Businesses of all types and sizes throughout the United States, Mexico and beyond bring their disputes to Gardere's litigation team and receive practical, responsive, boutique-style attention in return. Our clients have access to the firepower and value of a well-known and highly-regarded Firm's capabilities and interdisciplinary strengths.
Gardere has a national and international energy practice formed around our Energy Industry Team, which is a multidisciplinary group of approximately 60 attorneys with diverse backgrounds, experience and skills specific to the energy industry. Our team includes attorneys who have served as in-house counsel for major energy companies, providing a depth of insight into our clients' needs, issues and concerns. We understand and regularly practice in virtually every sector of the energy, and we represent a wide variety of industry participants from multinational corporations to individuals.
From our offices in the United States and Mexico, our International Practice helps clients operate in today’s global economy. We have more than 30 professionals operating as a boutique within an Am Law 200 law firm and are able to provide focused service with the resources of a large firm. We understand that clients who are engaged in the global marketplace need lawyers who can operate seamlessly across multiple jurisdictions. Our international experts are multi-lingual, are culturally fluent and intimately familiar with various legal systems across the world, especially those in Latin America. Whether you need help with commercial transactions, regulatory matters, customs and import regulations, immigration matters, M&A and joint ventures, international disputes, or international tax planning, Gardere’s international team is here to assist you.
We represent domestic and foreign private funds in all aspects of fund formation, fund operations, platform and add-on acquisitions, and portfolio company operations. Our team has a reputation for being the go-to-lawyers for private equity funds, hedge funds, venture capital funds and family offices. We are known for our vast deal experience, the efficient way we staff and manage our work, and the way we maintain our relationships. We get deals done with sophisticated, strategic, and practical advice tailored to the needs of our clients.
*Not admitted to practice law.
Infoworld reported that for Information Technolgoy (IT) “Privacy has become one of the leading computer security issues today…Today’s systems track every access, and every employee should know that accessing a single record they don’t have a legitimate need to view is likely to be noticed and acted on.” The November 17, 2014 Infoworld article entitled “10 security mistakes that will get you fired” includes these highlighted privacy mistakes by IT:
Colossal security mistake No. 1: Killing critical business functionality
Colossal security mistake No. 2: Killing the CEO’s access to anything
Colossal security mistake No. 3: Ignoring a critical security event
Colossal security mistake No. 4: Reading confidential data
Colossal security mistake No. 5: Invading privacy
Colossal security mistake No. 6: Using real data in test systems
Colossal security mistake No. 7: Using a corporate password on the Web at large
Colossal security mistake No. 8: Opening big “ANY ANY” holes
Colossal security mistake No. 9: Not changing passwords
Colossal security mistake No. 10: Treating every vulnerability like “the big one”
The report included the following example of Colossal security mistake No. 5: Invading privacy:
A friend worked at a hospital and once heard that a famous celebrity had checked in. The friend performed a quick SQL query and learned that the celebrity was in-house. They didn’t tell anyone or do anything.
A few days later someone in the primary care staff leaked to a popular media site that the celebrity was being treated in the hospital. Management asked for an audit of who accessed the celebrity’s records. The request came to my friend, who reported the results of the audit and self-reported their SQL query, though it had not been tracked by the information system. Management fired everyone who accessed the medical record without a legitimate reason. My friend, who would never have been caught if not for their aboveboard honesty, was fired without remorse.
Other important privacy mistakes were reported with with Colossal security mistake No. 6: Using real data in test systems:
When testing or implementing new systems, mounds of trial data must be created or accumulated. One of the simplest ways to do this is to copy a subset of real data to the test system. Millions of application teams have done this for generations. These days, however, using real data in test systems can get you in serious trouble, especially if you forget that the same privacy rules apply.
In today’s new privacy world, you should always create bogus test data to be used in your test systems. After all, test systems are rarely as well protected as production systems, and testers do not treat the data in test systems with the same mentality as they do data in production systems. In test systems, passwords are short, often shared, or not used at all. Application access control is often wide open or at least overly permissive. Test systems are rarely secure. It’s a fact that hackers love to exploit.
Most people do not realize how vulnerable their privacy is within IT systems, and this report reminds everyone that cybersecurity mistakes expose us all.
The publications contained in this site do not constitute legal advice. Legal advice can only be given with knowledge of the client's specific facts. By putting these publications on our website we do not intend to create a lawyer-client relationship with the user. Materials may not reflect the most current legal developments, verdicts or settlements. This information should in no way be taken as an indication of future results.
You may use the wildcard symbol (*) as a root expander. A search for "anti*" will find not only "anti", but also "anti-trust", "antique", etc.
Entering two terms together in a search field will behave as though an "OR" is being used. For example, entering "Antique Motorcars" as a Client Name search will find results with either word in the Client Name.
AND and OR may be used in a search. Note: they must be capitalized, e.g., "Project AND Finance."
The + and - sign operators may be used. The + sign indicates that the term immediately following is required, while the - sign indicates to omit results that contain that term. E.g., "+real -estate" says results must have "real" but not "estate".
To perform an exact phrase search, surround your search phrase with quotation marks. For example, "Project Finance".
Searches are not case sensitive.