Print Catalog:

Programs in Technology Law



Filter by State
Filter by Category
 
 

California’s New Privacy Law and Internet of Things Cybersecurity Laws

Program Number: 2944 Presenter: Michael Bahar, Esq., Ali Jessani, Frank Nolan, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. CLICK ONLY THE ONLINE BUTTON TO ADD TO CART, IF THAT BUTTON IS NOT AVAILABLE, THE PROGRAM HAS NOT YET BEEN PRODUCED **** On the heels of the EU’s implementation of the General Data Protection Regulation (GDPR), California has passed legislation that tracks the GDPR in important ways, and signals that more states (and, possibly, the US federal government) will dramatically tighten laws governing privacy. In addition to also passed a cybersecurity law governing Internet of Things (IoT) devices, both of which are scheduled to go into effect in 2020. In this webcast, three Eversheds Sutherland attorneys will address the general trends in rules and regulations governing information security and privacy, analyze the impacts of the CCPA and IoT legislation, and offer guidance on navigating this rapidly developing

$95.00Audio CD Add to Cart

“I’m the controller!” “No, I am!”: Joint Controllers under the GDPR

Program Number: 2943 Presenter: Sean Christy, Esq., Tyler Thompson, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. CLICK ONLY THE ONLINE BUTTON TO ADD TO CART, IF THAT BUTTON IS NOT AVAILABLE, THE PROGRAM HAS NOT YET BEEN PRODUCED **** The relationship between controllers and processors under the EU’s GDPR is well understood, but what if neither party is a processor? Is the relationship a data pool, a professional engagement, or a shared marketing program or service? In these and many other scenarios it is possible that the relationship is instead that of joint controllers. This program will take an in-depth look on how to determine when a relationship is between a controller and a processor, separate controllers, or joint controllers and the ramifications of each construct. Additionally, learn how to structure a contractual relationship between joint controllers and receive template documents designed to

$95.00Audio CD Add to Cart

Ethics and Cybersecurity: A Lawyer’s Professional Obligations Under the ABA Model Rules

Program Number: 2940 Presenter: David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. CLICK ONLY THE ONLINE BUTTON TO ADD TO CART, IF THAT BUTTON IS NOT AVAILABLE, THE PROGRAM HAS NOT YET BEEN PRODUCED **** In addition to complying with data security statutes and regulations, lawyers must comply with ethical obligations under the rules of professional conduct to protect their clients’ privacy and security. In this program, David Zetoony covers the attorney’s ethical considerations including requirements under ABA Model Rule 1.1, Model Rule 1.6(c), new ABA Formal Opinion 483 on data breach notification, Formal Opinion 477R on communicating with clients through email.

$95.00Audio CD Add to Cart

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Program Number: 2937 Presenter: Brian Lapidus, Keith Wojcieszek

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. CLICK ONLY THE ONLINE BUTTON TO ADD TO CART, IF THAT BUTTON IS NOT AVAILABLE, THE PROGRAM HAS NOT YET BEEN PRODUCED **** How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don’t follow security protocols or are tricked into downloading malicious code. Led by Keith Wojcieszek, former head of the USSS Cyber Intelligence Section, Criminal Investigation Division, and Brian Lapidus, global leader of Kroll’s Identity Theft and Breach Notification practice, this session will provide an overview of the latest cyber threats, insights into risks posed by the dark web, the opportunities presented by incorporating cyber intelligence into engagements, and practical steps to minimize its risks do data security, privacy, and

$95.00Audio CD Add to Cart

Intellectual Property and Beyond: Expansion of Intellectual Property Rights in the Fashion Industry

Program Number: 2913 Presenter: Olivera Medenica, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. CLICK ONLY THE ONLINE BUTTON TO ADD TO CART, IF THAT BUTTON IS NOT AVAILABLE, THE PROGRAM HAS NOT YET BEEN PRODUCED **** This program will examine traditional intellectual property or design rights in the United States, and will examine the latest cases dealing with brand owners seeking to apply traditional IP rights to non-traditional elements of a design. The panel will examine whether recent cases indicate a willingness for courts to expand upon such rights vis-à-vis the fashion industry.

