greatest risk your company faces – here’s why[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- July 15, 2020 - What Can Happen if You Do Not Notify Following a Data Breach?[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- November 25, 2020 - The Home Depot / State Attorneys General Settlement – My 1st and 2nd Thoughts[Shawn Tuma]
- December 4, 2020 - Simple Mistakes – Not Always “The Hackers” – Can Cause Substantial Data Breaches[Shawn Tuma]
- December 14, 2020 - The Art of Cybersecurity: How Sun Tzu Masterminded the FireEye / US Agencies / SolarWinds Cyberattacks[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 2, 2021 - Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- May 4, 2021 - Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- March 29, 2022 - Not all HIPAA privacy “breaches” are caused by “hackers” — dentist gets $50k penalty for responding to patient’s Google review[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- October 28, 2022 - “Data is the hot potato!” and data minimization lessons from the FTC’s Drizly case[Shawn Tuma]
- November 8, 2022 - “Data is the hot potato!” — some data governance lessons from the Twitter Whistleblower Testimony[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- Trade Secrets
- December 30, 2011 - Your business needs a social media policy and this is why.[Shawn Tuma]
- March 8, 2014 - Yes, Texas is a good state for plaintiffs to bring a CFAA claim.[Shawn Tuma]
- March 24, 2014 - Why is PNC Bank Accusing Morgan Stanley of Corporate Espionage and Trade Secret Theft?[Shawn Tuma]
- March 25, 2014 - 3 Steps for Obtaining Trade Secrets in Discovery[Shawn Tuma]
- April 15, 2014 - Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu[Shawn Tuma]
- April 28, 2014 - Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???[Shawn Tuma]
- May 3, 2014 - Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF[Shawn Tuma]
- August 31, 2014 - Yes, an Employee Really Can Steal Your Data and Then SLAPP You for It?[Shawn Tuma]
- February 14, 2015 - Business Guide: Identifying and Protecting Trade Secrets Under the Texas Uniform Trade Secrets Act[Shawn Tuma]
- August 6, 2015 - Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)[Shawn Tuma]
- April 14, 2016 - Law Firm Cybersecurity: I Hate to Say I Told You So But …[Shawn Tuma]
- May 4, 2016 - Can a Company Remotely Wipe an Ex-Employee’s Device?[Shawn Tuma]
- June 2, 2016 - Can Parties be Excluded from the Courtroom in Trade Secrets Cases?[Shawn Tuma]
- June 21, 2016 - What You Need to Know About Protecting Trade Secrets Under State and Federal Law[Shawn Tuma]
- March 11, 2017 - Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing[Shawn Tuma]
- June 8, 2011 - Personal Data Privacy and Security Act of 2011[Shawn Tuma]
- June 25, 2011 - Privacy and Cyber Legislation Pending in the 112th Congress[Shawn Tuma]
- January 31, 2013 - What do the penalties look like for a HIPAA violation?[Shawn Tuma]
- March 10, 2013 - Courts Showing Greater Respect for Data Privacy – United States v. Cotterman[Shawn Tuma]
- March 11, 2013 - Podcast Discussing Data Privacy and Information Security Implications of United States v. Cotterman – Now Available![Shawn Tuma]
- March 15, 2013 - Law360 article quotes Shawn Tuma on data privacy significance of U.S. v. Cotterman[Shawn Tuma]
- July 26, 2013 - Upcoming Webinar: Anatomy of a Data Breach[Shawn Tuma]
- November 18, 2013 - You should know this > “What do connected cars and toilets have in common?”[Shawn Tuma]
- January 28, 2014 - What is Data Privacy Day and How are You Observing It?[Shawn Tuma]
- May 7, 2014 - Why do cyber criminals want your healthcare data?[Shawn Tuma]
- September 25, 2014 - Uncle Sam doesn’t have a clue on data privacy, cyber crime laws, and neither do we![Shawn Tuma]
- September 29, 2014 - Possible Privacy Violations From New Corvettes Show Need For Legal Team to Include Privacy Experts[Shawn Tuma]
- November 1, 2014 - Fifth Amendment Permits Police To Force Users to Unlock iPhones With Fingerprints, But Not Passcodes[Shawn Tuma]
- November 6, 2014 - The Art of Cybersecurity: How Sun Tzu Masterminded the Home Depot Data Breach[Shawn Tuma]
- December 14, 2014 - #SonyHack shows there are no “safe secrets” in the corporate world – what do you do?[Shawn Tuma]
- December 17, 2014 - #SonyHack: Will Executives’ Embarrassing Emails Better Motivate Cybersecurity Change?[Shawn Tuma]
- January 18, 2015 - Update/Clarification: Washington AG Seeks Data Breach Law That Ends Blanket Exemption for Encrypted Data[Shawn Tuma]
- January 28, 2015 - Happy Data Privacy Day![Shawn Tuma]
- January 30, 2015 - 7 Ideas for Security Leaders – What Do You Think About My Suggestion?[Shawn Tuma]
- February 5, 2015 - Executives & Board: The conversation security leaders need to have about Amy Pascal’s departure[Shawn Tuma]
- March 10, 2015 - Private Investigators, You Are Not Immune From the Computer Hacking Laws[Shawn Tuma]
- May 1, 2015 - Will Officers & Directors Be Held Legally Responsible for Companies’ Data Breaches and Cybersecurity Incidents?[Shawn Tuma]
- May 13, 2015 - Cybersecurity is a Top Concern for Corporate General Counsel[Shawn Tuma]
- May 14, 2015 - Cybersecurity Presentation at ACFE 25th Annual DFW Fraud Conference[Shawn Tuma]
- May 14, 2015 - Bleak Cybersecurity Future: Data Breaches on Track to Cost Companies $2.1 Trillion[Shawn Tuma]
- May 19, 2015 - Cybersecurity Risk: Law and Trends – Ethical Boardroom Article[Shawn Tuma]
- May 28, 2015 - Presentation tomorrow – Collin County Bar Ass’n Corporate Counsel Section – here’s the question:[Shawn Tuma]
- May 31, 2015 - Businesses Beware: You need to understand and adopt EMV / Chip-and-PIN Technology[Shawn Tuma]
- June 29, 2015 - Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water[Shawn Tuma]
- August 6, 2015 - Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)[Shawn Tuma]
- August 12, 2015 - Rocky Dhir Interviews Shawn Tuma About Cybersecurity for Lawyers at State Bar of Texas 2015 Annual Meeting[Shawn Tuma]
- October 26, 2015 - Excellus Blue Cross Blue Shield’s big data breach and the security lessons we all need to learn[Shawn Tuma]
- November 19, 2015 - Is your business prepared to respond this quickly to a data breach?[Shawn Tuma]
- November 20, 2015 - Cover the Basics for Securing Your Network — Shawn Tuma’s Book Contribution[Shawn Tuma]
- January 13, 2016 - Cybersecurity Legal Year in Review – #DtSR Podcast[Shawn Tuma]
- January 28, 2016 - What is Data Privacy Day and How are You Observing It?[Shawn Tuma]
- February 10, 2016 - EU – U.S. Privacy Shield Summary & Fact Sheet for Businesses[Shawn Tuma]
- February 22, 2016 - UPDATE (FBI admits): #AppleVsFBI – Just 1 iPhone? In 1977 it was Just 1 Pen Register[Shawn Tuma]
- February 23, 2016 - Making Sense of #AppleVsFBI Issues: #DtSR Podcast[Shawn Tuma]
- February 24, 2016 - The “Legal” Reason the FBI’s Password Blunder Could Kill its Case in #AppleVsFBI[Shawn Tuma]
- February 25, 2016 - Apple’s Legal Response in Less Than 300 Words #AppleVsFBI[Shawn Tuma]
- March 18, 2016 - Why Cybersecurity Incidents Are Legal Events[Shawn Tuma]
- May 4, 2016 - Can a Company Remotely Wipe an Ex-Employee’s Device?[Shawn Tuma]
- September 7, 2016 - Brazzers porn hack: more than just account holders exposed–what does this mean for your company?[Shawn Tuma]
- September 14, 2016 - Cybersecurity Legal Issues: What you really need to know (slides)[Shawn Tuma]
- September 16, 2016 - You Could See This One Coming: Vibrator Company Sued for Tracking Usage[Shawn Tuma]
- September 23, 2016 - Yahoo Data Breach – Some Facts & Questions (i.e., was it really the Russians?)[Shawn Tuma]
- September 27, 2016 - Yahoo Data Breach: US Senators Demand Answers – Still Think You Don’t Have to Disclose and Notify?[Shawn Tuma]
- September 27, 2016 - SecureWorld Presentation: Cybersecurity Legal Issues: What You Really Need to Know[Shawn Tuma]
- October 21, 2016 - Why is Healthcare Data So Valuable to Cyber Criminals?[Shawn Tuma]
- October 25, 2016 - Shawn Tuma Discusses Government Scanning of Yahoo Emails on WHDT World News[Shawn Tuma]
- October 30, 2016 - Yes, Officers & Directors Can Be Held Personally Liable for Their Company’s Data Breach – Here’s Why[Shawn Tuma]
- November 18, 2016 - Eye Opener Morning Show Guest Shawn Tuma Discusses Adult Friend Finder Data Breach[Shawn Tuma]
- November 21, 2016 - Holiday Shopping Cybersecurity Tips on WFAA TV Interviewing Shawn Tuma[Shawn Tuma]
- December 14, 2016 - Porn, Politics & Cybersecurity: Are We Seeing Shame Hacking with Texas Elector?[Shawn Tuma]
- December 18, 2016 - Ashley Madison & FTC Settle Data Breach Case – Does Your Company Have These Cybersecurity Shortcomings?[Shawn Tuma]
- December 20, 2016 - Top 10 Web Resources for Privacy Professionals | LinkedIn Pulse[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- January 18, 2017 - How to Protect Yourself from Cell Phone Cyber Threats (WFAA TV Interview)[Shawn Tuma]
- January 23, 2017 - Improving Your Cybersecurity Plan, Explained by Paul Ferrillo in WSJ[Shawn Tuma]
- January 28, 2017 - Happy Data Privacy Day![Shawn Tuma]
- January 28, 2017 - Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day![Shawn Tuma]
- February 6, 2017 - David Beckham’s Exposed Emails Exemplify Shame Hacking Threat[Shawn Tuma]
- March 7, 2017 - “Shame Hacking” Liberal Groups — Is It Really Russian Hackers Doing It?[Shawn Tuma]
- March 10, 2017 - WikiLeaks and CIA’s Russian Hacking Tools & Techniques: Was it really the Russians?[Shawn Tuma]
- March 13, 2017 - WikiLeaks’ Vault7 CIA Hacking Tools Release Conundrum: The Politicization of Intelligence[Shawn Tuma]
- April 1, 2017 - April Fools’ Meme Illustrates Privacy Difference Between Opt-In and Opt-Out[Shawn Tuma]
- May 3, 2017 - Does the U.S. Need a Data Protection Authority? (a few of my thoughts)[Shawn Tuma]
- August 21, 2017 - Uber’s Settlement With FTC Emphasizes Companies’ Need for Cyber Risk Management Programs[Shawn Tuma]
- August 22, 2017 - Key Points of Delaware’s New Data Breach Notification Law[Shawn Tuma]
- September 13, 2017 - Incident Response – 3 Takeaways from the Equifax Breach[Shawn Tuma]
- December 5, 2017 - Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies[Shawn Tuma]
- December 14, 2017 - The Most Positive Cybersecurity Trend I Have Seen in Nearly 20 Years![Shawn Tuma]
- January 24, 2018 - Allscripts EHR Ransomware Attack is Huge–How Will it Impact Healthcare Practices?[Shawn Tuma]
- January 28, 2018 - Happy Data Privacy Day![Shawn Tuma]
- January 29, 2018 - State data breach notification law mishmash would get worse with proposed NC and SD legislation — is instant notification by clairvoyant next?[Shawn Tuma]
- February 2, 2018 - FMCNA to Pay $3.5 Million for Non-Compliance with HIPAA’s Risk Analysis and Risk Management Rules[Shawn Tuma]
- February 28, 2018 - Marine corp data breach lesson: human error is often the cause and is preventable[Shawn Tuma]
- April 30, 2018 - Regulator says May 25 is not doomsday #GDPR[Shawn Tuma]
- May 19, 2018 - Facebook Suspends 200 Apps for Data Privacy Concerns — What Does This Really Mean?[Shawn Tuma]
- May 25, 2018 - Integrating Amazon’s “Rekognition” Tool with Police Body Cameras — Shawn Tuma Discusses on CW33 Morning Dose[Shawn Tuma]
- May 26, 2018 - GDPR, snooping tech, and data privacy — what does this all mean? Shawn Tuma explains[Shawn Tuma]
- October 16, 2018 - Key Lesson All Business Leaders Can Learn From the Anthem Data Breach Case[Shawn Tuma]
- October 17, 2018 - Come to our session at #PSR18 – Vendor Risk Management: Maintaining Relationships While Limiting Liability[Shawn Tuma]
- January 30, 2019 - Protect Your Company Against W-2 Business Email Compromise Attacks During Tax Season[Shawn Tuma]
- February 1, 2019 - The Most Important Lesson You Are Not Hearing About Apple’s iOS FaceTime Glitch[Shawn Tuma]
- February 4, 2019 - Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update[Shawn Tuma]
- February 15, 2019 - Texas AG: Business Must Implement and Maintain Reasonable Cybersecurity Safeguards[Shawn Tuma]
- April 3, 2020 - Understanding the Cyber and Privacy Risks of Zoom and Tips For Using It More Securely[Shawn Tuma]
- June 3, 2020 - Ransomware is the single greatest risk your company faces – here’s why[Shawn Tuma]
- July 15, 2020 - What Can Happen if You Do Not Notify Following a Data Breach?[Shawn Tuma]
- July 29, 2020 - Why did Lifespan Health face such a stiff HIPAA penalty for a stolen laptop? (publication)[Shawn Tuma]
- November 25, 2020 - The Home Depot / State Attorneys General Settlement – My 1st and 2nd Thoughts[Shawn Tuma]
- December 14, 2020 - The Art of Cybersecurity: How Sun Tzu Masterminded the FireEye / US Agencies / SolarWinds Cyberattacks[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- March 29, 2022 - Not all HIPAA privacy “breaches” are caused by “hackers” — dentist gets $50k penalty for responding to patient’s Google review[Shawn Tuma]
- October 26, 2022 - OCR Guidance on HIPAA Security Rule Security Incident Procedures for National Cybersecurity Awareness Month[Shawn Tuma]
- November 1, 2022 - OCR Releases Video Guidance on Recognized Security Practices for National Cybersecurity Awareness Month[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- December 15, 2022 - Dental Practice Responses to Online Reviews Cost $23,000 Settlement with OCR for Impermissible Disclosure of PHI[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 17, 2023 - FBI, CISA, MS-ISAC Joint Cybersecurity Advisory – #StopRansomware: LockBit 3.0[Shawn Tuma]
- March 20, 2023 - HHS Releases HPH Sector Cybersecurity Framework Implementation Guide to Help Healthcare Organizations Leverage NIST Cybersecurity Framework[Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- Healthcare Privacy (HIPAA)
- June 10, 2017 - OCR Issues Cyberattack Response Checklist and Infographic[Shawn Tuma]
- January 24, 2018 - Allscripts EHR Ransomware Attack is Huge–How Will it Impact Healthcare Practices?[Shawn Tuma]
- February 2, 2018 - FMCNA to Pay $3.5 Million for Non-Compliance with HIPAA’s Risk Analysis and Risk Management Rules[Shawn Tuma]
- October 16, 2018 - Key Lesson All Business Leaders Can Learn From the Anthem Data Breach Case[Shawn Tuma]
- February 29, 2020 - Healthcare Providers – Are You Prepared for Hackers to Tell Your Patients About Your Ransomware and Data Breach?[Shawn Tuma]
- July 29, 2020 - Why did Lifespan Health face such a stiff HIPAA penalty for a stolen laptop? (publication)[Shawn Tuma]
- November 18, 2020 - ASPR Warns Ransomware Threat is Persistent, as Actors Leak More Data[Shawn Tuma]
- March 29, 2022 - Not all HIPAA privacy “breaches” are caused by “hackers” — dentist gets $50k penalty for responding to patient’s Google review[Shawn Tuma]
- October 26, 2022 - OCR Guidance on HIPAA Security Rule Security Incident Procedures for National Cybersecurity Awareness Month[Shawn Tuma]
- November 1, 2022 - OCR Releases Video Guidance on Recognized Security Practices for National Cybersecurity Awareness Month[Shawn Tuma]
- December 15, 2022 - Dental Practice Responses to Online Reviews Cost $23,000 Settlement with OCR for Impermissible Disclosure of PHI[Shawn Tuma]
- March 20, 2023 - HHS Releases HPH Sector Cybersecurity Framework Implementation Guide to Help Healthcare Organizations Leverage NIST Cybersecurity Framework[Shawn Tuma]
- October 19, 2013 - Presentation slides for Parenting Paper<less Conference on Digital Information Law Issues[Shawn Tuma]
- October 24, 2013 - Combating Corporate Espionage Seminar – Prezi and a few thoughts[Shawn Tuma]
- November 5, 2013 - Read this explanation of cyber espionage and how it impacts YOUR company[Shawn Tuma]
- November 9, 2013 - Private Facebook posts are protected by the SCA unless voluntarily provided by friends with access[Shawn Tuma]
- November 18, 2013 - You should know this > “What do connected cars and toilets have in common?”[Shawn Tuma]
- November 26, 2013 - So, your business has never had a data breach? Have you ever had an employee leave?[Shawn Tuma]
- January 17, 2014 - Aaron Swartz, Edward Snowden, Target Breach, Privacy and Data Security — What Do We Really Want?[Shawn Tuma]
- January 19, 2014 - Executives – Are You Ready to Lead Your Company Through a Data Breach?[Shawn Tuma]
- January 28, 2014 - What is Data Privacy Day and How are You Observing It?[Shawn Tuma]
- January 28, 2014 - Sixth Circuit: Unknown Access of a Remote Server Cannot Be Intentional, Thus Does Not Violate CFAA[Shawn Tuma]
- January 29, 2014 - Data Security Involves Human Behavior and, Therefore, Is More an Art, Than a Science[Shawn Tuma]
- February 6, 2014 - Will Sprint’s Multiple Computer Fraud and Abuse Act Lawsuits Highlight the District Court Split on Loss Jurisprudence?[Shawn Tuma]
- February 20, 2014 - Secret Service’s 3 Steps to Consider When Notifying Law Enforcement in Response to a Data Breach[Shawn Tuma]
- March 2, 2014 - Northern District of Texas Court Requires Plaintiffs’ Pre-Discovery Identification of Trade Secrets[Shawn Tuma]
- March 8, 2014 - Yes, Texas is a good state for plaintiffs to bring a CFAA claim.[Shawn Tuma]
- March 12, 2014 - A Hacker Can Takeover A Car Through Its Computer System — What About An Airplane?[Shawn Tuma]
- March 25, 2014 - 3 Steps for Obtaining Trade Secrets in Discovery[Shawn Tuma]
- March 27, 2014 - 3 Important Questions Your Company Must Answer After A Data Breach[Shawn Tuma]
- March 28, 2014 - What did Sun Tzu teach about cybersecurity?[Shawn Tuma]
- March 29, 2014 - The Legal Side of Data Breach and Third Party Risk (presentation slides)[Shawn Tuma]
- April 15, 2014 - Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu[Shawn Tuma]
- April 28, 2014 - Prezi: Data Breach! Hacking! Corporate Espionage! Are you listening yet???[Shawn Tuma]
- April 29, 2014 - Using Social Media in Your Law Practice – Prezi Presentation[Shawn Tuma]
- May 3, 2014 - Collin County Bench Bar Presentation on Cyber Risks to Lawyers #CCBBF[Shawn Tuma]
- May 5, 2014 - The #1 Thing the C-Suite Can Learn from Target’s CEO’s Resignation[Shawn Tuma]
- May 7, 2014 - Why do cyber criminals want your healthcare data?[Shawn Tuma]
- May 8, 2014 - Two Step Data Breach Risk Test for Texas Businesses[Shawn Tuma]
