Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law

Before leaving his employment at Merritt Hawkins & Associates (MHA), Larry Gresham allegedly accessed MHA's computer network and copied 400 of MHA's proprietary files and then deleted hundreds of files in an attempt to hide his activities. A jury found Gresham's actions violated the Harmful Access by Computer Act (HACA), Texas unauthorized access law (i.e., "hacking [...]

Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?

Should a claim for [YOU GUESS] have been included in this lawsuit? See my thoughts below and share your thoughts. The Allegations Behind the Lawsuit A legal team led by Gloria Allred made news by suing Toyota (and others) on behalf of a Frisco, Texas pastor and his wife, Tim  and Claire Gautreaux, alleging that a [...]

3 Important Points on Computer Use Policies

IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today's businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are [...]