- The Fee Is Free Unless You Win®.
- America's Largest Injury Law Firm™
- Protecting Families Since 1988
- 25 Billion+ Won
- 1,000+ Lawyers Nationwide
Free Case Evaluation
![data privacy](/sites/default/files/styles/lawyers_who_care_780x875/public/2024-03/Shutterstock_2117026061.jpg.webp?itok=TbkXTr5x)
Data Privacy Attorneys
Companies with negligent cybersecurity practices put their customers at risk of financial loss, identity theft, harassment, and various other preventable hardships. These businesses should be held accountable for failing to protect sensitive data.
Morgan & Morgan’s data privacy attorneys are dedicated to helping victims recover the costs they’ve incurred in data breaches. We’ve successfully handled many high-profile cases, and are eager to assist you.
Find out if you have a claim by scheduling a free, no-obligation case evaluation.
How it works
It's easy to get started.
The Fee Is Free®. Only pay if we win.
Results may vary depending on your particular facts and legal circumstances.
Step 1
Submit
your claimWith a free case evaluation, submitting your case is easy with Morgan & Morgan.
Step 2
We take
actionOur dedicated team gets to work investigating your claim.
Step 3
We fight
for youIf we take on the case, our team fights to get you the results you deserve.
Get answers to commonly asked questions about our legal services and learn how we may assist you with your case.
How do I find out if my personal information was involved in a data breach?
Check for notifications from the company or use online tools like “Have I Been Pwned” to verify if your data has been exposed. If you suspect your data has been compromised, you can contact an experienced lawyer who can help you research your specific case.
What should I do if I think my data was compromised in a breach?
If you suspect your data has been compromised in a breach, taking immediate action can help minimize potential damage. Here’s what you should do:
1. Confirm the Breach
- Check for notifications: Organizations affected by a data breach are often required to notify individuals whose data was compromised. Look for emails, letters, or public announcements.
- Use breach-checking tools: Services like Have I Been Pwned can help you determine if your data is associated with a known breach.
2. Change Your Passwords
- Update passwords for affected accounts immediately.
- Use strong, unique passwords that include a combination of letters, numbers, and special characters.
- Enable multi-factor authentication (MFA) whenever possible for an extra layer of security.
3. Monitor Your Accounts
- Bank and credit accounts: Watch for unauthorized charges or withdrawals.
- Credit reports: Request free reports from the three major credit bureaus (Equifax, Experian, and TransUnion) to check for unfamiliar activity.
- Online accounts: Look for signs of unusual logins or changes.
4. Place a Fraud Alert or Credit Freeze
- Fraud alert: Notify credit bureaus to flag your credit report, making it harder for identity thieves to open new accounts in your name.
- Credit freeze: Restrict access to your credit report to prevent unauthorized credit checks.
5. Report the Breach
- Contact the breached company to understand what information was compromised and what they’re doing to address the issue.
- Report suspected fraud to the Federal Trade Commission (FTC) at identitytheft.gov.
6. Consider Identity Theft Protection Services
- Many breached companies offer free credit monitoring or identity theft protection to affected individuals. Consider enrolling if available.
- Alternatively, explore independent services for ongoing monitoring and support.
7. Preserve Evidence
- Save emails, notifications, or other communications from the breached company.
- Keep records of any fraudulent activity or losses resulting from the breach.
8. Contact Morgan & Morgan
If you’ve experienced financial or emotional harm due to a breach, consult a data breach lawyer at Morgan & Morgan to understand your legal rights. A data privacy attorney can help you:
- Pursue compensation for losses.
- Hold the negligent company accountable for failing to protect your data.
While you can’t prevent a breach (only those in charge of your data security can), staying proactive can reduce your risk. Regularly update your passwords, stay informed about cybersecurity best practices, and use tools like password managers to enhance security.
If you need help navigating the aftermath of a data breach, Morgan & Morgan’s experienced data privacy lawyers are here to assist. Contact us today for a free case evaluation.
Can I sue a company for not protecting my data adequately?
Yes, if the company’s negligence or lax security measures enabled the breach, you may have grounds to sue for damages.
Why should I hire Morgan & Morgan?
At Morgan & Morgan, our team of experienced data breach attorneys has successfully represented countless clients in similar situations, securing billions in compensation. As the largest personal injury law firm in the country with over 1,000 lawyers nationwide, we have the resources, knowledge, and dedication to fight for your rights.
We work on a contingency fee basis, meaning you won’t have to pay unless we win your case. Morgan & Morgan believes justice should be accessible to all, so our motto is the Fee Is Free™—you only pay if we win.
We take pride in holding companies accountable when they fail to protect your sensitive information. You shouldn’t have to suffer the consequences of a data breach due to someone else’s negligence. Contact Morgan & Morgan today for a free case evaluation to explore your legal options.
Do I have to pay for a consultation with a lawyer?
No. Consultations at Morgan & Morgan are completely free. We believe everyone deserves access to legal advice, regardless of their financial situation.
Hiring one of our data privacy lawyers is easy, and you can get started in minutes with a free case evaluation on our site or by phone.
Who Leads Morgan & Morgan’s Data Privacy Team?
Attorney John A. Yanchunis leads the National Consumer Class Action section of Morgan & Morgan’s Complex Litigation Group, and has helped countless data breach victims recover the compensation they deserve. He has played a leading role in recovering millions of dollars for consumers in multidistrict class action litigations including the Yahoo data breach case.
Consistently recognized for his courtroom success, Mr. Yanchunis has been awarded the prestigious “AV” rating and has been repeatedly named a Florida Super Lawyer®. In addition, he was named a leader in cybersecurity at the Law360 MVP awards, as well as received the Chair’s Honor Award from the Elder Law Section of the Florida Bar.
Mr. Yanchunis and our team of experienced litigators are here to help victims of data breaches recover their losses. You can rest assured knowing that our law firm employs some of the brightest legal minds.
Who will be on my case team?
When you hire Morgan & Morgan, you don’t just hire a lawyer, you hire the largest personal injury law firm in the country with an army of over 1,000 lawyers and offices in all 50 states and Washington, D.C.
Your case will be handled by a dedicated team of professionals, including personal injury lawyers, paralegals, and support staff. You will be assigned a care team that includes a primary attorney who will oversee your case and ensure you receive personalized attention throughout the process.
When do I meet with my lawyer?
After your initial consultation, your care team will schedule regular meetings to discuss your case, provide updates, and prepare you for any upcoming proceedings. We are committed to maintaining open lines of communication and keeping you informed every step of the way.
These meetings can be handled in person, virtually, and by phone, depending on your case’s requirements and your ability to do so.
How much does it cost to hire Morgan & Morgan?
Morgan & Morgan’s civil rights lawyers work on a contingency fee basis, meaning that there are no upfront fees or expenses until your case comes to a successful conclusion. That’s right—the Fee Is Free™, and you only pay if we win.
Our fee is a percentage of the settlement or verdict amount, ensuring we are motivated to achieve the best possible outcome for you.
Are companies legally required to notify individuals of a data breach?
Yes, in many jurisdictions, companies must notify affected individuals and regulatory authorities promptly after a breach. With a free case evaluation, Morgan & Morgan can advise you if your state or area requires such.
What is the statute of limitations for filing a data breach lawsuit?
The amount of time you have to file a personal injury claim, known as the statute of limitations, varies by state and the specifics of your case. However, some exceptions may apply, such as in cases involving minors, government entities, or when the injury wasn’t discovered right away.
It's important to file your claim as soon as possible to preserve your legal rights. Failing to file within the statute of limitations could result in your case being dismissed, meaning you may lose the opportunity to recover compensation for your injuries.
Since deadlines can vary by state and situation, it's best to consult with a personal injury attorney as soon as possible after the incident to understand the specific timeline for your case. An attorney can help ensure your claim is filed correctly and on time.
Can I receive compensation for emotional distress caused by a data breach?
Yes, you may be able to receive compensation for emotional distress caused by a data breach, but it depends on the circumstances of the breach, the laws in your jurisdiction, and the impact the breach had on your emotional and mental well-being.
Emotional distress can arise when a data breach results in significant anxiety, stress, or trauma. This is especially true in cases where:
- Sensitive Information Is Exposed: If personal data such as medical records, Social Security numbers, or private financial information is compromised, it can create ongoing fear of identity theft or other misuse.
- Harassment or Stalking Occurs: If the breach leads to harassment, phishing attempts, or other targeted actions against you.
- Long-Term Consequences Are Likely: Emotional distress can stem from the uncertainty and inconvenience of dealing with potential identity theft or credit fraud for years after the breach.
What are the types of data breaches and what are their implications?
Data breaches come in various forms, each with specific risks and potential consequences:
- Financial Data Breaches: Breaches targeting banking information, credit card details, and payment platforms can lead to fraudulent transactions, drained accounts, and financial instability.
- Healthcare Data Breaches: Exposing protected health information (PHI) can lead to violations of privacy, medical identity theft, and disruptions to medical care.
- Personal Information Breaches: Breaches involving Social Security numbers, driver’s licenses, addresses, or passwords can result in identity theft, phishing scams, and unauthorized access to online accounts.
Each type of breach puts individuals at risk in different ways, often requiring months or even years to recover from the fallout.
What are the long-term consequences of a data breach?
The effects of a data breach can linger far beyond the initial incident:
- Identity Theft: Stolen personal information can be used to open fraudulent accounts, apply for loans, or file false tax returns in your name.
- Credit Damage: A compromised credit history can lead to higher interest rates, denied credit applications, or difficulties securing housing or employment.
- Emotional Distress: Victims often experience anxiety, frustration, and a loss of trust in companies and institutions that failed to protect their data.
- Ongoing Unauthorized Access: Once data is exposed, it can circulate on the dark web, leaving individuals vulnerable to future attacks.
What should companies do to prevent data breaches?
To minimize the risk of data breaches, companies must take proactive measures, including:
- Implementing Encryption:
Encrypting sensitive data ensures that even if hackers access it, they cannot read or misuse the information without a decryption key. - Using Firewalls and Security Software:
Firewalls and updated security software can help block unauthorized access to systems. - Employee Training:
Employees should be trained on recognizing phishing attempts, securely handling data, and following cybersecurity best practices. - Regular Security Audits:
Companies should frequently evaluate their systems to identify and address vulnerabilities. - Incident Response Plans:
Having a clear plan for responding to breaches can help mitigate damage and ensure timely communication with affected individuals.
Legal Rights for Victims of Data Breaches
Victims of data breaches have legal protections under various laws, including:
- GDPR (General Data Protection Regulation):
Protects individuals in the EU by requiring organizations to obtain consent before collecting personal data and report breaches promptly. - HIPAA (Health Insurance Portability and Accountability Act):
Safeguards sensitive healthcare information in the U.S. and imposes penalties for non-compliance. - CCPA (California Consumer Privacy Act):
Grants California residents the right to know how their data is collected and used, and to sue companies that fail to protect their information.
Victims may be entitled to compensation for financial losses, emotional distress, and other damages caused by a breach.
- Implementing Encryption:
What is the role of a data privacy lawyer in data breach cases?
A lawyer specializing in data privacy at Morgan & Morgan can be instrumental in helping you:
- Navigate the Legal System: Attorneys can interpret complex privacy laws and identify the best course of action.
- Pursue Damages: Lawyers can calculate financial and non-economic losses to seek fair compensation for victims.
- Hold Companies Accountable: By filing lawsuits or class actions, data privacy lawyers can ensure that negligent organizations face consequences for failing to protect sensitive information.
What are the most common types of personal information targeted in data breaches?
Data breaches often involve the theft or exposure of sensitive personal information that can be exploited for financial gain, identity theft, or other malicious purposes. The most common types of personal information targeted in data breaches include:
1. Financial Information
- Credit Card Numbers: Cybercriminals use stolen credit card information for unauthorized purchases or to sell on the dark web.
- Bank Account Details: Access to banking information allows for direct theft or fraudulent transfers.
- Payment Information: Online payment platforms like PayPal or Venmo accounts are also frequent targets.
2. Personally Identifiable Information (PII)
- Social Security Numbers (SSNs): Often targeted because they can be used to create fake identities, open accounts, or file fraudulent tax returns.
- Full Names: When combined with other details, names can facilitate phishing scams or identity theft.
- Addresses: Stolen addresses may be used in fraud schemes or for impersonation purposes.
- Dates of Birth: Birth dates are a key piece of information for verifying identity across many systems.
3. Login Credentials
- Usernames and Passwords: Hackers often steal login credentials to access other accounts, particularly if users reuse passwords across multiple sites.
- Email Addresses: These are used in phishing campaigns to trick users into revealing further sensitive information.
4. Healthcare Information
- Medical Records: Data such as diagnoses, treatments, and prescriptions is valuable for committing medical identity theft or insurance fraud.
- Health Insurance Information: Insurance details can be used to file fraudulent claims or obtain medical services.
- Protected Health Information (PHI): Under HIPAA regulations, any health-related data tied to an individual is particularly sensitive.
5. Employment and Professional Information
- Employee Records: Information like payroll details, tax forms (e.g., W-2s), and direct deposit information can be exploited for fraud.
- Credentials for Work Systems: Access to workplace systems can lead to larger organizational breaches or ransomware attacks.
6. Contact Information
- Phone Numbers: These can be used in social engineering scams or spam campaigns.
- Email Addresses: Frequently exploited for phishing, spam, or malware attacks.
7. Sensitive Personal Data
- Biometric Data: Fingerprints, facial recognition data, and voice prints are increasingly targeted due to their use in authentication systems.
- Photos and Videos: Personal multimedia content can be used for extortion or unauthorized distribution.
8. Government-Issued Identification
- Driver’s License Numbers: Stolen licenses can be used to create fake IDs or commit fraud.
- Passports: Passport information is particularly valuable for identity theft and international fraud.
9. Education Records
- Student Information: Records like grades, transcripts, or financial aid details can be exploited for fraud or blackmail.
Why This Information Is Valuable to Hackers
Stolen personal data is often sold on the dark web or used directly by cybercriminals for activities such as:
- Identity Theft: Creating fake identities or taking over existing ones.
- Fraudulent Transactions: Making unauthorized purchases or stealing money.
- Phishing Campaigns: Using personal details to make scam emails more convincing.
- Extortion: Threatening to release sensitive information unless paid.
At Morgan & Morgan, our data privacy lawyers are committed to helping you hold companies accountable and secure the compensation you deserve. Contact us today for a free case evaluation.
Download your FREE copy of our
Data Breach Lawsuit Guide