SlideShare a Scribd company logo
www.solidcounsel.com
Cybersecurity:
A Legal Issue?
www.solidcounsel.com
What do you think?
Sophisticated James Bond-like attacks?
or
Simple things, people doing dumb things?
www.solidcounsel.com
The real-world threats are not so sophisticated.
Easily preventable
• 90% in 2014
• 91% in 2015
• 63% confirmed breaches from weak,
default, or stolen passwords
• Data is lost over 100x more than stolen
• Phishing used most to install malware
Easily preventable
• 90% in 2014
• 91% in 2015
www.solidcounsel.com
Start with the basics.
“Some people try to find
things in this game that don’t
exist but football is only two
things – blocking and
tackling.”
-Vince Lombardi
* If you want to talk deep programming-
type issues, see Section VII of paper.
www.solidcounsel.com
Our objective is to protect IP.
Which of the following aspects of the IP are we most
focused on protecting?
1. Confidentiality
2. Integrity
3. Availability
4. All of the above
“CIATriad” of
cybersecurity
www.solidcounsel.com
Cybersecurity “CIA” examples.
 Stuxnet
 Integrity
 German steel mill
 Integrity
 Sony
 Availability
 Confidentiality
 Target
 Confidentiality
www.solidcounsel.com
Malicious
• compete
• newco
• Sabotage
• disloyal insider
Negligence
• email
• usb
• passwords
Blended
• foot out the door
• misuse of network
• stealing data
• negligence with data
• violate use policies
Hacking /
Cracking
Social
Engineering
Malware
Stealing
Planting
Corrupting
Who are the primary threats?
www.solidcounsel.com
Threat
Vectors
Network
Website
Email
BYOD
USBGSM
Internet
Surfing
Business
Associates
People
To protect IP, you must:
• Protect our companies’ data
• Confidentiality
• Integrity
• Availability
• Against threats from
• Insiders
• Outsiders
• Third-party partners
www.solidcounsel.com
Cybersecurity needs for companies (and firms).
 Strong cybersecurity basics.
 Policies and procedures focused on cybersecurity.
 Social engineering.
 Password and security questions
 Training of all employees.
 Phish all employees (esp. executives).
 Signature based antivirus and malware detection.
 Multi-factor authentication.
 Backups segmented from the network.
 Incident response plan.
 Encryption for sensitive and air-gap for hypersensitive data.
 Adequate logging and retention.
 Third-party security and supply chain risk management.*
 Intrusion detection and intrusion prevention systems.*
www.solidcounsel.com
Incident Response
• Appendix A
• Goal is to execute IRP
• This is check list, not
an IRP
• How detailed?
• Tabletop exercises
www.solidcounsel.com
Cyber Risk
Assessment
Strategic
Planning
Deploy
Defense
Assets
Develop,
Implement
&Train on
P&P
Tabletop
Testing
Reassess &
Refine
Cybersecurity Risk
Management Program
www.solidcounsel.com
Hypothetical.
You have become very wealthy over the last 5 years working for one client,
PayDaBills, Inc., which has given you so much business that it is now your only client.
PayDaBills was a start-up when you met and you have been its trusted advisor for all
things legal. Its leaders rely on you to alert and advise them on risks that could
impact the company as they focus all of their time on promoting PayDaBills’ product,
a highly-sophisticated computer program that is its only asset.
PayDaBills runs lean and mean with only the executives/sales people, 2 developers,
and an office admin. The developers are “computer savvy” and set up the computer
network when they started. Because the computer program is so valuable, they keep
its source code on a network drive with limited access rights and highly encrypted.
It is a beautiful Friday afternoon and you are with PayDaBills’ CEO for your weekly
golf game – the first round of drinks just arrived.
www.solidcounsel.com
 1:05 PM: CEO’s phone rings, it is Admin, he lets it go to voicemail. She is calling to tell
him that the website link in his email to her did not work – it didn’t sound important,
like she was confused, so he did not call back.
 1:45 PM: Admin calls again, this time CEO answers. She tells him that her computer
is frozen up and Developers are complaining that the network is slowing down. CEO
asks to talk to one of the Developers.
 2:05 PM: Developer calls and tells CEO that the entire network is encrypted and
there was a demand for $50k Bitcoin, paid in 72 hours, to get the decryption key.
But, it is not a big deal because they have recently backed up the network.
 2:25 PM: Developer calls back, back up copy of network was also encrypted. But, not
to worry, there is a monthly back up stored offline, they will use to restore.
 3:45 PM: Developer calls CEO. They attempted to restore the only backup copy but
somehow it too was then encrypted.
 3:47 PM: CEO turns to you. You say, “I heard about something like this at a
conference but I thought the speaker was making a big deal out of nothing.”
www.solidcounsel.com
• Board of Directors & General Counsel, Cyber Future Foundation
• Board of Advisors, NorthTexas Cyber Forensics Lab
• Cybersecurity & Data Privacy LawTrailblazers, National Law Journal (2016)
• SuperLawyersTop 100 Lawyers in Dallas (2016)
• SuperLawyers 2015-16 (IP Litigation)
• Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law)
• Council, Computer &Technology Section, State Bar ofTexas
• Privacy and Data Security Committee of the State Bar ofTexas
• College of the State Bar ofTexas
• Board of Directors, Collin County Bench Bar Foundation
• Past Chair, Civil Litigation & Appellate Section, Collin County Bar Association
• Information Security Committee of the Section on Science &Technology
Committee of the American Bar Association
• NorthTexas Crime Commission, Cybercrime Committee
• Infragard (FBI)
• International Association of Privacy Professionals (IAPP)
• Board of Advisors Office of CISO, Optiv Security
• Editor, Business Cybersecurity Business Law Blog
Shawn Tuma
Cybersecurity Partner
Scheef & Stone, L.L.P.
214.472.2135
shawn.tuma@solidcounsel.com
@shawnetuma
blog: www.shawnetuma.com
web: www.solidcounsel.com

