Ted Claypoole leads Womble Bond Dickinson (US) LLP’s IP Transactions and FinTech Teams. Clients call on Ted to help manage, protect and profit from information, and his practice spans all sectors of the information economy. He helps companies design data analytics strategies and comply with relevant laws and contracts. Privacy and cybersecurity are the starting points for client advice on data collected through transactions, online interactions and the Internet of Things, with an emphasis on payments and financial activity.
A former in-house data and technology counsel for Bank of America and for CompuServe, Ted brings deep and practical experience in business and risk management to his work with clients. From global outsourcing agreements to sophisticated technology provided as a service, Ted meets client goals by developing and implementing IP protective contracts. He drafts and negotiates agreements involving software, the internet, data, mobile/remote access, and services. Ted advises both FinTech start-ups and large financial services companies in payment processing, data security, insurance and other matters.
A regular speaker and writer on privacy and security issues, Ted has been selected six times as a presenter for the RSA Data Security Conference in San Francisco. Ted is also the editor of Womble Bond Dickinson’s Heydatadata Blog which covers topics related to data and digital business/law. In addition, he recently authored The Law of Artificial Intelligence and Smart Machines which was published by the Business Law Section of the American Bar Association. Prior to that, he co-authored two books from Rowman & Littlefield Publishers titled Privacy in the Age of Big Data and Protecting Your Internet Identity: Are You Naked Online? alongside Theresa Payton.
Presentations and Publications
- The Law of Artificial Intelligence and Smart Machines. Editor and Co-author. Published by the Business Law Section of the American Bar Association.
- Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family. Co-author with Theresa Payton. Published by Rowman & Littlefield.
- Protecting Your Internet Identity: Are You Naked Online? Co-author with Theresa Payton. Published by Rowman & Littlefield.
- California Screamin’ – Privacy Rollercoaster Becoming Steeper for Businesses, with Tara Cho, Nadia Aram, Taylor Ey, and Dominic Panakal
- Sin Eaters, Moles, and Eternal Damnation: Europe’s Quasi-Religious War Against U.S. Internet Companies, Business Law Today
- Tote That Search, Lift That Mail: A “Green” New Deal for Data?, Business Law Today, with Phil Gura
- Guide to Regulation of Biometric Technology for Business and Government, with Taylor Ey
- Sleep with an Eye Open: The New Age of Hotel Privacy Intrusion
- ICO Warns Prominent US Company to Change Business Model: Paid Subscription Versus FREE with Ads, with Nadia Aram
- FTC Action Against IoT provider D-Link: An Administrative Overreach? Cecile Park Media
- Developing Laws Address Flourishing Commercial Use of Biometric Information, with Cameron Stoll, ABA Business Law Today
- Our Mini-Theme: Watches and Wallets, Compliance and Rebellion: The State of Cyberspace Law, Business Law Today
- Trinket, Trailer, Sweater, Spy: Your Possessions Are Watching You, Master’s in Data Science
- Privacy and Social Media, Business Law Today
- Regulating the Brainspray Revolution, Business Law Today
- Location Tracking and U.S. Law: How Technology Alters Expectations, Journal of Internet Law, Volume 16, Number 5, with Richard Balough
- Developments in the Law Concerning Geolocational Privacy, Theodore F. Claypoole and Richard C. Balough, The Business Lawyer, Volume 68, Issue 1, Pages 197 – 204
- Privacy Considerations Limit Geolocation Technologies, Co-authored with Richard Balough, Business Law Today
- No Place to Hide: First Amendment Protection for Location Privacy, BNA Electronic Commerce Law Reporter (16 ECLR 869)
- U.S. Privacy Laws: New Obligations for Associations, Association Law & Policy
- Protecting Data in a Business Failure, ACC Docket, co-authored with Danielle M. Benoit
- How a License Becomes a Sale: Software Applications of the First Sale Doctrine published by Matthew Bender as Expert Commentary in LEXIS research service
- The High Cost of Failing to Leash an Internet Store with Personal Jurisdiction, HighMaintenanceBitch, LLC v. Uptown Dog Club, Inc., Slip OP., U.S. Dist. LEXIS 82456 (W. Dist. Washington 2007) published by Matthew Bender as Expert Commentary in LEXIS research service
- Awarding Punitive Damages for an Inadvertent Privacy Breach: Randi A.J. v. Long Island Surgi-Center, 2007 NY Slip OP 6953; 46 A.D. 3d 74; 842 N.Y.S. 2d 558 (NY App. Div., Second Department, Sept. 25, 2007) published by Matthew Bender as Expert Commentary in LEXIS research service
- Biometric Authentication for SCADA Security, Chapter 3 in Techno Security’s Guide to Securing SCADA: A Comprehensive Handbook on Protecting the Critical Infrastructure, Syngress Publishing, Inc.
- Growth in Security Standards Create Expensive Obligations for Business, The Charlotte Business Journal.
