In today’s world, information is both a valuable asset and a source of risk. Now more than ever before, sensitive data can escape from nearly every corner of your organization, and the costs to your business can be enormous. Pierce Atwood’s privacy and data security team regularly advises companies on how to handle and secure sensitive data. Whether you are a technology company with valuable trade secrets, a start-up with an innovative approach to using information, or a heavily regulated company responsible for the protection of large amounts of personal information, Pierce Atwood can help you develop the right policies and practices to protect your sensitive data and avoid litigation and regulatory action against your company, and guide you through the consequences of a breach.
Individual privacy is protected by an increasing number of laws and regulations in the U.S. and abroad. Companies seeking to navigate these regimes must contend with complexity and a rapidly changing environment. Pierce Atwood can help you with every step of the data life cycle, including collecting, securing, using, and disclosing your customers' and employees' personal information.
Cyberterrorism is on the rise, with criminals becoming increasingly adept at stealing sensitive commercial or personal information. Businesses that manage critical infrastructure – including health care services organizations, financial services entities, energy utilities, and manufacturers of sensitive equipment and technologies – are particularly at risk. Sensing this, the federal government has increasingly focused its scrutiny on these industries, including recently-issued cybersecurity regulation and proposed legislation.
By combining longstanding expertise in these areas, a deep understanding of the cybersecurity landscape, and connections to the cybersecurity community and Capitol Hill, Pierce Atwood can help you navigate today's landscape, while preparing for the threats and regulations to come.
Incident Response and Breach Notification
Despite a company’s best efforts and planning, sometimes data breaches do occur. When they do, our legal team stands ready to see our clients through the fallout. Whether the situation involves a rogue employee dealing with a single record, a large-scale loss of electronic media while in transit, cross-border unauthorized vendor access, or criminal intrusions by sophisticated hackers, we help our clients navigate the post-breach landscape, from determining whether notice is required to remediation and response, including handling regulatory enforcement and class action litigation.
We have helped clients in a wide variety of industries including retail, hospitality, information management, financial services, and public utilities. Our team of seasoned litigators, working in concert with our expert privacy professionals, provides the right combination of talent to respond swiftly and effectively when a crisis hits.
The cost of a data breach is frequently in the millions of dollars. As the risks of security breaches and other cyber-incidents continue to grow, responsible companies need to manage these risks through insurance and other contractual strategies. However, unlike other types of standardized commercial insurance policies, cyber insurance is a new and developing product, and the scope of coverage and exclusions varies widely from one company’s policy to another’s, frequently unrelated to price. Our experienced attorneys can help you determine whether your company needs cyber insurance and then help you select the best provider and policy for your particular situation. In addition, our team regularly leverages this expertise to help clients secure the right insurance and other protections for your company in technology and licensing transactions. Finally, when crisis strikes, we are ready to step in should disputes over coverage arise.