Ted Claypoole leads Womble Bond Dickinson (US) LLP’s IP Transactions and FinTech Teams and co-chairs the firm’s Privacy and Cybersecurity Team. Clients call on Ted to help manage, protect and profit from information, and his practice spans all sectors of the information economy. He helps companies design data analytics strategies and comply with relevant laws and contracts. Privacy and cybersecurity are the starting points for client advice on data collected through transactions, online interactions and the Internet of Things, with an emphasis on payments and financial activity.

A former in-house data and technology counsel for Bank of America and for CompuServe, Ted brings deep and practical experience in business and risk management to his work with clients. From global outsourcing agreements to sophisticated technology provided as a service, Ted meets client goals by developing and implementing IP protective contracts. He drafts and negotiates agreements involving software, the internet, data, mobile/remote access, and services.  Ted advises both FinTech start-ups and large financial services companies in payment processing, data security, insurance and other matters.

A regular speaker on privacy and security issues, Ted has been selected five times as a presenter for the RSA Data Security Conference in San Francisco, where he recently led a panel on AI’s effect on Information Security.  He is co-author with Theresa Payton of two books from Rowman & Littlefield Publishers titled Privacy in the Age of Big Data and Protecting Your Internet Identity: Are You Naked Online?

Presentations and Publications


  • Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family. Co-author with Theresa Payton. Published by Rowman & Littlefield.
  • Protecting Your Internet Identity: Are You Naked Online? Co-author with Theresa Payton. Published by Rowman & Littlefield.


  • FTC Action Against IoT provider D-Link: An Administrative Overreach? Cecile Park Media, February 2017
  • Developing Laws Address Flourishing Commercial Use of Biometric Information, with Cameron Stoll. ABA Business Law Today, May 2016.
  • Our Mini-Theme: Watches and Wallets, Compliance and Rebellion: The State of Cyberspace Law, Business Law Today, November 2014
  • Trinket, Trailer, Sweater, Spy: Your Possessions Are Watching You, Master’s in Data Science, March 31, 2013
  • Privacy and Social Media, Business Law Today, January 2014
  • Regulating the Brainspray Revolution, Business Law Today, November 2013
  • Location Tracking and U.S. Law:  How Technology Alters Expectations, Journal of Internet Law, November 2012 (Volume 16, Number 5), with Richard Balough
  • Developments in the Law Concerning Geolocational Privacy, Theodore F. Claypoole and Richard C. Balough, The Business Lawyer, Volume 68, Issue 1, Pages 197 – 204 (November 2012)
  • Privacy Considerations Limit Geolocation Technologies, Co-authored with Richard Balough, Business Law Today
  • No Place to Hide: First Amendment Protection for Location Privacy, BNA Electronic Commerce Law Reporter (16 ECLR 869), June 2011
  • U.S. Privacy Laws: New Obligations for Associations, Association Law & Policy, April 2011
  • Protecting Data in a Business Failure, ACC Docket, September 2009, co-authored with Danielle M. Benoit
  • How a License Becomes a Sale: Software Applications of the First Sale Doctrine published by Matthew Bender as Expert Commentary in LEXIS research service, 2008
  • The High Cost of Failing to Leash an Internet Store with Personal Jurisdiction, HighMaintenanceBitch, LLC v. Uptown Dog Club, Inc., Slip OP., U.S. Dist. LEXIS 82456 (W. Dist. Washington 2007) published by Matthew Bender as Expert Commentary in LEXIS research service, 2008
  • Awarding Punitive Damages for an Inadvertent Privacy Breach: Randi A.J. v. Long Island Surgi-Center, 2007 NY Slip OP 6953; 46 A.D. 3d 74; 842 N.Y.S. 2d 558 (NY App. Div., Second Department, Sept. 25, 2007) published by Matthew Bender as Expert Commentary in LEXIS research service, 2008
  • Biometric Authentication for SCADA Security, Chapter 3 in Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook on Protecting the Critical Infrastructure, Syngress Publishing, Inc., 2008
  • Growth in Security Standards Create Expensive Obligations for Business, The Charlotte Business Journal. May, 2007
  • Payment Card Industry Data Security Standards: What Merchants Need to Know, WCSR Client Alert, 2007
  • Unintended Consequences of Biometrics, Chapter 11 of American Bar Association Book The Practitioners Guide to Biometrics to be published September, 2006, with Todd Inskeep
  • Data Security Requirements Clearer for Business, Charlotte Business Journal, May 26, 2006
  • Battle Over Statistics Could Have Wide Implications, Southeast Tech Wire, May 16, 2006
  • Business Names and Trademarks in Cyberspace, Charlotte Business Journal, May 13, 2005
  • Copyrighting Video Golf: What Can You Protect?, Southeast Tech Wire, May 3, 2005
  • Search Engines Have Legal Right To Copy Web Pages, Southeast Tech Wire, March 15, 2005
  • Internet Doctor Disciplined, Southeast Tech Wire, February 16, 2005
  • Adware Battle Heats up in Alaska, Southeast Tech Wire, October 26, 2005
  • Federal Law Holds Hope of Curbing Spam, Charlotte Business Journal, May 12, 2004
  • Willie Sutton is on the Internet: Bank Security in a Shared-Risk Infrastructure, University of North Carolina Law School Banking Institute, April 2001, with Eugene M. Katz
  • Letting the Hackers in May Make Your Company Liable, The Business Journal of Charlotte, March 30, 2001
  • Protect Intellectual Assets from Theft by Employees, The Charlotte Business Journal, February 23, 2001
  • E-Commerce Contracts for Corporate Counsel, North Carolina Business Lawyer, Fall 2000
  • Taking Care of (Outsourced) Business, America’s Community Bankers, with Eugene M. Katz


