Celesq® Attorneys Ed Center
Print Catalog:

Programs in Data Security and Outsourcing

Programs are available online to all firms wishing to assist their attorneys in obtaining their CLE credits. Please email customer.care@celesq.com to obtain a coupon code for your firm. Once an attorney has completed a program, your firm will be billed $30 each for the cost of each certificate which will be issued as a download once the attorney has completed the affirmation for the particular program. CDs will be available for all programs upon request. Please email customer.care@celesq.com to purchase CDs for any course. Cost will be $95.00 per CD, plus shipping and handling.

PROGRAMS ARE NOT AVAILABLE UNTIL AFTER THE PROGRAM DATE – IF THE ONLINE PURCHASE BUTTON IS NOT SHOWING – THE PROGRAM IS NOT YET AVAILABLE FOR LISTENING. PLEASE DO NOT ADD AUDIO TAPE TO YOUR CART AS THE PROGRAM IS NOT YET AVAILABLE. ONLY ADD TO YOUR CART IF YOU SEE ‘ONLINE AUDIO’ - THANK YOU SO MUCH!

Filter by State
Filter by Category
 
 

How to Ethically Mitigate Risk in Remote Meetings and Depositions (01/12/2021)

Program Number: 3105 Presenter: Joanna Storey, Esq.

Many elementary school students have mastered the art of remote meetings during distance learning, but some seasoned lawyers still do not understand how to effectively use mute. In this 60-minute presentation, we navigate through the risky waters of using remote depositions and meetings in your law practice. We offer practical tips for meeting four primary ABA Model Rules of Professional Conduct: Competence (Rule 1.1), Communications (Rule 1.4), Confidentiality of Information (Rule 1.6) and Responsibilities Regarding Nonlawyer Assistance (Rule 5.3). The key takeaways will be understanding the technology, training, practicing and being mindful of your video and audio surroundings.

$95.00Audio Tape Add to Cart

Cyber Considerations in the Time of Covid-19 (03/27/2020)

Program Number: 3097 Presenter: Scot Lippenholz, Jena M. Valdetero, Esq

Please join data security legal counsel and a leading forensic investigator for an empowering discussion of cyber considerations for companies in light of Covid-19. Attendees will hear about recent Covid-19 cyber threats and how to address them, how in-house counsel can prepare for a data breach in a remote work environment, and how incident response teams can address the myriad legal issues arising from a data breach.

$95.00Online Audio Add to Cart

Digital Risks and Digital Duties: Finding a Standard of Care in Cyberspace - Part 1 (05/28/2020)

Program Number: 3090 Presenter: Michael A. Goode, Esq., James M. Paulino II, Esq.

In this two-part presentation, we will begin by discussing the patchwork of data privacy statutes, regulations and case law in an effort to define the baseline for reasonable security measures, and then apply these standards to recent breach events in the medical, construction, agricultural, retail, manufacturing, financial and legal industries to highlight common security failures, and opportunities for improvement. At the conclusion of the presentation, we will discuss best practices to consider to assist in reducing the risk of data breach incidences as well as the potential exposure in the event an incident occurs.

$95.00Online Audio Add to Cart

Demystifying Blockchain and Cryptocurrencies (05/07/2020)

Program Number: 3078 Presenter: David Kalat

In conventional usage, the term “hacking” generally refers to an unauthorized user gaining access to an electronic resource. Hackers use various means to steal, guess, calculate, or otherwise obtain credentials to access systems and data they are not allowed to access. When we talk about “hacking” a blockchain, however, this does not adequately or accurately describe what has happened and blinds us to understanding where the real risks lie in this new technology of distributed ledgers and crypto-assets. The high-profile, most destructive, and expensive “hacks” in blockchain environments actually represent *authorized* users misbehaving. In some cases, these are authorized users acting on their own behalf to exploit weaknesses in the system to their own gain at the expense of other users, in other cases these are authorized users who are misusing the trust placed in them by their customers. The key to protecting yourself against fraud in this new alien

$95.00Online Audio Add to Cart

The Shield Act: Are You Compliant (05/20/2020)

Program Number: 3077 Presenter: Nick Akerman, Esq.

On March 20th a new law in New York went into effect requiring all businesses holding personal data belonging to New York residents to institute specific data security measures. Known as the “Stop Hacks and Improve Electronic Data Security Act" (the “Shield Act”), this new statute will be enforced by the New York Attorney General and mandates that a company must implement a number of “administrative, technical and physical safeguards” and appoint an employee to manage the cybersecurity program. Among other changes, the new law expands the definition of personal information and the definition of what constitutes a data breach. Failure to comply with this new statute authorizes the Attorney General to obtain statutory damages and the actual damages to consumers.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

An Ethical Roadmap for Developing and Refining High-end Technology Competence (02/03/2020)

Program Number: 3046 Presenter: Kenneth Jones, Marina McGuire, Esq.

The American Bar Association first amended the comments to Model Rule 1.1 relating to technological change in 2012. This amendment imposed an ethical duty on lawyers to stay abreast of changes in technology. During the past eight years, almost forty state bar associations have updated the comments to their ethical rules to require lawyers to keep informed about technology changes. *Additionally, cloud computing is now increasingly prevalent in legal operations. To comply with Model Rule 1.6, which calls for lawyers to act competently to safeguard information relating to the representation of a client against unauthorized access, lawyers may wish to develop a basic understanding of how technology and cloud computing works and the associated risks to ensure data is securely stored with safeguards in place to protect that information. *To assist in compliance with ABA Model Rule 1.1 and 1.6, strong technology teams must be developed and maintained. This session focuses on some best practices

$95.00Online Audio Add to Cart

Legal Elements of Cybersecurity (02/13/2020)

Program Number: 3040 Presenter: John Lande, Esq.

Rarely a day goes by without news about a cybersecurity incident affecting a national company. Fraudsters are targeting companies of all kinds and sizes with the goal of divesting companies of their money and confidential information. This presentation will discuss current cybersecurity legal issues through the lens of real case studies, and specifically cover: (1) current threats, (2) liability issues, (3) insurance coverage, and (4) mitigating legal cybersecurity risk.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Botnet Extortion and Disparagement and Section 230: Do Businesses Have Any Recourse? (01/28/2020)

Program Number: 3037 Presenter: Bradford P. Meisel, Esq., Diane D. Reynolds, Esq.

Cybercriminals have presented targeted businesses with a frightening choice: pay up or have Botnets post thousands of negative reviews in a matter of minutes. Botnets, which are groups of computers controlled by a single person, have also famously flooded social media platforms with disparaging posts about politicians and political parties in the days before recent elections in the United States and other industrialized countries. Businesses, politicians, and other victims of Botnet-mediated disparagement seeking damages face a daunting obstacle in the form of Section 230, the controversial federal statute that immunizes computer service providers from liability for content provided by another person or entity. This program will examine the legal arguments regarding whether or not Botnet-mediated disparagement is subject to Section 230-a question which courts have yet to address. This program will also examine the intensifying debate in Congress regarding both the Botnet epidemic and Section 230 and how it could impact litigation

$95.00Online Audio Add to Cart

March 2020: How to Be Ready for New York’s New Data Protection Law (the SHIELD Act) (01/16/2020)

Program Number: 3032 Presenter: Nawa Lodin, Esq., Caroline A. Morgan, Esq.

On October 23, 2019, the Stop Hacks and Improve Electronic Data Security Act (the SHIELD Act) went into effect. The New York law imposes data breach notification requirements on any business that owns or licenses certain private information of New York residents, regardless of whether it conducts business in New York. In March 2020, the second part of the Act goes into effect, requiring businesses to develop, implement and maintain a data security program to protect private information. Through this course, attorneys can gain an understanding of the SHIELD Act with an emphasis on key actions businesses should take to comply, the penalties for not doing so, and cybersecurity best practices to mitigate loss.

$95.00Online Audio Add to Cart

Legal Ethics and Cyber Security 2020 (01/10/2020)

Program Number: 3031 Presenter: Carole Buckner, Esq.

Lawyers and law firms are at risk of data security breaches and must have reasonable measures in place to address cyber security. This presentation will discuss some of the practical risks associated with data security and the ethical obligations of lawyers in dealing with cybersecurity issues. A lawyer’s primary ethical duties involve the duty of competency, which requires a reasonable understanding of issues involving technology and data security, and the duty of confidentiality, which requires that lawyers take reasonable steps to protect their communications with clients and their clients’ electronic data, and the duty to disclose significant developments related to the representation, including possible security breaches. We will discuss ethics opinions concerning reasonable measures and preparation for cyber incidents, as well as several common scenarios including ransomware, phishing, lost laptops, missing smartphones, and cybersecurity when working remotely. In addition, we will discuss the availability of cyber insurance. In addition,

$95.00Online Audio Add to Cart

Categories