Menu

Cybersecurity and Privacy


Download Download PDF   
Share Share Page

Overview

We provide clients across industries with comprehensive counsel on complex, evolving, and multifaceted issues related to information security, data breaches, and privacy.

Our cybersecurity clients seek our advice at the three phases of cybersecurity legal needs: (i) planning, preparation, and hardening against a cybersecurity event; (ii) as “breach coaches” during a cybersecurity event, including coordination of forensic services and working with law enforcement, through consumer notification; and (iii) in the litigation that may follow a cybersecurity event.

Our attorneys are trusted counsel both to international companies and to growth-stage companies on all manner of privacy compliance and litigation issues. We advise on long-standing federal standards such as HIPAA and Gramm-Leach-Bliley as well as emerging state standards, such as those in California and New York.

We blend our skills and experiences as litigators and transactional attorneys with a deep understanding of information security, data breach law, and privacy laws and regulations to meet and anticipate our clients’ needs. Carlton Fields' team includes attorneys who have earned the designation of Certified Information Privacy Professional (e.g., CIPP/US, CIPM) as well as former federal cybercrime prosecutors.

Our services include: 

Data Breach and Incident Response

  • Help clients prepare for, and respond to, data breaches and the full range of government investigations they may prompt.
  • Provide immediate support and rapid response, via phone and email, for clients that learn of a possible data breach and must act immediately to mitigate potential liability and discharge potential obligations stemming from the incident.
  • Develop and test comprehensive incident response plans that address internal and external actions to take in the wake of a data security incident.

Litigation

  • Represent clients in all forms of litigation associated with data breaches and other security incidents. This includes class action defense in federal and state courts, and prosecution and defense of other complex matters.

Development and Implementation of Compliance Programs

  • Build full-scale compliance programs for domestic and international operations, including:
    • Data mapping and risk assessment
    • Data subject access request management policies, procedures, and workflows
    • Review and update of contracts and agreements to reflect data privacy obligations and data processing
    • Updates to internal and external privacy policies
    • Cookie consent and management of preferences
    • Privacy compliance for new product development and advertising
  • Update data privacy and information security policies, procedures, and programs for businesses of all sizes with both domestic and international operations. 

Federal and State Privacy and Cybersecurity Laws 

  • Regularly assist clients with their obligations pursuant to laws, including Gramm-Leach-Bliley, the Fair Credit Reporting Act, HIPAA, and HITECH.
  • Assist clients in complying with emerging state privacy and cybersecurity laws, such as the California Consumer Privacy Act (CCPA), the Colorado Privacy Act (CPA), Nevada's privacy law (SB-220), the New York SHIELD Act, and the Virginia Consumer Data Protection Act (VCDPA).

International Privacy Regulations and Global Policies 

  • Counsel clients on compliance with the GDPR and assist with the development of legal means for cross-border data transfers post Schrems II.
  • Counsel clients on compliance with other international regulations, including Brazil’s Lei Geral de Proteção de Dados (General Data Protection Law - LGPD), Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA), and Jamaica's Data Protection Act (DPA).
  • Counsel clients on compliance with International Standards of Organization (ISO), the internationally recognized best practices for personal data use, transmission, and storage.

Employee Privacy Issues 

  • Advise employers on a wide range of privacy areas, including compliance with federal and state regulations, including employer obligations under the CCPA.
  • Counsel clients on compliance with the Fair Credit Reporting Act and analogous state laws regarding pre-employment background checks and post-hire investigations.
  • Counsel businesses on privacy issues related to work-from-home and COVID-19.

Genetic Information and Health Privacy

  • Develop and implement incident management response for data breaches relating to electronic personal health information.
  • Manage security risk assessments to meet HIPAA, HITECH, and state health information privacy and security requirements.
  • Develop and implement full suite of policies and procedures necessary for compliance with HIPAA’s privacy and security rules.
  • Create compliance programs to accommodate emerging biometric data and genetic privacy laws domestically and internationally.

