cybersecurity and privacyPDF
MSK sits at the forefront of one the fastest growing concerns in today’s digital world, bringing together experts that provide services to its clients in the areas of cybersecurity and privacy protection. We assist grappling with a host of rapidly evolving concerns, such as:
- Preparedness and internal controls;
- Responses and breach notifications;
- Internal and external investigations;
- Compliance with federal and state data protection and privacy laws and regulations;
- Privacy policies and procedures;
- Website terms and conditions;
- Identification of causation and remedial security activities;
- Reputational and public relations challenges arising from cyber-attacks;
- Developing smart public policies regarding security of critical infrastructure;
- International human rights and public international law issues related to cyberwarfare and government use of cyber tools.
Whether the need is to assess compliance with international law standards; collect and protect citizen, employee or consumer data; comply with existing and rapidly evolving US state and federal privacy laws and regulations; defend or prevent class action lawsuits or other threatened litigation, evaluate insurance coverage, disclose information to and work with law enforcement, or otherwise respond to highly disruptive cyber hacking, MSK’s lawyers know how to address these and the other related and challenging issues.
MSK provides counseling and assistance from the first step of designing and initiating privacy protections and data breach prevention through incident reporting, working with law enforcement, federal and state regulators and your business partners, and providing other crisis management advice.
Through our membership in multiple international law firm consortia and the relationships our lawyers have with practitioners throughout the world, we are able to provide these services on a worldwide basis as companies continue to face the serious challenge of cybersecurity which affects companies of all sizes, regardless of their location. Whether your company directly retains sensitive information for its own use or is holding that information for third parties, you are equally at risk of intrusion. Any machine connected to the internet or an external device, such as a USB flash drive, is susceptible to being hacked.
- When a national client discovered its system had been hacked and personal information about its employees and customers (located in multiple states) had been posted online, we worked with the company’s legal and IT departments, as well as internal and external investigators and federal law enforcement, to address the breach and its consequences, including remedial activity.
- When a multinational client discovered its system had been breached, they called us in to work with the legal and IT departments to determine the scope of information which had been compromised, including whether personally identifiable information or attorney-client or work product privileged communications and documents had been exposed. We also advised the client regarding addressing the breach and its consequences.
- When the owner of a retail website discovered its IT director had failed to encrypt individual and credit card payment data on the company’s website, we advised regarding the notice requirements in multiple jurisdictions and how to otherwise minimize exposure.
- When our client discovered its payroll and personnel services provider had been breached, we advised about issues related to the protection of employee data and counseled the company regarding how to comply with the relevant notice requirements. We also assisted the client to identify and manage its legal obligations when its health insurance provider was subjected to a breach, compromising the private personal and medical information of the client’s employees located throughout the U.S.
- When it was discovered that our client’s Twitter account was hacked and a defamatory post published, we advised on the appropriate response and the legal options available.
- When a prominent food company discovered its system had been breached, we supported the company’s efforts to track down the source of the intrusion, stop the improper communications, determine whether any confidential or personally identifiable information had been made public, and shore up its systems and internal controls.
- Bloomberg Law , December 13, 2022
- January 1, 2019
- October 2017
- January 3, 2014
- December 22, 2009
- SIA Online, May 13, 2020
- New York’s Department of Financial Services Initiates Its First Enforcement Action Under Its 2017 Cybersecurity RegulationsAugust 4, 2020
- June 9, 2020
- May 29, 2020
- May 26, 2020
- April 20, 2020
- April 6, 2020
- Cybersecurity Concerns with Remote WorkMarch 23, 2020
- March 17, 2020
- March 12, 2020
- February 18, 2020
- October 21, 2019
- July 3, 2018
- April 5, 2018
- October 6, 2017
- June 20, 2017
- January 30, 2017
- Importance of Maintaining Cybersecurity Measures – Assessing the Ashley Madison Data Breach SettlementDecember 19, 2016
- May 31, 2016
- February 9, 2016
- January 11, 2016
- September 3, 2015
- February 17, 2015
- February 28, 2014
Events & Speaking Engagements
- July 19, 2021
- October 29, 2020
- June 5, 2020
- June 3, 2020
- December 4, 2019
- May 17, 2019
- March 11, 2019
- April 19, 2018
- April 18, 2018
- April 11, 2018
- December 13, 2017
- 2017 ABA Section of Litigation Corporate Counsel CLE SeminarFebruary 17, 2017
- January 30, 2017
- November 4, 2016
- September 8, 2016
- June 21, 2016
- January 13, 2016
- November 11, 2015
- October 28, 2015
- October 23, 2015
- June 13, 2014
- March 3, 2009