Skip to Content

Technology, Cyber and eDiscovery

Legal Services for Your Technology, Cyber, and eDiscovery Needs

Advances in technology have positively impacted business and government.  To remain competitive and productive, both private and public institutions have had to adopt technology.   Benefits and advancements, however, go hand in hand with risks and challenges.  Cybersecurity, therefore, is no longer an issue that affects only “big” business.  Everyone is vulnerable, no matter your size or industry.  In fact, press coverage reminds each of us of the costs associated with advancing technology, without giving adequate consideration to security as it relates to email, unprotected personal devices, unencrypted data, and weak firewalls, just to name a few. 

To thoughtfully address the full spectrum of technology issues, it takes a team.  A team that includes lawyers, forensic technology experts, law enforcement, and not-for-profits, is required. 

Our Technology Clients

Our technology and cyber attorneys service many sectors, including financial, retail, hospitality, construction, health care and pharmaceutical, insurance, manufacturing, real estate, transportation, and local, state, and federal governments.

Comprehensive Technology Services

Our technology and cyber attorneys help you protect what matters most to you and your business. Our services include:

  • Collection, Use, Sharing, and Retention of Bulk Data
  • Compliance Issues and Reviews
  • Contracts and Confidentiality Agreements
  • Contract Drafting and Review
  • Cyber Threat Intelligence and Security Issues
  • Cyber Litigation
  • Data Breach Preparedness and Response
  • Data Collection, Management, and Security
  • Education and Training
  • eDiscovery
  • Joint Ventures
  • Implementation of Information Systems
  • Investigations
  • Law Enforcement Intelligence Gathering
  • Litigation
  • Outsourcing to Third-Party Entities
  • Policies, Procedures, and Protocols
  • Public Relations
  • Privacy Rights
  • Procurement and Funding
  • Regulatory Investigations and Compliance
  • Software Development, Licensing, and Services
  • State and Federal Securities Issues
  • Technology Transfer and Licensing
  • Training

Protecting Your Hard-Earned Reputation

You have built a product, a business, a brand, a reputation.  In the complex world of technology, we stand by you to protect and defend what you have worked so hard to achieve. 

Technology’s Complex Regulatory Environment

At Carter Conboy, our technology and cyber attorneys have a regulatory background.  As such, they are versed in cybersecurity requirements, particularly, the 2017 New York State Department of Financial Services Rule, 23 NYCRR Part 500, a cybersecurity regulation establishing requirements for financial services companies, including banks, insurance companies, and other financial services firms, and third-party service providers to those companies.

Representing the Insurance Industry

Our technology and cyber attorneys also work with insurance companies and brokers to thoroughly counsel your insureds on potential risks, including risk assessment audits, policies, and procedures to mitigate their risks. We provide insurance analysis concerning all facets of cybersecurity policies.  Our technology team also delivers educational seminars to members of the insurance community regarding best practices for their insureds.

Notable Technology Experience and Results

  • Successful co-location of a government intelligence center with a not-for-profit, which resulted in a state, federal, and private information-sharing partnership concerning cyber threat intelligence and security issues. The project entailed operational and security matters, procurement and funding issues, and unique construction issues relative to state and federal security protocols.
  • Legal management of bulk data collection in the context of intelligence gathering, including protocols, relating to privacy rights, collection, use, sharing, and retention practices of various forms of bulk data.
  • Legal management of procedures and security protocols as it related to a number of information technology and business functions being outsourced to third-party entities.
  • Creation and implemental of eDiscovery protocols related to discovery obligations in litigation and the technical availability of archived data stored on a historical tape system.