Print Catalog:

Programs in Data Security and Outsourcing



Filter by State
Filter by Category
 
 

Data Privacy and Security Issues in M&A Transactions for Transactional, Technology and Corporate Lawyers

Program Number: 2813 Presenter: Jason D. Haislmaier, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Data privacy and data security present unique obligations and potentially significant liabilities for both buyers and sellers involved in M&A transactions. In addition, data itself is now often a key asset in driving the value of many M&A transactions. Starting with the initial stages of a deal, and extending through negotiation and signing to post-closing integration, this program focuses on strategies for identifying and addressing these obligations and liabilities, while capturing and preserving the value of data in M&A transactions.

$95.00Audio CD Add to Cart

What Attorneys Should Know about the Ever-Expanding Role of Open Source and Third-Party Software in Cybersecurity

Program Number: 2812 Presenter: Jason D. Haislmaier, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** As open source software has grown in importance, so too have the number of cybersecurity breaches involving hackers exploiting vulnerabilities in open source software. In this program of particular interest to IP, technology, corporate, and compliance attorneys, Jason Haislmaier examines the intersection of open source software and cybersecurity. Topics include: the legal and regulatory risks involved in the use of open source software, the role open source has played in several high-profile security incidents, lessons learned regarding the unique security challenges posed by open source, and actions to take to address those challenges.

$95.00Audio CD Add to Cart

Key Legal Issues in the Internet of Things

Program Number: 2749IP Presenter: Brian A. Jones, Esq., Amol Parikh, Esq.

Internet of Things (IoT), including artificial intelligence and robotics, have now entered the mainstream social narrative. However, the proliferation of this exciting and transformative technology raises a wide range of legal issues. This presentation focuses on the key legal issues surrounding the Internet of Things, including data ownership and privacy, security, intellectual property, and product liability, as well as ethical implications of the use of such technology.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What In-House, Corporate and Securities Counsel Should Know about System and Organization Controls (SOC) Reports and their Applicability to Reporting on Internal Controls

Program Number: 2743 Presenter: Michael Pinna, CPA

In today’s world, almost every type of public or private company needs to assess its internal control environment. This is especially true of public and SEC registered companies which are required to report on their internal control environments in their annual reports and filings. With technological, cybersecurity and other issues that have arisen, System and Organization Controls (SOC) Reports necessarily have become the standard for assessing internal controls as the reporting has become more complex. This program provides a brief history of the SOC reporting landscape; an understanding of the types of SOC reporting (i.e., SOC 1, SOC 2, SOC 3, and the new SOC for Cybersecurity) and their reporting structures and coverages; and an overview of recent changes to the SOC standards.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What Attorneys Should Know about Advising Boards and Management on How to Avoid Struggles When it Comes to Data Breaches

Program Number: 2742 Presenter: David A. Zetoony, Esq.

Boards and senior management often look to attorneys to advise them when a data breach arises. Providing sound and practical legal advice can be complicated if management has not gone through a data breach before, and does not understand the legal implications of the choices that they may make. This program focuses on how attorneys can explain the legal implications of a data breach in order to help management make decisions, either before or after a breach occurs, concerning how the company can position itself.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Ethics and Cybersecurity: A Lawyer’s Professional Obligations under New ABA Formal Opinion 477R, Opinion 99-413, and the ABA Model Rules

Program Number: 2739 Presenter: David A. Zetoony, Esq.

In addition to complying with data security statutes and regulations, lawyers must comply with ethical obligations under the rules of professional conduct to protect their clients’ privacy and security. In this program, David Zetoony covers the attorney’s ethical considerations including requirements under ABA Model Rule 1.1, Model Rule 1.6(c), new ABA Formal Opinion 477R, Securing Communication of Protected Client Information, and its previous ABA Formal Opinion 99-413, Protecting the Confidentiality of Unencrypted E-Mail (1999).

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Recent Amendments to the Federal Rules of Civil Procedure and the Mandatory Initial Discovery Pilot Program: Navigating the New 2017 Rules and Procedures

Program Number: 2738 Presenter: Megan Lopp Mathias, Esq.

In this important program for in-house and outside counsel and litigators, Megan Mathias provides an overview of recent 2017 amendments to the Federal Rules of Civil Procedure and discusses the Mandatory Initial Discovery Pilot (MIDP) Program which has commenced in the Northern District of Illinois and the District of Arizona. The MIDP changes, in a significant way, the mandatory disclosures required of parties early in the litigation, and failure to follow the requirements can have major implications for your client.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What In-House Counsel Should Know about the NIST and AICPA Frameworks and other Steps to Mitigate or Avoid Cybersecurity Risks and Threats

Program Number: 2733 Presenter: Michael Pinna, CPA

This program describes the problem of cybersecurity, including common vulnerabilities that can be exploited in order to gain unauthorized access to systems and data, and discusses some common frameworks, such as the National Institute of Standards and Technology ("NIST") Cybersecurity Framework and the new American Institute of Certified Public Accountants (“AICPA") Cybersecurity Risk Management Framework that can be used to understand and address the cybersecurity risks and threats in any type of organization. Also covered are cyber liability insurance which is becoming more prevalent in today’s marketplace, and key steps that organizations should consider implementing to make an immediate impact in their cybersecurity risk profile.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Long Live Open Source! Current Developments for IP, Technology, Corporate, and Compliance Attorneys

Program Number: 2728 Presenter: Jason D. Haislmaier, Esq., Matthew Jacobs, Esq.

Open source software burst onto the scene over a dozen years ago, and since then, the pervasiveness and importance of open source has only continued to grow. Today, the growth of open source is driving an expanded range of legal and regulatory issues, including: • Addressing open source compliance in cloud and hosted environments • Understanding new open source license enforcement efforts • Vetting open source for IT security concerns • Dealing with open source risk in corporate transactions Keeping pace with these issues poses new challenges, both for companies with established compliance programs and those still relatively new to open source. Join our presenters for a discussion of these issues and solutions to help address them.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Dealing with Data Privacy and Data Security in Cloud and IT Vendor Agreements: A Guide for In-House Counsel

Program Number: 2725 Presenter: Jason D. Haislmaier, Esq.

While cloud computing and other hosted and online services have become fundamental resources for many companies, using them can also lead to significant legal concerns over data privacy and security. As a result, the provisions involving these issues in such service agreements have become hotly contested. Join Jason Haislmaier of Bryan Cave LLP as he discusses significant data privacy and security concerns that can arise in cloud and other hosted and online services agreements and provides tools for addressing these issues and mitigating the risks that come with them.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories