Menu

Cybersecurity and Privacy


Download   

Overview

We provide clients across industries with comprehensive counsel on complex, evolving, and multifaceted issues related to information security, data breaches, and privacy.

Our cybersecurity clients seek our advice at the three phases of cybersecurity legal needs: (i) planning, preparation, and hardening against a cybersecurity event; (ii) as “breach coaches” during a cybersecurity event, including coordination of forensic services and working with law enforcement, through consumer notification; and (iii) in the litigation that may follow a cybersecurity event.

Our attorneys are trusted counsel both to international companies and to growth-stage companies on all manner of privacy compliance and litigation issues. We advise on long-standing federal standards such as HIPAA and Gramm-Leach-Bliley as well as emerging state standards, such as those in California and New York.

We blend our skills and experiences as litigators and transactional attorneys with a deep understanding of information security, data breach law, and privacy laws and regulations to meet and anticipate our clients’ needs. Carlton Fields' team includes attorneys who have earned the designation of Certified Information Privacy Professional (e.g., CIPP/US, CIPM) as well as former federal cybercrime prosecutors.

Our services include: 

Data Breach and Incident Response

  • Help clients prepare for, and respond to, data breaches and the full range of government investigations they may prompt.
  • Provide immediate support and rapid response, via phone and email, for clients that learn of a possible data breach and must act immediately to mitigate potential liability and discharge potential obligations stemming from the incident.
  • Develop and test comprehensive incident response plans that address internal and external actions to take in the wake of a data security incident.

Litigation

  • Represent clients in all forms of litigation associated with data breaches and other security incidents. This includes class action defense in federal and state courts, and prosecution and defense of other complex matters.

Development and Implementation of Compliance Programs

  • Build full-scale compliance programs for domestic and international operations, including:
    • Data mapping and risk assessment
    • Data subject access request management policies, procedures, and workflows
    • Review and update of contracts and agreements to reflect data privacy obligations and data processing
    • Updates to internal and external privacy policies
    • Cookie consent and management of preferences
    • Privacy compliance for new product development and advertising
  • Update data privacy and information security policies, procedures, and programs for businesses of all sizes with both domestic and international operations. 

Federal and State Privacy and Cybersecurity Laws 

  • Regularly assist clients with their obligations pursuant to laws, including Gramm-Leach-Bliley, the Fair Credit Reporting Act, HIPAA, and HITECH.
  • Assist clients in complying with emerging state privacy and cybersecurity laws, such as the California Consumer Privacy Act (CCPA), the Colorado Privacy Act (CPA), Nevada's privacy law (SB-220), the New York SHIELD Act, and the Virginia Consumer Data Protection Act (VCDPA).

International Privacy Regulations and Global Policies 

  • Counsel clients on compliance with the GDPR and assist with the development of legal means for cross-border data transfers post Schrems II.
  • Counsel clients on compliance with other international regulations, including Brazil’s Lei Geral de Proteção de Dados (General Data Protection Law - LGPD), Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA), and Jamaica's Data Protection Act (DPA).
  • Counsel clients on compliance with International Standards of Organization (ISO), the internationally recognized best practices for personal data use, transmission, and storage.

Employee Privacy Issues 

  • Advise employers on a wide range of privacy areas, including compliance with federal and state regulations, including employer obligations under the CCPA.
  • Counsel clients on compliance with the Fair Credit Reporting Act and analogous state laws regarding pre-employment background checks and post-hire investigations.
  • Counsel businesses on privacy issues related to work-from-home and COVID-19.

Genetic Information and Health Privacy

  • Develop and implement incident management response for data breaches relating to electronic personal health information.
  • Manage security risk assessments to meet HIPAA, HITECH, and state health information privacy and security requirements.
  • Develop and implement full suite of policies and procedures necessary for compliance with HIPAA’s privacy and security rules.
  • Create compliance programs to accommodate emerging biometric data and genetic privacy laws domestically and internationally.

Privacy and Cybersecurity Trainings

  • Provide off-the-shelf and white-label privacy training options to accommodate businesses of all sizes in privacy readiness and compliance, including trainings to meet compliance requirements for the CCPA, GDPR, LGPD, HIPAA, and EU data authority guidance.
  • Plan and conduct tabletop exercises with companies to simulate a breach event, targeting to the company’s particular risk profile, often partnering with inside or outside forensic experts and media relations professionals.

Website and Social Networking Issues 

  • Help ensure client compliance with FTC and other regulations.
  • Support brands and influencers in meeting requirements under Section 5 of the FTC Act.
  • Draft privacy policies, social media policies, terms of use, and community policies, and develop internal legal management programs for emerging online issues.
  • Assist clients with the wide-ranging issues that arise as a result of social media use and an internet presence, and help them develop related proactive policies and standards.

Online Harassment and Phishing Campaigns

  • Represent and protect companies and their employees who are victims of online harassment, including nonconsensual pornography, cyber stalking, reputation attacks, identity theft, and other forms of digital abuse.
  • Work with companies whose employees or customers are facing targeted, sophisticated phishing campaigns, including spoofing attempts and suspected email compromises.
  • Our work can include support of the company’s investigations into these matters, packaging the evidence for cooperation with law enforcement, and protection of corporate intellectual property, particularly as to domain name abuse.

Due Diligence and Other Transactional Support

  • Provide cybersecurity and privacy due diligence advice in connection with mergers and acquisitions, private equity investments, and other transactions.
  • Represent private equity firms and other pooled-capital entities as standby counsel for their investigations into potential acquisitions, including of SaaS companies as well as more traditional brick-and-mortar companies for which cybersecurity is a concern, both at the term sheet level and pre-closing.


Our attorneys are active and hold leadership positions in data privacy and cybersecurity organizations, such as:

  • International Association of Privacy Professionals (IAPP) 
  • International Security Management Association
  • Sedona Conference Working Group on Data Security and Privacy Liability 
  • ABA - Privacy and Computer Crime Committee CLE Working Group 
  • ABA - Computer and Software Legislation Committee 
  • ABA - Electronic Filing Committee 
  • ABA - Internet Relationships and Cloud Computing Committee 
  • ABA - Section of Science & Technology Law 
  • DRI - Data Management and Security Committee
  • ISACA (Information Systems Audit and Control Association)


Industries supported by our practice include:

  • Advertising
  • Artificial intelligence
  • Biotechnology
  • Construction and real estate
  • Consumer brands
  • Cosmetics
  • Data analytics
  • E-commerce
  • Education (K-12 and universities) and education technology (edtech)
  • Electronic gaming and esports
  • Financial services sector
  • Health care
  • Insurance
  • Media and entertainment
  • Professional services
  • Retail, including online retail
  • Software
  • Software as a service
  • Technology
  • Telecommunications
  • Title insurance

Experience

  • Served as breach coach and notifications counsel in responding to an extortionate ransomware attack on a B2B company with international operations, coordinating forensic response, threat actor engagement, coordination with law enforcement, and public and business-partner communications.
  • Helped dozens of corporate clients that have experienced data breaches due to theft (e.g., stolen laptops and servers), social engineering fraud (phishing, misdirected wires), hacking (stolen passwords, brute force attacks), and accident (e.g., natural disasters, lost backup tapes).
  • Defend clients under investigation by federal and/or state government agencies after complaints of privacy violations or data breaches. We frequently help clients, for example, that are subject to HIPAA privacy and security regulations respond to investigations by the U.S. Department of Health and Human Services’ Office for Civil Rights. 
  • Defend data breach class actions, including (i) a hospital system after the alleged theft of personal health and financial data of hospital patients; (ii) a public entity after the exposure of its employees’ tax information in a phishing scheme; and (iii) a multi-office medical practice that was the victim of a ransomware attack. In such cases, we have won at the motion to dismiss phase and class certification phases, and we have, in consultation with our clients and their insurance carriers, arranged for favorable resolutions at mediation.
  • Assist and represent clients with creation and implementation of vendor management programs, including policies and procedures related to vendor risk assessment, vendor due diligence, vendor supervision, and vendor contract negotiation and management.
  • Help clients implement companywide privacy and security policies to ensure protection of sensitive data.
  • Help clients design beginning-to-end privacy compliance programs for new products, means of advertising, or other uses of consumer data, including drafting and strategic placement of all necessary notices and authorizations, as well as negotiating associated contracts. Such engagements include compliance with the CCPA, GDPR, and similar privacy regimes.
  • Develop and implement GDPR compliance programs for international social media software as a service platform.
  • Represent, with local counsel, companies before EU Data Protection Authorities in regulatory inquiries.
  • Launch mobile application startups in app stores in international markets.
  • Scale privacy compliance programs as outside counsel from startup to IPO.
  • Help clients understand privacy compliance steps needed to expand current uses of consumer information.
  • Serve as the outside general counsel to education clients on privacy and cybersecurity legal issues, including advice on remote learning, interpretation of FERPA, issues related to sexting and cyberbullying, and incident response. Our clients include colleges and universities, as well as some of the country’s top private K-12 schools, school districts, and charter schools.

All Insights

No Password Required: CEO and Founder of AnzenSage, Defender of the Food Sector, and Friend to Primates

No Password Required: CEO and Founder of AnzenSage, Defender of the Food Sector, and Friend to Primates

November 20, 2023

What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain.

No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection

No Password Required: Founder and Commissioner of the US Cyber Games, CEO of the Cyber Marketing Firm Katzcy, and Someone Who Values Perseverance Over Perfection

October 25, 2023

Jessica Gulick is a woman of many trades. She is the founder and CEO of the cyber marketing firm Katzcy, the founder and commissioner of the US Cyber Games, and a trailblazer who is working to make cybersecurity a sport that thrives. In this episode, Jessica joins Carlton Fields’ Jack Clabby and KnowBe4’s Kayley Melton to share her experiences as a female entrepreneur and the role that perseverance has played throughout her career.

12 Tips to Help Your Business Address Generative AI Risks

12 Tips to Help Your Business Address Generative AI Risks

September 28, 2023

With generative AI becoming increasingly prevalent, businesses face a spectrum of opportunities, challenges, and risks. While some organizations have been quick to bring generative AI into the fold, the majority are still wondering whether it’s the right tool and, if so, how to integrate it safely and effectively.

 No Password Required: Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a Guy With a Mildly Exciting Expense Account

No Password Required: Threat Intelligence Analyst at Recorded Future, the Ransomware Sommelier, and a Guy With a Mildly Exciting Expense Account

September 22, 2023

Allan Liska is a threat intelligence analyst at Recorded Future. In this episode, Allan returns to No Password Required to talk with Carlton Fields attorney Jack Clabby and KnowBe4’s Kayley Melton about his experiences in the ever-evolving battlefield of cyber threats, what has changed in ransomware since his first time on the show, and his perspective on the power of AI in the battle against cyber threats.

No Password Required: CEO of Paragon Cyber Solutions, Family-Night Game Champion, and Calculated-Risk Taker

No Password Required: CEO of Paragon Cyber Solutions, Family-Night Game Champion, and Calculated-Risk Taker

September 5, 2023

Courtney H. Jackson is the CEO of Paragon Cyber Solutions, a Tampa-based cybersecurity solutions provider. If Courtney’s name sounds familiar, that may be because she was awarded the Global 2022 Cybersecurity Woman Entrepreneur of the Year! In addition, Courtney is a 2023 Business Woman of the Year Honoree and a veteran of the U.S. Navy, where she was introduced to the world of cyber and IT.

