When a client is the victim of a data breach – whether by a malicious hacker, a departing employee, a competitor or another third party – addressing the matter requires quick action to stop the dissemination of the data, recover it, provide notice to affected parties, and mitigate the risks associated with the incident. Armstrong Teasdale established one of the first privacy and data security practices in the Midwest, and has a strong reputation handling data breach matters and related incidents across the country.

Our Privacy and Data Security practice consists of a cross-disciplinary team of lawyers experienced with matters involving both U.S. and international privacy and data security laws. Given the increasing risk to business and the steady influx of regulation in this area, it’s critical to understand your company’s vulnerabilities and mitigate risk.

Our robust team includes Certified Ethical Hackers (C|EH) and Certified Information Privacy Professionals (CIPP/US and CIPP/E). Members of Armstrong Teasdale’s Privacy and Data Security practice routinely advise clients ranging from internet startups to Fortune 100 companies in a variety of industries, including financial services, insurance, communications, health care, retail, legal, technology and energy and utilities. Our attorneys are experienced in handling multijurisdictional events, as well as working with the Office of Civil Rights and other state and federal regulators. The issues we routinely address for clients fall into three key categories: preparedness, response and litigation.

We counsel clients on a wide variety of matters, including:

  • Class action lawsuits
  • Confidential and trade secret information
  • Computer tampering
  • Data recovery
  • Document retention and best practices
  • Employee training programs
  • Immediate injunctive relief
  • Litigation
  • Loss of customer, client or employee data
  • Network security gap analysis
  • Noncompete, nonsolicitation and confidentiality agreements
  • Personally identifiable information
  • Privacy and security audits
  • Privacy by design principles
  • Regulatory compliance
  • Risk management
  • Security programs and policies