Profile

Cover photo
Shawn Tuma
Works at Scheef & Stone, L.L.P.
Attended Regent University
Lived in Pineville, Louisiana
1,072 followers|218,133 views
AboutPostsPhotosYouTube+1's
Story
Tagline
Attorney | Expertise in emerging digital information law areas of Cybersecurity, Computer Fraud, Data Security & Privacy Law | blogger, author, and speaker.
Introduction
I am an experienced business, litigation, and intellectual property attorney who helps businesses assess, avoid, and resolve problems including those with emerging digital information law issues such as computer fraud, data breach, privacy and social media legal issues with a strong emphasis on the Computer Fraud and Abuse Act.  I am a devoted Christian, husband, father, author & speaker. Despite being a lawyer, I am actually guided by principles!  My practice has a strong focus on the Computer Fraud and Abuse Act. I counsel business clients on how to avoid trouble on these issues and, should they find themselves in trouble, help them resolve the issues in the most expeditious and efficient way possible, which is where my extensive litigation training and skills become very helpful.  I am also a blogger, author, and speaker. I am very thankful to be blessed with a wonderful family, friends, career, and life in general. I love God, my family, my career and the opportunities I have to continue growing and learning while helping others. You can visit my personal website / blog (www.shawnetuma.com) to learn more about who I am Personally and Professionally, as well as my Professional Philosophy. Also note that Google does not use my middle initial but most of my professional activities are listed with my name as Shawn E. Tuma so if you're searching for something and are doing a search, use that full name as well.
Bragging rights
I am married to the most wonderful woman in the world, Rachel Tuma, and have the 5 most amazing children anyone could ever ask for: Katherine, Clara, Christopher, Andrew and Seth! I am truly blessed!
Education
  • Regent University
    Law, 1996 - 1999
  • Northwestern State University
    Political Science & History, 1993
Basic Information
Gender
Male
Looking for
Friends, Networking
Relationship
Married
Other names
Shawn E. Tuma
Collections Shawn is following
View all
Work
Occupation
Computer Fraud, Computer Fraud and Abuse Act, Privacy, Data Breach, Technology, Litigation & Business Adviser and Attorney
Employment
  • Scheef & Stone, L.L.P.
    Partner, 2014 - present
  • BrittonTuma
    Partner, 2011 - 2014
  • Winstead
    2000 - 2007
  • Shamoun & Norman
    2007 - 2009
  • Winstead PC
Places
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
Previously
Pineville, Louisiana - Baton Rouge, Louisiana - Natchitoches, Louisiana - Virginia Beach, Virginia - The Colony, Texas
Contact Information
Home
Mobile
(214) 726-2808
Email
Work
Phone
(214) 472-2135
Email
Address
2600 Network Blvd., Suite 400 Frisco, Texas 75034

Stream

Shawn Tuma

Shared publicly  - 
 
My friend Paul Ferrillo (@PaulFerrillo) shared a cybersecurity version of the Night Before Christmas that I thought was brilliant. Wanting to be sure and properly credit this fine work, I asked Pau…
1
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Posts about shame hacking written by Shawn E. Tuma
1
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Here are my top 3 key Computer Fraud and Abuse Act (CFAA) takeaways from the Ninth Circuit Court of Appeals’ Order and Amended Opinion issued on December 9, 2016 in Facebook, Inc. v. Power Ve…
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Question: What do holiday charities, school closings,social media and ransomware have in common? Answer: They are all tools that cybercriminals use to steal money from you! Social engineering is a …
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Summary Cybersecurity & Data Privacy Partner, Scheef & Stone, L.L.P. Board of Directors & General Counsel, Cyber Future Foundation Board of Advisors, North Texas Cyber Forensics Lab Boa…
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
When presenting theft of trade secret claims to a jury, it is important for the lawyer representing the Plaintiff to explain the difference between a trade secret and a patent. It is common for a …
1
1
Bert Knabe's profile photo
 
Wow, it never occurred to me that the two could be confused. Guess that's why I'm not a lawyer. :^)
Add a comment...

Shawn Tuma

Shared publicly  - 
 
The New York Department of Financial Services has pushed back the effective date of its Cybersecurity Regulations from January 1, 2017 to March 1, 2017. This is to give the NYDFS time to significan…
1
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Here are my top 3 key Computer Fraud and Abuse Act (CFAA) takeaways from the Ninth Circuit Court of Appeals’ Order and Amended Opinion issued on December 9, 2016 in Facebook, Inc. v. Power Ve…
1
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
Many smaller companies — especially startups — view cybersecurity as a first world problem that pales in comparison to their immediate concerns for staying business. The reality is, it …
2
1
Add a comment...

