SlideShare a Scribd company logo
1 of 8
CYBERLAW
Defining and Categorizing Chaos
Challenge
■ Rapid technological change
■ Law falling behind
Threats
■ Security
■ Interconnectedness
■ Control
■ Privacy
Implications
■ Contracts
■ Estate Planning
■ Tax
■ IP
■ Employment
Knowledgebase
■ Legal concepts
■ Technical concepts
■ Business impacts
Communication
■ Boardroom speak
■ Geek speak
■ Translation & Mediation
Keywords
■ Security
■ Privacy
■ Social Media
■ Trade Secrets
Learn More
Phone
513-253-5283
Email
djmyers@djmyerslaw.com
Web
www.djmyerslaw.com
Twitter
@djmyerslaw
LinkedIn:
www.linkedin.com/in/davidjmyers

More Related Content

What's hot

Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paperaymancoo
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and techMomokoImamura
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential InformationWilliam McBorrough
 
G Data Businessportfolio 10.5 & E P P English
G  Data  Businessportfolio 10.5 &  E P P  EnglishG  Data  Businessportfolio 10.5 &  E P P  English
G Data Businessportfolio 10.5 & E P P EnglishDaniel Chee
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
Transitioning Military Attend CyberMaryland 2014
Transitioning Military Attend CyberMaryland 2014 Transitioning Military Attend CyberMaryland 2014
Transitioning Military Attend CyberMaryland 2014 Bob Riggins
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...XeniT Solutions nv
 
Charanjit singh sodhi
Charanjit singh sodhiCharanjit singh sodhi
Charanjit singh sodhiIPPAI
 
Certificate in-cybersecurity-management-cunitech-institute
Certificate in-cybersecurity-management-cunitech-instituteCertificate in-cybersecurity-management-cunitech-institute
Certificate in-cybersecurity-management-cunitech-instituteDian DIALLO
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaNSConclave
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourselfjkl0202
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...AIIM International
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity TrendsMarco
 
The Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxThe Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxZoneFox
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsNicholas Van Exan
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
Cloudtenna Hour With An Expert Webinar
Cloudtenna Hour With An Expert WebinarCloudtenna Hour With An Expert Webinar
Cloudtenna Hour With An Expert WebinarMitch Crane
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertMuhammad Khan
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchLaVerne Kemp
 

What's hot (19)

Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paper
 
how we design privacy for smart city and tech
how we design privacy for smart city and techhow we design privacy for smart city and tech
how we design privacy for smart city and tech
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential Information
 
G Data Businessportfolio 10.5 & E P P English
G  Data  Businessportfolio 10.5 &  E P P  EnglishG  Data  Businessportfolio 10.5 &  E P P  English
G Data Businessportfolio 10.5 & E P P English
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Transitioning Military Attend CyberMaryland 2014
Transitioning Military Attend CyberMaryland 2014 Transitioning Military Attend CyberMaryland 2014
Transitioning Military Attend CyberMaryland 2014
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
Charanjit singh sodhi
Charanjit singh sodhiCharanjit singh sodhi
Charanjit singh sodhi
 
Certificate in-cybersecurity-management-cunitech-institute
Certificate in-cybersecurity-management-cunitech-instituteCertificate in-cybersecurity-management-cunitech-institute
Certificate in-cybersecurity-management-cunitech-institute
 
DATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali RangoliyaDATA BREACH & PREVENTION - Hemali Rangoliya
DATA BREACH & PREVENTION - Hemali Rangoliya
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity Trends
 
The Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxThe Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFox
 
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security ProsPrivacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
Privacy & Pwnage: Privacy, Data Breaches and Lessons for Security Pros
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Cloudtenna Hour With An Expert Webinar
Cloudtenna Hour With An Expert WebinarCloudtenna Hour With An Expert Webinar
Cloudtenna Hour With An Expert Webinar
 
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy ExpertInterview With Eric Vanderburg, Cyber Security & Privacy Expert
Interview With Eric Vanderburg, Cyber Security & Privacy Expert
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 

Viewers also liked

Патент на полезную модель Республики Беларусь
Патент на полезную модель Республики БеларусьПатент на полезную модель Республики Беларусь
Патент на полезную модель Республики БеларусьИван Иванов
 
Amr_Moussa-GM-CV
Amr_Moussa-GM-CVAmr_Moussa-GM-CV
Amr_Moussa-GM-CVAmr Moussa
 
160912 - UKAD v Slowey - NADP Decision
160912 - UKAD v Slowey - NADP Decision160912 - UKAD v Slowey - NADP Decision
160912 - UKAD v Slowey - NADP DecisionStephen Akinsanya
 
Ex1 a setnotation
Ex1 a setnotationEx1 a setnotation
Ex1 a setnotationgiovanniL
 
Definición de acero_y_su_grafica
Definición de acero_y_su_graficaDefinición de acero_y_su_grafica
Definición de acero_y_su_graficaPedromgv1473
 
Патент на полезную модель Республики Беларусь
Патент на полезную модель Республики БеларусьПатент на полезную модель Республики Беларусь
Патент на полезную модель Республики БеларусьИван Иванов
 
TeamSpartanaddsadditionalCanadianmembers090513
TeamSpartanaddsadditionalCanadianmembers090513TeamSpartanaddsadditionalCanadianmembers090513
TeamSpartanaddsadditionalCanadianmembers090513Angelo Sorrentino
 
68830664 rdtr-bab-3-draft-a3-pusat-2
68830664 rdtr-bab-3-draft-a3-pusat-268830664 rdtr-bab-3-draft-a3-pusat-2
68830664 rdtr-bab-3-draft-a3-pusat-2teguh heru winarso
 
Pedoman penyusunan RDTR Kota
Pedoman penyusunan RDTR KotaPedoman penyusunan RDTR Kota
Pedoman penyusunan RDTR KotaAji Qan D
 

Viewers also liked (12)

Патент на полезную модель Республики Беларусь
Патент на полезную модель Республики БеларусьПатент на полезную модель Республики Беларусь
Патент на полезную модель Республики Беларусь
 
Amr_Moussa-GM-CV
Amr_Moussa-GM-CVAmr_Moussa-GM-CV
Amr_Moussa-GM-CV
 
Presentation1
Presentation1Presentation1
Presentation1
 
160912 - UKAD v Slowey - NADP Decision
160912 - UKAD v Slowey - NADP Decision160912 - UKAD v Slowey - NADP Decision
160912 - UKAD v Slowey - NADP Decision
 
Ex1 a setnotation
Ex1 a setnotationEx1 a setnotation
Ex1 a setnotation
 
Definición de acero_y_su_grafica
Definición de acero_y_su_graficaDefinición de acero_y_su_grafica
Definición de acero_y_su_grafica
 
Патент на полезную модель Республики Беларусь
Патент на полезную модель Республики БеларусьПатент на полезную модель Республики Беларусь
Патент на полезную модель Республики Беларусь
 
TeamSpartanaddsadditionalCanadianmembers090513
TeamSpartanaddsadditionalCanadianmembers090513TeamSpartanaddsadditionalCanadianmembers090513
TeamSpartanaddsadditionalCanadianmembers090513
 
Neural networks
Neural networksNeural networks
Neural networks
 
68830664 rdtr-bab-3-draft-a3-pusat-2
68830664 rdtr-bab-3-draft-a3-pusat-268830664 rdtr-bab-3-draft-a3-pusat-2
68830664 rdtr-bab-3-draft-a3-pusat-2
 
Pedoman penyusunan RDTR Kota
Pedoman penyusunan RDTR KotaPedoman penyusunan RDTR Kota
Pedoman penyusunan RDTR Kota
 
Kondenzacija
KondenzacijaKondenzacija
Kondenzacija