[bt_bb_section layout=”boxed_1200″ top_spacing=”extra_large” bottom_spacing=”medium” full_screen=”” vertical_align=”top” color_scheme=”Dark” background_image=”40″ background_overlay=”dark_solid” parallax=”0.8″ parallax_offset=”” background_video_yt=”” yt_video_settings=”” background_video_mp4=”” background_video_ogg=”” background_video_webm=”” el_id=”” el_class=”” el_style=””][bt_bb_row column_gap=”80″ el_id=”” el_class=”” el_style=””][bt_bb_column width=”1/1″ width_lg=”1/1″ width_md=”1/1″ width_sm=”1/1″ width_xs=”1/1″][bt_bb_headline superheadline=”” headline=”Data Breache and Digital Security
” html_tag=”h1″ dash=”top” align=”inherit,;,,;,,;,,;,” url=”” target=”_self” color_scheme=”” color=”” font=”inherit” font_subset=”latin,latin-ext” font_size=”” el_id=”” el_class=”” el_style=”” subheadline=”” size=”extralarge,;,,;,,;,,;,” font_weight=”” supertitle_position=”” superheadline_font_weight=”” subheadline_font_weight=”” responsive=”” publish_datetime=”” expiry_datetime=”” animation=”no_animation”][/bt_bb_headline][bt_bb_separator top_spacing=”medium” bottom_spacing=”” border_style=”none” border_width=”” el_id=”” el_class=”” el_style=””][/bt_bb_separator][/bt_bb_column][/bt_bb_row][/bt_bb_section][bt_bb_section layout=”boxed_1200″ top_spacing=”large” bottom_spacing=”medium” full_screen=”” vertical_align=”top” color_scheme=”” background_image=”” background_overlay=”” parallax=”” parallax_offset=”” background_video_yt=”” yt_video_settings=”” background_video_mp4=”” background_video_ogg=”” background_video_webm=”” el_id=”” el_class=”” el_style=””][bt_bb_row column_gap=”40″ el_id=”” el_class=”tablet-row-area” el_style=”” row_width=”default” color_scheme=”” background_color=”” opacity=”” responsive=”” publish_datetime=”” expiry_datetime=”” animation=”no_animation”][bt_bb_column width=”1/2″ align=”left” vertical_align=”top” animation=”fade_in” padding=”normal” background_color=”” opacity=”” el_id=”” el_class=”” el_style=”” width_lg=”1/2″ width_md=”1/2″ width_sm=”1/2″ width_xs=”1/1″][bt_bb_image image=”1410″ size=”” shape=”square” align=”inherit” url=”” target=”_self” el_id=”” el_class=”” el_style=””][/bt_bb_image][bt_bb_separator top_spacing=”” bottom_spacing=”medium” border_style=”none” border_width=”” el_id=”” el_class=”” el_style=””][/bt_bb_separator][/bt_bb_column][bt_bb_column width=”1/2″ align=”left” vertical_align=”middle” animation=”fade_in” padding=”normal” background_color=”” opacity=”” el_id=”” el_class=”” el_style=”” inner_background_color=”” width_lg=”1/2″ width_md=”1/2″ width_sm=”1/2″ width_xs=”1/1″][bt_bb_headline superheadline=”” headline=”Data Breaches and Digital Security” html_tag=”h2″ dash=”none” align=”inherit” url=”” target=”_self” color_scheme=”” color=”” font=”inherit” font_subset=”latin,latin-ext” font_size=”” el_id=”” el_class=”” el_style=”” subheadline=”” size=”normal” font_weight=””][/bt_bb_headline][bt_bb_separator top_spacing=”normal” bottom_spacing=”” border_style=”none” border_width=”” el_id=”” el_class=”” el_style=””][/bt_bb_separator][bt_bb_text]
Companies large and small maintain their customers’ personal and financial information on, or in, reportedly secure data-bases. This information may include social security numbers, bank account and credit card numbers, dates of birth, addresses, and even buying habits. All of these things can be used for identity theft, or for other nefarious reasons. As such, companies are obligated to keep their information secure, and consumers have an expectation that this information will be kept private and not shared unless the consumer has expressly given the company explicit permission to share such data.
[/bt_bb_text][bt_bb_separator top_spacing=”normal” bottom_spacing=”” border_style=”none” border_width=”” el_id=”” el_class=”” el_style=””][/bt_bb_separator][/bt_bb_column][/bt_bb_row][/bt_bb_section][bt_bb_section layout=”boxed_1200″ top_spacing=”large” bottom_spacing=”medium” full_screen=”” vertical_align=”top” color_scheme=”gray-background” background_image=”” background_overlay=”” parallax=”” parallax_offset=”” background_video_yt=”” yt_video_settings=”” background_video_mp4=”” background_video_ogg=”” background_video_webm=”” el_id=”” el_class=”” el_style=”” background_color=””][bt_bb_row column_gap=”40″ el_id=”” el_class=”tablet-row-area” el_style=”” row_width=”default” color_scheme=”” background_color=”” opacity=”” responsive=”” publish_datetime=”” expiry_datetime=”” animation=”no_animation”][bt_bb_column width=”1/2″ align=”left” vertical_align=”middle” animation=”fade_in” padding=”normal” background_color=”” opacity=”” el_id=”” el_class=”” el_style=”” inner_background_color=”” width_lg=”1/2″ width_md=”1/2″ width_sm=”1/2″ width_xs=”1/1″][bt_bb_headline superheadline=”” headline=”Information Leaks ” html_tag=”h2″ dash=”none” align=”inherit” url=”” target=”_self” color_scheme=”” color=”” font=”inherit” font_subset=”latin,latin-ext” font_size=”” el_id=”” el_class=”” el_style=”” subheadline=”” size=”normal” font_weight=””][/bt_bb_headline][bt_bb_separator top_spacing=”normal” bottom_spacing=”” border_style=”none” border_width=”” el_id=”” el_class=”” el_style=””][/bt_bb_separator][bt_bb_text]
All too often, this private information leaks to the public, either through intentional hacking and/or identity theft, or through lax security protocols and procedures. This information leak or storage negligence may have far-reaching ramifications for the victims, usually large groups of customers all at once.
At MCL, we litigate against those companies whose negligence or poor security resulted in data breaches.
[/bt_bb_text][bt_bb_separator top_spacing=”medium” bottom_spacing=”” border_style=”none” border_width=”” el_id=”” el_class=”” el_style=””][/bt_bb_separator][/bt_bb_column][bt_bb_column width=”1/2″ align=”left” vertical_align=”top” animation=”fade_in” padding=”normal” background_color=”” opacity=”” el_id=”” el_class=”” el_style=”” width_lg=”1/2″ width_md=”1/2″ width_sm=”1/2″ width_xs=”1/1″][bt_bb_image image=”1412″ size=”” shape=”square” align=”inherit” url=”” target=”_self” el_id=”” el_class=”” el_style=””][/bt_bb_image][bt_bb_separator top_spacing=”” bottom_spacing=”medium” border_style=”none” border_width=”” el_id=”” el_class=”” el_style=””][/bt_bb_separator][/bt_bb_column][/bt_bb_row][/bt_bb_section]