Celesq® Attorneys Ed Center
Print Catalog:

Programs in Corporate and Securities Law

Programs are available online to all firms wishing to assist their attorneys in obtaining their CLE credits. Please email customer.care@celesq.com to obtain a coupon code for your firm. Once an attorney has completed a program, your firm will be billed $30 each for the cost of each certificate which will be issued as a download once the attorney has completed the affirmation for the particular program. CDs will be available for all programs upon request. Please email customer.care@celesq.com to purchase CDs for any course. Cost will be $95.00 per CD, plus shipping and handling.

PROGRAMS ARE NOT AVAILABLE UNTIL AFTER THE PROGRAM DATE – IF THE ONLINE PURCHASE BUTTON IS NOT SHOWING – THE PROGRAM IS NOT YET AVAILABLE FOR LISTENING. PLEASE DO NOT ADD AUDIO TAPE TO YOUR CART AS THE PROGRAM IS NOT YET AVAILABLE. ONLY ADD TO YOUR CART IF YOU SEE ‘ONLINE AUDIO’ - THANK YOU SO MUCH!

Filter by State
Filter by Category
 
 

Challenging the SEC in Federal Court: Recent Developments in Case Law and Practice Notes (01/14/2021)

Program Number: 3103 Presenter: Jay A. Dubow, Esq., Mary Grace W. Metcalfe, Esq., Ghillaine A. Reid, Esq.

Challenging an ongoing investigation by the SEC is a daunting task, particularly for those identified as subjects of the investigation. Two recent holdings, one by the Third Circuit in Gentile v. Sec. & Exch. Comm’n, 2020 WL 5416297 (3d Cir. Sept. 10, 2020) and the other by the United States District Court for the District of New Jersey in Sec. & Exch. Comm’n v. Gentile, 16-cv-01619-BRM-JAD (Order Sept. 29, 2020), both of which involved the same parties, offer some clarification on when and how best to mount such a challenge. The Third Circuit’s opinion makes clear that the SEC’s ability to investigate is one of the “rare circumstances” in which an agency’s action is exempt from the waiver of sovereign immunity that might otherwise apply under the Administrative Procedure Act and, as a result, is not subject to judicial review. By contrast, the district court’s opinion reinforces that, once an investigation

$95.00Audio Tape Add to Cart

Cyber Considerations in the Time of Covid-19 (03/27/2020)

Program Number: 3097 Presenter: Scot Lippenholz, Jena M. Valdetero, Esq

Please join data security legal counsel and a leading forensic investigator for an empowering discussion of cyber considerations for companies in light of Covid-19. Attendees will hear about recent Covid-19 cyber threats and how to address them, how in-house counsel can prepare for a data breach in a remote work environment, and how incident response teams can address the myriad legal issues arising from a data breach.

$95.00Online Audio Add to Cart

When Competitors Cheat - How Businesses can use State Consumer Laws to Protect Themselves and the Marketplace (04/28/2020)

Program Number: 3096 Presenter: Richard Lawson, Esq.

While often lumped under the rubric of “consumer protection” laws, many state unfair and deceptive trade practices (UDAP) laws also allow businesses to file lawsuits. When a competitor is engaged in a deceptive or unfair practice which harms consumers, a company is often also harmed due to lost business. Certain state statutes allow businesses to bring actions to combat these unlawful competitors. Additionally, there are times where a trade association can bring an injunctive action against a deceptive or unfair business which may be causing industry wide disruption. This program will provide an overview of the nature and history of consumer protection laws, the key legal theories underlying them, the basis for businesses and trade associations / non-governmental organizations to have standing to sue, and the kinds of relief that can be obtained.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

To Trade Secret or Not to Trade Secret- That is THE Question! (06/10/2020)

Program Number: 3094 Presenter: David Postolski, Esq.

Keeping something secret is hard! Especially when it comes to what gives your business a competitive advantage. If you can legally and commercially manage to do this, then you can achieve Federal Rights for the first time in US history since 2016. This presentation will explore best practices, steps and strategies in ensuring that what you have as a trade secret can achieve maximum protection. This presentation will also explore the opposite of a Trade Secret, the Patent and the interplay between these types of intellectual property so that your clients can make an informed decision!

