Preventing breach of data begins with recognizing the risks and acting to protect data security.
Everyone should be concerned about data security. And, every business should develop, implement, and maintain policies and measures to enhance their data security to protect against a dat breach. In this era of ever-increasing vulnerabilities to cyberattacks, our firm is ready to work with businesses enhance data security and mitigate against potential loss and liability.
In developing solid data security, a business should work with attorneys well versed in technology, the use of said technology, networks, data security, and both the applicable core and peripheral laws. Our firm meets each of these criteria.
For more than three decades, our principal attorney has been involved in computer and network technology. From early years building computers and developing his own applications, Charles developed a passion for emerging technologies and, particularly, the ability to hack the computers he purchased. In college, he become involved with unix networks and the growing Internet used primarily among the government and academic institutions.
In graduate school, Charles began to apply his knowledge and love for technology into developing position papers including "The Emerging Real of Electronic Law and Policy" in 1994 and "Cybercourt: A Virtual Resolution of Differences" in 1995. His efforts to combine technology and law led to his co-creation of the Law And Technology Association at Quinnipiac University School of Law and a summer tenure in the Office of Chief Counsel for the National Telecommunications and Information Administration within the US Department of Commerce.
For the last twenty years, he has been heavily involved in technology based law associations. He currently serves as a Board Member for iTechLaw in which he has been a member for more than twenty years. He is a founding member of the Internet Law Leadership Summit. For nearly 15 years, Charles has guided his practice to represent individuals and businesses as they address a myriad of technical and Internet related legal issues, including data breach and data security.
Throughout, Charles has pushed himself to remain at the forefront of new technologies including mobile devices, solar chargers, network applications, and, most recently, AVR, VR, and AR technologies.
Beyond the knowledge and use of diverse technology, Charles also has a sound knowledge of network technology and implementation. While our firm defers to network experts for implementation, development, and management of internal networks, our above-base knowledge of the software and hardware aspects allows our firm to provide heightened advice that correlates with a facilitated understanding and language with our clients' technicians.
With respect to data security, our firm possesses a critical knowledge of the technical and legal aspects to this growing imperative. our firm can provide clients with the core components of data security legal representation: work with clients and their IT personnel to develop and draft sound data security policies; implement and provide training programs for employees; conduct audits and reassessments of cyber threat preparedness; develop a sound data breach response plan; and, work with our clients to respond to data breach incidents.
Beyond providing the core components of data security legal representation to our clients, our firm also integrates the knowledge and experience from other substantive areas into our representation to enhance the advice and counsel our clients receive. Beyond protecting customer data, good data security principles and practice help protect corporate intellectual property assets. Our firm utilizes its knowledge of international privacy principles to ensure that data security policies can - where necessary - withtand foreign scrutiny.
We welcome the opportunity to discuss in further detail our sound and well developed data security practice.