Overview
With data security breaches becoming routine and widespread, any entity—whether public or private—that stores proprietary or sensitive data electronically risks having that data stolen, lost, or otherwise compromised, with potentially catastrophic consequences for the entity's brand, reputation, and goodwill, as well as possible legal ramifications.
At Epstein Becker Green, we know that following certain crucial steps—such as establishing a good crisis management program, taking quick remedial action when a data breach occurs, and, when necessary, providing notices to government agencies and affected individuals—can dramatically lessen the impact of a data breach incident.
Our Privacy, Cybersecurity & Data Asset Management Group has extensive experience establishing data security breach preparedness and response programs, managing a client’s reaction to the data breach, and mitigating the breach's impact. Additionally, members of our group are available with their response skills as soon as a breach is discovered.
Our Services
We advise on the legal and technical issues flowing from a data breach and assist with all aspects of the breach response. For example, when a data breach occurs, members of our Privacy, Cybersecurity & Data Asset Management Group will:
- investigate the breach’s source, evaluate the damage, and confine the breach;
- recommend immediate remedial and cost-recovery measures;
- advise on compliance with notice and reporting obligations under federal securities laws and international, federal, and state privacy laws;
- draft required notices and deliver them to affected individuals and agencies in accordance with regulatory requirements and time limits;
- defend clients in investigations and lawsuits resulting from the breach;
- prosecute civil claims against hackers and cybercriminals;
- draft statements concerning the breach for the media, law enforcement, and consumer reporting agencies;
- advise clients on best practices and legal requirements with respect to offering credit monitoring, identity repair services, or identity theft insurance to affected individuals; and
- assist employers in drafting statements, email notices, and other correspondence to employees impacted by the breach.
Post-Crisis Services
Once the crisis has ended, our Privacy, Cybersecurity & Data Asset Management Group takes all steps necessary to enhance the client’s privacy and security compliance programs on a prospective basis so that they will be better positioned to shield data from future breach incidents. These steps would include, for example:
- identifying faulty data practices and policies and recommending needed changes;
- monitoring crisis communications to restore customer, shareholder, consumer, law enforcement, and regulator relationships;
- reviewing and updating controls, policies, and procedures relating to technology;
- reviewing and revising privacy, security, and incident response plans;
- retraining personnel on data security and oversight; and
- creating a breach report in compliance with regulatory requirements.
Read less
Focus Areas
Contacts
- Member of the Firm
- Member of the Firm
- General Counsel / Chief Privacy Officer
Media
Events
Past Events
Insights
Insights
- PublicationsUSA: Health Data Laws - State Privacy Laws Relating to Reproductive Health and to Children2 minute read
- PublicationsUSA: Health Data Laws - Navigating State Regulations2 minute read
- PublicationsThe Challenge of AI Governance: The Blessing and the Curse of Safeguarding Personal Data15 minute read
- BlogsVideo: New DOL Guidance - ERISA Plan Cybersecurity Update - Employment Law This Week3 minute read
- Media CoverageBrian Cesaratto Quoted in “New Jersey Legislation to Watch: A Midyear Report”3 minute read
- Firm AnnouncementsEpstein Becker Green Again Earns ISO 27001 and 27017 Certifications, Highest Accreditation for Data Security and Client ...3 minute read
- Blogs
Privacy Officer's Roadmap: Data Breach and Ransomware Defense – Speaking of Litigation Video Podcast
42 minute read - Media CoverageAlaap Shah Quoted in “Don’t Worry, You (Probably) Won’t Have to Deal with ONC: Algorithm Transparency Rule May Have ...2 minute read
- BlogsVideo: California's Upcoming Cyber Audit and Automated Tech Rules - Employment Law This Week2 minute read
- Media CoverageAlaap Shah Quoted in “2024 Outlook: The Cybersecurity Trends Health System Leaders Need to Know”3 minute read
- PublicationsUSA: Future of Cybersecurity Law and Regulation2 minute read
- Media CoverageAlaap Shah Featured in “You Gotta Get the Data Right! Talking EMPI”2 minute read
- Media CoverageBrian Cesaratto Quoted in “Best Practices for Detecting and Managing Fraud”3 minute read
- BlogsSEC Finalizes Cybersecurity Rule: What It Means7 minute read
- BlogsWhite House Releases National Cybersecurity Strategy Implementation Plan7 minute read
- BlogsWhite House Releases National Cybersecurity Strategy Implementation Plan7 minute read
- PublicationsWomen's Network—Health Apps for Women: Life Solutions v. Data Risks2 minute read
- Media CoverageLisa Pierce Reisz Featured in “People on the Move”1 minute read
- Media CoverageLisa Pierce Reisz Featured in “Wake Up Call: Laterals, Moves, In-House”1 minute read
- Media CoverageLisa Pierce Reisz Featured in “Epstein Becker Brings On Health Care Atty in Ohio”2 minute read
- Firm AnnouncementsHealth Care Attorney Lisa Pierce Reisz Joins Epstein Becker Green in Columbus4 minute read
- PublicationsTwitter Whistleblower Claim Is Cautionary Tale for Employers2 minute read
- PublicationsUSA: Employee Monitoring and Regulatory Frameworks for Keylogging Technology2 minute read
- Media Coverage
Alaap Shah Featured in AHLA Connections Magazine: Member Spotlight
3 minute read - Media CoverageAlaap Shah Quoted in "Source: FDA Guidance Takes More Nuanced Approach to Cybersecurity"1 minute read
- PublicationsUSA: Security Considerations for VPNs2 minute read
- Media CoverageRobert Travisano Quoted in “Businesses Face Growing Risk of Cyberattacks, Financial Loss”2 minute read
- Firm Announcements
Epstein Becker Green’s Brian Cesaratto and Francesco DeLuca Named 2022 BTI Client Service All-Stars
3 minute read - PublicationsDOJ’s Civil Cyber-Fraud Initiative: What Contractors Need to Know About Novel Use of False Claims Act3 minute read
- Firm AnnouncementsEpstein Becker Green Continues Growth in Ohio with Addition of Intellectual Property and Information Privacy Attorney ...2 minute read
- Media CoverageThe Ransomware Plague Continues, but the Response Model Is Changing2 minute read
- PublicationsHealth Cos. Must Prepare for Growing Ransomware Threat2 minute read
- PublicationsDesigning a Trusted Framework for the Application of AI in Health Care2 minute read