Texas AG: Business Must Implement and Maintain Reasonable Cybersecurity Safeguards

Go here to read: Texas Businesses Must Implement and Maintain Reasonable Cybersecurity Safeguards According to State Attorney General

Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update

The Texas Bar Journal's year-end update on Cybersecurity & Data Privacy law was once again provided by Shawn Tuma and addressed the following issues: Lawyers’ Cybersecurity and Data Breach Obligations that are required under Texas law and the ABA's Ethics Opinion 483 titled Lawyers’ Obligations Afteran Electronic Data Breach or CyberattackWhether an IT service provider's … Continue reading Texas Bar Journal 2018 Year-End Cybersecurity & Data Privacy Update

Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law

Before leaving his employment at Merritt Hawkins & Associates (MHA), Larry Gresham allegedly accessed MHA's computer network and copied 400 of MHA's proprietary files and then deleted hundreds of files in an attempt to hide his activities. A jury found Gresham's actions violated the Harmful Access by Computer Act (HACA), Texas unauthorized access law (i.e., "hacking … Continue reading Fifth Circuit: Employee Taking Data to Work for Competitor Violates Texas Hacking Law

“Thank You” to 2 Legal Leaders that I Respect

There are many ways to honor someone. For me, one of the greatest privileges is knowing that others have found some value or usefulness in my work, especially by referencing it to others. What is unfortunate, however, is when you did not learn about it for quite some time and realize you never properly thanked … Continue reading “Thank You” to 2 Legal Leaders that I Respect

Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing

Insider misuse triggers a breach just like outside hackers. When a company’s information is compromised because of insider[1] misuse of computers or information, regardless of insider’s intentions, the result for the company and the data subjects of that information is often the same as if it were an attack by an outside adversary – it … Continue reading Insider Misuse of Computers: No Big Deal? It Can Be a Data Breach, Ask Boeing