×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
shawn-tuma documents
Technology
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- (ISC)² Dallas/Fort Worth Chapter
Documents
Shawn Tuma Resume
Law
Cybersecurity & Data Protection: What the GC & CEO Need to Know
Law
Cybersecurity Incident Response Checklist
Law
What Does the CFAA Mean and Why Should I Care? A Primer on the Computer Fraud and Abuse Act for Civil Litigators
Law
Get the FUD out of Cybersecurity! ISACA CSXNA 2016 in Las Vegas
Law
Government Notification of Data Breach
Law
Plaintiffs' Original Petition - Gautreaux v. Toyota
Law
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- Joint Meeting of ISACA and IIA for North Texas
Law
Cybersecurity & Computer Fraud - The Convergence
Law
Data Security and Privacy by Contract: Hacking Us All Into Business Associates, SMU Science & Technology Law Review’s Cybersecurity Symposium (10/23/15)
Law
Protecting Your IP: Data Security for Software Technology
Health & Medicine
3rd Annual Health Care Cyber Security Symposium
Law
Cybersecurity: What Defense Lawyers Need to Know about Cyberliability, Cybercrime, and Cyber Insurance Coverage
Law
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Law
Cyber Liability Insurance Counseling and Breach Response
Law
E-Contracting: The Basic Rules (2/2/2001)
Law
Cyber Security for Your Clients: Business Lawyers Advising Business Clients
Law
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
Law
Guide to Computer Hacking Laws in Texas: Federal Computer Fraud and Abuse Act and Texas Computer Crimes Laws
Law
Cybersecurity Fundamentals for Legal Professionals
< Prev
Next >