More Related Content

PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PPTX
Top 12 Threats to Enterprise
PPT
The Security Director's Practical Guide to Cyber Security
PPTX
Red vs. Blue Why we’ve been getting it wrong for 25 years
PPTX
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
PDF
Industrial Control Security USA Sacramento California Oct 6/7
PPTX
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
PDF
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Top 12 Threats to Enterprise
The Security Director's Practical Guide to Cyber Security
Red vs. Blue Why we’ve been getting it wrong for 25 years
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Industrial Control Security USA Sacramento California Oct 6/7
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
[Webinar Slides] Data Privacy Solving Negligence, Bad Practices, Access Contr...

What's hot (18)

PDF
Event Presentation: Cyber Security for Industrial Control Systems
PPTX
Ntxissacsc5 purple 5-insider threat-_andy_thompson
PDF
Deral Heiland - Fail Now So I Don't Fail Later
PPTX
Aaron Higbee - The Humanity of Phishing Attack & Defense
PPTX
IT Security for Nonprofits
PPTX
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
PDF
Cyber Security 101: What Your Agency Needs to Know
PDF
State of Cyber: Views from an Industry Insider
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PDF
Security in the News
PPTX
Digital Age-Preparing Yourself
PPTX
Global CISO Forum 2017: Privacy Partnership
PPTX
Cyber Hygiene
PDF
PhD and Post PhD Network Security Visualization Research
PPTX
Mind the gap
PPTX
MCG Cybersecurity Webinar Series - Risk Management
PPTX
Data security 2016 trends and questions
PPTX
Backups and Disaster Recovery for Nonprofits
Event Presentation: Cyber Security for Industrial Control Systems
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Deral Heiland - Fail Now So I Don't Fail Later
Aaron Higbee - The Humanity of Phishing Attack & Defense
IT Security for Nonprofits
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cyber Security 101: What Your Agency Needs to Know
State of Cyber: Views from an Industry Insider
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Security in the News
Digital Age-Preparing Yourself
Global CISO Forum 2017: Privacy Partnership
Cyber Hygiene
PhD and Post PhD Network Security Visualization Research
Mind the gap
MCG Cybersecurity Webinar Series - Risk Management
Data security 2016 trends and questions
Backups and Disaster Recovery for Nonprofits
Ad

Viewers also liked (19)

