Thank you for your interest in communicating with Best & Flanagan LLP through one of its lawyers or paralegals.

By sending the email (and any information contained therein), you understand and agree that no attorney-client relationship is created or exists between us.

If you are not already a client, please do not provide us with any information relating to your legal matter(s) without first speaking to one of our lawyers, as any information provided before we confirm that we are willing and able to consult with you about becoming a client, may not be privileged, confidential, or protected information, and could be used against you if we represent a party adverse to you.

We counsel businesses and individuals in the rapidly emerging areas of privacy and data security.

Our attorneys can bring or defend claims when sensitive private images, recordings or other information are revealed by others. Social media, apps and other user‑friendly services have made it extremely easy to share such materials, and also much more difficult to remove them.

We are also ready to assist with the creation or review of formal policies, practices and other safeguards to help protect business and private information from unauthorized access or misuse, such as phishing, spoofing, ransomware, hacking and other practices designed to gain unauthorized, and often secret access to your electronic systems, databases and other private sensitive information. We can help your business comply with specific federal laws (e.g. children’s privacy), as well as the creation of appropriate policies for regulated industries where highly specific practices and compliance are required when working with sensitive personally identifiable private information.

All businesses should be actively planning to minimize the potentially devastating damages from a data breach. Our attorneys can help you proactively anticipate and develop responses and backup plans to restore normal operations as quickly as possible in the event of a breach.


Our areas of experience include:

  • Cross-Border Data Flow Requirements, including Safe Harbor Certification
  • Cybersecurity and Privacy Contract Development and Negotiation
  • Data Protection, Privacy and Cybersecurity Audits, Compliance Risk Assessment and Remediation
  • Data Protection Program Development, including Supporting Consumer Engagement Activities such as Marketing and Advertising
  • Data Security, Privacy and Technology Regulatory Response and Litigation
  • Development of Cybersecurity, Data Protection, Privacy Policies and Procedures
  • Leveraging Personal Information for Advertising and Marketing
  • Management of Employee Information 
  • Mobile Device Privacy Issues
  • Privacy Policies for Organizations and their Websites
  • Restrictions on Collection and Use of Consumer Information
  • Strategic Regulatory Compliance Advice
  • Technology and M&A Transactions
  • Vendor Management Program Development and Implementation
Related Practices
Firm News
    Related Professionals
    P 612.341.9719
    P 612.843.5834
    P 612.349.5655