Shawn Tuma

Shared publicly  - 
 
GUIDE TO NEW YORK DEPARTMENT OF FINANCIAL SERVICES CYBERSECURITY REGULATIONS Introduction. 1.1. Which businesses will be impacted? 1.2. What do the Cybersecurity Regulations require? 1.3. Wha…
2
Add a comment...

Shawn Tuma

Shared publicly  - 
1
1
Bert Knabe's profile photo
 
I'm not sure, but I think, since he was given access to the device with the assumption he would only be accessing the app to verify approval, it should be there.
Add a comment...
Shawn Tuma's +1's are the things they like, agree with, or want to recommend.
Trump's Policies Will Make America First Again
www.newsmax.com

Peace through Strength, the Eisenhower policy, will be the Trump policy. Trump will change Washington as it has not been changed since Ronal

It Was Only a Matter of Time - DEA Revisiting Federal Status of Marijuan...
southfloridatrial.foxrothschild.com

23 states, plus the District of Columbia and Guam permit some form of medical marijuana use. And, there are various medical marijuana ballot

Shots Fired: Wikileaks Accuses Panama Papers' Leaker Of Being "Soros-Fun...
www.zerohedge.com

Leading news site for global finance, economics, market, and political analysis.

Unauthorized Access of President Obama’s Student Loan Data Ends in Compu...
computerfraud.us

The Eight Circuit Court of Appeals upheld the criminal conviction of Sandra Teague for accessing President Obama’s data in the National Stud

Selling Life Contingent Payments from a Structured Settlement; Attorney ...
legalbroadcastnetwork.com

Structured settlements may contain life contingent payments, and these payments can be sold. Dallas attorney Matt Bracy explains life contin

Cyber Law is (the new) Practical Business Law - Zepko blog
security.zepko.com

Cyber Law is (the new) Practical Business Law. by Zepko Security · May 20, 2015. The cyber world poses incalculablecyber risks for businesse

Man admits role in law firm scam; says he funneled $2.5M via 38 accounts...
www.abajournal.com

A Florida man has agreed to plead guilty to conspiracy to commit money laundering in federal court in Tampa, concerning his role in a scheme

Marriott Customers’ Personal Details Exposed by Simple Web Flaw
thecybersecuritysentinel.blogspot.com

From Tripwire's State of Security Blog: Marriott Customers’ Personal Details Exposed by Simple Web Flaw Here’s a piece of advice for anyone

Boards Not Regularly Briefed on Cyber-Security: Survey | SecurityWeek.Com
www.securityweek.com

Boards of directors may have authority over the business, but they may be among the last to know about the security risks facing their organ

Cyber crime is a threat to global economy, says researcher
www.computerweekly.com

Halting cyber crime could have a positive impact on the global economy, says Halting cyber crime could have a positive impact on the global

5 questions to ask before a breach happens | CSO Online
www.csoonline.com

Use these five questions to start the conversations necessary to 'assume breach' and plan ahead.

Forum selection clause in browsewrap agreement did not bind parties in b...
blog.internetcases.com

internet technology intellectual property attorney Evan Brown Chicago lawyer copyright trademark domain names UDRP DMCA data privacy

When Your Marquis Client Gets Hacked
blog.wh1t3rabbit.net

There are people who will tell you that all PR is good PR. In my years in security I have seen both sides of that debate true. Lately though

Visual Hacking is High Tech Shoulder Surfing
robertsiciliano.com

A visual hacker can infiltrate you—from the outside in. Quite literally, a person (ranging from a snoop to a cyber criminal) can peer over y

Law firms face cybersecurity audits by banking clients; are they a 'weak...
www.abajournal.com

Banks are increasingly scrutinizing their law firms’ cybersecurity efforts, including the law firms’ protection of confidential information

LEGAL WRITING: STYLE vs. STRATEGY | LinkedIn
www.linkedin.com

PART 1 OF 3: The 3 A's There are no TV shows about legal writers. No one ever got to see Perry Mason or Matlock crank out a brief or write a

Seth's Blog: Good advice...
sethgodin.typepad.com

is priceless. Not what you want to hear, but what you need to hear. Not imaginary, but practical. Not based on fear, but on possibility. Not

Unauthorized
www.privacyassociation.org

Already a member? You must be logged in to access this content. Log in now to proceed. Not an IAPP member? It's easy and affordable to becom