- May 16, 2014 - Using Social Media in Your Law Practice – Presentation to Collin County Bar Association #ccba[Shawn Tuma]
- May 19, 2014 - Here is a “Computer Fraud” Case that is NOT Covered by the Computer Fraud and Abuse Act![Shawn Tuma]
- May 20, 2014 - What is Corporate Espionage, Industrial Espionage, Cyber Espionage, and Economic Espionage? The DOJ Explains …[Shawn Tuma]
- May 28, 2014 - 3 Important Questions the State Attorneys General Will Ask Your Company Following A Data Breach[Shawn Tuma]
- June 25, 2014 - Supreme Court: Private Information Is Worthy of Protection, Even on Cell Phones[Shawn Tuma]
- August 14, 2014 - Social Media Law Presentation Slides for MENG Webinar[Shawn Tuma]
- August 22, 2014 - Excellent Information = 5 Easy Ways to Get Sued Over Online Content & Social Media[Shawn Tuma]
- August 27, 2014 - ISIS Selfies Demonstrate the Connection Between Social Media and Business Situational Awareness[Shawn Tuma]
- August 31, 2014 - Yes, an Employee Really Can Steal Your Data and Then SLAPP You for It?[Shawn Tuma]
- September 22, 2014 - 3 Steps the C-Suite Can Take to Strengthen Cyber Security[Shawn Tuma]
- September 22, 2014 - Data Breach Judgment: Will Home Depot Be the One to “Get It”?[Shawn Tuma]
- September 25, 2014 - Uncle Sam doesn’t have a clue on data privacy, cyber crime laws, and neither do we![Shawn Tuma]
- October 2, 2014 - Podcast: CFAA, Shellshock and Cyber Security Research — What the Heck Do We Want?[Shawn Tuma]
- October 7, 2014 - FBI Director Talks Cyber Espionage: Chinese Like “Drunk Burglar”[Shawn Tuma]
- October 7, 2014 - Podcast: DtR NewsCast of Hot Cyber Security Topics[Shawn Tuma]
- October 13, 2014 - “Defense wins championships” when preparing for the inevitable data breach[Shawn Tuma]
- October 15, 2014 - Yes, I will mention this post in tomorrow’s seminar on data breach! “Who’s Gonna Get It?”[Shawn Tuma]
- October 27, 2014 - Podcast: #DtR Episode on Lines in the Sand on “Security Research”[Shawn Tuma]
- October 31, 2014 - Excellent info from Travelers: Company Data Security Policy & Standards[Shawn Tuma]
- November 1, 2014 - Fifth Amendment Permits Police To Force Users to Unlock iPhones With Fingerprints, But Not Passcodes[Shawn Tuma]
- November 14, 2014 - After this judge’s ruling, do you finally see value in passwords? | CSO Online[Shawn Tuma]
- December 3, 2014 - Check out my first post on Norse’s DarkMatters > Sony Hack: Where Do We Die First?[Shawn Tuma]
- December 8, 2014 - The Best Evidence Why Your Company Needs a CISO Before a Data Breach[Shawn Tuma]
- December 15, 2014 - DarkMatters: The Nature of Cybersecurity and Strategies for Unprecedented Cyber Attacks[Shawn Tuma]
- December 17, 2014 - #SonyHack: Will Executives’ Embarrassing Emails Better Motivate Cybersecurity Change?[Shawn Tuma]
- December 30, 2014 - Boards Had Better Start Paying Attention to Cybersecurity[Shawn Tuma]
- January 6, 2015 - Three Takeaways from the Target Data Breach Ruling – Norse DarkMatters[Shawn Tuma]
- January 8, 2015 - Maybe My Y2K Experience Will Help > Computer chaos feared over 2015’s leap second[Shawn Tuma]
- January 10, 2015 - Do you have a reasonable expectation of privacy in social network posts? No, here is why …[Shawn Tuma]
- January 21, 2015 - Part 2 of Series: Simple Ways to Use Social Media Marketing in One Hour[Shawn Tuma]
- January 28, 2015 - Happy Data Privacy Day![Shawn Tuma]
- January 30, 2015 - 7 Ideas for Security Leaders – What Do You Think About My Suggestion?[Shawn Tuma]
- February 5, 2015 - Executives & Board: The conversation security leaders need to have about Amy Pascal’s departure[Shawn Tuma]
- February 14, 2015 - Business Guide: Identifying and Protecting Trade Secrets Under the Texas Uniform Trade Secrets Act[Shawn Tuma]
- February 19, 2015 - Post Webinar Thoughts: Simple Ways to Effectively Use Social Media to Help Build Your Law Practice[Shawn Tuma]
- March 10, 2015 - Private Investigators, You Are Not Immune From the Computer Hacking Laws[Shawn Tuma]
- March 14, 2015 - Cyber Law is (the new) Practical Business Law[Shawn Tuma]
- April 7, 2015 - Business Social Media Accounts Can Be Part of Bankruptcy Estate[Shawn Tuma]
- April 30, 2015 - Why Hackers Love Companies Who Use Social Media – The Point[Shawn Tuma]
- May 1, 2015 - Will Officers & Directors Be Held Legally Responsible for Companies’ Data Breaches and Cybersecurity Incidents?[Shawn Tuma]
- May 11, 2015 - Cybersecurity Keynote Address at International Association of Insurance Professionals Event[Shawn Tuma]
- May 14, 2015 - Cybersecurity Presentation at ACFE 25th Annual DFW Fraud Conference[Shawn Tuma]
- May 14, 2015 - Bleak Cybersecurity Future: Data Breaches on Track to Cost Companies $2.1 Trillion[Shawn Tuma]
- May 15, 2015 - Speaking on Cybersecurity Law, Risk & Compliance at Collin County Bench Bar Conference in Austin! #CCBBF[Shawn Tuma]
- May 19, 2015 - Cybersecurity Risk: Law and Trends – Ethical Boardroom Article[Shawn Tuma]
- May 21, 2015 - FTC Gives Good Reason to Not (Try to) Hide Data Breaches[Shawn Tuma]
- May 31, 2015 - Businesses Beware: You need to understand and adopt EMV / Chip-and-PIN Technology[Shawn Tuma]
- June 29, 2015 - Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water[Shawn Tuma]
- August 3, 2015 - Why Your Company Needs a Breach Response Plan: Key Decisions You Must Make Following A Data Breach[Shawn Tuma]
- August 6, 2015 - Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)[Shawn Tuma]
- August 12, 2015 - Rocky Dhir Interviews Shawn Tuma About Cybersecurity for Lawyers at State Bar of Texas 2015 Annual Meeting[Shawn Tuma]
- August 13, 2015 - Employee Viewing Information Without Authorization Triggers Data Breach Notification Obligation for Credit Union[Shawn Tuma]
- November 13, 2015 - Why I am involved with the DFW Technology Prayer Breakfast[Shawn Tuma]
- November 24, 2015 - Texas Super Lawyers Honors Shawn Tuma[Shawn Tuma]
- December 15, 2015 - Why Lawyers Need to Understand Cyber Insurance for Their Clients[Shawn Tuma]
- December 29, 2015 - Social Media Malware: What Is It and How do You Avoid It?[Shawn Tuma]