No Password Required: Founder of Cyber Security Unity, Member of the Order of the British Empire, and Appreciator of '80s Soap Operas

No Password Required: Founder of Cyber Security Unity, Member of the Order of the British Empire, and Appreciator of '80s Soap Operas

July 19, 2023

In this episode of No Password Required, Lisa joins Carlton Fields’ Jack Clabby and KnowBe4’s Kayley Melton to share how she went from working on the U.K. version of “Who Wants to Be a Millionaire?” to becoming an award-winning leader in the cybersecurity industry. She also tells us about receiving her honorary award from the British Parliament, her love of 1980s American soap operas, and the sci-fi world she’d most want to live in.

No Password Required: Threat Researcher at Cisco Talos and a Veteran of the Highest-Profile Cyber Incidents Who Roasts His Own Coffee Beans

No Password Required: Threat Researcher at Cisco Talos and a Veteran of the Highest-Profile Cyber Incidents Who Roasts His Own Coffee Beans

June 20, 2023

Nick Biasini leads a team of threat researchers at Cisco Talos who patrol the cutting edge of the threat landscape. Not only has he investigated some of the most significant cyberattacks in history, but he also has hands-on experience with the 1980 Olympic bobsled track.

It’s 3 AM: Do You Know What Your Website Is Doing? Tips for Reducing Regulatory and Litigation Risk Stemming From Website Technologies

It’s 3 AM: Do You Know What Your Website Is Doing? Tips for Reducing Regulatory and Litigation Risk Stemming From Website Technologies

May 24, 2023

Website technologies run the gamut from session replay to pixels and other digital advertising technologies. These technologies are ubiquitous and deployed by organizations around the world to enhance the experience of visitors to those organizations' websites and improve marketing outcomes. Despite these legitimate uses, regulators and class action plaintiffs are taking aim at these technologies, leading to considerable compliance and litigation risk.

No Password Required: Gautam “Gotham” Sharma, a Cybersecurity Consultant and Comedian Who Injects Fun Into Infosec

No Password Required: Gautam “Gotham” Sharma, a Cybersecurity Consultant and Comedian Who Injects Fun Into Infosec

May 2, 2023

Gotham Sharma is a cybersecurity consultant, writer, educator, and stand-up comic. He’s on a mission to help folks build successful careers in information security through his latest venture, AccessCyber.co.

Website Tech Fueling Privacy Litigation: How to Reduce Your Risk

Website Tech Fueling Privacy Litigation: How to Reduce Your Risk

April 17, 2023

Website technologies (such as cookies, session-replay software, and other tools) are fueling a rise in privacy class actions and drawing regulators’ scrutiny. Plaintiffs’ attorneys are pursuing these claims under a variety of theories that implicate federal and state statutes as well as common law causes of action.

No Password Required:The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.

No Password Required:The Teenage CEO of Girls Who Hack and Secure Open Vote, Who Is as Comfortable Behind a Mic as She Is Behind a Keyboard.

April 6, 2023

Bianca Lewis, also known by her hacker handle BiaSciLab, is a next-generation teenage hacker and the CEO of Girls Who Hack. Bianca’s cybersecurity journey started at age 11 when she was part of a team that successfully compromised a simulated election-reporting system at DEF CON 26

No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success

No Password Required: A Security Engineer and Budding Surfer Who Took PentesterLab From Side Hustle to Global Success

February 28, 2023

On this episode of No Password Required, Louis Nyffenegger, founder and CEO of PentesterLab, shares how he built his penetration-testing training company, why empathy is crucial to application security, and what can be learned from having hobbies you’re not good at.

No Password Required: A Developer Advocate With Auth0 and an

No Password Required: A Developer Advocate With Auth0 and an "Accordion Guy" With Rockstar Aspirations

January 31, 2023

Joey deVilla is a Senior R&D Content Engineer at Auth-Zero, a division of Okta. After hours, Joey is known as the Accordion Guy and spends his time playing music and sharing his nerdy takes on his two personal blogs.

No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas

No Password Required: Former Commander, United States Central Command, Executive Director of Cyber Florida and an Appreciator of Battlefield Beef Enchiladas

January 4, 2023

General (Ret.) Frank McKenzie is the Executive Director of the Global and National Security Institute at the University of South Florida and the Executive Director of Cyber Florida.

  No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity

No Password Required: An FBI Special Agent's Journey from Submarines to Anti-Corruption to Cybersecurity

December 12, 2022

Andy Sekela is the Private Sector Coordinator for the FBI Tampa Division, who may just be on a mission to have the world’s coolest resumé. In this episode, Andy joins the No Password Required team to talk about his diverse career path, including his time as an officer on a nuclear submarine, public corruption investigations, and his best “wow, I’m an FBI agent” story.

No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory

No Password Required: A Senior Product Manager at GitLab With an Instagram Alter Ego That Puts Her in Privacy Superhero Territory

November 15, 2022

Hannah Sutor is the senior product manager at GitLab and digital privacy advocate at the Privacy Chick. Hannah joins the No Password Required team to talk about how she discovered privacy and cybersecurity in college, what she expects for the future of usernames and passwords, and her adventures while traveling in an RV with her family for a year

No Password Required: The Custom T-Shirt-Wearing CEO Who Not Only Appreciates Mega Man ... He Basically Is One

No Password Required: The Custom T-Shirt-Wearing CEO Who Not Only Appreciates Mega Man ... He Basically Is One

October 24, 2022

Charles Shirer is the Chief Executive Officer of GlobalWave Consulting, an IT and cybersecurity consultancy. Known as the @bsdbandit to his 20,000+ Twitter followers, Charles is often considered the most positive person in cybersecurity (and for good reason!)

Financial Services Cyber Fraud: The Latest Risks and Best Responses

Financial Services Cyber Fraud: The Latest Risks and Best Responses

October 20, 2022

Cyber fraud costs the financial services industry billions in losses each year and has been on the rise. Regulation has followed, creating risks of a different kind.

 Coast-to-Coast Privacy Compliance: California, Colorado, Connecticut, Utah, and Virginia

Coast-to-Coast Privacy Compliance: California, Colorado, Connecticut, Utah, and Virginia

September 29, 2022

With state-level momentum for comprehensive privacy bills at an all-time high, companies should familiarize themselves with the types of requirements and begin to address and develop mechanics for those requirements.

 No Password Required: Senior Manager of Cybersecurity Analysis at Capital One and a Builder of the Most Rad Relationships in Cyber

No Password Required: Senior Manager of Cybersecurity Analysis at Capital One and a Builder of the Most Rad Relationships in Cyber

September 12, 2022

Tashya Denose is a senior manager of cybersecurity analysis at Capital One and the director of brand and marketing at Black Girls in Cyber. In this episode, Tashya joins the No Password Required team to discuss her passion for making everyone feel welcome in the cybersecurity world, the state of the cybersecurity pipeline and what needs to be done, and a LOT of other rad stuff (including her feelings about the word “rad” making a comeback!).

 No Password Required: The Bob Ross of Infosec, Whose Secretive Job at KnowBe4 Solves Cybersecurity’s Most-Urgent Issues

No Password Required: The Bob Ross of Infosec, Whose Secretive Job at KnowBe4 Solves Cybersecurity’s Most-Urgent Issues

September 7, 2022

Kayley Melton is the Vice President of Security Awareness Company Courseware and Labs at KnowBe4. Although she can’t share too much about what the "labs" portion of her job entails, let's face it, the secrecy makes her even cooler.

No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure 

No Password Required: The Sailing CTO of Sylint Group Who Routinely Defends Against Nation-State Attacks on Critical Infrastructure 

August 17, 2022

Serge Jorgensen is a founding partner and CTO at Sylint Group, where he provides response and remediation guidance on international espionage incidents, cyber-security attacks, and counter cyber-warfare. An engineer by training, he has a bias for action over theory. In this episode, Serge joins the No Password Required team to talk about his time in the industry, his experience coaching sailing at the Paralympic Games, and his favorite childhood toy. Ernie, Jack, and Pablo discuss the cybercriminals that are posing as Twitter employees and journalists to breach academic and Middle East policy data. In the Technologue segment, Pablo teaches the team the history of the world’s largest hacking competition, DEF CON.

