In the Fall of 2000, I delivered this presentation at the North Central Texas Council of Governments' e-Government 2000 Fall Forum. There were no slides at this presentation but this is the paper that was delivered to the group.
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show.
For this and other videos, visit us at http://metanomics.net.
Federal law enforcement agencies recently demanded that Apple break the encryption used by iOS in the Apple v FBI fight in 2015, but backed down when an exploit was used to break into the iPhone.What followed was a pause in the demand for encryption backdoors for a few years, but that break has been short lived. This talk will update attendees on the history of the demands for encryption backdoors, from the Clipper chip to the creation of CALEA, and summarize recent demands from law enforcement to the tech industry to weaken strong encryption and allow law enforcement to access any data, any time.
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
Federal agencies are increasingly looking to virtual world technologies as both an opportunity and a potential threat. In this of an episode of Metanomics, Drs. Paulette Robinson and Robert Young, leading figures in the adoption of the metaverse at all levels of government, discuss how government is using virtual world technologies, and examine issues around security.
Metanomics is a weekly broadcast examining the serious uses of virtual worlds. Join us at http://metanomics.net.
051309 Federal Interest And Social Security Metanomics TranscriptRemedy Communications
Metanomics is a weekly Web-based show on the serious uses of virtual worlds. This transcript is from a past show.
For this and other videos, visit us at http://metanomics.net.
Federal law enforcement agencies recently demanded that Apple break the encryption used by iOS in the Apple v FBI fight in 2015, but backed down when an exploit was used to break into the iPhone.What followed was a pause in the demand for encryption backdoors for a few years, but that break has been short lived. This talk will update attendees on the history of the demands for encryption backdoors, from the Clipper chip to the creation of CALEA, and summarize recent demands from law enforcement to the tech industry to weaken strong encryption and allow law enforcement to access any data, any time.
Metanomics: Federal Interest in Virtual Worlds and CybersecurityDoug Thompson
Federal agencies are increasingly looking to virtual world technologies as both an opportunity and a potential threat. In this of an episode of Metanomics, Drs. Paulette Robinson and Robert Young, leading figures in the adoption of the metaverse at all levels of government, discuss how government is using virtual world technologies, and examine issues around security.
Metanomics is a weekly broadcast examining the serious uses of virtual worlds. Join us at http://metanomics.net.
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
An iterative update on my ongoing work on revenge porn and how to deal with it. This talk analyses recent legislation and Google's recent decision to extend the "right to be forgotten" to revenge porn and argues both forgiving (restorative justice) and forgetting (RTBF) may be more useful remedies than the crimainal law alone for victims.
The Internet Blackout of 2012 - Protest Against SOPA and PIPAShanna Kurpe
In this presentation, Shanna Kurpe explains the Internet Blackout of 2012 and discussed the impact of house bill SOPA and senate bill PIPA with web design and web development students.
What do we do with aproblem like revenge porn ?Lilian Edwards
Revenge porn is a vile and growing phenomenon. Thuis talk discusses its origins and gendered nature, what UK criminal law applies to stop it, and what other solutions there might be eg faster take down by socuial networks, the "right to be forgotten"
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
Given the exhaustive plethora of information regarding Wikileaks, Anonymous, and the U.S. Government, this is a comparatively superficial overview of the impact of Information Warfare on the Internet and our rights.
My apologies for the somewhat informal research aesthetic.
To understand the significance of the Computer Fraud and Abuse Act, we must consider its history, the use, scope, and function of the Internet at the time of the Act’s inception, and the recurring nature which Congress amended the Act in order to keep up with the advancements of computer and computer-based communications.
We must also consider the evolution of precedence over the course of its history with respect to charges under the Act.
Further, we must address the root cause of the contentious nature of this Act as written, and look to other industry models which can assist in amending the Act according to contemporary use of computers, and the modern Internet.
