Attorney Lynn Johnson helps organizations leverage the value of their information assets while satisfying compliance requirements and controlling risk. She brings experience with all project management knowledge areas necessary to deliver solutions from initiation through closure, including delivering projects requiring strategic planning, vendor selection, partnering with third party vendors, offshore development, custom software development and software package installation.
Program/Project Management Consulting
Our team is experienced in consulting for ensuring compliance with data policies, performing project risk assessments, resolving project barriers, and deployment planning. Services include managing multi-million dollar budgets for resource and project assignments, including onshore, near shore, and offshore locations. Attorney Lynn is experienced in review of IT contracts providing recommended modifications for vendor contracts for technology services and consultants. She has a background of working successfully with senior management in setting strategy, defining priorities, and resolving issues.
We advise on compliance with HIPAA, the Gramm-Leach-Bliley Act, FERPA, TCPA, the CAN-SPAM Act, EFTA, FCRA/FACTA, COPPA and state privacy laws. We evaluate and develop information security compliance plans, conduct compliance training, and prepare and negotiate information privacy-compliant agreements.
The best time to assess risk, secure data and plan for a breach is before a cybersecurity incident occurs. We help clients guard against cyber theft, cyber extortion and other unauthorized disclosures of protected information. We assess cybersecurity risks and gaps, develop compliant and effective security controls, educate employees, assess cyber liability insurance coverage and establish defensible records retention plans.
In the event a data security breach occurs, we can assist you with handling your first response, provide guidance on requirements to notify, and other legal requirements and best practices.We guide clients in key activities from notification to insurance coverage that must occur after a data breach, laying the groundwork that will ensure these activities are handled with minimal confusion, cost, risk and delay during a rapidly unfolding, high-stakes breach crisis.