Print Catalog:

Programs in Technology Law



Filter by State
Filter by Category
 
 

The New Normal: 8 Steps to Seeing if Your Company Defends Customer Data

Program Number: 2904 Presenter: Elizabeth G. Litten, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** According to a recent IBM survey, nearly two-thirds of consumers are more concerned about a breach of their private data than they are about going to war. Companies of all types and sizes collect and maintain customer data, and the customer assumes and expects that the company will protect their data and will not use, store, or share it in a way that puts them at risk. Today, a company should put as much effort into defending and protecting its customer data as it puts into defending and protecting its proprietary data and trade secrets, since breach, loss, or misuse will, at the very least, erode customer trust and the company’s reputation. Please join Fox Rothschild Partner and HIPAA Privacy and Security Officer Elizabeth Litten as she

$95.00Audio CD Add to Cart

How Do You Solve a Problem Like E-mail?

Program Number: 2903 Presenter: Therese Craparo, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** For years, e-mail has been both a vital communications tool and a growing liability for many organizations. While e-mail may contain critical business records and data subject to legal hold, years of lax management, exponentially increasing volumes, and changing or aging e-mail systems present significant cyber-security, data privacy, litigation and operational risks. And with the advent of technology platforms that allow for more sophisticated indexing and analysis of data, including Microsoft 365, cleaning-up historical e-mail and developing processes that leverage new technology will be transformative for e-mail risk management. This program will review strategies for managing the risks associated with e-mail, including retention, Records categorization, legal hold implementation, auto-disposal, and centralization and will review case studies on: (i) the use of record classification technology to categorize 1.5 billion e-mail messages; (

$95.00Audio CD Add to Cart

A FISA Primer- Everything You Didn’t Know, You Didn’t Know

Program Number: 2878 Presenter: George W. Croner, Esq.

Electronic surveillance represents the most important foreign intelligence collection tool available to the U.S. government. Correspondingly, the ability to surveil constitutes one of those activities most susceptible to abuse by a government against its citizens. For years, electronic surveillance for foreign intelligence purposes was considered an exclusively Executive Branch authority, and every president from Franklin Roosevelt to Richard Nixon authorized its use. When serious abuses by U.S. intelligence agencies were revealed during congressional hearings held in the aftermath of Watergate, Congress reacted by passing the Foreign Intelligence Surveillance Act which, for the first time, subjected foreign intelligence electronic surveillance conducted in the United States to a statutory regimen that included approval by a newly created Foreign Intelligence Surveillance Court. Today, there is more discussion, and controversy, about FISA than at virtually any other time in its history. This program is going to discuss the evolution of the use

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Mastering Bitcoin, Blockchain and Digital Currency Law

Program Number: 2873 Presenter: John Rafferty, Esq.

Bitcoin and other cryptocurrencies are unique from other currencies in that they exist on a continuously growing, immutable database, that when linked together, form a blockchain. Cryptocurrencies are largely decentralized and as such, are subject to competing regulations. This raises some interesting legal issues, especially with regard to the recovery of lost assets. In 2018, individuals around the world are using hundreds of different cryptocurrencies to pay for coffee, new homes and even legal services. But blockchain-use cases are not limited just to cryptocurrency. Increasingly, blockchains are being used for supply-chain management, intellectual property, fraud detection, regulatory compliance, audits, data storage and even smart-contract creation.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

The Practical Guide to the California Consumer Privacy Protection Act

Program Number: 2868 Presenter: David A. Zetoony, Esq.

The California Consumer Privacy Protection Act of 2018 (“CPPA”) is arguably the most comprehensive - and complex - data privacy regulation in the United States. The CCPA was designed to emulate the European General Data Protection Regulation (“GDPR”) in many respects. The program will address how the CCPA is like, and how it differs from, the GDPR, and practical steps that companies should take to come into compliance with the regulation. The program’s presenter, a partner at the law firm of Bryan Cave Leighton Paisner, has been ranked by Lexology as the most read author on data privacy and security in the world, and is the author of the American Bar Association’s General Data Protection Regulation: Answers to the Most Frequently Asked Questions.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Answers to the GDPR’s Most Frequently Asked Questions

Program Number: 2862 Presenter: David A. Zetoony, Esq.

The European General Data Protection Regulations (“GDPR”) is a complex, comprehensive, regulatory framework that purports to apply to companies in Europe and the United States. While the GDPR is many things – intuitive, it is not. The presenter collected over 150 of the most common (and perplexing) questions concerning the GDPR from companies across the United States. This program will focus on the most popular of those questions and explore the answers under the European regulation.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Remediating Old Documents & Data to Reduce Business Risks and Costs

Program Number: 2856 Presenter: Anthony J. Diana, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** With the rising risks associated with retaining large volumes of data, such as the regulatory focus on cyber-security and data privacy, organizations (with the urging of board members and investors) have made a priority of disposing of data and documents that are not needed for business or required to meet regulatory and legal obligations. Unfortunately, most organizations have neglected the management of documents and data for many years, and developing a program to routinely dispose of documents and data requires a balancing of risks and costs by a multi-disciplinary team (Legal, Compliance, Records, IT and the business). This program will provide some key lessons learned by a team who has assisted organizations defensibly decommission thousands of legacy systems, defensibly dispose of millions of boxes, and defensibly delete billions

$95.00Audio CD Add to Cart

Cross-Border Discovery After the GDPR

Program Number: 2855 Presenter: David R. Cohen, Partner

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** The new European General Data Protection Regulation imposes strict restrictions on the processing, transfer and retention of documents containing information about European data subjects. Violations of the GDPR, even if only to comply with U.S. discovery obligations, can be met with fines of up to 20 Million Euro, or 4% of a company's world-wide gross revenue. So what should companies do when faced with discovery obligations relating to data located in Europe or concerning European data subjects? Is there any middle ground to comply with both U.S. and European law? This program will cover key parts of the GDPR and options for compliance.

$95.00Audio CD Add to Cart

Protecting Privilege Before and After a Cyber Breach

Program Number: 2846 Presenter: Robert W. Anderson, Esq., Eric B. Levine, Esq.

One of the most important things a company/firm can do is to regularly conduct an investigation to understand what its cybersecurity defense weaknesses and vulnerabilities may be. Critical to any counsel working to prevent a cyber-attack or respond to a successful cyber intrusion is an understanding why and how to properly utilize both attorney-client and work-product privilege. The overriding principle of using privilege is straightforward: to protect your organizations Investigation and breach response efforts from usage by third parties or regulatory agencies in Litigation arising from a breach.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Recent Developments in Delaware M&A Litigation

Program Number: 2843 Presenter: Mark W. Rasmussen, Esq., Evan P. Singer, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** In this program, Jones Day partners Mark W. Rasmussen and Evan P. Singer discuss recent trends in takeover litigation in the Delaware Chancery Court and beyond, including the current effects of cases considering the so-called “disclosure only” settlements, such as Delaware Chancellor Bouchard’s opinion in Trulia, Judge Posner’s opinion in In re Walgreen Co. Stockholder Litigation, and the New York Appellate Division’s opinion in Gordon v. Verizon Communications, applying New York law.

$95.00Audio CD Add to Cart

Categories