- January 13, 2016 - Cybersecurity Legal Year in Review – #DtSR Podcast[Shawn Tuma]
- January 16, 2016 - Learning From the Sony Hack: Where Do We Die First?[Shawn Tuma]
- January 20, 2016 - How Scheef & Stone’s clients can benefit from Mackrell International[Shawn Tuma]
- February 5, 2016 - Managing Cybersecurity Risks for Boards of Directors[Shawn Tuma]
- February 22, 2016 - UPDATE (FBI admits): #AppleVsFBI – Just 1 iPhone? In 1977 it was Just 1 Pen Register[Shawn Tuma]
- February 23, 2016 - Making Sense of #AppleVsFBI Issues: #DtSR Podcast[Shawn Tuma]
- February 24, 2016 - The “Legal” Reason the FBI’s Password Blunder Could Kill its Case in #AppleVsFBI[Shawn Tuma]
- March 18, 2016 - Why Cybersecurity Incidents Are Legal Events[Shawn Tuma]
- April 1, 2016 - FBI Guidance: How to Respond to Ransomware[Shawn Tuma]
- April 27, 2016 - DFW Cybersecurity Attorney Shawn Tuma Named to D Magazine’s 2016 Best Lawyers List[Shawn Tuma]
- May 4, 2016 - Can a Company Remotely Wipe an Ex-Employee’s Device?[Shawn Tuma]
- May 6, 2016 - Three Takeaways from the Target Data Breach Ruling[Shawn Tuma]
- May 9, 2016 - Four Security Issues All Business Contracts Should Address[Shawn Tuma]
- May 18, 2016 - Cyber Law Update on #DtSR Podcast with Los, Santarcangelo and Tuma[Shawn Tuma]
- May 19, 2016 - Computer Use Policies – Are Your Company’s Illegal According to the NLRB?[Shawn Tuma]
- June 30, 2016 - D CEO Magazine: Why Cybercriminals Are Targeting Law Firms[Shawn Tuma]
- July 1, 2016 - Cybersecurity: How Long Should An Incident Response Plan Be?[Shawn Tuma]
- August 9, 2016 - Shawn Tuma discusses how elections could be hacked on WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- September 7, 2016 - Brazzers porn hack: more than just account holders exposed–what does this mean for your company?[Shawn Tuma]
- September 8, 2016 - Cybersecurity Incident Response Checklist[Shawn Tuma]
- October 5, 2016 - Kim Kardashian’s Lesson on the Relationship Between Physical and Cybersecurity[Shawn Tuma]
- December 27, 2016 - Feds: Chinese Traders Busted, Trading on Info “Hacked” from Law Firms via Email Compromise[Shawn Tuma]
- January 20, 2017 - Trying to DDoS the White House Website to Protest Trump’s Inauguration Violates CFAA[Shawn Tuma]
- January 28, 2017 - Happy Data Privacy Day![Shawn Tuma]
- February 6, 2017 - David Beckham’s Exposed Emails Exemplify Shame Hacking Threat[Shawn Tuma]
- November 10, 2017 - Facebook Requesting Your Nudies to Combat Revenge Porn – My Comments on TV[Shawn Tuma]
- March 15, 2020 - How will the #COVID19 #coronavirus #coronapocolypse impact the future of how we do life?[Shawn Tuma]
- April 30, 2020 - Two Cyber Insurance Issues Service Providers Should Discuss with Their Clients[Shawn Tuma]
- June 9, 2020 - Think your company’s IT is too sophisticated to be hit with a ransomware attack? Think again.[Shawn Tuma]
- June 24, 2020 - Texas Bar Journal 2019 Cybersecurity & Data Privacy Update[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- December 3, 2020 - Think your company is too sophisticated to be hit with a ransomware attack? Ask Advantech …[Shawn Tuma]
- December 9, 2020 - 2 Critical Cyber Insurance Issues All Companies Must Consider Now, Before an Incident![Shawn Tuma]
- December 9, 2020 - Think your company is too sophisticated to be hit with a successful cyber attack? Ask FireEye …[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 2, 2021 - Shawn Tuma Provided Texas Bar Journal 2020 Cybersecurity & Data Privacy Update[Shawn Tuma]
- April 23, 2021 - Nearly half of all businesses hit by cyber attacks in 2020 — 3 steps to help prepare your business[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- May 4, 2021 - Digital Extortion Drama: Deconstructing the Ransomware Response Lifecycle[Shawn Tuma]
- June 4, 2021 - Ransomware Attacks! The 5 Best Practices the White House Urges all Businesses to Take to Mitigate Them[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 14, 2021 - Ransomware! What is it and how do you better protect against it?[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- January 5, 2022 - Shawn Tuma Provided Texas Bar Journal 2021 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- January 13, 2022 - Ransomware Attack Forces Company Into Bankruptcy[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- March 29, 2022 - Not all HIPAA privacy “breaches” are caused by “hackers” — dentist gets $50k penalty for responding to patient’s Google review[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- December 12, 2022 - Shawn Tuma Provided Texas Bar Journal 2022 Cybersecurity & Data Privacy Year in Review Update[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- Social Media Law
- May 11, 2011 - Facebooking at Work Does Not Violate Computer Fraud and Abuse Act[Shawn Tuma]
- June 9, 2011 - Ex Wife Pretending to Be 17 Yr Old on Facebook Gets Hubby Arrested by FBI[Shawn Tuma]
- June 20, 2011 - LinkedIn: think before you sync![Shawn Tuma]
- October 18, 2011 - Are LinkedIn Contacts Trade Secrets?[Shawn Tuma]
- December 30, 2011 - Your business needs a social media policy and this is why.[Shawn Tuma]
- January 14, 2012 - Social Media Policy Must Have: when are they on the clock?[Shawn Tuma]
- January 26, 2012 - Learn About Social Media Through Pictures on Pinterest![Shawn Tuma]
- February 4, 2012 - Recent Cases Highlight Need for Businesses to Have Social Media Policies[Shawn Tuma]
- February 4, 2012 - NLRB Says A Lot More By Saying Social Media Policies Must Be Appropriately Tailored[Shawn Tuma]
- February 13, 2012 - Update on “who owns Twitter account” case: Court denies Kravitz’s Motion to Dismiss[Shawn Tuma]
- March 12, 2012 - Business Situational Awareness & Social Media[Shawn Tuma]
- March 31, 2012 - Want to be Creeped Out or Creeped On? “Girls Around Me” Shows Dangers of Sharing TMI on Social Media[Shawn Tuma]
- June 18, 2012 - Federal Court in New York Refuses Service Via Facebook[Shawn Tuma]
- August 13, 2012 - Social Media Law: The Legal Do’s and Don’ts of Social Media[Shawn Tuma]
