Skip to Main Content.

Data Security & Privacy

Helping clients comply as they innovate.

Our team of business, intellectual property and litigation attorneys advises on all aspects of privacy compliance, information handling, data security, breach preparation and response, enforcement, and other related litigation. We guide clients in taking practical steps to meet their legal obligations and mitigate operational and reputational risks.

Several of our privacy professionals have achieved their International Association of Privacy Professionals privacy credential. Our ranks also include former technology professionals, engineers, and software developers. While each attorney on our team brings a distinct skillset, the one common denominator is that we are fluent in the technology and sophisticated data management systems used by businesses competing in today’s economy.

We recognize that an effective compliance program must be tailored to each client’s operations, data practices, and risk profile. We draw upon our collective experience and deep regulatory knowledge to help clients enhance their cybersecurity architecture and navigate their legal and regulatory requirements in the U.S., Europe, and globally.

Incident Response Services | Learn More

Cyber Incident Response Planning

Our Privacy & Data Security Team not only understands the cyber-threat landscape, but we know where to prioritize. We help clients identify system vulnerabilities, incorporate security-by-design principles where necessary, and develop proactive incident response plans to minimize the legal and reputational impact of cybersecurity threats. In the event of a data breach or ransomware attack, we work with clients to contain the threat, recoup losses, draft and issue disclosure statements, and take appropriate steps to limit their legal and regulatory exposure.

To help prevent the unthinkable, we provide training to industry groups as well as company or non-profit boards of directors, executives, and employees, to ensure that your team understands the threat landscape. We also provide experienced counsel for your organization’s overall data privacy and cybersecurity policies, procedures, and insurance protection. We integrate your IT and compliance teams to ensure a concerted approach to the growing ransomware threat, or we can bridge the gap if your organization does not have an internal team.

Representative Incident Experience
  • Advising private and publicly traded companies regarding the collection, use, protection, and disclosure of confidential and personal information.
  • Advising companies regarding compliance with the European Union’s General Data Protection Regulation (GDPR) and related laws.
  • Advising companies regarding compliance with the California Consumer Privacy Act and similar state laws.
  • Advising companies on domestic and international laws affecting cross-border transfers of confidential information, as well as the necessary content of privacy notices.
  • Preparing and implementing comprehensive information governance and security programs and policies.
  • Providing education and training to employees, officers, and directors relating to applicable privacy and information security policies.
  • Assisted a national restaurant chain with a credit card data breach in dozens of states with over one million card exposures. Responsibilities included emergency response coaching, breach evaluation, breach notification, breach vendor management, liability assessments, negotiations with processors, acquiring banks, issuing banks and card brands, and litigation support.
  • Assisted a large multinational corporation with its evaluation of and response to a ransomware attack that crippled all corporate servers, including human resources and payroll.
  • Assisted a company with response and notification arising from infiltration of the company’s system that altered payroll files processed by a third-party payroll processor. Responsibilities included working with a forensics investigation firm, coordination of notification to employees, and negotiation with the cyber liability insurance provider.
  • Consulted with an international manufacturing business regarding a “phishing” incident directed at employees’ personal data. Responsibilities included identification of the scope of attempted intrusion, analysis of potentially applicable law of multiple jurisdictions, and assessment of technological safeguards in place to prevent an actual security breach of the information systems in question.
  • Advised a midsized consumer retail services business on response to employee theft of personal information from company systems. Worked with the client’s IT department to identify access and attempted misappropriation of information and coordinated with law enforcement for potential prosecution and assessment of any breach notification.
  • Preparing and, if necessary, executing incident response plans in the event of a security breach.
  • Overseeing and directing breach response activities, including forensic investigations, coordination with law enforcement agencies, compliance with all applicable state breach notification laws, compliance with contractual notice obligations, and responding to inquiries from the Federal Trade Commission and state attorneys general.
  • Conducting internal investigations regarding employee theft of confidential information and trade secrets.
  • Representing numerous companies in responding to security breaches, including, most recently, two publicly-traded Fortune 500 companies.
  • Providing advice regarding the scope and application of cyber risk insurance policies, including the negotiation of favorable terms and conditions.

Key Contacts

A smiling person wearing a suit with a tie stands against a plain background.
Gene F. Price

Partner

Louisville, KY

Secure credit card (Blue)
Banning Virtual Currency Kiosks Is Not a Solution to Fraud

August 22, 2025 | In the News

Bill Repasky, attorney at Frost Brown Todd, authored an article for Cointelegraph, “Banning Virtua...

The image features a digital-themed design with a glowing padlock at the center, symbolizing data security and cybersecurity. Surrounding the padlock are abstract circuit lines and AI-generated elements, representing the integration of GenAI and enterprise AI. The background has a dark blue and black color scheme, emphasizing the technological and security-focused theme. The image highlights the growing concerns about privacy risks with AI, particularly in enterprise environments where AI-driven innovations intersect with data protection challenges.
Take a Look Inside: Managing and Mitigating Insider Risk

August 22, 2025 | In the News

Frost Brown Todd’s Mason Clutter authored an article for Security Magazine, “Take a Look Inside...

AI Artificial Intelligence Security Sentinel Password Cyber Security Ransomware Email Phishing Encrypted Technology, Digital Information Protected Secured Lock
Navigating Privacy Compliance When AI Changes Everything

August 15, 2025 | In the News

Frost Brown Todd attorney Mason Clutter, who leads our firm’s Data Security and Privacy team, was ...

Cybersecurity IT engineers are working on protecting networks from cyber attacks from hackers on the Internet. Secure access to online privacy and personal data protection
Minnesota Consumer Data Privacy Act: What Businesses Need to Know

July 31, 2025 | Publications

The Minnesota Consumer Data Privacy Act went into effect July 31, 2025. Modeled after many states’...

U.S. Cybersecurity and Hacking Threats
Growing Cybersecurity Risks in the Municipal Bond Market

July 30, 2025 | Publications

In November 2024, the Township of White Lake, Michigan, fell victim to a cyberattack resulting in th...

Woman interacting with futuristic digital interface using biometric hand scan technology
New Texas AI Law Affects Collection and Use of Biometric Identifiers

July 15, 2025 | Publications

On June 22, 2025, Texas Governor Greg Abbot signed into law the Texas Responsible Artificial Intelli...

Cybersecurity IT engineers are working on protecting networks from cyber attacks from hackers on the Internet. Secure access to online privacy and personal data protection
Privacy Legislation | July 2025 Update

July 1, 2025 | Publications

This month, two of the 19 comprehensive state-level consumer privacy laws come into effect: Tennesse...

wireless microphone at seminar. public speaking

In the News:

Building AI Use Cases in Greater Cincinnati

Publication: Cincinnati AI Week

Publish Date: June 10, 2025

Authors: Mason C. Clutter

A digital screen displays a series of alphanumeric codes along with the words "Data Breach" and "Cyber Attack" in a high-contrast, blue and orange color scheme, suggesting a security breach or hacking incident.
Indiana Water Treatment Plants and Utilities Required to Reinforce Cybersecurity Defenses

May 29, 2025 | Publications

It is well known that malicious actors have been targeting the U.S.’s critical infrastructure thro...

wireless microphone at seminar. public speaking

In the News:

Panel on Responsible AI: Planning, Governance, Compliance

Publication: Nashville AI Week

Publish Date: May 16, 2025

Authors: Barbara Bennett

Stay ahead of the law.

Subscribe to receive email updates and choose your topics.