Shawn Tuma – BrittonTuma

Computer Fraud and Abuse Act Limitations Accrued With Awareness of ...

SUMMARY: The two year statute of limitations for Computer Fraud and Abuse Act claim began to run when the plaintiff had an awareness of an unauthorized access into its computer system even if the plaintiff did not know the…more

| Business Torts, Communications & Media Law, Intellectual Property, Labor...

Jurisdiction for an International Computer Fraud Lawsuit?

The proper jurisdiction for suing someone for engaging in computer fraud from a foreign country, directed at a company in the United States, is the place where the wrongfully accessed computer server is located if the defendant…more

| Business Torts, Intellectual Property, Labor & Employment Law, Privacy,...

Data Breach: Who's Gonna Get It?

The message–that’s what I’m talking about–who’s gonna get the message sent to them first? Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing anytime…more

| Business Organizations, Communications & Media Law, Consumer Protection,...

Texas’ Amended Data Breach Notification Law Is Expansive

Texas amended its existing data breach notification law which became effective on September 1, 2012. The relevant section of the law is titled “Notification Required Following Breach of Security of Computerized Data” and is…more

| Communications & Media Law, Consumer Protection, Intellectual Property,...

Social Media Policy Must Have: when are they on the clock?

If your company has employees managing its social media you better have a policy that makes it clear when they are "on the clock" and "off the clock" or you could end up in trouble for violating the Fair Labor Standards Act…more

| Commercial Law & Contracts, Communications & Media Law, Intellectual...

Your business needs a social media policy and this is why

It is foolish to not have one. Having a social media policy is like having a Will for your businesses’ branding and marketing efforts and the cost of getting that policy will likely be less than the bill for the first day in…more

| Business Torts, Communications & Media Law, Intellectual Property, Labor...

Are LinkedIn Contacts Trade Secrets?

A judge “across the pond” ruled that an employee’s LinkedIn contacts were, in essence, trade secrets of his former employer where those contacts were created during the term of employment and mimicked the employer’s confidential…more

| Business Torts, Intellectual Property, Labor & Employment Law, Law Firm...

Can stealing a CAR violate the Computer Fraud and Abuse Act?

Ford wants its cars connected to the Internet. By now we all know from my previous post on United States v. Kramer that the Computer Fraud and Abuse Act applies to anything with a microchip or data processor that is connected to…more

| Communications & Media Law, Intellectual Property, Labor & Employment...

3 Recent Computer Fraud and Abuse Act Cases Worth Noting

Three recent Computer Fraud and Abuse Act (“CFAA”) cases decided over the last couple of months are worth looking at because they show the following points, respectively: (1) the CFAA in its current form does not give consumers…more

| Business Torts, Consumer Protection, Intellectual Property, Privacy,...

Computer Fraud and Abuse Act Update: Recent Cases

This article provides an update of recent cases involving the Computer Fraud and Abuse Act that have been decided over the last couple of weeks. One of particular interest, Yoder & Frey Auctioneers, Inc. v. Equipmentfacts, LLC,…more

| Intellectual Property, Labor & Employment Law, Privacy, Science,...

This profile may constitute attorney advertising. Prior results do not guarantee a similar outcome. Any correspondence with this profile holder does not constitute a client/attorney relationship. Neither the content on this profile nor transmissions between you and the profile holder through this profile are intended to provide legal or other advice or to create an attorney-client relationship.