Privacy and Cybersecurity Trainings

  • Provide off-the-shelf and white-label privacy training options to accommodate businesses of all sizes in privacy readiness and compliance, including trainings to meet compliance requirements for the CCPA, GDPR, LGPD, HIPAA, and EU data authority guidance.
  • Plan and conduct tabletop exercises with companies to simulate a breach event, targeting to the company’s particular risk profile, often partnering with inside or outside forensic experts and media relations professionals.

Website and Social Networking Issues 

  • Help ensure client compliance with FTC and other regulations.
  • Support brands and influencers in meeting requirements under Section 5 of the FTC Act.
  • Draft privacy policies, social media policies, terms of use, and community policies, and develop internal legal management programs for emerging online issues.
  • Assist clients with the wide-ranging issues that arise as a result of social media use and an internet presence, and help them develop related proactive policies and standards.

Online Harassment and Phishing Campaigns

  • Represent and protect companies and their employees who are victims of online harassment, including nonconsensual pornography, cyber stalking, reputation attacks, identity theft, and other forms of digital abuse.
  • Work with companies whose employees or customers are facing targeted, sophisticated phishing campaigns, including spoofing attempts and suspected email compromises.
  • Our work can include support of the company’s investigations into these matters, packaging the evidence for cooperation with law enforcement, and protection of corporate intellectual property, particularly as to domain name abuse.

Due Diligence and Other Transactional Support

  • Provide cybersecurity and privacy due diligence advice in connection with mergers and acquisitions, private equity investments, and other transactions.
  • Represent private equity firms and other pooled-capital entities as standby counsel for their investigations into potential acquisitions, including of SaaS companies as well as more traditional brick-and-mortar companies for which cybersecurity is a concern, both at the term sheet level and pre-closing.


Our attorneys are active and hold leadership positions in data privacy and cybersecurity organizations, such as:

  • International Association of Privacy Professionals (IAPP) 
  • International Security Management Association
  • Sedona Conference Working Group on Data Security and Privacy Liability 
  • ABA - Privacy and Computer Crime Committee CLE Working Group 
  • ABA - Computer and Software Legislation Committee 
  • ABA - Electronic Filing Committee 
  • ABA - Internet Relationships and Cloud Computing Committee 
  • ABA - Section of Science & Technology Law 
  • DRI - Data Management and Security Committee
  • ISACA (Information Systems Audit and Control Association)


Industries supported by our practice include:

  • Advertising
  • Artificial intelligence
  • Biotechnology
  • Construction and real estate
  • Consumer brands
  • Cosmetics
  • Data analytics
  • E-commerce
  • Electronic gaming and esports
  • Financial services sector
  • Health care
  • Insurance
  • Media and entertainment
  • Professional services
  • Retail, including online retail
  • Software
  • Software as a service
  • Technology
  • Telecommunications
  • Title insurance

Experience

  • Served as breach coach and notifications counsel in responding to an extortionate ransomware attack on a B2B company with international operations, coordinating forensic response, threat actor engagement, coordination with law enforcement, and public and business-partner communications.
  • Helped dozens of corporate clients that have experienced data breaches due to theft (e.g., stolen laptops and servers), social engineering fraud (phishing, misdirected wires), hacking (stolen passwords, brute force attacks), and accident (e.g., natural disasters, lost backup tapes).
  • Defend clients under investigation by federal and/or state government agencies after complaints of privacy violations or data breaches. We frequently help clients, for example, that are subject to HIPAA privacy and security regulations respond to investigations by the U.S. Department of Health and Human Services’ Office for Civil Rights. 
  • Defend data breach class actions, including (i) a hospital system after the alleged theft of personal health and financial data of hospital patients; (ii) a public entity after the exposure of its employees’ tax information in a phishing scheme; and (iii) a multi-office medical practice that was the victim of a ransomware attack. In such cases, we have won at the motion to dismiss phase and class certification phases, and we have, in consultation with our clients and their insurance carriers, arranged for favorable resolutions at mediation.
  • Assist and represent clients with creation and implementation of vendor management programs, including policies and procedures related to vendor risk assessment, vendor due diligence, vendor supervision, and vendor contract negotiation and management.
  • Help clients implement companywide privacy and security policies to ensure protection of sensitive data.
  • Help clients design beginning-to-end privacy compliance programs for new products, means of advertising, or other uses of consumer data, including drafting and strategic placement of all necessary notices and authorizations, as well as negotiating associated contracts. Such engagements include compliance with the CCPA, GDPR, and similar privacy regimes.
  • Develop and implement GDPR compliance programs for international social media software as a service platform.
  • Represent, with local counsel, companies before EU Data Protection Authorities in regulatory inquiries.
  • Launch mobile application startups in app stores in international markets.
  • Scale privacy compliance programs as outside counsel from startup to IPO.
  • Help clients understand privacy compliance steps needed to expand current uses of consumer information.
  • Serve as the outside general counsel to education clients on privacy and cybersecurity legal issues, including advice on remote learning, interpretation of FERPA, issues related to sexting and cyberbullying, and incident response. Our clients include colleges and universities, as well as some of the country’s top private K-12 schools, school districts, and charter schools.