- August 22, 2012 - Video Preview for Social Media Law: It Is Real and Yes, Can Really Impact Your Business[Shawn Tuma]
- September 4, 2012 - Have You Ever Wondered What A Social Media Lawyer Does?[Shawn Tuma]
- September 5, 2012 - Is a “Like” Protected Speech? Is It Different Than Giving “The Finger”?[Shawn Tuma]
- September 12, 2012 - Social Media Law: Video Presentation for Social Media Breakfast[Shawn Tuma]
- December 3, 2012 - Lawsuit Over Ownership of Former Employee’s Twitter Followers Settled: PhoneDog v. Kravitz[Shawn Tuma]
- December 9, 2012 - Executives of Public Companies Must Use Caution With Social Media – The SEC is Watching![Shawn Tuma]
- December 10, 2012 - Social Media Evidence: Nightclub Promoter Tweets of Cowboys Players Drinking “Ace” Shortly Before Deadly Car Crash[Shawn Tuma]
- December 23, 2012 - Business Situational Awareness, Social Media & Harvard Business Review[Shawn Tuma]
- January 18, 2013 - Tweeting a Copyrighted Photograph Does Not Make it Fair Game for Others to Use[Shawn Tuma]
- February 18, 2013 - Court: Yelp Reviews Are Not Hearsay But Are Then Existing Mental State of the Declarant[Shawn Tuma]
- March 1, 2013 - Proposal to Allow “Substitute Service” of Legal Documents through Social Media – What Do You Think?[Shawn Tuma]
- March 7, 2013 - WARNING: Internet Pictures of You Hunting While on Medical Leave from Work Will Kill Your Retaliatory Discharge Claim[Shawn Tuma]
- March 14, 2013 - Doing stupid (and illegal) things and posting videos of it on social media is, well, stupid.[Shawn Tuma]
- March 17, 2013 - Listen to Shawn Tuma discuss social media law issues for business on PlayMakers Talk Show via podcast[Shawn Tuma]
- April 5, 2013 - Deactivating Your Facebook While in Litigation May Be Destruction of Evidence[Shawn Tuma]
- July 30, 2013 - “The Streisand Effect Gone Bonkers” – trying to use copyright to silence online reviews backfired[Shawn Tuma]
- September 5, 2013 - How do you cite to social media? Here are the MLA and APA standards[Shawn Tuma]
- September 19, 2013 - YES, IT IS! > Is a “Like” Protected Speech? Is It Different Than Giving “The Finger”?[Shawn Tuma]
- October 19, 2013 - Presentation slides for Parenting Paper<less Conference on Digital Information Law Issues[Shawn Tuma]
- November 9, 2013 - Private Facebook posts are protected by the SCA unless voluntarily provided by friends with access[Shawn Tuma]
- January 20, 2014 - Court Requires Yelp! to ID Negative Reviewers to Determine if They Are Real Customers[Shawn Tuma]
- April 29, 2014 - Using Social Media in Your Law Practice – Prezi Presentation[Shawn Tuma]
- May 16, 2014 - Using Social Media in Your Law Practice – Presentation to Collin County Bar Association #ccba[Shawn Tuma]
- June 6, 2014 - Do Not Delete Relevant Social Media Accounts or Posts During Lawsuits > Spoliation of Evidence[Shawn Tuma]
- June 7, 2014 - Social Media Evidence From Facebook Used Get to Get Rape, Sodomy, Domestic Violence Charges Dismissed[Shawn Tuma]
- August 14, 2014 - Social Media Law Presentation Slides for MENG Webinar[Shawn Tuma]
- August 22, 2014 - Excellent Information = 5 Easy Ways to Get Sued Over Online Content & Social Media[Shawn Tuma]
- August 27, 2014 - ISIS Selfies Demonstrate the Connection Between Social Media and Business Situational Awareness[Shawn Tuma]
- January 10, 2015 - Do you have a reasonable expectation of privacy in social network posts? No, here is why …[Shawn Tuma]
- January 20, 2015 - Lawyers: Simple Ways to Use Social Media Marketing in One Hour: Part 1 | Cordell Parvin Blog[Shawn Tuma]
- January 21, 2015 - Part 2 of Series: Simple Ways to Use Social Media Marketing in One Hour[Shawn Tuma]
- January 22, 2015 - Part 3 of Series: Simple Ways to Use Social Media to Build Your Practice in One Hour[Shawn Tuma]
- February 19, 2015 - Post Webinar Thoughts: Simple Ways to Effectively Use Social Media to Help Build Your Law Practice[Shawn Tuma]
- April 6, 2015 - New York Court Permits Service of Divorce Papers via Facebook[Shawn Tuma]
- April 7, 2015 - Business Social Media Accounts Can Be Part of Bankruptcy Estate[Shawn Tuma]
- April 30, 2015 - Why Hackers Love Companies Who Use Social Media – The Point[Shawn Tuma]
- May 5, 2015 - Periscope Piracy Sets Up Grudge Match: Hollywood vs. Twitter[Shawn Tuma]
- June 25, 2015 - Kevin O’Keefe Interviews Shawn Tuma About Blogging at State Bar of Texas 2015 Annual Meeting[Shawn Tuma]
- December 29, 2015 - Social Media Malware: What Is It and How do You Avoid It?[Shawn Tuma]
- November 10, 2017 - Facebook Requesting Your Nudies to Combat Revenge Porn – My Comments on TV[Shawn Tuma]
- March 29, 2022 - Not all HIPAA privacy “breaches” are caused by “hackers” — dentist gets $50k penalty for responding to patient’s Google review[Shawn Tuma]
- August 16, 2016 - Cyber security attorney Shawn Tuma tells us how our elections could be hacked – WOWO 1190 AM | 107.5 FM[Shawn Tuma]
- September 14, 2016 - Cybersecurity Legal Issues: What you really need to know (slides)[Shawn Tuma]
- September 23, 2016 - Yahoo Data Breach – Some Facts & Questions (i.e., was it really the Russians?)[Shawn Tuma]
- September 24, 2016 - Video: What to do if you have a Yahoo account (Tuma on WFMJ News)[Shawn Tuma]
- September 28, 2016 - Shawn Tuma Discusses Yahoo Data Breach on KURV 710 News Talk Radio[Shawn Tuma]
- September 29, 2016 - Cybersecurity Lessons Learned from SecureWorld #SWDAL16 Conference[Shawn Tuma]
- October 5, 2016 - Kim Kardashian’s Lesson on the Relationship Between Physical and Cybersecurity[Shawn Tuma]
- October 8, 2016 - WHTD World News Interview: How to Protect Yourself After the Yahoo Attack[Shawn Tuma]
- October 10, 2016 - Video: Cybersecurity Legal Issues – What you really need to know (Shawn Tuma)[Shawn Tuma]
- October 25, 2016 - Shawn Tuma Discusses Government Scanning of Yahoo Emails on WHDT World News[Shawn Tuma]
- October 27, 2016 - Shawn Tuma Discusses IoT DDoS Attack Against Dyn on WHDT World News[Shawn Tuma]
- November 18, 2016 - Eye Opener Morning Show Guest Shawn Tuma Discusses Adult Friend Finder Data Breach[Shawn Tuma]
- November 21, 2016 - Holiday Shopping Cybersecurity Tips on WFAA TV Interviewing Shawn Tuma[Shawn Tuma]
- November 29, 2016 - Complimentary SecureWorld Webinar – 2016 Breaches: Lessons Learned[Shawn Tuma]
- January 18, 2017 - How to Protect Yourself from Cell Phone Cyber Threats (WFAA TV Interview)[Shawn Tuma]
- January 28, 2017 - Learn More About the NLJ’s Cybersecurity & Data Privacy Trailblazers for Data Privacy Day![Shawn Tuma]
- May 19, 2017 - CGTN America interviews Shawn Tuma about #WannaCry #ransomware attacks[Shawn Tuma]
- October 27, 2017 - 3 Legal Points for InfoSec Teams to Consider Before an Incident[Shawn Tuma]
- November 10, 2017 - Facebook Requesting Your Nudies to Combat Revenge Porn – My Comments on TV[Shawn Tuma]
- November 27, 2017 - Tips for Staying #CyberSecure While Shopping Online for #BlackFriday and #CyberMonday Deals[Shawn Tuma]
- May 19, 2018 - Facebook Suspends 200 Apps for Data Privacy Concerns — What Does This Really Mean?[Shawn Tuma]
- May 25, 2018 - Integrating Amazon’s “Rekognition” Tool with Police Body Cameras — Shawn Tuma Discusses on CW33 Morning Dose[Shawn Tuma]
- May 26, 2018 - GDPR, snooping tech, and data privacy — what does this all mean? Shawn Tuma explains[Shawn Tuma]
- July 16, 2018 - Did hackers record you watching porn? New scam using key elements of phishing and shame hacking[Shawn Tuma]
- October 6, 2018 - “Hacked” Facebook Account — or Cloned?[Shawn Tuma]
- February 11, 2019 - Cyberbullying of Children is a Heartbreaking Problem that Parents Have a Role in Preventing[Shawn Tuma]
- June 18, 2020 - Cyber Insurance Becoming a Necessity, No Longer a Luxury for Prepared Companies (publication)[Shawn Tuma]
- November 10, 2020 - Podcast: #DtSR Episode 408 – Shawn Tuma Cyber Superhero 🙂[Shawn Tuma]
- November 17, 2020 - Podcast: #DtSR Episode 410 – TPA CISO Accountability Problems[Shawn Tuma]
- November 17, 2020 - Free Virtual Event: Reimagine Your Company Operating Again After a Ransomware Attack (DBU Tech Symposium)[Shawn Tuma]
- December 17, 2020 - Working From Home During COVID-19? Five Things You Should be Doing–But Probably Are Not–To Be More Cyber Secure (publication)[Shawn Tuma]
- December 20, 2020 - Shawn Tuma Included in “Raise the Cybersecurity Curtain – Cybersecurity Leaders Quotes”[Shawn Tuma]
- March 31, 2021 - Podcast: Shawn Tuma Shares Real-Life Examples and Best Practices for Ransomware Incident Response[Shawn Tuma]
- April 30, 2021 - Understanding How Cyber Insurance Impacts Your Incident Response Planning (video of Shawn Tuma’s SecureWorld session)[Shawn Tuma]
- June 15, 2021 - Podcast: #DtSR Episode 449 – TPA Tuma on A Watershed Moment for US Cyber[Shawn Tuma]
- July 8, 2021 - Shawn Tuma Discusses Kaseya Ransomware Attack[Shawn Tuma]
- July 12, 2021 - Reimagining Cyber Podcast: So You’ve Been Hacked, Now What?[Shawn Tuma]
- July 15, 2021 - Shawn Tuma Discusses The Rise of Cybersecurity Problems on KLIF Morning News[Shawn Tuma]
- July 21, 2021 - Cyber Insurance Fact vs Fiction (i.e., dispelling the myths!): #DtSR Podcast Episode 454 with Sean Scranton & Raf Los[Shawn Tuma]
- October 8, 2021 - The INSIDERS Podcast – Cybersecurity with Shawn Tuma[Shawn Tuma]
- October 8, 2021 - Facebook Outage: Shawn Tuma’s WFAA Interview from the deck at #NetDiligence[Shawn Tuma]
- February 25, 2022 - Increased Ransomware Threat in Wake of Russia Invasion of Ukraine — Shawn Tuma Discusses[Shawn Tuma]
- March 16, 2022 - Security Incidents and Your Board Pt.1 – The Above Board Show[Shawn Tuma]
- April 2, 2022 - Cyber Incident Response Preparation and Your Board Pt.2 – The Above Board Show[Shawn Tuma]
- April 11, 2022 - Security Incidents and Your Board Pt.3 – The Above Board Show[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- February 23, 2023 - Charlotte, NC Area Friends – Join me at SecureWorld Charlotte on March 1 & 2![Shawn Tuma]
- March 10, 2023 - The White House Cybersecurity Plan – the Devil is in the Details[Shawn Tuma]
- March 15, 2023 - Boston Area Friends – Join me for the lunch keynote at SecureWorld Boston on March 23![Shawn Tuma]
- March 27, 2023 - Join me and #EnterpriseUniversity for Real-World Cyber Risk Management and Resilience Planning on March 28, 2023![Shawn Tuma]
- March 29, 2023 - A few quotes from my keynote at SecureWorld Boston[Shawn Tuma]
- February 8, 2011 - “If you’ll not settle for anything less”[Shawn Tuma]
- February 9, 2011 - What I Learned In My First Week Using Social Media For Business[Shawn Tuma]
- February 11, 2011 - Happy Lawyers?[Shawn Tuma]
- February 18, 2011 - I’m a No0b! + A Few Other Social Media Lessons I Recently Learned[Shawn Tuma]
- February 20, 2011 - Grandpaw’s Lessons: My New Blog Series[Shawn Tuma]
- February 21, 2011 - Productivity: Are You Using Dual Monitors?[Shawn Tuma]
- February 24, 2011 - No0bs Listen Up![Shawn Tuma]
- February 24, 2011 - Grandpaw’s Lessons: Be a Craftsman[Shawn Tuma]
- February 26, 2011 - Every time I watch this it blows my mind[Shawn Tuma]
- March 1, 2011 - Grandpaw’s Lessons: “It don’t take long to shower when the water’s cold”[Shawn Tuma]
- March 6, 2011 - “Should Blogs Be Short?” or[Shawn Tuma]
- March 16, 2011 - Just A Minute?[Shawn Tuma]
- March 30, 2011 - Are You Accessible?[Shawn Tuma]
- April 24, 2011 - Amazing Example of Customer Service –> Gaylord Texan![Shawn Tuma]
- May 27, 2011 - What a Wonderful Day![Shawn Tuma]
- July 29, 2011 - My Experience With Lawyer Coaching[Shawn Tuma]
- August 27, 2011 - Are you like Clark Griswold or Ray Lewis?[Shawn Tuma]
- September 4, 2011 - Personal: Cure “Fore” Clara – My Precious Daughter[Shawn Tuma]
- September 11, 2011 - Determination.[Shawn Tuma]
- September 23, 2011 - My Interview With Cordell Parvin[Shawn Tuma]
- October 30, 2011 - BrittonTuma — our new law firm is finally here![Shawn Tuma]
- November 23, 2011 - Are you using OneNote / Outlook / Getting Things Done? You should–for whatever you do![Shawn Tuma]
- February 5, 2012 - What the Giants’ Season Can Teach Us About Life[Shawn Tuma]
- September 3, 2012 - Tension is Not Always Bad[Shawn Tuma]
