fbpx
  • LinkedIn
  • 514 879-5606
  • The bloG
  • Careers
  • The Firm
  • Contact
  • Français
Gascon ≡ Menu
  • FIELDS OF EXPERTISE
    • REAL ESTATE LAW
      • Real Estate Acquisition and Sale
      • Commercial Lease
      • Construction
      • Co-Owner
      • Title Review
      • Real Estate Finance
      • Contractors license
      • Due Diligence
      • REAL ESTATE SHAREHOLDING AND PARTNERSHIPS
    • BUSINESS LAW
      • Shareholding and Partnerships
      • Incorporation and Dissolution of Corporations
      • Agreements, Contracts and Partnerships
      • Corporate Financings
      • Merger and Acquisition
      • Corporate Governance
      • Corporate Reorganization
    • LITIGATION AND INSURANCE
      • Collection
      • Arbitration and Mediation
      • Bankruptcy, Insolvency and Restructuring
      • Construction Litigation
      • Commercial Lease Litigation
      • Conflicts between Shareholders
      • Insurance
      • Recourse in Co-ownership
      • Civil Liability Remedies, Hidden Defects and Insurance Recourse
      • Hypothecary Recourse
      • Appeal and judicial review
    • INTELLECTUAL PROPERTY / IT
      • Trademarks
      • Confidentiality Agreements
      • Service Agreements
      • Master Services Agreement (MSA) and Irrevocable Right of Use (IRU)
      • Easements for Telecommunication Services
      • Data Center Agreements
      • Software Source Code Escrow Agreements
      • License Agreements
      • Terms of Use of a Website
    • CYBERSECURITY
      • Incident response planning
      • Breach coaching
      • Loss and liability mitigation
      • Who is at risk?
    • DATA CENTERS
      • Land acquisition and planning
      • Construction and development
      • Operations
  • The Team
  • STARTUP G PROGRAM
  • Search
  • Menu Menu

PROTECTING YOUR BUSINESS FROM THE FALLOUT OF A CYBER SECURITY INCIDENT IN THE WEEKS AND MONTHS FOLLOWING AN ATTACK

A cyber security incident can have long-reaching effects, even after the immediate crisis has passed. Your business can be exposed to liability on a number of fronts, such as:

  • Claims from employees having suffered disclosure of personally identifying information
  • Claims from clients having suffered disclosure of personally identifying information
  • Investigations and sanctions imposed by regulatory authorities located in various countries, provinces and states as a result of disclosure of personally identifying information
  • Claims for breach of contract due to disruption of service

While rapid intervention during the immediate crisis can mitigate these risks, it is essential to have legal counsel who understands the issues at play and is qualified to guide your company through the strategic challenges caused by cyber security incidents and our team is well placed to assist you in finding efficient and cost-effective ways to mitigate the long-term impact of these events.

YOUR TEAM

MARY DELLI QUADRI
https://www.gascon.ca/en/mary-delli-quadri/

MARY DELLI QUADRI

Attorney, Partner
Gascon
ALEXANDRA KALLOS
https://www.gascon.ca/en/alexandra-kallos/

ALEXANDRA KALLOS

Senior Counsel
Gascon

THESE PUBLICATIONS MIGHT INTEREST YOU

CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

CYBERSECURITY
“I would never fall for a scam! I’m smarter than that, it could never happen to me!”    As a professional who specializes in cybersecurity and privacy law, I have extensive training on the techniques that threat actors use…
Read more
February 23, 2024
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Evelyne Chiasson https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Evelyne Chiasson2024-02-23 09:18:582024-02-23 09:21:15CONFESSIONS OF A CYBERSECURITY LAWYER ON DODGING DECEPTION

UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

BUSINESS LAW, CYBERSECURITY, INTELLECTUAL PROPERTY / IT, LITIGATION, REAL ESTATE LAW
As a kick-off to our educational series, we delve into explaining one such crucial industry term, "Zero-Day Exploit." In the increasingly sophisticated domain of cyber threats, the menace of Zero-Day Exploits has become hard to ignore. This…
Read more
October 24, 2023
https://gasc.sltm.ca/wp-content/uploads/2023/10/AK_Blog-1.jpg 708 1515 Karine Blais https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png Karine Blais2023-10-24 12:17:142023-12-01 17:36:50UNDETECTED & UNSTOPPABLE: A DIVE INTO ZERO DAY EXPLOITS

ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

BUSINESS LAW, CYBERSECURITY, LITIGATION, REAL ESTATE LAW
Introduction Artificial Intelligence (AI) has been a revolutionary technology in recent years and has changed the way the world operates. AI has the ability to automate tasks, analyze vast amounts of data, and make decisions based on the…
Read more
March 1, 2023
https://gasc.sltm.ca/wp-content/uploads/2021/11/VisuelsBlogue-Autres2.jpg 628 1200 C4 Communications https://www.gascon.ca/wp-content/uploads/2018/09/Logo_Gascon_EN-1.png C4 Communications2023-03-01 17:30:342023-12-01 17:36:38ARTIFICIAL INTELLIGENCE’S IMPACT ON CYBERSECURITY AND CYBER INSURANCE

Categories

  • BUSINESS LAW
  • COVID-19 LEGAL IMPACTS
  • CYBERSECURITY
  • DATA CENTERS
  • FIRM NEWS
  • INSURANCE
  • INTELLECTUAL PROPERTY / IT
  • LITIGATION
  • REAL ESTATE LAW
  • RECENT WORK
  • STARTUP G
© All Rights Reserve - Gascon & Associates L.L.P. Web Design C4 Communications.
  • LinkedIn
  • Contact
  • Legal Notice
  • Privacy Statement
  • Cookie Policy
Scroll to top
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}