  • Protecting Healthcare Data, SC Medical Association Conference, February 2014
  • Data Obligations for Accounting Clients, NCACPA Cybersecurity Conference, December 2013
  • Law Enforcement and Your Data, Privacy in Practice Webinar, November 2013
  • Cash in the Air: Protecting Electronic Money and Mobile Payments, Privacy in Practice Webinar, October 2013
  • Mobile Privacy and Security: Solutions for Consumer Facing Apps and the Back Office, Privacy in Practice Webinar, August 2013
  • Insuring Data Risks: Preparing Ahead of Time for Data Incidents and Obligations, Privacy in Practice Webinar, June 2013
  • The Myth of ‘Best Practices’: Meaningfully Limiting Privacy Exposures, Customized For Your Company, Privacy in Practice Webinar, May 2013
  • The Sky is Not Falling! Personal Data as an Asset, Not a Liability, Privacy in Practice Webinar, April 2013
  • Licensing Mobile Apps (Toronto, ON; Charlotte, NC; Washington, DC)
  • Geolocation Privacy (San Francisco, CA; Denver, CO; Charlotte, NC; Chicago, IL)
  • Drafting Bring-Your-Own-Device-To-Work Policies (Los Angeles, CA; Washington, DC)
  • Genetic Privacy: Research vs. Law Enforcement (Austin, TX)
  • Social Media Ethics for Lawyers (Charlotte, NC; Boston, MA; Raleigh, NC)
  • Protecting Your Internet Identity (Chicago, IL; Pinehurst, NC: Charlotte, NC)
  • Corporate Technology Risk management (RSA Conference San Francisco, CA)
  • Mitigating Risks of Cloud Computing (Charlotte, NC; Chicago, IL; Raleigh, NC; Boston, MA; Toronto, ON)
  • Business Marketing through Online Social Networks (Charlotte, NC; Boston, MA; Vancouver)
  • Your Company’s Data Obligations: Privacy and Beyond (Columbia, SC; Greensboro, NC; Nashville, TN)
  • International Privacy Regulation (Toronto, ON)
  • Trade Secrets in the Cloud (Boston, MA; Charlotte, NC)

Professional Activities

  • Liaison between the ABA Business Law Section and the ABA Standing Committee on Law and National Security.
  • Member, Leadership Council of the ABA Business Law Section 
  • Immediate Past-Chair, Cyberspace Committee, Business Law Section of the American Bar Association.
  • Member of Advisory Committee for the University of North Carolina Charlotte, College of Computing and Informatics, Chair of Faculty Support Committee 2010-2015.
  • Member of Board of Directors, North Carolina Technology Association 2012-2014.
  • Co-Chair of local KnowledgeNet Chapter, International Association of Privacy Professionals 2012-2014.
  • Founder and Host of the WombleTech Lunch & Learn series in Charlotte.
  • Board Member and Chair for Certification Committee, Carolinas Minority Supplier Development Council. 2008 -2012.
  • Fellow of the American Bar Association.
  • Co-Chair, Mobile Commerce Subcommittee, Cyberspace Committee, Business Law Section of the American Bar Association 2011-2014.
  • Co-Chair, Privacy and Data Security Subcommittee, Cyberspace Committee, Business Law Section of the American Bar Association, 2009 - 2011.
  • Contingency Planning Association of the Carolinas.
  • Regular Ethics Speaker for newly admitted attorneys for Mecklenburg County Bar Association.
  • North Carolina Super Lawyers.
  • Best Lawyers in America, Technology Law.

Honors and Awards

Recognized in The Best Lawyers in America© in the fields of Technology Law, 2017 – Present


Any result the lawyer or law firm may have achieved on behalf of clients in other matters does not necessarily indicate similar results can be obtained for other clients.

  • Negotiated mobile payment platform for international bank.
  • Facilitated strategic relationship between leaders of FinTech company and a credit card company.
  • Led response to data breach for payments company involving tens of millions of credit card data sets.
  • Designed and implemented world-wide data management programs together with several international manufacturing companies.
  • Analyzed and proposed cyber-insurance options and a risk management solution for world-wide computer manufacturer.

Bar admissions

2018, Georgia

2000, North Carolina

1988, Ohio


  • J.D., 1988, Ohio State University College of Law
  • B.A., 1985, Duke University: Public Policy