Day Pitney remains committed to providing quality legal counsel, while protecting our clients and employees, and transforming our communities into more just, equal and equitable spaces. For more information, please visit our COVID-19 Resource Center | Racial Justice and Equity Task Force.
Jonathan "Jed" Davis, a seasoned former career prosecutor, advises and represents companies and individuals in internal inquiries, government investigations and prosecutions, and in civil litigation. For the last ten years, he has helped clients navigate cutting-edge issues of cyber-driven risk, including computer intrusions, data breach response, misappropriation of intellectual property, online harassment, and electronic search and seizure by law enforcement.
Jed served for nine years as an Assistant United States Attorney in the Eastern District of New York, developing and trying a wide spectrum of fraud, money-laundering and organized crime cases before turning to the challenge of cybercrime as that District’s Computer Hacking and Intellectual Property Coordinator. He began his government career in the Manhattan District Attorney’s Office, serving for three years as an Assistant District Attorney in the Rackets Bureau.
After returning to the private sector in 2008, Jed was a Managing Director at Kroll Associates. During his four years there, he managed sensitive inquiries for institutions responding to hacking attacks and other cyber incidents, internal misconduct and mistake, external frauds, and corruption in the U.S. and abroad. From 2012 until his recent move to Day Pitney, Jed was the principal of his own law firm focusing on cybersecurity matters. His work at that firm ranged from investigation and litigation of breaches of standardized exam security, to assisting in the defense of computer programmers formerly employed by Bernard L. Madoff, to advising a state attorney general investigating hacks of retail chains, to representing companies and individuals in government investigations of cybercrime and official corruption.
Jed’s unique combination of experience and skills enables him to deliver what clients in the Information Age need: the capabilities with which to contain fallout from cyber-risks astutely, under strong privilege, and cost-effectively. The services that he provides include:
Represented standardized testing organization, unmasking and successfully suing the operator of an anonymized website for sales of content copied from a healthcare provider licensing exam
Advised state attorney general in its investigations of the mass thefts of credit cards hacked from chain store POS terminals
Led internal investigation of hacking attack that shut down multinational client’s U.S operations, developed evidence against ex-employee, and persuaded federal authorities to prosecute, resulting in his conviction
Led the team that re-secured the systems of a presidential campaign after intrusion by a foreign intelligence agency
Assisted hospitals and healthcare systems to investigate and remediate theft, loss, and errant emailing of sensitive datasets
Supervised investigations on behalf of global clients to trace online defamation and harassment to their origins and convince perpetrators to cease and desist
Represented individual under criminal investigation for alleged computer intrusion and theft of intellectual property, persuading prosecutors to bring no charges
Served as expert consultant to defense counsel in the criminal trial of computer programmers formerly employed by Bernard L. Madoff
Represented disaster recovery contractor in connection with state criminal investigation into local government’s contract awards decisions
Conducted investigation in Europe and Gulf States for corporation that demonstrated hidden side deals with governments and state enterprises
As an Assistant U.S. Attorney in the Eastern District of New York:This website may use cookies, pixel tags and other passive tracking technologies, including Google Analytics, to improve functionality and performance. For more information, see our Privacy Policy. By using our website, you are consenting to our use of these tracking technologies. You can alter the configuration of your browser to refuse to accept cookies, but if you do so, it is possible that some areas of web sites that use cookies will not function properly when you view them. To learn more about how to delete and manage cookies, refer to the support instructions for each browser (e.g., see AllAboutCookies.org). You may locate Google Analytics' currently available opt-outs for the web here.
This website may use cookies, pixel tags and other passive tracking technologies, including Google Analytics, to improve functionality and performance. For more information, see our Privacy Policy. By using our website, you are consenting to our use of these tracking technologies. You can alter the configuration of your browser to refuse to accept cookies, but if you do so, it is possible that some areas of web sites that use cookies will not function properly when you view them. To learn more about how to delete and manage cookies, refer to the support instructions for each browser (e.g., see AllAboutCookies.org). You may locate Google Analytics' currently available opt-outs for the web here.