All Insights

 Coast-to-Coast Privacy Compliance: California, Colorado, Connecticut, Utah, and Virginia

Coast-to-Coast Privacy Compliance: California, Colorado, Connecticut, Utah, and Virginia

September 29, 2022

With state-level momentum for comprehensive privacy bills at an all-time high, companies should familiarize themselves with the types of requirements and begin to address and develop mechanics for those requirements.

 No Password Required: Senior Manager of Cybersecurity Analysis at Capital One and a Builder of the Most Rad Relationships in Cyber

No Password Required: Senior Manager of Cybersecurity Analysis at Capital One and a Builder of the Most Rad Relationships in Cyber

September 12, 2022

Tashya Denose is a senior manager of cybersecurity analysis at Capital One and the director of brand and marketing at Black Girls in Cyber. In this episode, Tashya joins the No Password Required team to discuss her passion for making everyone feel welcome in the cybersecurity world, the state of the cybersecurity pipeline and what needs to be done, and a LOT of other rad stuff (including her feelings about the word “rad” making a comeback!).

 No Password Required: The Bob Ross of Infosec, Whose Secretive Job at KnowBe4 Solves Cybersecurity’s Most-Urgent Issues

No Password Required: The Bob Ross of Infosec, Whose Secretive Job at KnowBe4 Solves Cybersecurity’s Most-Urgent Issues

September 7, 2022

Kayley Melton is the Vice President of Security Awareness Company Courseware and Labs at KnowBe4. Although she can’t share too much about what the "labs" portion of her job entails, let's face it, the secrecy makes her even cooler.

No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure 

No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure 

August 17, 2022

Serge Jorgensen is a founding partner and CTO at Sylint Group, where he provides response and remediation guidance on international espionage incidents, cyber-security attacks, and counter cyber-warfare. An engineer by training, he has a bias for action over theory. In this episode, Serge joins the No Password Required team to talk about his time in the industry, his experience coaching sailing at the Paralympic Games, and his favorite childhood toy. Ernie, Jack, and Pablo discuss the cybercriminals that are posing as Twitter employees and journalists to breach academic and Middle East policy data. In the Technologue segment, Pablo teaches the team the history of the world’s largest hacking competition, DEF CON.

No Password Required: The Former NSA Director, an Elite Storyteller Whose Life Resembles a Grisham Novel

No Password Required: The Former NSA Director, an Elite Storyteller Whose Life Resembles a Grisham Novel

June 13, 2022

Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more.

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs

May 11, 2022

Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. In this episode, Dr. Dark joins the No Password Required team to discuss her career in “training the trainers,” the early days of cybersecurity education as an academic subject, and how to encourage cybersecurity awareness among today’s students.

No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else

No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else

April 7, 2022

Larry Whiteside Jr. is the President and Director of Cyversity, an organization whose mission is to achieve consistent representation of women and underrepresented minorities in the cyber industry through programs designed to diversify, educate, and empower.

The SEC Has Proposed a New Cyber Disclosures Rule for Public Companies

The SEC Has Proposed a New Cyber Disclosures Rule for Public Companies

March 14, 2022

The SEC has stated its belief that the proposed four-day reporting requirement would “significantly improve the timeliness of cybersecurity incident disclosures, as well as provide investors with more standardized and comparable disclosures.”

Four Takeaways From the SEC's Proposed Cyber Rule for Public Companies

Four Takeaways From the SEC's Proposed Cyber Rule for Public Companies

March 11, 2022

The Securities and Exchange Commission recently published a proposed rule that would significantly impact public companies’ cybersecurity reporting obligations. This alert discusses the proposed changes and provides four key takeaways for publicly traded companies.

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People

March 1, 2022

Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. In this episode, Thomas joins the No Password Required team to talk about his journey from the military to cybersecurity, the top-tier candy that he can’t live without, and the philosophical lessons that he carries with him throughout his life.

No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader

No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader

January 28, 2022

Chase Fopiano is the Founder of CyberTech Analytics, a cybersecurity provider that combines the worlds of both law enforcement and information security. Chase began his career as a police officer before diving headfirst into the cybersecurity world, and has since carried the lessons he learned during that time into both his life and his career.

No Password Required: Cyber Threat Management Leader at Wells Fargo Who Has a Passion for Adventure

No Password Required: Cyber Threat Management Leader at Wells Fargo Who Has a Passion for Adventure

December 10, 2021

Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick, her dog, Jack.

No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team

No Password Required: A Child of the 1980s With a Knack for Storytelling, Comedic Timing, and Building an Elite Cybersecurity Team

November 19, 2021

Asim Fareeduddin is the Vice President of IT Security & Regulatory Controls Assurance at the RELX Group. In addition to his impressive professional resume, Asim is a guy who is never afraid to take a chance - from stand-up comedy to teaching masters-level students at Georgia State University; he’s done it all.

DOJ Unveils New Initiative to Pursue Cybersecurity-Related Fraud by Government Contractors and Grant Recipients

DOJ Unveils New Initiative to Pursue Cybersecurity-Related Fraud by Government Contractors and Grant Recipients

October 20, 2021

Earlier this month, the Department of Justice (DOJ) announced the launch of its Civil Cyber-Fraud Initiative, aimed to combat cyber threats to the security of U.S. infrastructure.

No Password Required: An Infowar Expert Who Paved the Path From Rock-And-Roll to Cybersecurity

No Password Required: An Infowar Expert Who Paved the Path From Rock-And-Roll to Cybersecurity

October 7, 2021

Winn Schwartau is a security, privacy, infowar, and cyber-terrorism expert who has been paving the way in cybersecurity since 1983. He is often referred to as the “Civilian Architect of Information Warfare” and is known for his straight-shooting, no-BS originality.

Making Good on Its Promise: SEC Pursues Cyber Enforcement Actions Against Financial Services Companies

Making Good on Its Promise: SEC Pursues Cyber Enforcement Actions Against Financial Services Companies

October 4, 2021

The SEC recently announced settled charges with several investment advisory firms and broker-dealers following email account takeovers. These settlements are the latest in a string of enforcement actions relating to what the SEC considers as cybersecurity failures at registered financial firms.

No Password Required: A Cyber Threat Intelligence Analyst Who Is an Expert on Social Media Trolls

No Password Required: A Cyber Threat Intelligence Analyst Who Is an Expert on Social Media Trolls

September 3, 2021

Charity Wright is a Cyber Threat Intelligence Analyst at Recorded Future who specializes in Chinese threats and disinformation. Charity is a Super Mario-loving extrovert who utilizes her research and inferencing skills in both of her full-time jobs; threat analyst and mom.

CF on Cyber: The Anatomy of a Ransomware Attack - Part 2

CF on Cyber: The Anatomy of a Ransomware Attack - Part 2

September 1, 2021

In part 2 of this series, we continue to discuss the tools that cybersecurity teams use to combat ransomware attacks.

CF on Cyber: The Anatomy of a Ransomware Attack - Part 1

CF on Cyber: The Anatomy of a Ransomware Attack - Part 1

August 31, 2021

Ransomware is a type of malware used by criminal organizations to gain unlawful access to computer networks and encrypt the data stored on those networks and render it unusable. The criminal organization then holds the data hostage until a ransom payment is made. If the ransom is not paid, the victim organization’s data will either remain encrypted and unusable or it could be released to the public.

Bracing for 2023: 10 Steps to Prepare for a New Era in U.S. Privacy

Bracing for 2023: 10 Steps to Prepare for a New Era in U.S. Privacy

August 17, 2021

On July 7, Colorado joined California and Virginia as the third state to pass comprehensive consumer privacy legislation. All three states have new privacy laws with effective dates in 2023 (though California’s Privacy Rights Act has some provisions that took immediate effect). While the laws vary, here are 10 steps companies should take now to ease the transition.

No Password Required: A Corvette-Driving Research Scientist Who Built His Own Video Games

No Password Required: A Corvette-Driving Research Scientist Who Built His Own Video Games

July 30, 2021

Dr. Greg Hall is a Research Scientist at the Institute for Human-Machine Cognition and the University of West Florida. Dan is a Corvette-driving car lover who considers ALF to be one of the classics and has great taste in hats.

DFS Continues Focus on Cybersecurity: Issues Ransomware Guidance and Signals Increased Enforcement Actions

DFS Continues Focus on Cybersecurity: Issues Ransomware Guidance and Signals Increased Enforcement Actions

July 15, 2021

The New York State Department of Financial Services is continuing its focus on financial institutions’ cybersecurity, issuing new guidance, probing cybersecurity as part of routine examinations, and signaling increased enforcement actions. This alert discusses this new guidance and its impact on financial institutions.

CF on Cyber: An Update on the Changes to the Florida Telemarketing Act

CF on Cyber: An Update on the Changes to the Florida Telemarketing Act

June 30, 2021

On June 29, Gov. Ron DeSantis signed into law a bill enacting substantial changes to the Florida Telemarketing Act. In this podcast, Carlton Fields shareholders Aaron Weiss and Charles Throckmorton discuss these changes and key new provisions in the act. If your company is considering any phone or text-based marketing in Florida, this podcast may be of particular interest.

No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day

No Password Required: A Cyber Practice Leader and Natural Optimist Who Believes Every Day Is the Best Day

June 30, 2021

Dan Burke is the Cyber Practice Leader at Woodruff Sawyer, one of the largest insurance brokerage and consulting firms in the US. Dan is a natural optimist and family man who believes every day is going to be the best day and the next shot will always be his greatest golf shot.

Biden Administration Issues Practical Guidance for Ransomware Attacks

Biden Administration Issues Practical Guidance for Ransomware Attacks

June 15, 2021

On June 2, 2021, President Biden issued a memorandum providing "recommended best practices" for protecting against ransomware.

No Password Required: An SOC Technical Manager Who Builds Things With Keyboards and Blowtorches...

No Password Required: An SOC Technical Manager Who Builds Things With Keyboards and Blowtorches...

May 20, 2021

Phillip Tarrant is the SOC Technical Manager at Compuquip Cybersecurity who is passionate about many things in life, including his pet chickens, building things both with and without a keyboard, disconnecting in nature, and welcoming people into the field of cybersecurity.

No Password Required: An OSINT Expert Who Credits Much of Her Success to Her Improv Comedy Skills...

No Password Required: An OSINT Expert Who Credits Much of Her Success to Her Improv Comedy Skills...

April 22, 2021

Rachel Tobac is the CEO and co-founder of Social Proof Security who hopes to one day work herself out of a job by improving education and awareness of social engineering attacks.

No Password Required: A Believer That the Key to Internet Safety Is Simple...

No Password Required: A Believer That the Key to Internet Safety Is Simple...