$95.00Online Audio Add to Cart

Digital Risks and Digital Duties: Finding a Standard of Care in Cyberspace - Part 1 (05/28/2020)

Program Number: 3090 Presenter: Michael A. Goode, Esq., James M. Paulino II, Esq.

In this two-part presentation, we will begin by discussing the patchwork of data privacy statutes, regulations and case law in an effort to define the baseline for reasonable security measures, and then apply these standards to recent breach events in the medical, construction, agricultural, retail, manufacturing, financial and legal industries to highlight common security failures, and opportunities for improvement. At the conclusion of the presentation, we will discuss best practices to consider to assist in reducing the risk of data breach incidences as well as the potential exposure in the event an incident occurs.

$95.00Online Audio Add to Cart

Demystifying Blockchain and Cryptocurrencies (05/07/2020)

Program Number: 3078 Presenter: David Kalat

In conventional usage, the term “hacking” generally refers to an unauthorized user gaining access to an electronic resource. Hackers use various means to steal, guess, calculate, or otherwise obtain credentials to access systems and data they are not allowed to access. When we talk about “hacking” a blockchain, however, this does not adequately or accurately describe what has happened and blinds us to understanding where the real risks lie in this new technology of distributed ledgers and crypto-assets. The high-profile, most destructive, and expensive “hacks” in blockchain environments actually represent *authorized* users misbehaving. In some cases, these are authorized users acting on their own behalf to exploit weaknesses in the system to their own gain at the expense of other users, in other cases these are authorized users who are misusing the trust placed in them by their customers. The key to protecting yourself against fraud in this new alien

$95.00Online Audio Add to Cart

The Shield Act: Are You Compliant (05/20/2020)

Program Number: 3077 Presenter: Nick Akerman, Esq.

On March 20th a new law in New York went into effect requiring all businesses holding personal data belonging to New York residents to institute specific data security measures. Known as the “Stop Hacks and Improve Electronic Data Security Act" (the “Shield Act”), this new statute will be enforced by the New York Attorney General and mandates that a company must implement a number of “administrative, technical and physical safeguards” and appoint an employee to manage the cybersecurity program. Among other changes, the new law expands the definition of personal information and the definition of what constitutes a data breach. Failure to comply with this new statute authorizes the Attorney General to obtain statutory damages and the actual damages to consumers.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Anti-Poaching Clauses-Drafting, Liability and Enforcement (03/13/2020)

Program Number: 3062 Presenter: Craig Tractenberg, Esq.

Craig is a skilled business lawyer who resolves disputes responsively and cost-effectively. His focus is on franchise and infrastructure transactions, development and disputes, both domestic and international. Clients hire him to provide creative solutions to “bet the company” litigation and defining transactions.

$95.00Online Audio Add to Cart

Key Issues and Best Practices for Proposal Preparation (04/22/2020)

Program Number: 3057 Presenter: Christian N. Curran, Esq., Zachary Schroeder, Esq., Anuj Vohra, Esq.

Experienced practitioners will walk through the lifecycle of a procurement from pre-proposal submission through award to arm you with the knowledge to put together a winning effort. The presentation will provide an overview of pre-award and post-award protest issues contractors should be aware of when preparing their proposals, as well as a discussion of key Government Accountability Office (“GAO”) decisional law involving commonly encountered protest grounds. Topics covered include: •How to utilize the question and answer process to your advantage •When to consider filing a pre-award protest •Maximizing credit for past and corporate experience •Impact of incumbency on proposal evaluation •Avoidance and mitigation of Organizational Conflicts of Interest (“OCIs”) •Handling key personnel departures •Steering clear of potential protests Find out what you can do to make yourself stand out from the pack and to avoid common errors that could sink your proposal.

$95.00Online Audio Add to Cart

Legal Elements of Cybersecurity (02/13/2020)

Program Number: 3040 Presenter: John Lande, Esq.

Rarely a day goes by without news about a cybersecurity incident affecting a national company. Fraudsters are targeting companies of all kinds and sizes with the goal of divesting companies of their money and confidential information. This presentation will discuss current cybersecurity legal issues through the lens of real case studies, and specifically cover: (1) current threats, (2) liability issues, (3) insurance coverage, and (4) mitigating legal cybersecurity risk.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Categories