{"id":6076,"date":"2020-12-03T19:33:47","date_gmt":"2020-12-04T00:33:47","guid":{"rendered":"https:\/\/www.khflaw.com\/news\/?p=6076"},"modified":"2021-05-21T09:56:08","modified_gmt":"2021-05-21T13:56:08","slug":"legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action","status":"publish","type":"post","link":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/","title":{"rendered":"Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action"},"content":{"rendered":"<p class=\"article-description\"><em><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-6078\" src=\"https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach-1024x576.png\" alt=\"Lock unlocked with 1's and 0's spilling out; hacker to the right\" width=\"1024\" height=\"576\" srcset=\"https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach-1024x576.png 1024w, https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach-300x169.png 300w, https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach-768x432.png 768w, https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach-1536x864.png 1536w, https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach-1000x563.png 1000w, https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach-213x120.png 213w, https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach.png 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive information may still fall prey to hackers and other kinds of breaches.<\/em><\/p>\n<p>In the November 25, 2020 edition of\u00a0<a href=\"https:\/\/www.law.com\/thelegalintelligencer\/\"><em> The Legal Intelligencer<\/em> <\/a>Edward T. Kang, managing member of Kang Haggerty wrote, &#8220;<a href=\"https:\/\/www.law.com\/thelegalintelligencer\/2020\/11\/25\/data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/\">Data Breach Cases: An Analysis of Standing and Best Causes of Action.<\/a>&#8221;<\/p>\n<p>Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive information may still fall prey to hackers and other kinds of breaches. Those affected may seek counsel to aid in bringing suit to hold an entity liable for its intermediary role when a third party commits a data breach.. While data breaches have become too common, case law and statutory law governing redress for data breaches is limited. This column explores standing and potential causes of action in data breach suits.<\/p>\n<div class=\"read_more_link\"><a href=\"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/\"  title=\"Continue Reading Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action\" class=\"more-link\">Continue reading \u203a<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive information may still fall prey to hackers and other kinds of breaches. In the November 25, 2020 edition of\u00a0 The Legal Intelligencer Edward T. Kang, managing member of Kang Haggerty wrote, &#8220;Data [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":6078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[414],"tags":[336],"coauthors":[535],"class_list":["post-6076","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-publications","tag-legal-intelligencer","publication_lawyer-edward-t-kang"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action &#8212; Kang Haggerty News &#8212; December 3, 2020<\/title>\n<meta name=\"description\" content=\"Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive &#8212; December 3, 2020\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action &#8212; Kang Haggerty News &#8212; December 3, 2020\" \/>\n<meta property=\"og:description\" content=\"Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive &#8212; December 3, 2020\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/\" \/>\n<meta property=\"og:site_name\" content=\"Kang Haggerty News\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-04T00:33:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-21T13:56:08+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/localhost\/news\/wp-content\/uploads\/2020\/12\/Data-Breach.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1125\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Edward T. Kang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Edward T. Kang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action &#8212; Kang Haggerty News &#8212; December 3, 2020","description":"Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive &#8212; December 3, 2020","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/","og_locale":"en_US","og_type":"article","og_title":"Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action &#8212; Kang Haggerty News &#8212; December 3, 2020","og_description":"Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive &#8212; December 3, 2020","og_url":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/","og_site_name":"Kang Haggerty News","article_published_time":"2020-12-04T00:33:47+00:00","article_modified_time":"2021-05-21T13:56:08+00:00","og_image":[{"width":2000,"height":1125,"url":"http:\/\/localhost\/news\/wp-content\/uploads\/2020\/12\/Data-Breach.png","type":"image\/png"}],"author":"Edward T. Kang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Edward T. Kang","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/","url":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/","name":"Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action &#8212; Kang Haggerty News &#8212; December 3, 2020","isPartOf":{"@id":"https:\/\/www.khflaw.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/#primaryimage"},"image":{"@id":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/#primaryimage"},"thumbnailUrl":"https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach.png","datePublished":"2020-12-04T00:33:47+00:00","dateModified":"2021-05-21T13:56:08+00:00","author":{"@id":"https:\/\/www.khflaw.com\/news\/#\/schema\/person\/715d97d788a57e99416dcc912bc92bcf"},"description":"Despite the rules and security measures that many organizations put in place to protect the personal information of their clients or customers, sensitive &#8212; December 3, 2020","breadcrumb":{"@id":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/#primaryimage","url":"https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach.png","contentUrl":"https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach.png","width":2000,"height":1125,"caption":"Lock unlocked with 1's and 0's spilling out; hacker to the right"},{"@type":"BreadcrumbList","@id":"https:\/\/www.khflaw.com\/news\/legal-intelligencer-data-breach-cases-an-analysis-of-standing-and-best-causes-of-action\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"News","item":"https:\/\/www.khflaw.com\/news\/"},{"@type":"ListItem","position":2,"name":"Legal Intelligencer: Data Breach Cases: An Analysis of Standing and Best Causes of Action"}]},{"@type":"WebSite","@id":"https:\/\/www.khflaw.com\/news\/#website","url":"https:\/\/www.khflaw.com\/news\/","name":"Kang Haggerty News","description":"Published By Kang Haggerty LLC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.khflaw.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.khflaw.com\/news\/#\/schema\/person\/715d97d788a57e99416dcc912bc92bcf","name":"Edward T. Kang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.khflaw.com\/news\/#\/schema\/person\/image\/e0d0c7487856dd0dfc77d3733787f0e1","url":"https:\/\/secure.gravatar.com\/avatar\/8dcff756ae0093f937b15b5df94416a7c3d96219078d2839a5bc5728ba16357a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8dcff756ae0093f937b15b5df94416a7c3d96219078d2839a5bc5728ba16357a?s=96&d=mm&r=g","caption":"Edward T. Kang"},"sameAs":["https:\/\/www.khflaw.com\/"]}]}},"jetpack_featured_media_url":"https:\/\/www.khflaw.com\/news\/wp-content\/uploads\/2020\/12\/Data-Breach.png","_links":{"self":[{"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/posts\/6076","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/comments?post=6076"}],"version-history":[{"count":2,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/posts\/6076\/revisions"}],"predecessor-version":[{"id":6120,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/posts\/6076\/revisions\/6120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/media\/6078"}],"wp:attachment":[{"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/media?parent=6076"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/categories?post=6076"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/tags?post=6076"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.khflaw.com\/news\/wp-json\/wp\/v2\/coauthors?post=6076"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}