Welcome!

News Feed Item

BuckleySandler Launches "Privacy, Cyber Risk & Data Security" Hotline

WASHINGTON, DC -- (Marketwired) -- 01/23/14 -- BuckleySandler LLP, a leading financial services regulatory, criminal & civil enforcement defense law firm, has launched a Privacy, Cyber Risk & Data Security Hotline to assist companies with mitigating online security risks. The Hotline (1-888-5-DATA-55) is available 24/7 and provides companies with immediate access to a Privacy, Cyber Risk & Data Security Team member to address all aspects of legal and regulatory compliance when responding to security incidents. Inquiries can also be submitted via email to [email protected].

"The recent breaches in data security, such as those at Target and Neiman Marcus, show that not only are cyber attacks continuing, but that cyber criminals are adapting techniques to find new and more effective ways to steal customer personal and financial information," noted Margo H.K. Tank, a partner with BuckleySandler specializing in e-Commerce, Privacy and Data Protection.

"This Hotline will serve as a valuable tool for financial institutions and their service providers as they continue to struggle with the ever-increasing challenges of collecting, using, disclosing and protecting personal information relating to customers, employees and others," added BuckleySandler partner Samuel J. Buffone.

BuckleySandler's Privacy, Cyber Risk & Data Security Team, which in 2012 and 2013 received recognition from the Legal 500 for its notable representations and overall risk management reputation, has addressed hundreds of security incidents and regularly advises clients in all aspects of legal and regulatory compliance, incident analysis, forensic review, call center set up and credit monitoring.

BuckleySandler partner Elizabeth E. McGinn further explained that the Hotline serves as a resource for companies to speak with a BuckleySandler Team member to:

  • Review policies and procedures for data privacy and security in light of current industry trends;
  • Prepare employee training materials;
  • Assess incident response plans;
  • Assist in the planning and conducting breach preparedness exercises;
  • Revise breach-related provisions in vendor agreements (including cloud services agreements);
  • Craft template letters for notice to consumers and regulators; and
  • Conduct an on-site Breach Risk Mitigation Day.

With more than 150 lawyers in Washington, New York, Los Angeles and Chicago, BuckleySandler provides best-in-class legal counsel to meet the challenges of its financial services industry and other corporate and individual clients across the full-range of government enforcement actions, complex and class action litigation and transactional, regulatory and public policy issues. The Firm represents many of the nation's leading financial services institutions. (www.buckleysandler.com; https://twitter.com/BuckleySandler; http://www.infobytesblog.com)

Add to Digg Bookmark with del.icio.us Add to Newsvine

MEDIA CONTACT:
Susan E. Jacobsen
202.251.8184
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
Both SaaS vendors and SaaS buyers are going “all-in” to hyperscale IaaS platforms such as AWS, which is disrupting the SaaS value proposition. Why should the enterprise SaaS consumer pay for the SaaS service if their data is resident in adjacent AWS S3 buckets? If both SaaS sellers and buyers are using the same cloud tools, automation and pay-per-transaction model offered by IaaS platforms, then why not host the “shrink-wrapped” software in the customers’ cloud? Further, serverless computing, cl...
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...