Print Catalog:

Programs in Intellectual Property Law



Filter by State
Filter by Category
 
 

Key Legal Issues in the Internet of Things

Program Number: 2749IP Presenter: Brian A. Jones, Esq., Amol Parikh, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Internet of Things (IoT), including artificial intelligence and robotics, have now entered the mainstream social narrative. However, the proliferation of this exciting and transformative technology raises a wide range of legal issues. This presentation focuses on the key legal issues surrounding the Internet of Things, including data ownership and privacy, security, intellectual property, and product liability, as well as ethical implications of the use of such technology.

$95.00Audio CD Add to Cart

What In-House, Corporate and Securities Counsel Should Know about System and Organization Controls (SOC) Reports and their Applicability to Reporting on Internal Controls

Program Number: 2743 Presenter: Michael Pinna, CPA

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** In today’s world, almost every type of public or private company needs to assess its internal control environment. This is especially true of public and SEC registered companies which are required to report on their internal control environments in their annual reports and filings. With technological, cybersecurity and other issues that have arisen, System and Organization Controls (SOC) Reports necessarily have become the standard for assessing internal controls as the reporting has become more complex. This program provides a brief history of the SOC reporting landscape; an understanding of the types of SOC reporting (i.e., SOC 1, SOC 2, SOC 3, and the new SOC for Cybersecurity) and their reporting structures and coverages; and an overview of recent changes to the SOC standards.

$95.00Audio CD Add to Cart

What Attorneys Should Know about Advising Boards and Management on How to Avoid Struggles When it Comes to Data Breaches

Program Number: 2742 Presenter: David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Boards and senior management often look to attorneys to advise them when a data breach arises. Providing sound and practical legal advice can be complicated if management has not gone through a data breach before, and does not understand the legal implications of the choices that they may make. This program focuses on how attorneys can explain the legal implications of a data breach in order to help management make decisions, either before or after a breach occurs, concerning how the company can position itself.

$95.00Audio CD Add to Cart

Remedies in Trademark Infringement Litigation

Program Number: 2741IP Presenter: Anthony F. Lo Cicero, Esq.

When planning litigation for trademark infringement, attorneys should consider the nature of the remedies available, legal and equitable. These remedies, if obtained, will often determine success or failure in the eyes of the client. Anthony Lo Cicero of Amster, Rothstein & Ebenstein LLP explains the ways to obtain available remedies, preliminary and permanent injunctive relief, destruction of merchandise, awards of actual and statutory damages, disgorgement of profits and more.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Ethics and Cybersecurity: A Lawyer’s Professional Obligations under New ABA Formal Opinion 477R, Opinion 99-413, and the ABA Model Rules

Program Number: 2739 Presenter: David A. Zetoony, Esq.

In addition to complying with data security statutes and regulations, lawyers must comply with ethical obligations under the rules of professional conduct to protect their clients’ privacy and security. In this program, David Zetoony covers the attorney’s ethical considerations including requirements under ABA Model Rule 1.1, Model Rule 1.6(c), new ABA Formal Opinion 477R, Securing Communication of Protected Client Information, and its previous ABA Formal Opinion 99-413, Protecting the Confidentiality of Unencrypted E-Mail (1999).

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What In-House Counsel Should Know about the NIST and AICPA Frameworks and other Steps to Mitigate or Avoid Cybersecurity Risks and Threats

Program Number: 2733 Presenter: Michael Pinna, CPA

This program describes the problem of cybersecurity, including common vulnerabilities that can be exploited in order to gain unauthorized access to systems and data, and discusses some common frameworks, such as the National Institute of Standards and Technology ("NIST") Cybersecurity Framework and the new American Institute of Certified Public Accountants (“AICPA") Cybersecurity Risk Management Framework that can be used to understand and address the cybersecurity risks and threats in any type of organization. Also covered are cyber liability insurance which is becoming more prevalent in today’s marketplace, and key steps that organizations should consider implementing to make an immediate impact in their cybersecurity risk profile.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Long Live Open Source! Current Developments for IP, Technology, Corporate, and Compliance Attorneys

Program Number: 2728 Presenter: Jason D. Haislmaier, Esq., Matthew Jacobs, Esq.

Open source software burst onto the scene over a dozen years ago, and since then, the pervasiveness and importance of open source has only continued to grow. Today, the growth of open source is driving an expanded range of legal and regulatory issues, including: • Addressing open source compliance in cloud and hosted environments • Understanding new open source license enforcement efforts • Vetting open source for IT security concerns • Dealing with open source risk in corporate transactions Keeping pace with these issues poses new challenges, both for companies with established compliance programs and those still relatively new to open source. Join our presenters for a discussion of these issues and solutions to help address them.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Ethics Developments in IP Practice-2017

Program Number: 2727IP Presenter: Anthony F. Lo Cicero, Esq.

Anthony Lo Cicero of Amster, Rothstein & Ebenstein, LLP, discusses recent developments in the law of ethics as it applies to intellectual property, including such subjects as formation and termination of the client relationship, under, e.g. ABA Rules 1.16, 1.18; duties owed to current and former clients under Rules 1.7-1.9; the bases for disqualification and the ever-challenging issue of subject matter conflicts, including developments after the decision in Maling v. Finnegan Henderson, 473 Mass. 336 (2015).

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Dealing with Data Privacy and Data Security in Cloud and IT Vendor Agreements: A Guide for In-House Counsel

Program Number: 2725 Presenter: Jason D. Haislmaier, Esq.

While cloud computing and other hosted and online services have become fundamental resources for many companies, using them can also lead to significant legal concerns over data privacy and security. As a result, the provisions involving these issues in such service agreements have become hotly contested. Join Jason Haislmaier of Bryan Cave LLP as he discusses significant data privacy and security concerns that can arise in cloud and other hosted and online services agreements and provides tools for addressing these issues and mitigating the risks that come with them.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Restraining Former Employees from Improper Use of Confidential Information and Enforcing Non-Competition Provisions

Program Number: 2722 Presenter: Megan Lopp Mathias, Esq.

This program, for employment and corporate counsel and litigators, addresses the legal challenges in enforcing confidentiality provisions and non-competition provisions against former employees. Topics include: an explanation of the line between not interfering with the employee's ability to work and protecting the disclosure of the former employer's information; and information on how to obtain a temporary restraining order (TRO).

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories