Print Catalog:

Programs in Cybersecurity



Filter by State
Filter by Category
 
 

Biometrics and the New Wave of Class Action Lawsuits (May 30, 2019)

Program Number: 2984 Presenter: Harrison Brown, Esq., Jeffrey N. Rosenthal, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. If the online purchase button is not showing, then the on-demand program is not yet available. **** Whether it is an employee’s fingerprint used to clock in and out of work, or using your face to unlock a phone, the use of biometric information is becoming increasingly commonplace. Such biometric information provides convenience in a complicated world. But, at the same time, creates legal risk for businesses in all industries. This webinar will explore what biometric information is and how it is used; the jurisdictions which regulate biometric information; the requirements imposed on businesses; trends in lawsuits over the use of biometric information; and compliance strategies intended to reduce exposure.

$95.00Audio CD Add to Cart

“I’m the controller!” “No, I am!”: Joint Controllers under the GDPR

Program Number: 2943 Presenter: Sean Christy, Esq., Tyler Thompson, Esq.

The relationship between controllers and processors under the EU’s GDPR is well understood, but what if neither party is a processor? Is the relationship a data pool, a professional engagement, or a shared marketing program or service? In these and many other scenarios it is possible that the relationship is instead that of joint controllers. This program will take an in-depth look on how to determine when a relationship is between a controller and a processor, separate controllers, or joint controllers and the ramifications of each construct. Additionally, learn how to structure a contractual relationship between joint controllers and receive template documents designed to make the relationship clear and compliant. Finally, hear practical guidance from BCLP attorneys who have structured large joint controller relationships, including those processing large amounts of sensitive data.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Program Number: 2937 Presenter: Brian Lapidus, Keith Wojcieszek

How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don’t follow security protocols or are tricked into downloading malicious code. Led by Keith Wojcieszek, former head of the USSS Cyber Intelligence Section, Criminal Investigation Division, and Brian Lapidus, global leader of Kroll’s Identity Theft and Breach Notification practice, this session will provide an overview of the latest cyber threats, insights into risks posed by the dark web, the opportunities presented by incorporating cyber intelligence into engagements, and practical steps to minimize its risks do data security, privacy, and overall firm reputation.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Intellectual Property and Beyond: Expansion of Intellectual Property Rights in the Fashion Industry

Program Number: 2913 Presenter: Olivera Medenica, Esq.

This program will examine traditional intellectual property or design rights in the United States, and will examine the latest cases dealing with brand owners seeking to apply traditional IP rights to non-traditional elements of a design. The panel will examine whether recent cases indicate a willingness for courts to expand upon such rights vis-à-vis the fashion industry.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Biometric Privacy (June 6, 2019)

Program Number: 29103 Presenter: Ian Fisher, Esq., Gillian Lindsay, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. If the online purchase button is not showing, then the on-demand program is not yet available. **** Fingerprints, iris imaging, hand scans, and face geometry are no longer reserved for special agents. Today, employers use fingerprints to track employees’ hours, amusement parks collect thumbprints to prevent sharing of passes, social media sites capture facial images to “tag” people in photographs, retail stores implement similar facial scans to ban troublesome customers, and premier office buildings offer “wave of hand” biometric security access. Its use can increase security, convenience and efficiency, but it also creates significant legal risk, especially in Illinois. Illinois has the strongest biometric privacy law in the country, the Illinois Biometric Privacy Act (“BIPA”). Fearful of the potential abuses of biometric data—sensitive information that cannot be

$95.00Audio CD Add to Cart

One Ring to Rule Them All: The Changing US Legal Landscape in Cybersecurity and Data Privacy (August 5, 2019)

Program Number: 29101 Presenter: Rebecca L. Rakoski, Esq.

**** CD's are pre-order only and not available until after the program date - Online Programs are not available until after the program date. If the online purchase button is not showing, then the on-demand program is not yet available. **** The European Union’s General Data Protection Regulation (“GDPR”) took effect on May 25, 2018, the California Consumer Privacy Act (CCPA) will take effect on January 1, 2020, and with 42 of the 50 different data breach reporting laws substantially changed in 2018, the US legal landscape is drastically changing. What does this mean for businesses? Uncertainty and high costs of compliance. The current regulatory framework benefits the criminals and penalizes the corporations. This presentation will discuss the impact these ever-changing regulations have on the collection, processing, and storage of data. The discussion will include a comparison of the requirements for security and privacy domestically, and the implications of the recent Pennsylvania Supreme Court decision in Dittman v.

$95.00Audio CD Add to Cart

The New Normal: 8 Steps to Seeing if Your Company Defends Customer Data

Program Number: 2904 Presenter: Elizabeth G. Litten, Esq.

According to a recent IBM survey, nearly two-thirds of consumers are more concerned about a breach of their private data than they are about going to war. Companies of all types and sizes collect and maintain customer data, and the customer assumes and expects that the company will protect their data and will not use, store, or share it in a way that puts them at risk. Today, a company should put as much effort into defending and protecting its customer data as it puts into defending and protecting its proprietary data and trade secrets, since breach, loss, or misuse will, at the very least, erode customer trust and the company’s reputation. Please join Fox Rothschild Partner and HIPAA Privacy and Security Officer Elizabeth Litten as she discusses eight steps your company can take to see if it is defending its customer data.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories