News

What's the Cost of Not Keeping a Secret?

From missing laptops and USB drives to anonymous computer hackers and cyber terrorists, data breaches are on the rise. In the midst of a data breach, when the security of critical information and potentially millions—or even billions—of dollars are at risk, you want the team that has the knowledge and experience to act decisively and efficiently. That’s why businesses and healthcare institutions call BakerHostetler’s Privacy and Data Protection Team.

This team has handled more than 170 breaches alone this year, with attorneys available 24/7 through its Data Breach Hotline.

Subscribe to BakerHostetler’s Data and Privacy Protection blog: www.DataPrivacyMonitor.com.

 
When global retailers and hospitality service providers are required to retain a PCI Forensics Investigator (PFI), they call BakerHostetler to lead the response and oversee the investigation and discussions with the card brands. Our representation often continues if there is litigation--we have defended over 25 privacy class action matters.

When premier health systems and academic medical centers lose control of patient information, BakerHostetler is called to provide critical assistance with breach analysis, federal and state notification obligations, crisis management, investigation of the incident, regulatory compliance, resolution of patient complaints and response to regulatory investigations. We have handled three of the largest healthcare breaches ever announced and have defended dozens of Department of Human Services Office for Civil Rights investigations.

Education institutions can face significant fallout from students, parents, Attorneys General, and the Department of Education. BakerHostetler lawyers have guided them to achieve the best outcome. Our lawyers recognize that it is your brand at stake, and we can give you the advice you need because we have handled hundreds of privacy events.

Financial institutions call on BakerHostetler when a simple stolen lap top or sophisticated network intrusion expose customer information. We manage their forensic investigations and customer notification obligations while limiting the impact from state and federal regulatory investigations.

In the high-stakes world of data security and compliance, BakerHostetler’s Data and Privacy Protection Team is your team.

Related Industries

Blog

In The Blogs

Previous Next
Data Privacy Monitor
Reexamining the GDPR’s Territorial Scope
January 24, 2020
Key Takeaways From the European Data Protection Board’s New Guidance In November 2019, the European Data Protection Board (EDPB) issued its final guidance on territorial scope of the General Data Protection Regulation (GDPR), following...
Read More ->
Data Privacy Monitor
Everything Data!
By Theodore J. Kobus III
January 21, 2020
Thank you to our clients and relationships, as well as to the BakerHostetler team who made the creation of the new Digital Assets and Data Management (DADM) Practice Group possible. In a world dependent on data, this group takes a...
Read More ->
Data Privacy Monitor
California AG Press Release Clarifies CCPA's Jan. 1 Effective Date and Data Broker Registry, Provides No Update on Draft Regulations
By Kyle R. Fath
January 14, 2020
On Jan. 6, 2020, the California attorney general (AG) released a CCPA advisory press release outlining the new data privacy rights under the California Consumer Privacy Act (CCPA) afforded to California consumers and clearly stating that...
Read More ->
Data Privacy Monitor
Cybersecurity Remains a Top SEC Examination Priority in the New Decade
By Jonathan A. Forman
January 10, 2020
It may be a new decade, but the focus of the Securities and Exchange Commission (SEC) on cybersecurity has not shifted. In particular, the SEC noted in its 2020 Examination Priorities that the Office of Compliance Inspections and...
Read More ->
Data Privacy Monitor
Steps to Develop a Mature Third-Party Risk Management Program With High-Risk Third Parties
By Daniel A. Pepper
January 10, 2020
This blog is the first in a series exploring how organizations can prevent or mitigate the severity of a third-party data breach or cyber exploit by implementing a variety of cybersecurity risk management controls such as assessing...
Read More ->