PPTX
Aula de introdução a pentateuco
PPT
Pentateuco
PPT
05 el pentateuco
PPTX
1º Aula do Pentateuco
PPT
Pentateuco (lições 1 e 2) - EETAD - Pr Gesiel de Souza Oliveira
PDF
Pentateuco
PDF
Stefan Steigerwald - "Pressearbeit aktiv managen - Voraussetzungen für erfolg...
PDF
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
PDF
Introdução ao pentateuco
PPTX
A Framework of Purpose and Consent for Data Security and Consumer Privacy
PPTX
SA 200 to 299
PPT
тема 4.2. мотивы и мотивация. классификация мотивов
PDF
CenterPointe Hospital break-ground
PPTX
Chapter 04 Carbon Base Life
PDF
What a data-centric strategy gives you that others do not
PDF
Hubungan Antara Jenggot Dengan Kecerdasan dan Penampilan
PDF
خلاصه Summary of How to execute the base isolation system?
PDF
Workplace Privacy and Employee Monitoring: Laws and Methods
PDF
Aula 1 genesis
Aula de introdução a pentateuco
Pentateuco
05 el pentateuco
1º Aula do Pentateuco
Pentateuco (lições 1 e 2) - EETAD - Pr Gesiel de Souza Oliveira
Pentateuco
Stefan Steigerwald - "Pressearbeit aktiv managen - Voraussetzungen für erfolg...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Introdução ao pentateuco
A Framework of Purpose and Consent for Data Security and Consumer Privacy
SA 200 to 299
тема 4.2. мотивы и мотивация. классификация мотивов
CenterPointe Hospital break-ground
Chapter 04 Carbon Base Life
What a data-centric strategy gives you that others do not
Hubungan Antara Jenggot Dengan Kecerdasan dan Penampilan
خلاصه Summary of How to execute the base isolation system?
Workplace Privacy and Employee Monitoring: Laws and Methods
Aula 1 genesis
Ad

Similar to Protecting Your IP: Data Security for Software Technology (20)

PDF
Cybersecurity for Your Law Firm: Data Security and Data Encryption
PDF
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
PPTX
CYBER SECURITY FOR LAW FIRMS
PPTX
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
PDF
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
PDF
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
PPTX
ACEDS-ACFCS Cybersecurity Webcast
PPTX
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
PDF
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
PDF
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PDF
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
PPTX
nist_small_business_fundamentals_july_2019.pptx
PPTX
Cybersecurity & Computer Fraud - The Convergence
PPTX
Cybersecurity Basics of awareness presentation .pptx
PDF
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
PPTX
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
PDF
Cyber Security small
PDF
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
PDF
In the news
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
CYBER SECURITY FOR LAW FIRMS
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
ACEDS-ACFCS Cybersecurity Webcast
Cybercrime: 5 Practical Tips for Law Firms on Avoiding Financial & Reputation...
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Cybersecurity Issues All Lawyers Should Know -- Especially Litigators
CyberCare Pro - Cybersecurity for SME's updated.pptx
Cybersecurity (and Privacy) Issues - Legal and Compliance Issues Everyone in ...
nist_small_business_fundamentals_july_2019.pptx
Cybersecurity & Computer Fraud - The Convergence
Cybersecurity Basics of awareness presentation .pptx
Leadership Through the Firestorm - Legal Counsel's Role in Guiding Through Cy...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Cyber Security small
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
In the news

More from Shawn Tuma (20)

