Privacy and Data Protection – Critical Infrastructure

Overview

A cybersecurity incident that affects the critical infrastructure system, including energy generation and distribution facilities, transportation, the Web and other information providers, and financial markets and institutions, could undermine the functioning of the global economy and the well-being of the international community. The need for businesses, organizations, and governmental agencies that comprise the critical infrastructure to be compromise ready is extremely urgent, as they present attractive targets to bad actors sponsored by hostile governments or by independent criminal or terrorist groups. In addition, the government is increasingly concerned and has been taking steps to craft a national policy.

Our lawyers regularly advise players in these key industries, as to both preparation for and prevention of incidents and as to compliance with laws and regulations intended to make our critical infrastructure more secure. They also have experience handling the legal fallout from major incidents and emergencies affecting critical infrastructure clients.

Select Experience

  • Represented a Fortune 500 electric and natural gas utility on privacy and data security issues, including Identity Theft Red Flags Rule, Telephone Consumer Protection Act, and Fair Credit Reporting Act compliance, state data security regulations, and incident response.
  • Represented a multijurisdictional energy infrastructure company, preparing policies and procedures for the rollout of a Bring Your Own Device program.
  • Represented clients participating in U.S. Coast Guard inspections and audits, annual spill drill exercises and tabletop sessions, and management of pipeline spill response actions.
  • Represtened a pressure control system manufacturer after a well blowout that killed two members of the energy crew, injured two others, and destroyed the workover rig.
More »

Experience

  • Represented a Fortune 500 electric and natural gas utility on privacy and data security issues, including Identity Theft Red Flags Rule, Telephone Consumer Protection Act, and Fair Credit Reporting Act compliance, state data security regulations, and incident response.
  • Represented a multijurisdictional energy infrastructure company, preparing policies and procedures for the rollout of a Bring Your Own Device program.
  • Represented clients participating in U.S. Coast Guard inspections and audits, annual spill drill exercises and tabletop sessions, and management of pipeline spill response actions.
  • Represtened a pressure control system manufacturer after a well blowout that killed two members of the energy crew, injured two others, and destroyed the workover rig.
  • Represented the charterer of a tanker involved in an oil spill, including handling emergency response services and representing the client in all spill-related litigation.
  • Represented a pipeline company in claims against a salvage company for damages incurred to the client’s offshore pipeline during a salvage operation.
  • Represented an energy company as co-defendant in a case arising from a chemical plant explosion in Ohio, with a certified class of more than 10,000 neighboring residents alleging personal injury, property damage, real property diminution in value, and evacuation claims.
  • Represented critical infrastructure clients in the oversight of pipeline spill response actions following releases from an underground 12-inch jet fuel pipeline in the Florida Keys and from a train derailment in upstate New York that struck two above-ground 12-inch jet fuel pipelines.

Recognition

  • Recognized as one of the top law firms for client service, we were named to the 2018 BTI Client Service 30 for the fourth consecutive year.

Publications

Blog

In The Blogs

Previous Next
Data Privacy Monitor
Toying With Children’s Data: Lessons From the FTC’s First Connected Toys Settlement Action
January 17, 2018
Every year, especially around the holidays, more and more products that connect to the internet hit the market. For adults, connected home devices that act like personal domestic assistants have become increasingly popular. Children have...
Read More ->
Data Privacy Monitor
Recent Trends, Future Predictions, and Effective Risk Assessments
January 8, 2018
Risk assessments are a fundamental part of any organization’s risk management process. But many organizations still do not incorporate true risk assessments into their information-security planning, even though doing so makes good business...
Read More ->
Data Privacy Monitor
The IRS Succeeds in Compelling Crypto Exchange to Disclose User Information
January 4, 2018
As the price of bitcoin leaps and lurches toward new highs, it seems fitting that the legal regime surrounding it and other virtual currencies is similarly unpredictable. With bitcoin edging its way into mainstream finance, and Coinbase...
Read More ->
Data Privacy Monitor
Coming Full Circle: FTC Recovers BIAS Regulation Jurisdiction Following FCC Vote
January 3, 2018
In a widely publicized decision, the Federal Communication Commission (FCC) voted on Dec. 14, 2017, to repeal the tenets of the Protecting and Promoting the Open Internet Order, or the Open Internet Order, of 2015. See Protecting and...
Read More ->
Data Privacy Monitor
Small Health Care Providers: Do you really know what your IT services vendor is providing to secure your systems?
December 27, 2017
A small health care provider such as a physician office or clinic often will contract with an IT services vendor to meet overall IT needs to operate the business. A small health care provider may not have the resources and expertise to...
Read More ->