Cybersecurity & Privacy
Cybersecurity involves the protection of information on computers and networks. Privacy involves the confidentiality of, or restriction to, information contained within computers and networks. This firm has helped dozens of companies handle cybersecurity and privacy issues. For example, this firm can:
-
Handle data breaches and attendant notifications to state and federal authorities
-
Conduct and/or direct investigations (incidence response) involving breaches of security on networks, servers and PC's
-
Negotiate Settlements with the FTC for security breaches
-
Perform audits of information technology systems
-
Generate computer security policies for companies
-
Generate privacy policies for company employees, websites and apps
-
Perform investigations involving computer crimes and torts
-
Counsel on crimes involving computer devices and systems
-
Perform investigations involving the theft of company trade secrets or corporate espionage
-
Perform limited penetration testing of websites and computer systems
Ron has made many presentations on this topic, including (most recently):
Tectonic Shifts that Will Affect Your Career in Privacy and Cybersecurity
These slides were presented to the Houston Technology CSC Webinar for InfraGuard on Tuesday, October 28, 2020.
Artificial Intelligence and Robotics in Digital Forensics
This presentation was made in the Woodlands, Texas on August 21, 2019 before a local group of certified computer forensic examiners.
The California Consumer Privacy Act of 2018: GDPR Hits Close to Home
This paper was first published in "Circuits", a newsletter of the Computer & Technology Section of the State Bar of Texas.
Cybersecurity Threats for Law Firms
This presentation was made before the Business Law Track of the Annual Meeting of the State Bar of Texas on June 13, 2019 in Austin, Texas
LinkNYC: What Sounds Like a Great Idea Can Have Some Serious Downsides
This article was published in the Summer issue of Circuits, a periodical published by the Computer & Technology Section of the State Bar of Texas
Cybersecurity for Your Office: Encryption and Firewalls
This presentation was made before the Louisiana Bar Association Solo, Small Office & Tech Conference in New Orleans, LA on April 10, 2019.
Encryption and Firewalls -- Presentation Slides
These are the presentation slides for the Essentials of Business Law, 2019 that was held in Dallas, Texas on March 15, 2019.
Cybersecurity for Your Office: Encryption and Firewalls
11:00 AM, Friday, March 15, 2019.
The European ePrivacy Directive: The Companion to GDPR About Which You Need to Know
This short essay was written for the Journal "Circuits" that is published by the Computer & Technology Section of the State Bar of Texas
What's All the Fuss About GDPR?
Known formally as the General Data Protection Regulation 2016/679,i GDPR is a European Union law concerning the protection and the privacy of individual's personal data. GDPR was drafted with the understanding that companies want personal data about individuals, and that individuals must be free to chose whether or not that data will be provided to companies and under what conditions.
General Data Protection Regulation: Keeping yourself, your customers, and your data safe in a monitized-data era
This presentation was made before a meeting of data scientists and data analysts in New York City on October 10, 2018
Carpenter v. United States: The Supreme Court Hands Privacy Advocates a (Limited) Victory
In Carpenter v. United States, 585 U.S. ___ (2018), the U.S. Supreme Court ruled that the government must get a warrant to obtain certain types of information from cell-phone providers.
A Day in the Life of a Breach - 2016
This is an updated version of a presentation made in 2015. This presentation was made before a joint session of ISACA and IIA at the Petroleum Club in Houston, Texas on October 3, 2016.
Security Audits
An outline of what in-house counsel should know about cyber-security in general, with links to checklists and more information about cyber-security audits.
Be A Hero: Encrypt Documents For Free In 3 Steps, And Learn Enough To Teach Your Clients And Opposing Counsel
Learn Why Encryption Is Good Business And How It Works. Published in "Circuits," a newsletter of the Computer & Technology Section of the State Bar of Texas in March, 2016; also presented at the 2016 Essentials of Business Law Seminar in Houston, Texas.
The Cybersecurity Landscape
An assessment of the cybersecurity situation for businesses and lawyers. Presented at the Advanced Business Law Seminar in Houston, Texas on November 19, 2015.
Computer Forensics - Tracking the Hacker
Presented at a webinar for the Information Systems Security Association (ISSA) on November 17, 2015. There was a panel of three individuals who covered how to detect a hacker, how to find the hacker, and then what to do about it. My focus was on the latter of the three, and in particular what evidence do you need to collect in order to make a case against the hacker.
A Day in the Life of a Data Breach
Presentation on data breach/notification laws to the Greater Houston Area Chapter of ISACA on August 17, 2015 in Houston, Texas.
Changes in Some Federal Rules and State Breach/Notification Laws
Presented to the Gulf Coast Chapter of the High Technology Crime Investigation Association on November 21, 2014 in Houston, Texas.
Computer & Internet Update: For the Business Owner and Lawyer
Presented at the Advanced Business Law Seminar in Dallas, Texas on November 6, 2014, and later to ISACA on December 15, 2014 in Houston, Texas.
Cybersecurity Legislation
This presentation was made before the Annual Meeting of the State Bar of Texas in Dallas, Texas on June 20, 2013.
Things to Watch for When Flying Among the Clouds
A paper (co-authored with Al Harrison) that was presented to the "Family Law Technology Course: No Tech to High Tech in Two Days" in Austin, Texas on December 13, 2012.
Cloud Computing: Security Issues When the Wind Goes South
This presentation was made before the E-Commerce and the Data Privacy Committees of the Business Law Section of the Texas Bar on September 24, 2011.
Internet Maladies (Partie Deux)
Presented at the Houston Intellectual Property Law Association Conference in Galveston, Texas on October 1, 2010.
Asset and Database Protection
These were the slides that accompanied my lecture to my class entitled "Digital Transactions" at the University of Houston Law Center (where I was an Adjunct Professor) on October 17, 2006.
Identity Theft and Data Security
This presentation was made to a conference in Houston, Texas in 2006.