DATA SECURITY & PRIVACY LAW

Our data security legal work looks into how clients administer their data.  We also look into how our clients operate and provide their services or products. Cyber security differs from data security and clients are counseled on their operations and their compliance.  We resort to forensics to discover the reason for the irregular operation or irregular events occurring in our clients’ business. In our experience, how clients manage their data is crucial.  We always address the practical aspects of data security, cyber security, cloud computing, computer processing, technology stacking, etc. as we discuss customer or patient privacy issues.

As we work with our clients, we get involved with data issues regarding, technologyintellectual property, employee computer use policies, internet use, cloud computing services, contracts, and other business aspects that are pertinent to cyber security.

Data security and privacy concerns are intertwined as cybercrime incidents surprise daily business operations along with personal data breaches.  We advise clients on their data treatment claims which may draw attention from the FTC regarding deceptive practices.  Our efforts have involved the need to reach out to law enforcement, i.e., the FBI and the Secret Service, to engage their efforts for investigating incidents.  Our data security and privacy work involve many concerns of our clients: Data retention and protection; Identity theft; Data security disputes; Internet fraud; consumer protection litigation; invasion of privacy litigation; and much more.   Many data security and privacy breach incidents queries delve in on business issues and practices and incident response.  Compliance with state and federal provisions and their notification requirements are addressed when a data breach incident occurs.  Our data security and privacy counsel compliance service deals with Electronic Communication Privacy Act (ECPA); Economic Espionage Act; Federal and State Computer Fraud Abuse Act; Stored Communications Act (SCA); Electronic Communications Transactions Act (ECTA); Gramm-Leach-Bliley-Act (Financial Privacy); Drivers Privacy Protection Act; Computer Fraud and Abuse Act (CFAA), and much more.

Related Posts:

Cybersecurity Rule Setting a Mark

Data Security Practices

Data Breach Notification and Ransomware

Digital Assets Recognized by States

IP Address and You