Regardless of your industry, service, product or size, you are now also a data company. Your servers, computer hard drives and mobile devices likely contain valuable intellectual property and business data that can be commercialized for profit. Conversely, they can also include sensitive commercial data and personal information on customers and employees that should not be disclosed. We can help you optimize the value of your digital assets in a manner that complies with an ever-changing legal and regulatory framework. Equally important, we can advise on how you should manage and protect your and your customers’ sensitive data from attacks, so they do not become a significant liability.
Regardless of your industry, service, product or size, you are now also a data company.
Your servers, computer hard drives and mobile devices likely contain valuable intellectual property and business data that can be commercialized for profit. Conversely, they can also include sensitive commercial data and personal information on customers and employees that should not be disclosed.
We can help you optimize the value of your digital assets in a manner that complies with an ever-changing legal and regulatory framework. Equally important, we can advise on how you should manage and protect your and your customers’ sensitive data from attacks, so they do not become a significant liability.
Our multi-disciplinary team of lawyers can handle any aspect of your data protection needs. Please click on the links below to learn more about our services.
-
The proper collection, safeguarding and use of information are growing concerns that require attention to technology, business practices and the requirements of multiple jurisdictions and government agencies. Data collection from mobile devices and social media are two highly visible areas of risk. Whether your business involves digital advertising or financial safeguards, we can help management put effective and reasonable privacy policies and procedures in place. Our lawyers develop privacy policies for a variety of clients, applications and business models, including drafting procedures and policies for the management of consumer information (online and offline) and the protection of employment and other sensitive materials.
-
We develop compliance programs and policies that address complex state and federal privacy regulations, so you can reduce the risk of improper disclosure of confidential or sensitive information.
-
We provide practical advice on what you can do now to decrease your liability should a data breach occur. We help companies determine what data must be stored to comply with applicable laws, and what should be saved for business purposes. Less data equals less exposure in the event of a cyber breach and less data to collect, review and produce during litigation.
-
Various federal laws and the laws of 46 states govern a company’s response and notification requirements in the event of a breach. We can help you prepare and then comprehensively and effectively respond to data breaches by partnering with consultants in the fields of software, forensics, insurance and public relations. In addition, we work with cybersecurity professionals after a cyber breach to ascertain and advise you on the nature of potential legal claims and the exposure for damages. Finally, our lawyers help to develop a litigation strategy with practical solutions that align with your interests.
-
We offer trial attorneys who are experienced in representing clients and their insurers in complex litigation to represent clients against claims from federal agencies and regulators, state Attorneys General and private litigants, including the defense of national class actions across the country.
-
A contract with a vendor for the physical or cloud storage and maintenance of your customers’ personal information and data does not mean you are absolved of liability if that information is breached. We conduct due diligence of prospective vendors and negotiate and enact third-party vendor programs to reduce clients’ risks from a breach.
In addition, we are experienced in advising clients in the following industries and, therefore, are familiar with specific issues that may come into play with data protection and cybersecurity. For more information, please click on the following links.
-
Increasingly, banking is done remotely via mobile devices or on the Internet. While online banking has many advantages, it also comes with a significant risk for both financial institutions and their customers - unauthorized transfers from a customer’s account caused by a breach of the customer’s computer system. We counsel clients with regard to compliance with the Gramm-Leach-Bliley Act and related privacy and safeguards rules and the Fair Credit Reporting Act (FCRA). Our experienced litigators can develop and execute a strategy that balances a financial services company’s reputational concerns, exposure to damages and desire to retain its customers.
-
We routinely advise hospitals, health systems, physicians and vendors on privacy and security issues related to the Health Insurance Portability and Accountability Act of 1996 (HIPAA), which governs the use and disclosure of Protected Health Information (PHI). To help our health care clients avoid potentially significant monetary penalties associated with the improper disclosure of PHI, we develop comprehensive compliance programs and provide counsel on what constitutes a data breach. If a data breach has occurred, we can guide our clients through the relevant breach notification requirements and mitigation efforts.
-
We counsel clients and help enact effective privacy and online policies to ensure that their marketing, social media and promotional campaigns are compliant with regulations and laws from, and related to, the Federal Trade Commission (FTC), the Children’s Online Privacy Protection Act (COPPA), the California Online Privacy Protection Act (CalOPPA) and the Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM) that protect consumers.
-
Any data that can be associated with a location is particularly sensitive because it can often be used to identify a person and make assumptions about his or her habits and activities. As a result, laws and regulations are increasingly being created or amended to protect geolocation information. This will become more of an issue for public and private sector entities since these entities have been collecting this type of information for many years without regulatory oversight. We help various entities develop products and services that use geolocation information in a manner that is compliant with privacy regulations and applicable laws.
