Search form

Privacy, e-Communication and Data Security

Accessing, maintaining, safeguarding and exchanging personal, consumer and business information fosters both unlimited possibilities and new risks and vulnerabilities for organizations across the globe.


Jackson Lewis’ interdisciplinary Privacy, e-Communication and Data Security Group, comprised of experienced attorneys many of whom are “Certified Information Privacy Professionals” (CIPP) by the International Association of Privacy Professionals, stays on the edge of legal developments affecting our clients’ workplace, business and marketing risks—and opportunities—in the digital age.

We fully appreciate the value and sensitivity of data and we take a holistic, value-add approach in advising clients, regularly coordinating with other subject matter experts, such as information technology vendors, to provide practical advice and preventive strategies that address the range of potential issues relating to privacy, e-communication and data security.

The group has three primary areas of focus. For each, we provide clients with preventive strategies and compliance advice, including policy development and training, and represent them in related administrative enforcement actions and litigation, including class actions.

24/7 Data Incident Response Team

Has an electronic device (laptop, smartphone, thumb drive, etc.) been lost or stolen? Are you locked out of your data because of ransomware? Have company records or data been improperly accessed? Has an employee been a victim of a phishing attack requesting tax records? Are your businesses’ electronic systems corrupted or under attack? Has something like this happened to one of your third-party service providers? Are you uncertain what to do now to respond to a potential data breach?

Our team has experienced, data breach response attorneys available to assist organizations that have encountered a data incident, ransomware attack, or potential data breach.

We are available 24/7 at 844-544-5296 or
Read More

Data Security

Reviewing and developing enterprise-wide strategies for safeguarding data and maintaining compliance, including data breach response.

  • Cybersecurity Assessments
  • Written Information Security Program Development
  • BYOD and Device Management
  • Cybersecurity, Ransomware Breach Preparedness, Response and Litigation
  • Cybersecurity Awareness and Training Programs for Executives and Employees
  • Vendor Management and Data Security Agreement Drafting and Negotiation
  • Government Contractor Compliance
  • Strategy Development for Going Paperless and Cloud Computing
  • Read More


Maximizing the effectiveness and efficiencies of electronic communications (e.g., social media, BYOD, telemarketing) while avoiding legal, contractual and ethical pitfalls.

  • Social Media and Other Online Communications
  • e-Communication Policy and Procedure Development
  • e-Application and Onboarding Program Design and Implementation
  • Telephone Consumer Protection Act Compliance and Litigation
  • Children’s Online Privacy Protection Act Compliance
  • SEC and FINRA e-Communication Monitoring and Recordkeeping Compliance
  • Read More


Achieving a balance between an entity’s need for use or disclosure of personal or confidential information with an individual’s or entity’s privacy rights and interests in an era of big data and high-powered analytics.

  • Big Data and Analytics
  • Monitoring and Surveillance of Customers, Employees and Others
  • HIPAA Privacy and Security Compliance for Providers, Plans and Business Associates
  • International/Cross Border Data Privacy Compliance
  • Records Access Management
  • Leave of Absence Management
  • Background Checks, Workplace Searches and Investigations
  • Strategies for Exchanges of Data in Mergers and Acquisitions
  • Read More

The Team

See All
Showing 1-8 of 20
Advanced Filtering
All A-Z
See All
Showing 1-8 of 20

See All Webinars


Watch Now

Cybersecurity Risk Management for Law Firms Webinar Series

April 19, 2017 - 1:00 PM to 2:00 PM EST
Credits: CLE - Pending*, HRCI - Pending, SHRM - Pending
Watch Now


Watch Now

Cybersecurity Risk Management for Law Firms - Webinar Series

April 5, 2017 - 1:00 PM to 2:00 PM EST
Credits: CLE - Pending*, HRCI - Pending, SHRM - Pending
Watch Now


Watch Now

Pay Equity is “Comp”licated: New Laws, New Reporting, & How to Protect your Organization

April 27, 2016 - 2:00 PM to 3:30 PM
Watch Now

See AllPublications

Advanced Filtering
Showing 1-3 of 39
Most Read
August 8, 2017

Use of Non-Compliant Disclosure Form Did Not Result in Concrete Injury under Fair Credit Reporting Act

August 8, 2017

A job applicant alleging a violation of one of the procedural requirements of the Fair Credit Reporting Act (FCRA) lacked standing to sue under Article III of the United States Constitution because he failed to allege facts showing he suffered a concrete injury in fact, apart from the alleged statutory violation itself, the U.S. Court of... Read More

August 8, 2017

Maryland Amends Personal Information Protection Act

August 8, 2017

Amendments to Maryland’s Personal Information Protection Act expand the definition of personal information, modify the definition of breach of the security of the system, provide a 45-day timeframe for notification, allow alternative notice for breaches that enable an individual’s email to be accessed, and expand the class of information... Read More

May 14, 2017

Ransomware Attacks: Prevention and Preparedness

May 14, 2017

Several years ago, cyber criminals developed a profitable form of malware, now known as ransomware. A “ransomware” attack occurs when a hacker takes control of the victim’s information systems and encrypts its data, preventing the owner from accessing it unless the victim pays a sum of money, usually in the form of bitcoins. The FBI... Read More

Showing 1-3 of 39

See AllIn the News

Showing 1-3 of 44
Most Read
August 9, 2017
Cook County Record

Joseph Lazzarotti Comments on Implications of Companies Turning to Biometric Tools

August 9, 2017

Joseph Lazzarotti comments on implications of companies turning to biometric tools to validate time entries in "Employers facing surge in class action suits over storage, use of employee fingerprints, other biometrics," published by Cook County Record. Subscription may be required to view article Read More

July 26, 2017
Corporate Counsel

Joseph Lazzarotti Discusses Implications of Workers Receiving Company Microchip Implants

July 26, 2017

Joseph Lazzarotti discusses implications of employees volunteering to have company microchip implants in "Workers Are Lining Up for Microchip Implants, but Lawyers Say Slow Down," published by Corporate Counsel. Subscription may be required to view article Read More

July 6, 2017
Legaltech News

Brett Anders and Ana Shields Author "Navigating the New Sources of Electronically Stored Information"

July 6, 2017

Brett Anders and Ana Shields author "Navigating the New Sources of Electronically Stored Information," published by Legaltech News. Subscription may be required to view article.  Read More

Showing 1-3 of 44

See AllBlogs

Artificial Intelligence Enabled Cybersecurity Systems
August 11, 2017

The use of artificial intelligence (AI) enabled cybersecurity systems is increasing dramatically. By 2018, sixty-two percent of all companies are projected to use AI technologies. Read More

Maryland Amends Personal Information Protection Act
August 10, 2017

The Maryland General Assembly has recently amended its Maryland Personal Information Protection Act, House Bill 974, effective January 1, 2018. Read More

Washington Joins Growing List of States with Laws Protecting Biometric Information
August 6, 2017

Not to be outdone by the recent attention to biometric information in Illinois, and the Prairie State’s Biometric Information Privacy Act (BIPA), Washington enacted a biometric data protection statute of its own, HB 1493, which became effective July 23, 2017. What it notable about Washington’s new biometric information law? Read More