Before leaving his employment at Merritt Hawkins & Associates (MHA), Larry Gresham allegedly accessed MHA's computer network and copied 400 of MHA's proprietary files and then deleted hundreds of files in an attempt to hide his activities. A jury found Gresham's actions violated the Harmful Access by Computer Act (HACA), Texas unauthorized access law (i.e., "hacking … Continue reading Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law
There are many ways to honor someone. For me, one of the greatest privileges is knowing that others have found some value or usefulness in my work, especially by referencing it to others. What is unfortunate, however, is when you did not learn about it for quite some time and realize you never properly thanked … Continue reading “Thank You” to 2 Legal Leaders that I Respect
Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it … Continue reading Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing
Should a claim for [YOU GUESS] have been included in this lawsuit? See my thoughts below and share your thoughts. The Allegations Behind the Lawsuit A legal team led by Gloria Allred made news by suing Toyota (and others) on behalf of a Frisco, Texas pastor and his wife, Tim and Claire Gautreaux, alleging that a … Continue reading Is Key Claim Missing from Pastor’s Lawsuit Over Wife’s Nude Pics Emailed to Swinger Site?
IMPORTANT POINT #1: YOUR BUSINESS MUST HAVE A COMPUTER USE POLICY IN PLACE Computer Use Policies (or Acceptable Use Policies, as they are often referred to) are must haves for today's businesses. Such policies are a foundational component in how a business creates a culture of security with its workforce by establishing expectations on what are … Continue reading 3 Important Points on Computer Use Policies
The Dallas Court of Appeals recently decided a civil case involving claims under Texas' unauthorized access of computer law that provides some helpful guidance for this relatively new law that has very little case law construing it. The 3 takeaways that follow are the key legal principles that apply to this law as set forth … Continue reading 3 Key Takeaways About Texas’ Unauthorized Access Law