Print Catalog:

Programs in Cybersecurity



Filter by State
Filter by Category
 
 

“I’m the controller!” “No, I am!”: Joint Controllers under the GDPR

Program Number: 2943 Presenter: Sean Christy, Esq., Tyler Thompson, Esq.

The relationship between controllers and processors under the EU’s GDPR is well understood, but what if neither party is a processor? Is the relationship a data pool, a professional engagement, or a shared marketing program or service? In these and many other scenarios it is possible that the relationship is instead that of joint controllers. This program will take an in-depth look on how to determine when a relationship is between a controller and a processor, separate controllers, or joint controllers and the ramifications of each construct. Additionally, learn how to structure a contractual relationship between joint controllers and receive template documents designed to make the relationship clear and compliant. Finally, hear practical guidance from BCLP attorneys who have structured large joint controller relationships, including those processing large amounts of sensitive data.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Program Number: 2937 Presenter: Brian Lapidus, Keith Wojcieszek

How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don’t follow security protocols or are tricked into downloading malicious code. Led by Keith Wojcieszek, former head of the USSS Cyber Intelligence Section, Criminal Investigation Division, and Brian Lapidus, global leader of Kroll’s Identity Theft and Breach Notification practice, this session will provide an overview of the latest cyber threats, insights into risks posed by the dark web, the opportunities presented by incorporating cyber intelligence into engagements, and practical steps to minimize its risks do data security, privacy, and overall firm reputation.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Intellectual Property and Beyond: Expansion of Intellectual Property Rights in the Fashion Industry

Program Number: 2913 Presenter: Olivera Medenica, Esq.

This program will examine traditional intellectual property or design rights in the United States, and will examine the latest cases dealing with brand owners seeking to apply traditional IP rights to non-traditional elements of a design. The panel will examine whether recent cases indicate a willingness for courts to expand upon such rights vis-à-vis the fashion industry.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

The New Normal: 8 Steps to Seeing if Your Company Defends Customer Data

Program Number: 2904 Presenter: Elizabeth G. Litten, Esq.

According to a recent IBM survey, nearly two-thirds of consumers are more concerned about a breach of their private data than they are about going to war. Companies of all types and sizes collect and maintain customer data, and the customer assumes and expects that the company will protect their data and will not use, store, or share it in a way that puts them at risk. Today, a company should put as much effort into defending and protecting its customer data as it puts into defending and protecting its proprietary data and trade secrets, since breach, loss, or misuse will, at the very least, erode customer trust and the company’s reputation. Please join Fox Rothschild Partner and HIPAA Privacy and Security Officer Elizabeth Litten as she discusses eight steps your company can take to see if it is defending its customer data.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories