Cybersecurity & Privacy

Cybersecurity involves the protection of information on computers and networks. Privacy involves the confidentiality of, or restriction to, information contained within computers and networks. This firm has helped dozens of companies handle cybersecurity and privacy issues. For example, this firm can:
  • Handle data breaches and attendant notifications to state and federal authorities

  • Conduct and/or direct investigations (incidence response) involving breaches of security on networks, servers and PC's

  • Negotiate Settlements with the FTC for security breaches

  • Perform audits of information technology systems

  • Generate computer security policies for companies

  • Generate privacy policies for company employees, websites and apps

  • Perform investigations involving computer crimes and torts

  • Counsel on crimes involving computer devices and systems

  • Perform investigations involving the theft of company trade secrets or corporate espionage

  • Perform limited penetration testing of websites and computer systems



Ron has made many presentations on this topic, including (most recently):

What's All the Fuss About GDPR?

Known formally as the General Data Protection Regulation 2016/679,i GDPR is a European Union law concerning the protection and the privacy of individual's personal data. GDPR was drafted with the understanding that companies want personal data about individuals, and that individuals must be free to chose whether or not that data will be provided to companies and under what conditions.

Security Audits

An outline of what in-house counsel should know about cyber-security in general, with links to checklists and more information about cyber-security audits.

The Cybersecurity Landscape

An assessment of the cybersecurity situation for businesses and lawyers. Presented at the Advanced Business Law Seminar in Houston, Texas on November 19, 2015.

Computer Forensics - Tracking the Hacker

Presented at a webinar for the Information Systems Security Association (ISSA) on November 17, 2015. There was a panel of three individuals who covered how to detect a hacker, how to find the hacker, and then what to do about it. My focus was on the latter of the three, and in particular what evidence do you need to collect in order to make a case against the hacker.

Asset and Database Protection

These were the slides that accompanied my lecture to my class entitled "Digital Transactions" at the University of Houston Law Center (where I was an Adjunct Professor) on October 17, 2006.