Warning: session_start() [function.session-start]: Cannot send session cookie - headers already sent by (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:2) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19

Warning: session_start() [function.session-start]: Cannot send session cache limiter - headers already sent (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:2) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19
Celesq® Attorneys Ed Center
Print Catalog:

Programs in Computer, Internet & E-Commerce Law

Programs are available online to all firms wishing to assist their attorneys in obtaining their CLE credits. Please email customer.care@celesq.com to obtain a coupon code for your firm. Once an attorney has completed a program, your firm will be billed $30 each for the cost of each certificate which will be issued as a download once the attorney has completed the affirmation for the particular program. CDs will be available for all programs upon request. Please email customer.care@celesq.com to purchase CDs for any course. Cost will be $95.00 per CD, plus shipping and handling.



Filter by State
Filter by Category
 
 

Getting Your Ducks in a Row for the California Consumer Privacy Act

Program Number: 2985 Presenter: Sadia Mirza, Esq.

Data privacy took center stage in 2018. The European Union's (EU) General Data Protection Regulation (GDPR) came into effect in May 2018, and California quickly followed suit with its own privacy protection law, the California Consumer Privacy Act of 2018 (CCPA). The CCPA greatly expands privacy protections for California residents by providing greater transparency and control over how certain businesses use their personal information. Come next year, California residents will have rights similar in principle to those afforded to EU residents, including the right to access information, right to deletion, right to data portability, and the right to opt out of the sale of their personal information. Businesses subject to the CCPA need to get their ducks in a row early to comply with the CCPA, which goes into effect on January 1, 2020. During this webinar, Troutman Sanders’ attorney Sadia Mirza will cover the scope of the act, key definitions, the new rights afforded

$95.00Online Audio Add to Cart

Biometrics and the New Wave of Class Action Lawsuits

Program Number: 2984 Presenter: Harrison Brown, Esq., Jeffrey N. Rosenthal, Esq.

Whether it is an employee’s fingerprint used to clock in and out of work, or using your face to unlock a phone, the use of biometric information is becoming increasingly commonplace. Such biometric information provides convenience in a complicated world. But, at the same time, creates legal risk for businesses in all industries. This webinar will explore what biometric information is and how it is used; the jurisdictions which regulate biometric information; the requirements imposed on businesses; trends in lawsuits over the use of biometric information; and compliance strategies intended to reduce exposure.

$95.00Online Audio Add to Cart

FISA: More of Everything You Didn’t Know

Program Number: 2946 Presenter: George W. Croner, Esq.

Electronic surveillance represents the most important foreign intelligence collection tool available to the U.S. government. Correspondingly, the ability to surveil constitutes one of those activities most susceptible to abuse by a government against its citizens. In the U.S., the government’s use of electronic surveillance is highly regulated and can be conducted for only two purposes: law enforcement, which is undertaken by both federal and state governments; and foreign intelligence collection, which is an exclusively federal government function conducted pursuant to a single authority - the Foreign Intelligence Surveillance Act or “FISA”. FISA governs not only electronic surveillance but the use of physical searches, pen registers, trap and trace devices, and business records collection to acquire foreign intelligence. It permits surveillance and other intrusive activities in the United States both with, and in limited circumstances, without a warrant. It covers virtually every major intelligence collection effort used by

$140.00Online Audio Add to Cart

Inspector General Whistleblower Investigations – How They Work & How to Manage if Under Investigation

Program Number: 2945 Presenter: Margaret Cassidy, Esq.

Federal Government inspector general offices are required to investigate whistleblower complaints against contractors in certain circumstances. If your company does business with the federal government, it is important to know: How inspector general offices work, When IG’s must investigate whistleblower complaints, How the “new” DoD alternative dispute resolution process for whistleblower complaints work, and What your company can do to mitigate the risk of an inspector general investigation as well as how to manage if your company is under investigation. This CLE will discuss applicable laws, regulations and best practices on making it through an IG investigation.

$95.00Online Audio Add to Cart

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Program Number: 2937 Presenter: Brian Lapidus, Keith Wojcieszek

How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don’t follow security protocols or are tricked into downloading malicious code. Led by Keith Wojcieszek, former head of the USSS Cyber Intelligence Section, Criminal Investigation Division, and Brian Lapidus, global leader of Kroll’s Identity Theft and Breach Notification practice, this session will provide an overview of the latest cyber threats, insights into risks posed by the dark web, the opportunities presented by incorporating cyber intelligence into engagements, and practical steps to minimize its risks do data security, privacy, and overall firm reputation.

$95.00Online Audio Add to Cart

Intellectual Property and Beyond: Expansion of Intellectual Property Rights in the Fashion Industry

Program Number: 2913 Presenter: Olivera Medenica, Esq.

This program will examine traditional intellectual property or design rights in the United States, and will examine the latest cases dealing with brand owners seeking to apply traditional IP rights to non-traditional elements of a design. The panel will examine whether recent cases indicate a willingness for courts to expand upon such rights vis-à-vis the fashion industry.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

The New Normal: 8 Steps to Seeing if Your Company Defends Customer Data

Program Number: 2904 Presenter: Elizabeth G. Litten, Esq.

According to a recent IBM survey, nearly two-thirds of consumers are more concerned about a breach of their private data than they are about going to war. Companies of all types and sizes collect and maintain customer data, and the customer assumes and expects that the company will protect their data and will not use, store, or share it in a way that puts them at risk. Today, a company should put as much effort into defending and protecting its customer data as it puts into defending and protecting its proprietary data and trade secrets, since breach, loss, or misuse will, at the very least, erode customer trust and the company’s reputation. Please join Fox Rothschild Partner and HIPAA Privacy and Security Officer Elizabeth Litten as she discusses eight steps your company can take to see if it is defending its customer data.

$95.00Online Audio Add to Cart

A FISA Primer- Everything You Didn’t Know, You Didn’t Know

Program Number: 2878 Presenter: George W. Croner, Esq.

Electronic surveillance represents the most important foreign intelligence collection tool available to the U.S. government. Correspondingly, the ability to surveil constitutes one of those activities most susceptible to abuse by a government against its citizens. For years, electronic surveillance for foreign intelligence purposes was considered an exclusively Executive Branch authority, and every president from Franklin Roosevelt to Richard Nixon authorized its use. When serious abuses by U.S. intelligence agencies were revealed during congressional hearings held in the aftermath of Watergate, Congress reacted by passing the Foreign Intelligence Surveillance Act which, for the first time, subjected foreign intelligence electronic surveillance conducted in the United States to a statutory regimen that included approval by a newly created Foreign Intelligence Surveillance Court. Today, there is more discussion, and controversy, about FISA than at virtually any other time in its history. This program is going to discuss the evolution of the use

$95.00Online Audio Add to Cart

Categories