{"id":1102,"date":"2023-03-29T14:13:16","date_gmt":"2023-03-29T14:13:16","guid":{"rendered":"https:\/\/cybersecurity.csulaw.org\/conference\/?page_id=1102"},"modified":"2026-02-24T02:32:16","modified_gmt":"2026-02-24T07:32:16","slug":"douglas-h-meal","status":"publish","type":"speakers","link":"https:\/\/cybersecurity.csulaw.org\/conference\/speakers\/douglas-h-meal\/","title":{"rendered":"Douglas H. Meal"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-a5331a9e wp-block-columns-is-layout-flex\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"><figure style=\"aspect-ratio:1;\" class=\"wp-block-post-featured-image\"><img loading=\"lazy\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" style=\"width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png 400w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal-300x300.png 300w, https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal-150x150.png 150w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:0;padding-right:0;padding-bottom:0;padding-left:0;flex-basis:66.66%\">\n<h6 class=\"wp-block-heading\">Adjunct Professor, CSU College of Law<\/h6>\n\n\n\n<p>Doug Meal teaches \u201cCybersecurity Litigation\u201d at Cleveland State University College of Law and Boston College Law School. Previously, Doug spent over 40 years in private practice, during which time he developed a specialty in defending clients targeted by litigation and government investigations stemming from major privacy and cybersecurity incidents. According to Chambers USA, clients selected Doug because \u201c[h]e is the premier expert in this field and knows how to run a breach response process from A to Z\u201d; is \u201cextremely experienced [and] can give immediate advice off the top of his head\u201d; \u201chas been in court through trials and negotiations, all aspects of the litigation, and is highly effective in all of them\u201d; and \u201cis good to work with, personable and very authoritative.\u201d Most recently, clients said, \u201cI would trust him with my life if I ran into a litigation\u201d; \u201cDoug is extremely calm and has a way of presenting and explaining problems which makes you feel empowered to do your job\u201d; and \u201cHe has great experience in this field and is a solid rock in litigation.\u201d Based on client assessments like these, Chambers USA named Doug as the first \u201cBand 1\u201d litigator in the Privacy and Data Security category, describing him as the \u201cmarket leader,\u201d being \u201cregarded by market sources as the leading privacy litigator in the USA\u201d and \u201cthe dean of the data breach litigation Bar.\u201c<\/p>\n\n\n\n<p>As the lead outside lawyer handling claims and\/or regulatory investigations stemming from the data security breaches suffered by Target, Neiman Marcus, The Home Depot, Hilton Worldwide, Landry\u2019s, Arby\u2019s, Shopify, Chegg, Supervalu, Sally Beauty, Sony, Heartland Payment Systems, TJ Maxx, Hannaford Brothers, Aldo, Genesco, and Wyndham Hotels\u2014some of the most highly publicized breaches in the 21st century\u2014Doug became the national leader in defending companies that suffer breaches involving consumer information against the ensuing claims and regulatory investigations. Doug\u2019s successes included leading the team that prevailed in the closely watched LabMD v. FTC litigation, convincing the U.S. Court of Appeals for the Eleventh Circuit to become the first court ever to overturn a cybersecurity enforcement action by the FTC.<\/p>\n\n\n\n<p>Doug was recognized four times as one of The Cybersecurity Docket\u2019s Incident Response 40\u2014a list of the top 40 incident response lawyers in the United States. He is also a five-time Law360 Privacy MVP.<\/p>\n<\/div>\n<\/div>\n","protected":false},"featured_media":1427,"template":"","meta":{"_acf_changed":true,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"categories":[],"tags":[],"class_list":["post-1102","speakers","type-speakers","status-publish","has-post-thumbnail","hentry"],"acf":{"first_name":"Douglas","last_name":"Meal","job_title":"Adjunct Professor, CSU College of Law"},"uagb_featured_image_src":{"full":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png",400,400,false],"thumbnail":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal-150x150.png",150,150,true],"medium":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal-300x300.png",300,300,true],"medium_large":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png",400,400,false],"large":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png",400,400,false],"1536x1536":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png",400,400,false],"2048x2048":["https:\/\/cybersecurity.csulaw.org\/conference\/wp-content\/uploads\/2023\/03\/Dopuglas-Meal.png",400,400,false]},"uagb_author_info":{"display_name":"admin","author_link":"https:\/\/cybersecurity.csulaw.org\/conference\/author\/"},"uagb_comment_info":0,"uagb_excerpt":"Doug Meal teaches \u201cCybersecurity Litigation\u201d at Cleveland State University College of Law and Boston College Law School. Previously, Doug spent over 40 years in private practice, during which time he developed a specialty in defending clients targeted by litigation and government investigations stemming from major privacy and cybersecurity incidents. According to Chambers USA, clients selected&hellip;","_links":{"self":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/speakers\/1102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/speakers"}],"about":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/types\/speakers"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media\/1427"}],"wp:attachment":[{"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/media?parent=1102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/categories?post=1102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurity.csulaw.org\/conference\/wp-json\/wp\/v2\/tags?post=1102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}