No Password Required: The Former NSA Director, an Elite Storyteller Whose Life Resembles a Grisham Novel

No Password Required: The Former NSA Director, an Elite Storyteller Whose Life Resembles a Grisham Novel

June 13, 2022

Vice Admiral Mike McConnell is the former director of the National Security Agency (NSA) and the current Executive Director of Cyber Florida. In this two-part episode, VADM McConnell stuns the No Password Required team to silence with stories of his life. A few highlights include the reason he refuses to drink cheap beer (or formaldehyde), some iconic moments during his time at the NSA, and more.

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs

No Password Required: A Cybersecurity Education Specialist, Whose Passions Include the Forest, DIY, and Deviled Eggs

May 11, 2022

Dr. Melissa Dark is the Founder of DARK Enterprises, a non-profit organization dedicated to developing and supporting cybersecurity education at the secondary level. In this episode, Dr. Dark joins the No Password Required team to discuss her career in “training the trainers,” the early days of cybersecurity education as an academic subject, and how to encourage cybersecurity awareness among today’s students.

No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else

No Password Required: The Motorcycle-Riding Founder of Cyversity Who Values Mentorship and Inclusivity Above All Else

April 7, 2022

Larry Whiteside Jr. is the President and Director of Cyversity, an organization whose mission is to achieve consistent representation of women and underrepresented minorities in the cyber industry through programs designed to diversify, educate, and empower.

The SEC Has Proposed a New Cyber Disclosures Rule for Public Companies

The SEC Has Proposed a New Cyber Disclosures Rule for Public Companies

March 14, 2022

The SEC has stated its belief that the proposed four-day reporting requirement would “significantly improve the timeliness of cybersecurity incident disclosures, as well as provide investors with more standardized and comparable disclosures.”

Four Takeaways From the SEC's Proposed Cyber Rule for Public Companies

Four Takeaways From the SEC's Proposed Cyber Rule for Public Companies

March 11, 2022

The Securities and Exchange Commission recently published a proposed rule that would significantly impact public companies’ cybersecurity reporting obligations. This alert discusses the proposed changes and provides four key takeaways for publicly traded companies.

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People

No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People

March 1, 2022

Thomas Vaughn is the current Chief Information Security Officer (CISO) of the City of Tallahassee and the former CISO of Florida. In this episode, Thomas joins the No Password Required team to talk about his journey from the military to cybersecurity, the top-tier candy that he can’t live without, and the philosophical lessons that he carries with him throughout his life.

No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader

No Password Required: A Former Police Officer Who Embodies All the Qualities of a Great Leader

January 28, 2022

Chase Fopiano is the Founder of CyberTech Analytics, a cybersecurity provider that combines the worlds of both law enforcement and information security. Chase began his career as a police officer before diving headfirst into the cybersecurity world, and has since carried the lessons he learned during that time into both his life and his career.

No Password Required: Cyber Threat Management Leader at Wells Fargo Who Has a Passion for Adventure

No Password Required: Cyber Threat Management Leader at Wells Fargo Who Has a Passion for Adventure

December 10, 2021

Debbie Janeczek is the Cyber Threat Management Leader and Technology Executive at Wells Fargo. At her core, Debbie is an outdoorswoman who is passionate about conquering the mountains of Colorado and beyond with her sidekick, her dog, Jack.

Key Contacts

Other Team Members

Gary K. Slinger

Gary K. Slinger

Director of Security & Business Continuity

Featured Insights

Disclaimer

The information on this website is presented as a service for our clients and Internet users and is not intended to be legal advice, nor should you consider it as such. Although we welcome your inquiries, please keep in mind that merely contacting us will not establish an attorney-client relationship between us. Consequently, you should not convey any confidential information to us until a formal attorney-client relationship has been established. Please remember that electronic correspondence on the internet is not secure and that you should not include sensitive or confidential information in messages. With that in mind, we look forward to hearing from you.