Print Catalog:

Programs in Privacy Law



Filter by State
Filter by Category
 
 

Complying with the EU General Data Protection Regulation (GDPR): Information Notices

Program Number: 2823 Presenter: David A. Zetoony, Esq.

This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 25 2018, with specific focus on the obligations in Articles 13 and 14 to provide information notices to data subjects. The program explores the ways in which companies draft information or privacy notices, what information must be included in such notices, how such notices are distributed, and to whom they must be given. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Complying with the EU General Data Protection Regulation (GDPR): Cross Border Transfers of Information

Program Number: 2820 Presenter: Sarah Delon-Bouquet, Esq., David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the restrictions that the GDPR imposes to the cross-border transfer of information through Articles 44 - 50. The program explores practical ways in which companies have attempted to comply with these provisions while continuing to transmit data outside of the EEA. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart

Complying with the EU General Data Protection Regulation (GDPR): Third Party Vendor Management Programs

Program Number: 2819 Presenter: Christopher M. Achatz, Esq., David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the obligations that the GDPR imposes on vendors (and their clients) through Article 28. The program explores practical ways in which companies have attempted to modify their contractual arrangements to account for those changes. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart

Complying with the EU General Data Protection Regulation (GDPR): Revising Incident Response Plans and Data Breach

Program Number: 2818 Presenter: Christopher M. Achatz, Esq., David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the obligations that the GDPR imposes in Articles 33 and 34 to respond in the event of a data breach. The program explores changes to incident response plans that may be needed to document compliance. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart

Complying with the EU General Data Protection Regulation (GDPR): Data Subject Requests

Program Number: 2817 Presenter: David A. Zetoony, Esq.

This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the rights provided to data subjects in Articles 16-20. The program explores the ways in which companies seek to comply with requests by data subjects to exercise those rights, and provides practice pointers for the creation of such policies. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Complying with the EU General Data Protection Regulation (GDPR): Conducting Data Inventories

Program Number: 2816 Presenter: David A. Zetoony, Esq.

This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the requirements of Article 6, to have a permissible purpose with respect to all data processed, and Article 30, to keep records of processing activities. The program explores the ways in which companies seek to comply with these requirements and discusses in particular the use of data inventories or data maps as a compliance tool, and addresses the challenges that organizations face when attempting to conduct such inventories/maps. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Data Privacy and Security Issues in M&A Transactions for Transactional, Technology and Corporate Lawyers

Program Number: 2813 Presenter: Jason D. Haislmaier, Esq.

Data privacy and data security present unique obligations and potentially significant liabilities for both buyers and sellers involved in M&A transactions. In addition, data itself is now often a key asset in driving the value of many M&A transactions. Starting with the initial stages of a deal, and extending through negotiation and signing to post-closing integration, this program focuses on strategies for identifying and addressing these obligations and liabilities, while capturing and preserving the value of data in M&A transactions.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What Attorneys Should Know about the Ever-Expanding Role of Open Source and Third-Party Software in Cybersecurity

Program Number: 2812 Presenter: Jason D. Haislmaier, Esq.

As open source software has grown in importance, so too have the number of cybersecurity breaches involving hackers exploiting vulnerabilities in open source software. In this program of particular interest to IP, technology, corporate, and compliance attorneys, Jason Haislmaier examines the intersection of open source software and cybersecurity. Topics include: the legal and regulatory risks involved in the use of open source software, the role open source has played in several high-profile security incidents, lessons learned regarding the unique security challenges posed by open source, and actions to take to address those challenges.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Key Legal Issues in the Internet of Things

Program Number: 2749IP Presenter: Brian A. Jones, Esq., Amol Parikh, Esq.

Internet of Things (IoT), including artificial intelligence and robotics, have now entered the mainstream social narrative. However, the proliferation of this exciting and transformative technology raises a wide range of legal issues. This presentation focuses on the key legal issues surrounding the Internet of Things, including data ownership and privacy, security, intellectual property, and product liability, as well as ethical implications of the use of such technology.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What In-House, Corporate and Securities Counsel Should Know about System and Organization Controls (SOC) Reports and their Applicability to Reporting on Internal Controls

Program Number: 2743 Presenter: Michael Pinna, CPA

In today’s world, almost every type of public or private company needs to assess its internal control environment. This is especially true of public and SEC registered companies which are required to report on their internal control environments in their annual reports and filings. With technological, cybersecurity and other issues that have arisen, System and Organization Controls (SOC) Reports necessarily have become the standard for assessing internal controls as the reporting has become more complex. This program provides a brief history of the SOC reporting landscape; an understanding of the types of SOC reporting (i.e., SOC 1, SOC 2, SOC 3, and the new SOC for Cybersecurity) and their reporting structures and coverages; and an overview of recent changes to the SOC standards.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories