As we work with our clients, we get involved with data issues regarding, technologyintellectual property, employee computer use policies, internet use, cloud computing services, contracts, and other business aspects that are pertinent to cyber security.  We look into how our clients operate and provide their services or products. Cyber security differs from data security and clients are counseled on their operations and their compliance.  We resort to forensics to discover the reason for the irregular operation or irregular events occurring in our clients’ business. In our experience, how clients manage their data is crucial.  We always address the practical aspects of data security, cyber security, cloud computing, computer processing, technology stacking, etc. as we discuss customer or patient privacy issues.  We advise clients on their data treatment claims which may draw attention from the FTC regarding deceptive practices.  Our efforts have involved the need to reach out to law enforcement, i.e., the FBI and the Secret Service, to engage their efforts for investigating incidents.  Our work involves: data retention and protection; data security disputes; Internet fraud & ID theft; consumer protection litigation; data privacy breach; invasion of privacy; data storage & SaaS agreements; cloud computing, and much more.

Our data security and privacy counsel compliance service and litigation efforts touch upon the following provisions: Electronic Communication Privacy Act (ECPA); Economic Espionage Act; Federal and State Computer Fraud Abuse Act; Stored Communications Act (SCA); Electronic Communications Transactions Act (ECTA); Gramm-Leach-Bliley-Act (Financial Privacy); Drivers Privacy Protection Act; Right to Financial Privacy Act; Health Insurance Portability and Accountability Act (HIPAA); Fair and Accurate Credit Transactions Act (FACTA); and the Computer Fraud and Abuse Act (CFAA).

Related Posts:

Cybersecurity Rule Setting a Mark

Data Security Practices

Data Breach Notification and Ransomware

Digital Assets Recognized by States

IP Address and You