An iterative update on my ongoing work on revenge porn and how to deal with it. This talk analyses recent legislation and Google's recent decision to extend the "right to be forgotten" to revenge porn and argues both forgiving (restorative justice) and forgetting (RTBF) may be more useful remedies than the crimainal law alone for victims.
The Internet Blackout of 2012 - Protest Against SOPA and PIPAShanna Kurpe
In this presentation, Shanna Kurpe explains the Internet Blackout of 2012 and discussed the impact of house bill SOPA and senate bill PIPA with web design and web development students.
What do we do with aproblem like revenge porn ?Lilian Edwards
Revenge porn is a vile and growing phenomenon. Thuis talk discusses its origins and gendered nature, what UK criminal law applies to stop it, and what other solutions there might be eg faster take down by socuial networks, the "right to be forgotten"
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can
assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises
severe privacy concerns. In this paper, we have discussed this complex information technology issue of
governmental wiretapping and how it effects both public and private liberties. Legislation has had a
major impact on the uses and the stigma of wiretapping for the war on terrorism. This paper also
analyzes the ethical and legal concerns inherent when discussing the benefits and concerns of
wiretapping. The analysis has concluded with the effects of wiretapping laws as they relate to future
government actions in their fight against terrorists.
Yahoo!, the Shi Tao Case, and lessons for corporate social responsibilityrmackinnon
Slides from an academic paper presentation. Paper at: http://rconversation.blogs.com/YahooShiTaoLessons.pdf">Download YahooShiTaoLessons.pdf
ABSTRACT: In 2005, Chinese journalist Shi Tao was convicted and sentenced to ten years in prison for leaking state secrets abroad. Key evidence cited in Chinese court documents included information about Shi’s account supplied by Yahoo! to the Chinese State Security Bureau. Condemnation by human rights groups and investors, U.S. congressional hearings, a Hong Kong government investigation, and a U.S. lawsuit followed. This paper documents the core facts, events, issues and debates involved. The Shi Tao case highlights the complex challenges of corporate social responsibility for Internet and telecommunications companies: They are caught between demands of governments on one hand and rights of users on the other – not only in authoritarian countries such as China but in virtually all countries around the world. While there are no simple or quick solutions, Internet and telecoms companies seeking to establish trustworthy reputations across a global customer base cannot afford to ignore the human rights implications of their business practices. Users and investors have a right to demand that user rights be respected. If companies fail to respect user rights, the need to develop non-commercial, grassroots alternatives will become increasingly important if privacy and free expression are to be possible anywhere.
Balancing an employer's right to know vs. privacy; wireless devices and employee's privacy violations; monitoring and creating policies regarding internet, email, tesxting and other electronic communications; wireless devices and employee's and employer's privacy violations; off the job behavior;
Social media, surveillance and censorshiplilianedwards
Talk delivered at European University Florence, March 2012. Did the Aran spring really prove that social media enables the flowering of democracy or are social media in fact easy venues for blanket state surveillance? Can they be arenas for free speech when platforms likeTwitter are refining their censorship policies to avoid legal risk?
Similar to Municipalities & The Internet: A Few Legal Issues (12)
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...Shawn Tuma
Shawn Tuma, a professional "breach guide" (aka, breach quarterback, coach, privacy counsel, etc), is an attorney who has practiced in cyber law since 1999. His day job as Co-Chair of Spencer Fane LLP's Data Privacy and Cybersecurity Practice is leading companies through the cyber incident response and recovery process. In this presentation, he provides a virtual tabletop exercise explaining the lifecycle of responding to a typical ransomware attack through a detailed timeline.
The audio for this presentation, in podcast form, is here: https://www.secureworldexpo.com/resources/podcast-ransomware-attack-lifecycle
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, was a guest lecturer on this topic at Southern Methodist University Digital Branding Class on October 27, 2020.
Incident Response Planning - Lifecycle of Responding to a Ransomware AttackShawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, was a guest lecturer on this topic at Columbia University for the Executive Masters of Technology Management Program on November 21, 2020.
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, presented on this topic at the 2020 Northwestern State University's Fall Continuing Legal Education Conference on November 18, 2020.
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...Shawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, presented on this topic at the 2020 Dallas Baptist University Reimagine Technology Conference course in Dallas, Texas on November 18, 2020.
The Role of Contracts in Privacy, Cybersecurity, and Data BreachShawn Tuma
Shawn Tuma, Co-Chair of Spencer Fane LLP's Data Privacy & Cybersecurity practice, presented on this topic at the 2020 Texas Bar CLE's Making and Breaking Iron-Clad Contracts course in Austin, Texas on March 6, 2020.
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
Shawn Tuma delivered this presentation on April 9, 2019, at the Oklahoma State University 4th Annual Cyber Security Conference in Oklahoma City, Oklahoma.
In twenty years of practicing cyber law, Shawn Tuma has seen a multitude of cybersecurity and data breach cases that have helped him understand the real-world risks companies face and the practical things they can do to prioritize their resources and effectively manage cyber risk. In this presentation, he will share his experience on issues such as:
· Why cybersecurity is an overall business risk issue that must be properly managed to comply with laws and regulations
· Why strategic leadership is critical in cybersecurity
· Why teams are critical for cybersecurity and how to personalities and psychology can impact that team
· The most likely real-world risks that most companies face
· How to prioritize limited resources to effectively manage the most likely real-world risks
· What is reasonable cybersecurity
· How to develop, implement, and mature a cyber risk management program
· Why cyber insurance is a critical component of the cyber risk management process
Real World Cyber Risk. Understand it. Manage it.Shawn Tuma
Renaissance Executive Forums 2019 CEO Summit presentation by Shawn E. Tuma, Co-Chair, Data Privacy & Cybersecurity Group, Spencer Fane, LLP
March 7, 2019
Dallas, Texas
The Legal Case for Cyber Risk Management Programs and What They Should IncludeShawn Tuma
Spencer Fane LLP Cybersecurity and Data Privacy attorney Shawn Tuma delivered "The Legal Case for Cyber Risk Management Programs and What They Should Include" at the Texas Society of Certified Public Accountants' TSCPA CPE 2018 CPE Expo Conference on November 30, 2018, in Addison, Texas.
As an attorney serving as a guide for companies that have data breaches, I regularly advise clients through the data breach incident response process. Here is a checklist that I developed to give them a roadmap for how this process works, on a single page. While this is not an exhaustive list, these are the items that most often need to be performed in the cases in which I guide clients through the incident response and remediation process. Of course, there will be exceptions, additions, and omissions — take this for what it is, a starting point. Another important point to remember is that this is just a checklist, it is not a cybersecurity incident response plan. Fore more information see https://shawnetuma.com/incident-response-checklist/
Cybersecurity: Cyber Risk Management for Lawyers and ClientsShawn Tuma
Shawn E. Tuma, cybersecurity and data privacy attorney at Spencer Fane, LLP, delivered the presentation titled "Cybersecurity: Cyber Risk Management for Lawyers and Clients" at the Texas Bar CLE's 16th Annual Advanced Business Law Course on November 8, 2018.
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)Shawn Tuma
Cybersecurity is a Team Sport: Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams.
This presentation was a discussion of issues such as:
* Who should be on the team and what should they know?
* How should the team be organized?
* Who is responsible for developing the strategy and seeing the whole playing field?
* What are the team members responsibilities?
* How do team members personalities affect their roles and performance?
* Is there a role for lawyers if the "privilege" "magic wand" turns out to be more fairy-tale than reality?
The presentation was delivered by cybersecurity and data privacy attorney Shawn Tuma, Co-Chair of the Cybersecurity and Data Privacy Practice Group of Spencer Fane LLP, on October 10, 2018, at SecureWorld - Dallas.
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsShawn Tuma
Everyone should now understand that no bank or financial institution is immune from cyber risk. Many are now ready to move forward with improving their cyber risk posture but do not know what to do next or how to prioritize their resources. Recognizing that cybersecurity is an overall business risk issue that must be properly managed to comply with many laws and regulations governing banks and financial institutions, this presentation will provide a strategy for how to better understand and manage such risks by:
(1) Providing an overview of the legal and regulatory framework;
(2) Examining the most likely real-world risks; and
(3) Providing strategies for how to manage such risks, including cyber insurance and the development and implementation of an appropriate cyber risk management program (which is not as difficult as it sounds).
Shawn E. Tuma, cybersecurity and data privacy attorney at Spencer Fane, LLP, delivered the presentation titled Cybersecurity: Cyber Risk Management for Banks & Financial Institutions (and Attorneys Who Represent Them) at the Southwest Association of Bank Counsel 42nd Annual Convention on September 20, 2018 (formerly, Texas Association of Bank Counsel).
Something is Phishy: Cyber Scams and How to Avoid ThemShawn Tuma
Reginald A. Hirsch and Shawn E. Tuma presented this talk at the Annual Meeting of the State Bar of Texas for the Law Practice Management Section of the State Bar of Texas. The date of the talk was June 22, 2018, and the location was Houston, Texas.
Cybersecurity Fundamentals for Legal Professionals (and every other business)Shawn Tuma
Cybersecurity & Data Privacy attorney Shawn Tuma delivered this presentation to the Mid-Year Meeting of the State Bar of Oklahoma's Intellectual Property Law Section on June 2, 2018. For more information visit www.shawnetuma.com
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersHarpreetSaini48
Discover how Mississauga criminal defence lawyers defend clients facing weapon offence charges with expert legal guidance and courtroom representation.
To know more visit: https://www.saini-law.com/
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
Matthew Professional CV experienced Government LiaisonMattGardner52
As an experienced Government Liaison, I have demonstrated expertise in Corporate Governance. My skill set includes senior-level management in Contract Management, Legal Support, and Diplomatic Relations. I have also gained proficiency as a Corporate Liaison, utilizing my strong background in accounting, finance, and legal, with a Bachelor's degree (B.A.) from California State University. My Administrative Skills further strengthen my ability to contribute to the growth and success of any organization.
Car Accident Injury Do I Have a Case....Knowyourright
Every year, thousands of Minnesotans are injured in car accidents. These injuries can be severe – even life-changing. Under Minnesota law, you can pursue compensation through a personal injury lawsuit.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
Lifting the Corporate Veil. Power Point Presentationseri bangash
"Lifting the Corporate Veil" is a legal concept that refers to the judicial act of disregarding the separate legal personality of a corporation or limited liability company (LLC). Normally, a corporation is considered a legal entity separate from its shareholders or members, meaning that the personal assets of shareholders or members are protected from the liabilities of the corporation. However, there are certain situations where courts may decide to "pierce" or "lift" the corporate veil, holding shareholders or members personally liable for the debts or actions of the corporation.
Here are some common scenarios in which courts might lift the corporate veil:
Fraud or Illegality: If shareholders or members use the corporate structure to perpetrate fraud, evade legal obligations, or engage in illegal activities, courts may disregard the corporate entity and hold those individuals personally liable.
Undercapitalization: If a corporation is formed with insufficient capital to conduct its intended business and meet its foreseeable liabilities, and this lack of capitalization results in harm to creditors or other parties, courts may lift the corporate veil to hold shareholders or members liable.
Failure to Observe Corporate Formalities: Corporations and LLCs are required to observe certain formalities, such as holding regular meetings, maintaining separate financial records, and avoiding commingling of personal and corporate assets. If these formalities are not observed and the corporate structure is used as a mere façade, courts may disregard the corporate entity.
Alter Ego: If there is such a unity of interest and ownership between the corporation and its shareholders or members that the separate personalities of the corporation and the individuals no longer exist, courts may treat the corporation as the alter ego of its owners and hold them personally liable.
Group Enterprises: In some cases, where multiple corporations are closely related or form part of a single economic unit, courts may pierce the corporate veil to achieve equity, particularly if one corporation's actions harm creditors or other stakeholders and the corporate structure is being used to shield culpable parties from liability.
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Massimo Talia
This guide aims to provide information on how lawyers will be able to use the opportunities provided by AI tools and how such tools could help the business processes of small firms. Its objective is to provide lawyers with some background to understand what they can and cannot realistically expect from these products. This guide aims to give a reference point for small law practices in the EU
against which they can evaluate those classes of AI applications that are probably the most relevant for them.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
2. The Author’s Biography
Shawn E. Tuma is an attorney practicing with DONOHOE, JAMESON & CARROLL, P.C. in
Dallas, Texas. His practice focuses on the developing law of the Internet and litigation
of commercial disputes involving contract, technology, intellectual property, deceptive
trade practices, insurance, and employment issues.
Mr. Tuma received his B.A., with honors, from Northwestern State University and his
J.D., magna cum laude, from Regent University School of Law, where he was selected
as the Outstanding Graduate in the School of Law, served as Editor-in-Chief of the
Regent University Law Review, received the Corpus Juris Secundum Award for
Contracts and Civil Procedure, and was chosen as a member of Who’s Who Among
Students in American Universities & Colleges and Who’s Who Among American Law
Students.
Mr. Tuma is licensed in all State and Federal Courts in Texas and the Fifth Circuit
Court of Appeals, is a member of the American Bar Association, and Dallas Bar
Association. Mr. Tuma has recently participated in the following professional activities:
PRESENTATIONS
" Contracting Over the Internet in Texas, Presentation to the
Dallas Bar Association, February 2000
" Shifting Paradigms: Practicing Law in the Information Age,
a symposium at Texas Tech School of Law, March 2000
" Contracting Over the Internet, B2B and B2C E Commerce Seminar,
forthcoming February 2001
PUBLICATIONS
" Contracting Over the Internet in Texas, Baylor Law Review,
Volume 51
" It Ain’t Over ‘Till . . . A Post Y-2K Analysis of Y2K Litigation
& Legislation, Texas Tech Law Review, Volume 31, Book IV
" Preserving Liberty: United States v. Printz and the Vigilant
Defense of Federalism, Regent University Law Review,
Volume 10, Number 1
Mr. Tuma is married to Stacy Tuma and they currently have three children, Katherine
who is five, Seth who is four, and Andrew who is two. They are expecting another child
in December. Their family resides in The Colony, Texas.
3. 1
Associate Attorney, Donohoe, Jameson & Carroll, P.C., Dallas, Texas. B.A., Northwestern
State University; J.D., magna cum laude, Regent University School of Law.
MUNICIPALITIES & THE INTERNET: A FEW LEGAL ISSUES
Shawn E. Tuma1
I. INTRODUCTION
The benefits to using the Internet in the day to day operation of municipal
governments are many. Among those, are the dramatic increase in public accessability
to information and governmental efficiency in conducting day-to-day affairs.
Unfortunately, using the Internet poses just as many potential problems as it does
benefits. Unless a municipal government is careful to understand the many pitfalls of
the Internet and prepare itself in advance for those problems, all of the benefits it brings
forth can be lost through disputes and litigation. Thus, it is important for you all to
know where you, your colleagues, and employees stand with a few basic legal issues that
are likely to be encountered with regard to Internet usage. There number of issues that
use of the Internet can raise is incalculable and it would be impossible to address them
all in this article. Accordingly, this article will focus on three issues: first, personal use
of the Internet by officials and employees; second, public access to open government; and
third, entering transactions over the Internet.
II. PERSONAL USE OF THE INTERNET
Personal use of the Internet from the municipality’s office, or using the
municipality’s Internet service by “logging on” from a remote location such as an
employee’s own home, can present several problems for the municipality. Though there
are numerous issues that arise in this area this section will focus on two main problems