• Skip to primary navigation
  • Skip to content
  • Skip to primary sidebar

McCarter & English Logo

  • People
  • Services
  • Insights
  • Our Firm
    • Leadership Team
    • Diversity & Inclusion
    • Pro Bono
    • Client Service Values
  • Join Us
    • Lawyers
    • Summer Associates
    • Patent Professionals
    • Professional Staff
    • Job Openings
  • Locations
    • Boston
    • Philadelphia
    • East Brunswick
    • Stamford
    • Hartford
    • Trenton
    • Newark
    • Washington, DC
    • New York
    • Wilmington
  • Share

Share

Browse Alphabetically:

  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • All
Bankruptcy & Commercial Litigation
Blockchain, Smart Contracts & Digital Currencies
Cannabis
Corporate
Crisis Management
Cybersecurity & Data Privacy
Delaware Corporate, LLC & Partnership Law
Design, Fashion & Luxury
E-Discovery & Records Management
Energy & Utilities
Environment & Energy
Financial Institutions
Government Affairs
Government Contracts & Global Trade
Healthcare
Immigration
Impact Investing
Insurance Recovery, Litigation & Counseling
Intellectual Property
Labor & Employment Law
Life Sciences
Litigation
Manufacturing
Products Liability, Mass Torts & Consumer Class Actions
Proptech
Public Finance 
Real Estate
Renewable Energy
Sports & Entertainment
Tax & Employee Benefits 
Technology Transactions
Transportation, Logistics & Supply Chain Management
Trusts, Estates & Private Clients 
Venture Capital & Emerging Growth Companies
  • Broadcasts
  • Events
  • News
  • Publications
  • View All Insights
Search By:
Insights Speaking Hand
Main image for Data Security—The Risk Management You Cannot Afford to Ignore
News

Data Security—The Risk Management You Cannot Afford to Ignore

Metropolitan Corporate Counsel

6.3.2014

The growing threat of cyber-related/electronic data security breaches and the attendant risk of liability and loss should compel companies in all industries to be evermore vigilant with their processes and procedures to protect against such breaches and to have a well-developed response protocol. Whether that breach is caused by a hacker, a stolen computer, a bug in a company’s security software or a bug in an encryption program (see Heartbleed Bug), even companies that employ presumably state-of-the-art security measures are vulnerable to data security breaches. The reasonableness of the security measures in place and the effectiveness of response to a security breach are critical to minimizing potential liability, as well as to sound business practice.

Reader Interactions

sidebar

Related People

Media item: Steven H. Weisman
Steven H. Weisman

Partner

Related Services

Insurance Recovery, Litigation & Counseling
Cybersecurity & Data Privacy
Subscribe to our Insights
McCarter & English, LLP
Copyright © 2019 McCarter & English, LLP. All Rights Reserved.
  • Login
  • Attorney Advertising
  • Disclaimer
  • Awards Methodology
  • Contact
  • Subscribe
  • Sitemap
This website uses cookies to collect certain information to help improve functionality and performance of the site. If you choose to continue browsing this website, you agree to our use of cookies.Ok