ARTICLE
24 March 2017

Data Breach Response: Orchestrating Legal And Technical Resources To Contain And Mitigate

LD
Lowndes, Drosdick, Doster, Kantor & Reed

Contributor

The firm’s original four partners were engaged primarily in a burgeoning real estate practice. While our real estate practice and deep-rooted involvement in that industry remains an integral component of the firm, we have grown alongside the dynamic needs of our clients and community at large. Today, the firm’s lawyers advise clients on almost every aspect of business: from copyrights and trademarks to high-stakes, high-profile litigation; from complex commercial and residential real estate issues to wealth management; from labor and employment law to healthcare; from capital raising and entity formation to corporate growth and expansion locally, nationally and internationally.
Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise.
United States Privacy

Data breaches are inevitable and the aftermath of a data breach can be a significantly difficult exercise. When legal and technical resources work together, both proactively and reactively, the response can run more smoothly.

Examples of proactive and reactive guidance:

  • — System data retentions to ensure appropriate sets are available for post breach analysis
  • — Breach response workflow processes that integrate legal and technology resources
  • — Post breach preservation considerations

Click here to view the materials from a webinar we recently hosted, providing practical guidance and workflow suggestions to change potential cacophony into symphony.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More