- November 28, 2012 - How a simple calendar – Zig Ziglar’s calendar – helped change my life. Thank you Zig![Shawn Tuma]
- March 7, 2013 - … there’s no such thing as too much lawyering.[Shawn Tuma]
- August 2, 2013 - Lawyers — answer this one question if you want to persuade judges[Shawn Tuma]
- December 14, 2014 - #SonyHack shows there are no “safe secrets” in the corporate world – what do you do?[Shawn Tuma]
- January 20, 2015 - Lawyers: Simple Ways to Use Social Media Marketing in One Hour: Part 1 | Cordell Parvin Blog[Shawn Tuma]
- January 22, 2015 - Part 3 of Series: Simple Ways to Use Social Media to Build Your Practice in One Hour[Shawn Tuma]
- January 31, 2015 - DFW Business Leaders, I have 2 questions for you …[Shawn Tuma]
- May 15, 2015 - Speaking on Cybersecurity Law, Risk & Compliance at Collin County Bench Bar Conference in Austin! #CCBBF[Shawn Tuma]
- May 22, 2015 - Excellent information and great company: check out AllClear ID’s “Resources” page[Shawn Tuma]
- August 12, 2015 - Rocky Dhir Interviews Shawn Tuma About Cybersecurity for Lawyers at State Bar of Texas 2015 Annual Meeting[Shawn Tuma]
- November 13, 2015 - Why I am involved with the DFW Technology Prayer Breakfast[Shawn Tuma]
- November 24, 2015 - Texas Super Lawyers Honors Shawn Tuma[Shawn Tuma]
- January 20, 2016 - How Scheef & Stone’s clients can benefit from Mackrell International[Shawn Tuma]
- April 27, 2016 - DFW Cybersecurity Attorney Shawn Tuma Named to D Magazine’s 2016 Best Lawyers List[Shawn Tuma]
- June 30, 2016 - D CEO Magazine: Why Cybercriminals Are Targeting Law Firms[Shawn Tuma]
- November 24, 2016 - Thank You and Happy Thanksgiving![Shawn Tuma]
- March 27, 2017 - “Thank You” to 2 Legal Leaders that I Respect[Shawn Tuma]
- July 16, 2020 - Shawn Tuma Elected as Chair of TX State Bar Computer & Technology Section[Shawn Tuma]
- October 23, 2011 - Cybersecurity risk — think its material? (hint: the SEC does!)[Shawn Tuma]
- December 9, 2012 - Executives of Public Companies Must Use Caution With Social Media – The SEC is Watching![Shawn Tuma]
- February 6, 2014 - The SEC Will Begin Looking at Companies’ IT Security and Data Breach Response Policies[Shawn Tuma]
- February 19, 2014 - Is Your Business Following the 3 Steps the FTC is Requiring for Using Data Service Providers?[Shawn Tuma]
- September 22, 2014 - Data Breach Judgment: Will Home Depot Be the One to “Get It”?[Shawn Tuma]
- December 30, 2014 - Boards Had Better Start Paying Attention to Cybersecurity[Shawn Tuma]
- February 17, 2015 - New Podcast: #DtSR Episode 130 – Where Law and Cyber Collide[Shawn Tuma]
- May 1, 2015 - Will Officers & Directors Be Held Legally Responsible for Companies’ Data Breaches and Cybersecurity Incidents?[Shawn Tuma]
- May 13, 2015 - Cybersecurity is a Top Concern for Corporate General Counsel[Shawn Tuma]
- May 14, 2015 - Cybersecurity Presentation at ACFE 25th Annual DFW Fraud Conference[Shawn Tuma]
- May 19, 2015 - Cybersecurity Risk: Law and Trends – Ethical Boardroom Article[Shawn Tuma]
- May 21, 2015 - FTC Gives Good Reason to Not (Try to) Hide Data Breaches[Shawn Tuma]
- June 29, 2015 - Cybersecurity & Data Breach: You Don’t Drown From Falling Into the Water[Shawn Tuma]
- August 6, 2015 - Why every CIO needs a cybersecurity attorney (my comments on why this is my favorite article ever)[Shawn Tuma]
- August 12, 2015 - Rocky Dhir Interviews Shawn Tuma About Cybersecurity for Lawyers at State Bar of Texas 2015 Annual Meeting[Shawn Tuma]
- November 27, 2015 - FTC v. Wyndham Worldwide Solidifies the FTC’s Role in Regulating Cybersecurity[Shawn Tuma]
- November 27, 2015 - SEC v. R.T. Jones shows the SEC has a role in regulating cybersecurity[Shawn Tuma]
- November 27, 2015 - FTC v. LabMD: I always give ’em a fair trial before I hang ’em.[Shawn Tuma]
- December 10, 2015 - Wyndham and FTC settle data breach dispute — Wyndham got 20 years[Shawn Tuma]
- January 13, 2016 - Cybersecurity Legal Year in Review – #DtSR Podcast[Shawn Tuma]
- February 5, 2016 - Managing Cybersecurity Risks for Boards of Directors[Shawn Tuma]
- February 13, 2016 - The #1 Reason NIST Cybersecurity Framework is Becoming the Standard[Shawn Tuma]
- April 28, 2016 - 3 Important Points on Computer Use Policies[Shawn Tuma]
- May 19, 2016 - Computer Use Policies – Are Your Company’s Illegal According to the NLRB?[Shawn Tuma]
- May 15, 2017 - Webinar: Global reaching Cybersecurity Regulations in New York, will they impact your company?[Shawn Tuma]
- August 6, 2017 - Invitation for 2 Webinars: Protecting Data Exchanged in Discovery and Securing IoT Data[Shawn Tuma]
- December 5, 2017 - Complimentary Webinar: Countdown to #GDPR – Compliance for Non-EU Companies[Shawn Tuma]
- January 24, 2018 - Allscripts EHR Ransomware Attack is Huge–How Will it Impact Healthcare Practices?[Shawn Tuma]
- January 26, 2018 - Helpful FTC Guidance on Cybersecurity for Small and Midsize Companies[Shawn Tuma]
- July 29, 2020 - Why did Lifespan Health face such a stiff HIPAA penalty for a stolen laptop? (publication)[Shawn Tuma]
- October 26, 2022 - OCR Guidance on HIPAA Security Rule Security Incident Procedures for National Cybersecurity Awareness Month[Shawn Tuma]
- October 28, 2022 - “Data is the hot potato!” and data minimization lessons from the FTC’s Drizly case[Shawn Tuma]
- November 1, 2022 - OCR Releases Video Guidance on Recognized Security Practices for National Cybersecurity Awareness Month[Shawn Tuma]
- November 8, 2022 - “Data is the hot potato!” — some data governance lessons from the Twitter Whistleblower Testimony[Shawn Tuma]
- December 15, 2022 - Dental Practice Responses to Online Reviews Cost $23,000 Settlement with OCR for Impermissible Disclosure of PHI[Shawn Tuma]
- January 25, 2023 - SEC Continues to Emphasize Importance of Cybersecurity and Cyber Risk Governance[Shawn Tuma]
- March 10, 2023 - The White House Cybersecurity Plan – the Devil is in the Details[Shawn Tuma]
- March 20, 2023 - HHS Releases HPH Sector Cybersecurity Framework Implementation Guide to Help Healthcare Organizations Leverage NIST Cybersecurity Framework[Shawn Tuma]
Like this:
Like Loading...