As reported last week, a state-sponsored hacker may have breached multiple U.S. government networks through a widely-used software product offered by SolarWinds. The compromised product helps organizations manage their networks, servers and networked devices. The product is not only used by government agencies, but is widely used in both the

Margaret A. Dale
Margaret Dale is a seasoned trial lawyer and first-chair litigator handling complex business disputes across a wide variety of industries and sectors, including consumer products, media and entertainment, financial services, telecommunications and technology, and higher education. A former vice-chair of the Litigation Department, she has been recognized since 2017 in Benchmark Litigation's Top 250 Women in Litigation.
Margaret’s practice covers the spectrum of complex commercial disputes, including matters involving contracts, bankruptcy and insolvency, securities, corporate governance, asset management, M&A, intellectual property, and privacy and data security.
Margaret regularly counsels clients before litigation commences to assess risk, develop strategies to minimize or avoid disputes, and resolve matters outside of the courtroom.
Margaret is a frequent writer, including authoring the chapter titled “Privileges” in the treatise Commercial Litigation in New York State Courts (Haig, 5th ed.), the chapter titled “Data Breach Litigation” in PLI’s Proskauer on Privacy, and the chapter titled “Perfecting the Appeal” in PLI’s Principles of Appellate Litigation. She also serves as the lead editor of Proskauer’s blog on commercial litigation, Minding Your Business Litigation. For over 10 years, Margaret co-authored a regular column on corporate and securities law in the New York Law Journal.
Margaret maintains an active pro bono practice advocating on issues relating to reproductive rights, women, children, and veterans. She serves on the Board of Directors of CFR (Center for Family Representation), VLA (Volunteer Lawyers for the Arts), and the City Bar Fund.
Cybersecurity: A Guide to Preparing for and Responding to a Breach
A cyber breach can have serious legal, financial, and reputational consequences for a company, as described in our previous post. As such, cybersecurity threats must be treated as business risks, not just a potential IT problem. Senior management at a company should take the lead to ensure that the company is taking appropriate actions to protect itself against cyber risks. There are several steps that senior management can guide the company to take to prevent breaches from occurring and to mitigate the impact when they do occur.
Margaret Dale Explores Ways to Protect Privilege After Data Breach
Proskauer’s Vice-Chair of the Litigation Department and Minding Your Business blog editor, Margaret Dale was recently featured on Thomson Reuters’ Practical Law, where she explores ways that clients can protect privilege after a data breach. The first, “Protecting Privilege Basics,” identifies steps that can be taken by…
Cybersecurity: Threats, Consequences, and the Regulatory Framework
In today’s world, cybersecurity breaches and threats are pervasive concerns for any business entity, without exception. Working from home arrangements due to COVID-19 constraints only magnify the risk and create further vulnerabilities for companies. Companies should be aware of (1) the key cyber threats they face, (2) the consequences of a breach, and (3) the statutory and regulatory framework governing cybersecurity. Cybersecurity breaches are unique in that an entity can both be the victim of the breach and still be found to have a degree of responsibility. Fortunately, there are precautionary measures that companies can implement to help prevent a breach and to mitigate the scope and damage of a breach if one were to occur. We will elaborate on the steps to take to guard against a breach and how to effectively respond to a breach in a forthcoming post.