About BrittonTuma

We are a full service boutique business law firm designed to provide you with a full range of transactional, litigation, technology, and general counseling services. Our founding partners, Michael S. Britton and Shawn E. Tuma, have nearly 50 years of experience between them. Despite their significant experience, they are never content with just doing things the way they have always been done. Instead, they are committed to adapting to the ever-changing business environment and making sure we are evolving with you.

Our Mission

Our mission is to deliver outstanding service and results to you in the most efficient and expeditious way possible. Simply put, we want all of our clients to be Raving Fans!

How We Do It

Innovation in how we think and what we do is the key. First, by collaborating with you we gain a complete understanding of your situation and objectives. Then we think. We think about the objectives before we start working and focus on developing a unique strategy designed to achieve those objectives. Then we focus on executing the strategy with precision. This keeps us focused on the objectives and minimizes wasted effort which helps us achieve your objectives more efficiently and expeditiously.

What our clients say

"We felt we got excellent representation from BrittonTuma in our lawsuit. They gave us a fair appraisal of the suit at the beginning of the engagement, kept us well informed during the 16 month proceedings, and at the same time, were mindful of legal fees. AND we were successful!" B.P., Plano, TX




RSS computer | data security | Law Blog

  • Corporate Espionage: Hacking A Company Through A Chinese Restaurant Takeout Menu
    Corporate espionage (industrial espionage) is a favorite topic of mine. I have written and presented on the subject quite a bit and, while I am never sure how my readers react when I write about this, I do carefully watch the look on my audience members’ faces when I first mention the issue. The story […]
  • The Legal Side of Data Breach and Third Party Risk (presentation slides)
    I presented at the Institute of Internal Auditors 9th Annual Fraud Summit on The Legal Side of Data Breach and Third Party Risk. My co-presenter was Christopher Mitchell of Crowe Horwath. The following are the presentation slides used for my part of the presentation. Key Takeaway: Your company is still responsible for a data breach […]
  • What did Sun Tzu teach about data security?
    Sun Tzu taught that, when it comes to data security, you must be wary of your business associates and other third parties. Why? Have you heard of the national retailer that what was hit with a perfectly timed cyber attack on Black Friday ’13 that resulted in credit card data from roughly 110 million customers being taken? […]
  • 3 Important Questions Your Company Must Answer After A Data Breach
    Riddle: What has sensitive data, is the target of cyber criminals, and will (almost certainly) have a data breach? Answer: YOUR COMPANY! When your company has a data breach, these are the top 3 questions that you will be required to answer: How did the breach happen? What steps did your company take before the breach […]
  • 3 Steps for Obtaining Trade Secrets in Discovery
    When can a competitor use litigation to find out your company’s trade secret information? Let me explain it this way … What if it was your businesses’ valuable information? Pause for a moment and imagine that your business is the industry leading innovator in its field because, through your effort and resources, you have developed secret tricks and technique […]