PDF
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
PDF
The Dark Side of Digital Engagement
PDF
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
PPTX
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
Lawyers' Ethical Obligations for Cybersecurity
PDF
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
PDF
Real World Cyber Risk. Understand it. Manage it.
PDF
The Legal Case for Cyber Risk Management Programs and What They Should Include
PDF
Cyber Hygiene Checklist
PDF
Cyber Incident Response Checklist
PDF
Cybersecurity: Cyber Risk Management for Lawyers and Clients
PDF
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPT
Something is Phishy: Cyber Scams and How to Avoid Them
PPTX
Cybersecurity Fundamentals for Legal Professionals (and every other business)
PPTX
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
PDF
Cybersecurity Update
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
The Dark Side of Digital Engagement
Incident Response Planning - Lifecycle of Responding to a Ransomware Attack
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Reimagine Your Company Operating Again After a Ransomware Attack -- The Lifec...
The Role of Contracts in Privacy, Cybersecurity, and Data Breach
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Lawyers' Ethical Obligations for Cybersecurity
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Real World Cyber Risk. Understand it. Manage it.
The Legal Case for Cyber Risk Management Programs and What They Should Include
Cyber Hygiene Checklist
Cyber Incident Response Checklist
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity is a Team Sport (SecureWorld - Dallas 2018)
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Something is Phishy: Cyber Scams and How to Avoid Them
Cybersecurity Fundamentals for Legal Professionals (and every other business)
NYDFS Cybersecurity Regulations - 23 NYCRR Part 500
Cybersecurity Update

Recently uploaded (20)

PDF
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
PPTX
Sexual Harassment Prevention training class
PPT
Cyber-Crime-in- India at Present day and Laws
PPTX
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
PPTX
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
PDF
algor mortis or cooling of body after death THANATOLOGY
PPTX
4-D...Preparation of Research Design.pptx
PPT
Criminal law and civil law under of collage corriculum
PPT
wipo: IP _smes_kul_06_www_6899913 (1).ppt
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PPTX
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
PPT
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPT
Understanding the Impact of the Cyber Act
PPT
looking_into_the_crystal_ball - Merger Control .ppt
PDF
OpenAi v. Open AI Summary Judgment Order
PPTX
prenuptial agreement ppt my by a phd scholar
PPTX
Lecture Notes on Family Law - Knowledge Area 5
PDF
Notes on Plausibility - A Review of the English and EPO Cases
PDF
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...
The AI & LegalTech Surge Reshaping the Indian Legal Landscape
Sexual Harassment Prevention training class
Cyber-Crime-in- India at Present day and Laws
Peter Maatouk Is Redefining What It Means To Be A Local Lawyer Who Truly List...
UDHR & OTHER INTERNATIONAL CONVENTIONS.pptx
algor mortis or cooling of body after death THANATOLOGY
4-D...Preparation of Research Design.pptx
Criminal law and civil law under of collage corriculum
wipo: IP _smes_kul_06_www_6899913 (1).ppt
Lecture Notes on Family Law - Knowledge Area 5
FFFFFFFFFFFFFFFFFFFFFFTA_012425_PPT.pptx
3. INDUTRIAL RELATIONS INTRODUCTION AND CONCEPTS.ppt
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Understanding the Impact of the Cyber Act
looking_into_the_crystal_ball - Merger Control .ppt
OpenAi v. Open AI Summary Judgment Order
prenuptial agreement ppt my by a phd scholar
Lecture Notes on Family Law - Knowledge Area 5
Notes on Plausibility - A Review of the English and EPO Cases
APPELLANT'S AMENDED BRIEF – DPW ENTERPRISES LLC & MOUNTAIN PRIME 2018 LLC v. ...

