Site Search
Professionals 288 results
Capabilities 68 results
Practice Area
Winston takes a strategic approach to privacy and data security, integrating our extensive capabilities across practices to provide our clients with cutting-edge privacy and data security counseling, crisis management, security incident investigation and notification management, defense of data security class action litigation and regulatory inquiries, and international data protection. Our Global Privacy & Data Security Practice features a core team of privacy professionals and is bolstered by more than 40 attorneys from a variety of other disciplines firmwide. Our team combines compliance counselors, transactional lawyers, former government regulators and federal prosecutors, seasoned investigators, and experienced litigators. Few firms can rival our in-depth, sophisticated, and integrated experience in this area.
Practice Area
eDiscovery & Information Governance
Winston’s eDiscovery & Information Governance Practice (eDiscovery Group) is one of the United States’ largest and most experienced. Per The Legal 500 US 2024, “[Winston has] a very strong practice from top to bottom. They have a good e-discovery consulting practice and excellent review and production capabilities and are amongst the strongest advocates you could want in a courtroom.” We have built a full-service consulting practice to support our clients and case teams in these complex areas—both domestically and globally.
Experience 46 results
Experience
|June 6, 2024
Winston Represented Shore Capital Partners in its Sale of Behavioral Innovations
Experience
|May 31, 2024
Joint Venture with Affiliate of Stonefield Investment Advisors for Texas Shopping Center
Insights & News 2,339 results
Seminar/CLE
|January 30, 2025
Winston Hosts 2025 Financial Services Symposium in Charlotte
Winston’s Financial Services Industry Group is pleased to host our 2nd Annual Financial Services Symposium. This year the event includes a full day of programming led by top industry thought leaders. We hope you will join us to gain insights from leading industry executives and lawyers, along with opportunities to network with peers in the industry.
Webinar
|January 22, 2025
Public Readiness – Are Your Cybersecurity Controls Ready?
As you prepare for a public transaction, you will have to focus and report on your cybersecurity posture. Join Capital Markets Practice Co-Chair Michael Blankenship and Privacy & Data Security partner Eric Shinabarger for an engaging webinar where they will discuss:
Sponsorship
|January 16, 2025
Winston Sponsors the 13th ITA-IEL-ICC Joint Conference on International Energy Arbitration
Winston is proud to sponsor the joint conference presented by The Institute for Transnational Arbitration (ITA), The Institute for Energy Law (IEL) (both subsidiaries of The Center for American and International Law (CAIL)), and the International Court of Arbitration of the International Chamber of Commerce (ICC) on January 16–17, 2025.
Other Results 72 results
Law Glossary
What Is Data Breach and Data Security Law?
Within 48 U.S. states and the District of Columbia, data breach and data security laws require organizations and government agencies to provide notifications of security breaches when they involve personally identifiable information. Companies may also be required by state data breach laws to act to minimize the effects of a breach. The FTC can investigate companies that do not adhere to their stated privacy policies and do not have safeguards to protect customer data, but no broad federal law exists regarding breach notifications. However, these U.S. data security laws and government agency rules are enforced:
Site Content
Definitions of big data may differ within the computing or business world. In general, the term refers to structured and unstructured data that is extremely large in volume and/or complex—and due to these characteristics, it is difficult to manage with standard data processing or storage. The phrase “big data” may also refer to the processing techniques that an organization employs to manage the huge, complex, or time-sensitive sets of information it receives.
Law Glossary
Though the U.S. has not passed legislation dealing solely with data security law, organizations are expected to safeguard sensitive information and establish privacy policies. Legislation addressing specific types of sensitive data is found within various U.S. laws, such as the Gramm-Leach-Bliley Act.