RumbergerKirk
  • People
    • Robert H. Adams
    • Nicholas A. Aguirre
    • Craig A. Alexander
    • Robert P. Barton
    • Katherine Becerra
    • Rebecca A. Beers
    • Michael D. Begey
    • Robert L. Blank
    • Gabriele Bodanza
    • Blake Bonsack
    • Madison Buckley
    • Alyxandra Buhler Palma
    • Lori J. Caldwell
    • J. Richard Caldwell, Jr.
    • Brett M. Carey
    • Hannah Clark
    • Fred Clarke
    • Ligianette Cordova
    • Bradley Davis
    • Patrick M. Delaney
    • Leonard J. Dietzen, III
    • Renee Duffy
    • Samantha Duke
    • Derek M. Dzwonkowski
    • Douglas E. Ede
    • Ernest “Skip” H. Eubanks, Jr.
    • Angel Everett
    • Meredith Fee
    • Sandra Ferrin
    • Robert V. Fitzsimmons
    • Michael L. Forte
    • Darryl L. Gavin
    • Daniel J. Gerber
    • Richard A. Greenberg
    • Jeffrey J. Grosholz
    • Jessica J. Gross
    • Reginald Guillaume
    • Carie Hall
    • Brent Hartman
    • Chase Hattaway
    • Suzanne Barto Hill
    • Michael R. Holt
    • Mary Hudson
    • Sara Lewis Kallop
    • Jacey Kaps, CIPP/US
    • Lan Kennedy-Davis
    • Meghan Kennedy Marcus
    • Jessica Kerbel
    • Melina Khosrovani
    • Bud Kirk
    • Steven I. Klein
    • Hannah L. Klonowski
    • Taylor M. Koshak
    • Nicole Kwapisz
    • Meredith Jowers Lees
    • Joshua D. Lerner
    • Paul Lipton
    • Graham Marcus
    • J. David Marsey
    • Alexander A. Melvin
    • Candy L. Messersmith
    • Kari A. Metzger
    • Joseph T. Metzger
    • Madison Miller
    • Charles P. Mitchell
    • Damien A. Orato
    • Brittney Polo
    • Julie Potts
    • Rihana D. Purdin
    • Kayla E. Platt Rady
    • J. Michael Rediker
    • Seth B. Roebuck
    • Jessica A. Romanies
    • Jens C. Ruiz
    • E. Thom Rumberger
    • Isadora Sadler
    • Scott M. Sarason
    • Nicholas Sellas
    • David B. Shelton
    • Francis H. Sheppard
    • Suzanne A. Singer
    • Nicole Sieb Smith
    • M. Stephen Smith
    • Larry D. Smith
    • Matthew Smith
    • Melissa I. Softness
    • E. Berton Spence
    • Peter J. Tepley
    • Jennifer Smith Thomas
    • Evan Thomas
    • Devin M. Topper
    • Courtney Tournade
    • James F. Walsh
    • Eric Watson
    • Thomas Webb
    • John “Jack” Weiss
    • Passion Wells
    • R. Scott Williams
    • David C. Willis
  • Practices
    • Appellate
    • Aviation
    • Bankruptcy and Restructuring
    • Casualty Litigation
    • Class Actions
    • Commercial Litigation
    • Construction
    • Consumer Defense
    • Corporate and Tax
    • Criminal Defense
    • Cyber & Technology
    • Education
    • Employment and Labor
    • Estates and Trusts
    • External General Counsel Services
    • Family Law
    • Government and Administrative
    • Insurance Coverage and Bad Faith
    • Intellectual Property
    • Mediation & Arbitration
    • Product Liability
    • Professional Liability
    • Real Estate
    • Securities and Financial Services
    • Toxic Torts
    • Trucking
    • Warranty and Lemon Law
  • Careers
    • Summer Associate
    • Summer Associate Blog
    • Associate College
    • Career Openings
  • Insights
    • Articles
    • Podcasts
  • News
  • About
  • Industries
  • Diversity
  • Contact
  • Legal
Facebook LinkedIn X Instagram
Rumberger Kirk
We use cookies to enhance your experience and improve our services and our website’s functionality. By continuing to use our website, including remaining on the landing page, you consent to our use of cookies. For more information see our Cookie Notice.
LinkedIn Facebook Twitter

Cyber & Technology

Related Attorneys
  • Overview
  • Services
  • News

Overview

RumbergerKirk helps clients at the intersection of technology and the law. Our best practice is to form a relationship with a client before an incident arises, because prevention is much better than trying to remedy an incident. We review clients’ documents and procedures to help them comply with regulatory guidance and to develop best practices and handle cybersecurity data breach incidents.