-
As the use of unmanned systems technology becomes more pervasive, the amount of data being collected, transmitted and stored will grow exponentially. Because we have extensive knowledge of the field of geospatial data, including what is and what is not permissible under privacy laws, we can help public and private sector entities narrowly tailor their collection plans so that they comply with applicable federal, state and local laws. We can also advise on best practices on how they should protect the data they collect from unapproved uses. In addition, we are closely following laws and policies intended to protect command and control communications from cyber threats.
-
Cybersecurity issues confront all businesses but are especially challenging for government contractors. In addition to being particularly savory targets for hackers, government contractors must confront an array of evolving, complex, conflicting and increasingly costly standards and requirements regarding information security. We help companies navigate through the changing legal standards and requirements and advise on data breach responses through investigation, reporting and follow-up. We can help government contractors safeguard company interests by strengthening agreements involving information security, advise on due diligence in M&A situations, help develop a proactive response to cybersecurity audits and enforcement actions and provide counsel on cybersecurity-related bid protests and claims. In sum, our team of regulatory, transactional and litigation lawyers can help government contractors develop an appropriate approach to confronting this daunting challenge in a responsible manner that is commensurate with their company’s situation.
News
-
12.27.2022
Virginia Consumer Data Protection Act to Become Effective January 1, 2023
-
08.18.2022
123 Williams Mullen Attorneys Listed in 2023 Edition of The Best Lawyers in America©
-
08.02.2022
New Cyber Incident Reporting Requirements Go Into Effect in Virginia
-
06.16.2022
FTC Publishes Blog Post that Could Expand Data Breach Notification Requirements
-
04.25.2022
Top Takeaways From the International Association of Privacy Professionals Global Privacy Summit
-
04.05.2022
Data & Security Legal Update: Russian Cyber-Attacks, and More
-
03.25.2022
Four Key Developments in Data, Data Protection and Cybersecurity Law
-
11.30.2021
Williams Mullen Welcomes Two Attorneys in Richmond
-
08.23.2021
124 Williams Mullen Attorneys Listed in 2022 Edition of The Best Lawyers in America©
-
06.22.2021
Accomplished Health Care Lawyer Nathan Kottkamp Joins Williams Mullen
-
06.17.2021
Data & Privacy Update: Six Most Significant Developments Companies Need to Know About
-
04.20.2021
North Carolina Proposes Expansive Consumer Privacy Protections
-
04.19.2021
TCPA Litigation Update: The Aftermath of the Supreme Court’s Facebook v. Duguid Decision
-
04.14.2021
Tackling the Complex World of Cybersecurity
-
03.10.2021
FAQs: Virginia Consumer Data Protection Act
-
02.24.2021
Data & Privacy Update: Biometric, Ransomware, PIPEDA and EU-UK Data Transfers
-
02.15.2021
Data & Privacy Legal Developments: Virginia Consumer Data Protection Act, Data Scraping, CFIUS and more
-
04.07.2020
Legal Risks in Sharing Geolocation Data with Government Agencies
-
04.03.2020
Protecting Your Sensitive Information While Using Virtual Meeting Platforms
-
03.31.2020
The Need for Enhanced Risk-Based Information Security Policies with a Remote Workforce
-
03.27.2020
The Impact of Remote Workforce on Contractual Obligations
-
01.23.2020
Commerce Adopts Export Controls on Artificial Intelligence Software for Geospacial Imagery – Controls on Additional Technologies Expected Shortly
-
08.12.2019
PODCAST: How Do I Conduct Due Diligence of a Company’s Data Assets?
-
06.13.2019
Kevin Pomfret Relays Importance of Keeping Landsat Remote Sensing Data Free
-
05.03.2019
Williams Mullen Expands Intellectual Property Section with Ed White and Janet Cho
-
01.25.2019
Forecasting The Future: What to Learn from The Weather Channel App's Geolocation Lawsuit
-
07.25.2018
Virginia Adds Improper Tax Return Access to Data Breach Notification Laws
-
07.13.2018
Fourth Circuit Ruling Makes Data Management Policies More Important than Ever
-
07.05.2018
GDPR-like Privacy Protection Is Coming to U.S.
-
05.04.2018
Yahoo! Settlement Affirms SEC's Focus on Cybersecurity Disclosures
-
04.24.2018
Kevin Pomfret Talks Geospatial Law with ABA's National Security Law Today Podcast
-
02.05.2018
Kevin Pomfret Quoted in USGIF Blog Post on Global Location Data
-
10.10.2017
Selling Unmanned Systems Products and Services to the Government
-
09.01.2017
Federal Trade Commission’s Uber Consent Agreement Designates Geolocation Information as Personal Information
-
07.27.2017
State Governors Sign Cybersecurity Compact
-
07.26.2017
Kevin Pomfret Pens Article for GeospatialWorld on Commercial Remote Sensing Satellites in the U.S.
