data breach litigation

Over the past few years, the rate of notable data breaches has risen considerably, and along with that rise has come an increase in class action litigation. In a world where any company can be the next victim of a breach, business leaders and their legal counsel should consider in advance how to protect privilege

GT Shareholder Jena M. Valdetero, co-chair of the firm’s U.S. Data Privacy and Cybersecurity Practice, will present the CLE webinar, “Maintaining Privilege in Data Breach Investigations: Best Practices and War Stories from Multimillion-dollar Breaches,” Dec. 19 at noon ET. This session will provide critical steps for protecting privilege during a data breach investigation

Rebekah S. Guyon, a member of GT’s Litigation and Data Privacy & Cybersecurity Practices, was quoted in a Corporate Counsel article titled “Suits Flooding Courts Seize on Decades-Old Wiretapping Laws to Allege Data Breaches.”

Click here to read the full Corporate Counsel article. (subscription required)

Greenberg Traurig is sponsoring the Virtual Fall Academy 2021 Privacy + Security Forum, taking place Sept. 29 through Oct. 1, 2021.

On Sept. 29, Shareholder Ian C. Ballon, co-chair of the firm’s Global Intellectual Property & Technology Practice, will join a workshop panel on “Surprising Trends and Important Lessons from Recent Developments

Section 1798.150 of the CCPA permits consumers to “institute a civil action” if consumer “personal information, as defined in subparagraph (A) of paragraph (1) of subdivision (d) of Section 1798.81.5, is subject to unauthorized access and exfiltration, theft, or disclosure,” and where that unauthorized access was “a result of the business’s violation” of a duty

Marginally.

Section 1798.150 of the CCPA permits consumers to “institute a civil action” if consumer “personal information, as defined in subparagraph (A) of paragraph (1) of subdivision (d) of Section 1798.81.5, is subject to unauthorized access and exfiltration, theft, or disclosure,” and where that unauthorized access was “a result of the business’s violation” of a