March 18, 2021

Roger Grimes is the defense-driven evangelist at KnowBe4 who confidently defines himself as the best in the world at defending against hackers. In this episode, Roger joins the No Password Required team to discuss how being a terrible accountant led him to the world of cybersecurity, why octopi cannot be trusted, and why music is the best way to create powerful connections.

No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars

No Password Required: A Pen Tester at Rapid7 With a Passion for LEGO Bricks, Star Wars, and Sometimes LEGO Star Wars

February 18, 2021

Shane Young is a penetration tester at Rapid7 whose real-life acting and cyber skills would have been a great addition to the “Oceans 11” team. In this episode, Shane joins the No Password Required team to share some of his exciting stories as a penetration tester, how hacking his high school’s network got him into the world of cybersecurity, and why LEGO bricks are really made for adults, not kids.

No Password Required: An Inherently Trusting Person in an Inherently Distrusting Profession

No Password Required: An Inherently Trusting Person in an Inherently Distrusting Profession

February 18, 2021

Melinda Lemke is the Head of Information Security at King & Spalding with a decade of leadership experience in the cyber industry. In this episode, Melinda joins the No Password Required team to talk about her experience as a woman and leader in this field, how professional mentors can enhance success, and the best yacht-rock bands of all time. Maybe most importantly, the team discusses the John Hughes movie universe and why Kevin McAllister is a better problem-solver than Ferris Bueller.

No Password Required: A Journey From Math Camp to Cyber Intelligence

No Password Required: A Journey From Math Camp to Cyber Intelligence

February 18, 2021

Stephen “Scuba” Gary is a cyber intelligence professor at the University of South Florida with over 15 years of experience in the cybersecurity industry. In this episode, Scuba joins the No Password Required team to discuss his journey in the field of cybersecurity, how one gets the nickname Scuba without scuba diving, and why math nerds throw the best parties. Scuba, Ernie, and Clabby analyze ransomware attacks in Florida, security lessons to be learned from the 2020 elections, and more.

What the Heck is Happening in California? An Update on California’s Privacy Laws

What the Heck is Happening in California? An Update on California’s Privacy Laws

February 12, 2021

In a period of less than two years, the California privacy law landscape has changed dramatically. With the effective enforcement date of the CCPA in January 1, 2020, to a new privacy law, the California Privacy Rights Act (CPRA), passed by California voters in November 2020, as well as a new Attorney General on the horizon, California will certainly be a place to watch in 2021.

Ledgers and Law: Real-World Planning for Cyber Attacks

Ledgers and Law: Real-World Planning for Cyber Attacks

December 15, 2020

The COVID-19 pandemic has changed the way millions of people work. Remote workers are especially vulnerable to cyber threats such as ransomware and business email compromise. Joe Swanson, chair of Carlton Fields’ Cybersecurity and Privacy Practice, discusses important cybersecurity trends, what companies should do to prepare for cyber breaches, how to mitigate risk if an employee makes a mistake, vendor management issues, and the importance of a game plan if you are hit with an attack.

Brazil’s LGPD: What You Need to Know Before 2021

Brazil’s LGPD: What You Need to Know Before 2021

October 29, 2020

Overlooked in a year dominated by a “wait-and-see” dynamic with both the finalization and enforcement of the California Consumer Privacy Act (CCPA), Brazil’s General Data Protection Law—Lei Geral de Proteção de Dados (LGPD)—is another major privacy compliance obligation that must be undertaken for 2021.

Key Contacts

Other Team Members

Gary K. Slinger

Gary K. Slinger

Director of Security & Business Continuity

Featured Insights

Disclaimer

The information on this website is presented as a service for our clients and Internet users and is not intended to be legal advice, nor should you consider it as such. Although we welcome your inquiries, please keep in mind that merely contacting us will not establish an attorney-client relationship between us. Consequently, you should not convey any confidential information to us until a formal attorney-client relationship has been established. Please remember that electronic correspondence on the internet is not secure and that you should not include sensitive or confidential information in messages. With that in mind, we look forward to hearing from you.