-
05.19.2017
Global Cyber Attack Highlights Need for President Trump’s Executive Order
-
05.18.2017
Bills to Help Small Businesses Prepare for Cyber Attacks Working Way Through Congress
-
01.19.2017
Williams Mullen Attracts Seasoned Attorney Michael Maloney to Expanding Government Contracts Practice
-
11.18.2016
The Evolving Internet of Things and Its Risks for Business Consumers
-
08.02.2016
No Harm, Yes Foul: FTC Rules Risk of Consumer Harm Sufficient to Find LabMD Liable for Security Breach.
-
08.01.2016
Kevin Pomfret Discusses Potential Policy Changes Due to Pokémon GO
-
07.15.2016
Adoption of Privacy Shield Gives U.S. Businesses Greater Clarity On Data Transfers From Europe
-
06.22.2016
FAA Issues Final Rule for Businesses to Use Drones
-
05.23.2016
Will Spokeo Impact Standing In Data Breach Cases?
-
04.12.2016
Kevin Pomfret Interviewed by NBC12 on Recent Battle Between FBI and Apple
-
03.23.2016
Latest "Ransomware" Attack Affects Hospital Data – How Secure Are Your Patient Data?
-
10.02.2015
Do You Know Your IP Rights In Your Imagery and Other Data Products?
-
10.01.2015
31 Tips for 31 Days - National Cybersecurity Awareness Month
-
08.04.2015
Cybersecurity & Data Protection announcement picked up in editorial by FierceBigData
-
07.30.2015
Rob Van Arnam and Kevin Pomfret quoted by Law360 about Data Protection & Cybersecurity Practice
-
07.28.2015
Williams Mullen Announces Data Protection & Cybersecurity Practice
-
07.08.2015
Tony Anikeeff discusses OPM system shutdown in the Washington Examiner
-
06.30.2015
Cybersecurity Standards Apply to Thee, Not Me
-
03.20.2015
Cybersecurity: Mitigating the Legal Risks of On-Line Banking With Business Customers
-
02.13.2015
Preparing for a Data Breach – What to Know about Breach Notification
Events
-
02.08.2023
Privacy Law Updates in the United States
-
08.31.2022
Navigating the New Cyber Incident Reporting Requirements
-
10.08.2021
CLE Institute 2021
-
05.11.2021
Virginia Association for Community Banks: Second Quarter Compliance Forum Tuesday Session
-
11.20.2020
CLE Institute 2020
-
11.12.2020
CLE Institute - Advertising and Customer Engagement in the Digital Age
-
01.31.2020
2020 Cybersecurity Summit
-
10.15.2019
M&A Webinar Series - Data Protection and Privacy: Due Diligence Issues in M&A Transactions
-
10.01.2019
Cybersecurity Vigilance – An Expert Panel Briefing for Directors and CEOs
-
09.26.2019
CLE Day
-
06.05.2019
Regulatory Hot Topics – Data Processing Contracts, LIBOR Transition
-
02.25.2019
First Quarter Compliance Forum Central
-
11.26.2018
Recent Developments in International Cyber and Privacy Laws: Implications on Insider Threat Programs, Incident Reporting, the Internet of Things, and Geolocation Data Processing
-
09.07.2018
Blockchain Technology: What You Need To Know for Your Business
-
Carmelle F. Alipio
Associate- Phone:919.981.4038
- Email:Email
-
Anthony H. Anikeeff
Partner- Phone:703.760.5206
- Email:Email
-
Wyatt S. Beazley, IV
Partner- Phone:804.420.6497
- Email:Email
-
J.P. McGuire Boyd, Jr.
Partner- Phone:804.420.6927
- Email:Email
-
Miles S. Bruder
Partner- Phone:919.981.4039
- Email:Email
-
Janet W. Cho
Partner- Phone:804.420.6339
- Email:Email
-
Brydon M. DeWitt
Partner- Phone:804.420.6917
- Email:Email
-
Nathan A. Kottkamp
Partner- Phone:804.420.6028
- Email:Email
-
Michael D. Maloney
Partner- Phone:703.760.5230
- Email:Email
-
Craig L. Mytelka
Partner- Phone:757.473.5336
- Email:Email
-
Kevin D. Pomfret
Partner- Phone:703.760.5204
- Email:Email
-
Courtney Reigel
Associate- Phone:804.420.6368
- Email:Email
-
Robert Van Arnam
Partner- Phone:919.981.4055
- Email:Email
-
Lauren W. Waller
Partner- Phone:804.420.6590
- Email:Email
-
Edward T. White
Partner- Phone:804.420.6338
- Email:Email