University of Pittsburgh,
Lake Forest College,
District of Columbia
Next Generation Lawyer in Cyber Law (Data Protection and Privacy)
Legal 500, 2017-2019 (by Legalease, Ltd.)
Associate to Watch in Privacy and Data Security
Chambers Global, 2016; Chambers USA, 2015 (by Chambers & Partners)
Readers Choice Award in Data Privacy
JD Supra, 2021 (by JD Supra, LLC)
Jim serves as a trusted advisor to clients facing complex cybersecurity and privacy issues — particularly those in the country's most highly regulated industries. He is the chair of Thompson Coburn's Cybersecurity group, was named a Fellow of Information Privacy and holds CIPP/US and CIPT certifications from the International Association of Privacy Professionals.
Jim advises all types of companies on the myriad legal concerns surrounding confidential information and how such information is stored and transmitted. Applying the law to rapidly changing technology and software capabilities, Jim provides clients with a profile of their potential risk, then works closely with executive leadership, legal, IT and compliance information security teams to develop a comprehensive and practical plan for risk avoidance and responding to cyber and data-related issues.
Should a company face a security breach, Jim draws on his years of experience handling thousands of incidents to counsel clients through every step of cyber and information security incidents, including notification, reporting and all associated state, federal and global regulatory requirements.
Jim helps clients develop robust and responsive security and privacy policies and governance documents, meet applicable data safeguarding requirements and implement compliance programs.
Jim has presented on a variety of in-the-news cybersecurity topics for industry organizations and associations, including the RSA Conference, the International Association of Privacy Professionals, the ABA and the Mortgage Bankers Association.
Successfully assisted clients through thousands of data security incidents, including interactions with federal, state and foreign agencies, forensic investigations, consumer notifications and remedial steps following any incident.
Guides client responses to regulatory inquiries, investigations, and enforcement actions relating to privacy, information security, or cybersecurity issues.
Coordinates with a broad range of financial institutions, including banks, Securities and Exchange Commission (SEC)-regulated entities, mortgage lenders or servicers, or service providers to financial institutions in meeting bank-level security expectations of regulators or business partners. Jim also counsels entities working with financial institutions and who must meet the more stringent security requirements of the financial industry.
Advises new and expanding fintech companies regarding the application of privacy and security to new technologies and business models as well as related financial services requirements, such as payments standards, anti-money laundering compliance and licensing.
Quoted, "U.S. Lawyers Hope for Longer-Term Solution in Wake of Transatlantic Privacy Deal",
National Law Journal, July 17, 2023
Co-author, "BIPA litigation update: Cothron’s impact and employer BIPA defense affirmed",
Labor and Employment Law Section, Illinois State Bar Association Newsletter, July, 2023
Although we would like to hear from you, we cannot represent you until we know that doing so will not create a conflict of interest. Also, we cannot treat unsolicited information as confidential. Accordingly, please do not send us any information about any matter that may involve you until you receive a written statement from us that we represent you (an ‘engagement letter’).
By clicking the ‘ACCEPT’ button, you agree that we may review any information you transmit to us. You recognize that our review of your information, even if you submitted it in a good faith effort to retain us, and, further, even if you consider it confidential, does not preclude us from representing another client directly adverse to you, even in a matter where that information could and will be used against you. Please click the ‘ACCEPT’ button if you understand and accept the foregoing statement and wish to proceed.