- Payment Card Industry Data Security Standards: What Merchants Need to Know, WCSR Client Alert
- Unintended Consequences of Biometrics, Chapter 11 of American Bar Association Book The Practitioners Guide to Biometrics, with Todd Inskeep
- Data Security Requirements Clearer for Business, Charlotte Business Journal
- Battle Over Statistics Could Have Wide Implications, Southeast Tech Wire
- Business Names and Trademarks in Cyberspace, Charlotte Business Journal
- Copyrighting Video Golf: What Can You Protect?, Southeast Tech Wire
- Search Engines Have Legal Right To Copy Web Pages, Southeast Tech Wire
- Internet Doctor Disciplined, Southeast Tech Wire
- Adware Battle Heats up in Alaska, Southeast Tech Wire
- Federal Law Holds Hope of Curbing Spam, Charlotte Business Journal
- Willie Sutton is on the Internet: Bank Security in a Shared-Risk Infrastructure, University of North Carolina Law School Banking Institute, with Eugene M. Katz
- Letting the Hackers in May Make Your Company Liable, The Business Journal of Charlotte
- Protect Intellectual Assets from Theft by Employees, The Charlotte Business Journal
- E-Commerce Contracts for Corporate Counsel, North Carolina Business Lawyer
- Taking Care of (Outsourced) Business, America’s Community Bankers, with Eugene M. Katz
- How Cybersecurity Fits into Your Compliance and Ethics Program, Association of Corporate Counsel (Atlanta, GA), January 2021
- The Ethical Requirement for Technical Competence Among Attorneys, Association of Corporate Counsel (Atlanta, GA), March 2020
- AI and the Financial Industry, Artificial Intelligence and Robotics National Institute, January 2020
- Protecting Healthcare Data, SC Medical Association Conference, February 2014
- Data Obligations for Accounting Clients, NCACPA Cybersecurity Conference, December 2013
- Law Enforcement and Your Data, Privacy in Practice Webinar, November 2013
- Cash in the Air: Protecting Electronic Money and Mobile Payments, Privacy in Practice Webinar, October 2013
- Mobile Privacy and Security: Solutions for Consumer Facing Apps and the Back Office, Privacy in Practice Webinar, August 2013
- Insuring Data Risks: Preparing Ahead of Time for Data Incidents and Obligations, Privacy in Practice Webinar, June 2013
- The Myth of ‘Best Practices’: Meaningfully Limiting Privacy Exposures, Customized For Your Company, Privacy in Practice Webinar, May 2013
- The Sky is Not Falling! Personal Data as an Asset, Not a Liability, Privacy in Practice Webinar, April 2013
- Licensing Mobile Apps (Toronto, ON; Charlotte, NC; Washington, DC)
- Geolocation Privacy (San Francisco, CA; Denver, CO; Charlotte, NC; Chicago, IL)
- Drafting Bring-Your-Own-Device-To-Work Policies (Los Angeles, CA; Washington, DC)
- Genetic Privacy: Research vs. Law Enforcement (Austin, TX)
- Social Media Ethics for Lawyers (Charlotte, NC; Boston, MA; Raleigh, NC)
- Protecting Your Internet Identity (Chicago, IL; Pinehurst, NC: Charlotte, NC)
- Corporate Technology Risk management (RSA Conference San Francisco, CA)
- Mitigating Risks of Cloud Computing (Charlotte, NC; Chicago, IL; Raleigh, NC; Boston, MA; Toronto, ON)
- Business Marketing through Online Social Networks (Charlotte, NC; Boston, MA; Vancouver)
- Your Company’s Data Obligations: Privacy and Beyond (Columbia, SC; Greensboro, NC; Nashville, TN)
- International Privacy Regulation (Toronto, ON)
- Trade Secrets in the Cloud (Boston, MA; Charlotte, NC)
- Liaison between the ABA Business Law Section and the ABA Standing Committee on Law and National Security.
- Member, Leadership Council of the ABA Business Law Section
- Immediate Past-Chair, Cyberspace Committee, Business Law Section of the American Bar Association.
- Member of Advisory Committee for the University of North Carolina Charlotte, College of Computing and Informatics, Chair of Faculty Support Committee 2010-2015.
- Member of Board of Directors, North Carolina Technology Association 2012-2014.
- Co-Chair of local KnowledgeNet Chapter, International Association of Privacy Professionals 2012-2014.
- Founder and Host of the WombleTech Lunch & Learn series in Charlotte.
- Board Member and Chair for Certification Committee, Carolinas Minority Supplier Development Council. 2008 -2012.
- Fellow of the American Bar Association.
- Co-Chair, Mobile Commerce Subcommittee, Cyberspace Committee, Business Law Section of the American Bar Association 2011-2014.
- Co-Chair, Privacy and Data Security Subcommittee, Cyberspace Committee, Business Law Section of the American Bar Association, 2009 - 2011.
- Contingency Planning Association of the Carolinas.
- Regular Ethics Speaker for newly admitted attorneys for Mecklenburg County Bar Association.
- North Carolina Super Lawyers.
- Best Lawyers in America, Technology Law.
Honors and Awards
Recognized in The Best Lawyers in America (BL Rankings), Technology Law, 2017 – Present
Any result the lawyer or law firm may have achieved on behalf of clients in other matters does not necessarily indicate similar results can be obtained for other clients.
- Negotiated mobile payment platform for international bank.
- Facilitated strategic relationship between leaders of FinTech company and a credit card company.
- Led response to data breach for payments company involving tens of millions of credit card data sets.
- Designed and implemented world-wide data management programs together with several international manufacturing companies.
- Analyzed and proposed cyber-insurance options and a risk management solution for world-wide computer manufacturer.