CYBERSECURITY & DATA PROTECTION

Cyber-attacks have become a daily occurrence, so much so that now we think more in terms of “when” than “if.” Many general counsel and IT executives report that they are not as prepared as they would like to be. How well prepared are you?

  • Advised numerous companies, including health care providers, retailer, security alarm company and collection agency on information security breach notification procedures.
  • Developed comprehensive training programs related to document management and data security.
  • Prepared and reviewed company policies related to document management, social networking and incident response.
  • Won reversals, both in the trial court and on appeal, of a special master's recommended order that would have forced disclosure of confidential peer review, risk management and quality assurance meetings, and records of his client, a private hospital sued under Florida's Public Records Act.
  • Coordinated response to security breaches and hacking with local and federal law enforcement, district attorney and United States Attorney.
  • On behalf of a health care automation solutions provider, obtained dismissal of claims arising from the theft of an employee’s laptop computer containing protected health information, on grounds that court lacked subject matter jurisdiction because plaintiff failed to adequately allege injury-in-fact.
  • Conducted an internal investigation of a large-scale data leak of personnel information at a Fortune 100 corporation; interviewed relevant employees and preparing a report and recommendations for the Executive Board.
  • Advised a major regional bank on improving its strategies and protocol for protecting its customer and proprietary information, including development of enhanced employment agreements, confidentiality agreements and privacy policies.
  • Drafted new restrictive covenants for a marketing and promotions firms and designed new procedures and policies to safeguard internal customer information and contact database software and systems.