Protecting Your IP: Data Security for Software Technology

  • 3. www.solidcounsel.com What do you think? Sophisticated James Bond-like attacks? or Simple things, people doing dumb things?
  • 4. www.solidcounsel.com The real-world threats are not so sophisticated. Easily preventable • 90% in 2014 • 91% in 2015 • 63% confirmed breaches from weak, default, or stolen passwords • Data is lost over 100x more than stolen • Phishing used most to install malware Easily preventable • 90% in 2014 • 91% in 2015
  • 5. www.solidcounsel.com Start with the basics. “Some people try to find things in this game that don’t exist but football is only two things – blocking and tackling.” -Vince Lombardi * If you want to talk deep programming- type issues, see Section VII of paper.
  • 6. www.solidcounsel.com Our objective is to protect IP. Which of the following aspects of the IP are we most focused on protecting? 1. Confidentiality 2. Integrity 3. Availability 4. All of the above “CIATriad” of cybersecurity
  • 7. www.solidcounsel.com Cybersecurity “CIA” examples.  Stuxnet  Integrity  German steel mill  Integrity  Sony  Availability  Confidentiality  Target  Confidentiality
  • 8. www.solidcounsel.com Malicious • compete • newco • Sabotage • disloyal insider Negligence • email • usb • passwords Blended • foot out the door • misuse of network • stealing data • negligence with data • violate use policies Hacking / Cracking Social Engineering Malware Stealing Planting Corrupting Who are the primary threats?
  • 10. To protect IP, you must: • Protect our companies’ data • Confidentiality • Integrity • Availability • Against threats from • Insiders • Outsiders • Third-party partners
  • 11. www.solidcounsel.com Cybersecurity needs for companies (and firms).  Strong cybersecurity basics.  Policies and procedures focused on cybersecurity.  Social engineering.  Password and security questions  Training of all employees.  Phish all employees (esp. executives).  Signature based antivirus and malware detection.  Multi-factor authentication.  Backups segmented from the network.  Incident response plan.  Encryption for sensitive and air-gap for hypersensitive data.  Adequate logging and retention.  Third-party security and supply chain risk management.*  Intrusion detection and intrusion prevention systems.*
  • 12. www.solidcounsel.com Incident Response • Appendix A • Goal is to execute IRP • This is check list, not an IRP • How detailed? • Tabletop exercises
  • 14. www.solidcounsel.com Hypothetical. You have become very wealthy over the last 5 years working for one client, PayDaBills, Inc., which has given you so much business that it is now your only client. PayDaBills was a start-up when you met and you have been its trusted advisor for all things legal. Its leaders rely on you to alert and advise them on risks that could impact the company as they focus all of their time on promoting PayDaBills’ product, a highly-sophisticated computer program that is its only asset. PayDaBills runs lean and mean with only the executives/sales people, 2 developers, and an office admin. The developers are “computer savvy” and set up the computer network when they started. Because the computer program is so valuable, they keep its source code on a network drive with limited access rights and highly encrypted. It is a beautiful Friday afternoon and you are with PayDaBills’ CEO for your weekly golf game – the first round of drinks just arrived.
  • 15. www.solidcounsel.com  1:05 PM: CEO’s phone rings, it is Admin, he lets it go to voicemail. She is calling to tell him that the website link in his email to her did not work – it didn’t sound important, like she was confused, so he did not call back.  1:45 PM: Admin calls again, this time CEO answers. She tells him that her computer is frozen up and Developers are complaining that the network is slowing down. CEO asks to talk to one of the Developers.  2:05 PM: Developer calls and tells CEO that the entire network is encrypted and there was a demand for $50k Bitcoin, paid in 72 hours, to get the decryption key. But, it is not a big deal because they have recently backed up the network.  2:25 PM: Developer calls back, back up copy of network was also encrypted. But, not to worry, there is a monthly back up stored offline, they will use to restore.  3:45 PM: Developer calls CEO. They attempted to restore the only backup copy but somehow it too was then encrypted.  3:47 PM: CEO turns to you. You say, “I heard about something like this at a conference but I thought the speaker was making a big deal out of nothing.”
  • 16. www.solidcounsel.com • Board of Directors & General Counsel, Cyber Future Foundation • Board of Advisors, NorthTexas Cyber Forensics Lab • Cybersecurity & Data Privacy LawTrailblazers, National Law Journal (2016) • SuperLawyersTop 100 Lawyers in Dallas (2016) • SuperLawyers 2015-16 (IP Litigation) • Best Lawyers in Dallas 2014-16, D Magazine (Digital Information Law) • Council, Computer &Technology Section, State Bar ofTexas • Privacy and Data Security Committee of the State Bar ofTexas • College of the State Bar ofTexas • Board of Directors, Collin County Bench Bar Foundation • Past Chair, Civil Litigation & Appellate Section, Collin County Bar Association • Information Security Committee of the Section on Science &Technology Committee of the American Bar Association • NorthTexas Crime Commission, Cybercrime Committee • Infragard (FBI) • International Association of Privacy Professionals (IAPP) • Board of Advisors Office of CISO, Optiv Security • Editor, Business Cybersecurity Business Law Blog Shawn Tuma Cybersecurity Partner Scheef & Stone, L.L.P. 214.472.2135 shawn.tuma@solidcounsel.com @shawnetuma blog: www.shawnetuma.com web: www.solidcounsel.com