Close X
Attorney Spotlight

How does Jordana Nelson's prior experience as a general counsel inform her work with firm clients? Read more>


Close X


Search our Experience

Experience Spotlight

The M&A Advisor Winner 2017The M&A Advisor announced the winners of the 16th Annual M&A Advisor Awards on Monday, November 13 at the 2017 M&A Advisor Awards. Bass, Berry & Sims was named a winner in the two categories related to the following deals:

M&A Deal of the Year (from $1B-$5B) – Acquisition of CLARCOR Inc. by Parker Hannifin Corporation

Corporate/Strategic Deal of the Year (over $1B) – Acquisition of BNC Bancorp by Pinnacle Financial Partners

Close X

Thought Leadership

Enter your search terms in the relevant box(es) below to search for specific Thought Leadership.
To see a recent listing of Thought Leadership, click the blue Search button below.

Thought Leadership Spotlight

Regulation A+

It seems that lately there has been a noticeable uptick in Regulation A+ activity, including several recent Reg A+ securities offerings where the stock now successfully trades on national exchanges. In light of this activity, we have published a set of FAQs about Regulation A+ securities offerings to help companies better understand this "mini-IPO" offering process, as well as pros and cons compared to a traditional underwritten IPO.

Read now

Privacy Perils: Data Collection from Connected Devices

Firm Publication


March 20, 2017

While the WikiLeaks CIA dump makes for interesting reading about our nation's capability to hack certain connected devices, it does not mean we are all being spied on while waiting for a microwave burrito. However, fanciful headlines do foreshadow privacy and data collection issues as the number of those connected devices (the "Things" in the Internet of Things) grow. 

From pacemakers to thermostats to baby monitors to toasters, everyday devices are becoming "smart." Unfortunately, many of these Things and the data they collect are notoriously insecure – many with outdated security and even known flaws – primarily because the flood of these devices has been so new and fast, and the devices are so varied, there are no security standards, and the devices are poorly patched.

These security flaws have not truly been exploited because these devices historically have been too frivolous to attack. That may soon change, because increasingly "smart" devices are gateways to more worthwhile targets, such as their connected networks. In addition, because the types of connected devices are becoming more substantial (such as our cars), the data being collecting is becoming more valuable, precise, and capable of being mined. 

Use of "smart" Things is a matter of convenience and lifestyle choice. However, that choice should be guided by whether you think every-Thing in your life really needs to be connected. Does your child really need a connected plush toy that collects her location, sibling's names, voice recordings, birthday and photo? Do other devices really need to send usage data to their manufacturers? 

Often the answer will be that the convenience and usefulness of the Thing – such as watching Netflix on a smart TV or controlling your thermostat remotely – outweighs the low risk of a data breach. If you make that choice, you should at least do a cursory review of the types of information the device intends to collect, the device's security, any privacy policy provided by the manufacturer, and any consumer and expert reviews of that device. 

In a welcome security step forward, some companies have started to employ two-factor authentication. For instance, Nest recently rolled out two-factor authentication for its home video cameras, thermostats and smoke alarms. Apple's HomeKit also includes a two-factor authentication option. Although text-based two-factor authentication is not failsafe, it certainly adds an extra layer of protection to account security.

Privacy Perils imageCheck out our series, Privacy Perils, to learn what steps you can take to guard your personal and company data. For more information about this topic and other cyber security concerns, please contact Bob Brewer, Tony McFarland, Elizabeth Warren or a member of our Privacy & Data Security team.

Related Services


Visiting, or interacting with, this website does not constitute an attorney-client relationship. Although we are always interested in hearing from visitors to our website, we cannot accept representation on a new matter from either existing clients or new clients until we know that we do not have a conflict of interest that would prevent us from doing so. Therefore, please do not send us any information about any new matter that may involve a potential legal representation until we have confirmed that a conflict of interest does not exist and we have expressly agreed in writing to the representation. Until there is such an agreement, we will not be deemed to have given you any advice, any information you send may not be deemed privileged and confidential, and we may be able to represent adverse parties.