$95.00Audio CD Add to Cart

The New Normal: 8 Steps to Seeing if Your Company Defends Customer Data

Program Number: 2904 Presenter: Elizabeth G. Litten, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** According to a recent IBM survey, nearly two-thirds of consumers are more concerned about a breach of their private data than they are about going to war. Companies of all types and sizes collect and maintain customer data, and the customer assumes and expects that the company will protect their data and will not use, store, or share it in a way that puts them at risk. Today, a company should put as much effort into defending and protecting its customer data as it puts into defending and protecting its proprietary data and trade secrets, since breach, loss, or misuse will, at the very least, erode customer trust and the company’s reputation. Please join Fox Rothschild Partner and HIPAA Privacy and Security Officer Elizabeth Litten as she

$95.00Audio CD Add to Cart

How Do You Solve a Problem Like E-mail?

Program Number: 2903 Presenter: Therese Craparo, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** For years, e-mail has been both a vital communications tool and a growing liability for many organizations. While e-mail may contain critical business records and data subject to legal hold, years of lax management, exponentially increasing volumes, and changing or aging e-mail systems present significant cyber-security, data privacy, litigation and operational risks. And with the advent of technology platforms that allow for more sophisticated indexing and analysis of data, including Microsoft 365, cleaning-up historical e-mail and developing processes that leverage new technology will be transformative for e-mail risk management. This program will review strategies for managing the risks associated with e-mail, including retention, Records categorization, legal hold implementation, auto-disposal, and centralization and will review case studies on: (i) the use of record classification technology to categorize 1.5 billion e-mail messages; (

$95.00Audio CD Add to Cart

A FISA Primer- Everything You Didn’t Know, You Didn’t Know

Program Number: 2878 Presenter: George W. Croner, Esq.

Electronic surveillance represents the most important foreign intelligence collection tool available to the U.S. government. Correspondingly, the ability to surveil constitutes one of those activities most susceptible to abuse by a government against its citizens. For years, electronic surveillance for foreign intelligence purposes was considered an exclusively Executive Branch authority, and every president from Franklin Roosevelt to Richard Nixon authorized its use. When serious abuses by U.S. intelligence agencies were revealed during congressional hearings held in the aftermath of Watergate, Congress reacted by passing the Foreign Intelligence Surveillance Act which, for the first time, subjected foreign intelligence electronic surveillance conducted in the United States to a statutory regimen that included approval by a newly created Foreign Intelligence Surveillance Court. Today, there is more discussion, and controversy, about FISA than at virtually any other time in its history. This program is going to discuss the evolution of the use

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Mastering Bitcoin, Blockchain and Digital Currency Law

Program Number: 2873a Presenter: John Rafferty, Esq.

Bitcoin and other cryptocurrencies are unique from other currencies in that they exist on a continuously growing, immutable database, that when linked together, form a blockchain. Cryptocurrencies are largely decentralized and as such, are subject to competing regulations. This raises some interesting legal issues, especially with regard to the recovery of lost assets. In 2018, individuals around the world are using hundreds of different cryptocurrencies to pay for coffee, new homes and even legal services. But blockchain-use cases are not limited just to cryptocurrency. Increasingly, blockchains are being used for supply-chain management, intellectual property, fraud detection, regulatory compliance, audits, data storage and even smart-contract creation.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

The Practical Guide to the California Consumer Privacy Protection Act

Program Number: 2868 Presenter: David A. Zetoony, Esq.

The California Consumer Privacy Protection Act of 2018 (“CPPA”) is arguably the most comprehensive - and complex - data privacy regulation in the United States. The CCPA was designed to emulate the European General Data Protection Regulation (“GDPR”) in many respects. The program will address how the CCPA is like, and how it differs from, the GDPR, and practical steps that companies should take to come into compliance with the regulation. The program’s presenter, a partner at the law firm of Bryan Cave Leighton Paisner, has been ranked by Lexology as the most read author on data privacy and security in the world, and is the author of the American Bar Association’s General Data Protection Regulation: Answers to the Most Frequently Asked Questions.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories