Practice

Cybersecurity Incident Response

Helping you prepare for and respond to cyber breaches

When your data security is compromised, you need to act quickly: to resolve the breach, investigate what happened, make required notifications, consider contacting law enforcement and impacted individuals - all while maintaining continuity of your operations. Any compromise of your cybersecurity implicates a host of legal, technical, and personnel challenges. Foley Hoag can help identify and address these issues.

Foley Hoag’s Cybersecurity Incident Response Team includes lawyers from a number of the firm’s practice areas — litigation, white collar criminal defense, and privacy and data security law. These lawyers have deep knowledge in the different substantive areas of law that cybersecurity issues can affect, such as finance and banking, securities, health care, and intellectual property.

The Incident Response Team has worked extensively with federal and state law enforcement on cybersecurity issues and has drafted breach response policies, trained personnel, assisted companies through data breaches (including compliance with the wide array of laws and regulations), and handled litigation stemming from data breaches. Our lawyers also have a network of contacts in related fields, including crisis management, computer forensics, and customer and public relations. 

Whether you experience a data breach, need help with litigation resulting from a data breach, or want to plan your company’s breach prevention and response strategy, Foley Hoag’s Cybersecurity Incident Response Team is ready to assist you.

For the latest developments in privacy and data security, turn to Foley Hoag’s blog, Security, Privacy and the Law, which focuses on the security and privacy issues encountered by businesses that often require immediate and discreet solutions. Here we cover topics that arise from guiding our clients through the process of complying with the ever-growing number of state, federal and international laws governing information security, identity theft, HIPAA compliance, surveillance and other privacy issues.