Main Menu

cybersecurity and privacy

PDF

MSK sits at the forefront of one the fastest growing concerns in today’s digital world, bringing together experts that provide services to its clients in the areas of cybersecurity and privacy protection.  We assist grappling with a host of rapidly evolving concerns, such as:

  • Preparedness and internal controls;
  • Responses and breach notifications;
  • Internal and external investigations;
  • Compliance with federal and state data protection and privacy laws and regulations;
  • Privacy policies and procedures;
  • Website terms and conditions;
  • Identification of causation and remedial security activities;
  • Reputational and public relations challenges arising from cyber-attacks;
  • Developing smart public policies regarding security of critical infrastructure;
  • International human rights and public international law issues related to cyberwarfare and government use of cyber tools.

Whether the need is to assess compliance with international law standards; collect and protect citizen, employee or consumer data; comply with existing and rapidly evolving US state and federal privacy laws and regulations; defend or prevent class action lawsuits or other threatened litigation, evaluate insurance coverage, disclose information to and work with law enforcement, or otherwise respond to highly disruptive cyber hacking, MSK’s lawyers know how to address these and the other related and challenging issues.

Spotlight

MSK provides counseling and assistance from the first step of designing and initiating privacy protections and data breach prevention through incident reporting, working with law enforcement, federal and state regulators and your business partners, and providing other crisis management advice.

Through our membership in multiple international law firm consortia and the relationships our lawyers have with practitioners throughout the world, we are able to provide these services on a worldwide basis as companies continue to face the serious challenge of cybersecurity which affects companies of all sizes, regardless of their location. Whether your company directly retains sensitive information for its own use or is holding that information for third parties, you are equally at risk of intrusion. Any machine connected to the internet or an external device, such as a USB flash drive, is susceptible to being hacked. 

Back to Page