Organizations want to consider an organized and well laid out CP, CIRP, and CRA that range from the entire cyber system to drilling down into who should be called and when those contacts should be made when an adverse data event occurs. There are innumerable considerations that go into an organization’s unique CP, CIRP, and CRA. Our team offers the perspective needed from a third party legal standpoint to assist in development of policies and plans that are appropriate to the organization.

Another area of concern is relationships with vendors. Vendors often hold data and have access to a company’s network. It is important to ensure vendor agreements require them to meet certain cybersecurity standards. We offer a helpful eye to organizations for review of vendor agreements and how they could potentially involve data security together with suggestions for vendor agreements.

We assist clients in review of internal procedures on data storage and data access. Employees and vendors sometimes may be granted access to data that is unnecessary to job performance. In this vein, a company should also consider procedures that are designed to marginalize the internal and external impact created by “hacktivists.” We partner with clients to evaluate data access and make suggestions to protect data and minimize our clients’ risk.

Countless data protection surveys and studies lead to the same conclusion: the greatest threat to the data of an organization comes from inside an organization. We assist clients in reviewing HR processes and gateway procedures to protect the company. A company may unwittingly employ a disgruntled employee, a hacktivist, or someone who is looking to move to a competitor along with data that is the property of the organization. Most commonly, however, employees are not properly trained concerning information awareness. In addition to reviewing CIRP’s and internal processes, we also provide training to employees whether in the C-suite, IT, and at large.

We help clients understand how executives, employees, and the organization as a whole manage their personal or corporate data with respect to the public. An organization should consider its HR policies with regard to employees’ social media habits. There are important requirements a company can have towards employees’ sharing of information. Our team can offer valuable training insights with regard to privacy settings for its employees and executives.

Today, IT has oversight for the data that is the lifeblood of an organization. We work with IT professionals to understand an organization’s configurations for data storage, back-ups, authentication, etc. Our team also works with organizations and their IT professionals to help evaluate the legal impact of options under consideration when making IT decisions.

Cyber security reviews, incident responses, and table top exercises have become part of the lexicon of companies in today’s climate. This is particularly so for publicly traded companies where an outside attorney can offer the third party perspective on the soundness of data security and technology practices from the legal perspective.

Attorneys

  • Jacey Kaps, CIPP/US

Related Insights

See All Insights
Drag
02.05.2025
Cyber & Technology

The Time Is Now for Employers to Assess Risk of Employees’ Use of DeepSeek

DeepSeek-V3 became the most downloaded app across the world in...

Photo: Shutterstock.com/Nick Livyi
03.11.2021
Insurance Coverage and Bad Faith

Fourth DCA Opines: When Insurance Policy Cancellation Requires Notification

In Svetlana Spielberg vs. Progressive Select Insurance Company, the Fourth...

Photo: Shutterstock/Andrey_Popov
02.10.2021
Cyber & Technology

Third DCA Defines Scope of Duty for Security Services Contracts

When it comes to defining a security company’s obligations, words...

Photo: Shutterstock.com/New Africa
10.06.2020
Cyber & Technology

What Can Marketers Learn from COVID-19 Privacy Considerations?

Contact-tracing during COVID-19 raises data privacy implications for restaurants.  It...

05.04.2018
Cyber & Technology

General Data Protection Regulation: Should a Florida Business Care?

This article was originally published by the Orlando Business Journal...

09.21.2017
Cyber & Technology

Clickwraps and Browsewraps Oh My! Terms of Online Vendor Agreements – Are They Enforceable?

Often times, in seeking to enforce a term or condition...

03.29.2017
Cyber & Technology

Enforcing Browsewrap Agreements: Don’t Make the Fine Print Too Fine

“Reprinted with permission from the March 29, 2017 issue of...

11.06.2014
Cyber & Technology

Fishing in a Digital Ocean: 1st DCA Rules Defense May Discover “All Data” on Decedent’s Cellphone

Florida’s First District Court of Appeal recently upheld a trial...

See All News

Offices

Orlando

300 South Orange Avenue
Suite 1400
Orlando, FL 32801

407.872.7300

Miami

80 Southwest 8th Street
Suite 3000
Miami, FL 33130

305.358.5577

Tampa

100 North Tampa Street
Suite 2000
Tampa, FL 33602

813.223.4253

Tallahassee

101 North Monroe Street
Suite 1050
Tallahassee, FL 32301

850.222.6550

Birmingham

2001 Park Place North
Suite 1300
Birmingham, AL 35203

205.327.5550
Start a conversation
Search for an attorney
Facebook
LinkedIn
X
Instagram
©2025 Rumberger, Kirk & Caldwell, P.A.
All rights reserved.
Legal
Attorney Advertising A site by Big Vision.