Print Catalog:

Programs in Technology Law



Filter by State
Filter by Category
 
 

Blockchain Technology and Digital Currencies: Key Legal Issues for the Financial Industry

Program Number: 2747 Presenter: David Andrew Kern, Esq., Mark W. Rasmussen, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Business of all sizes, from start-ups to Fortune 500 companies, are quickly seeing the benefits of Blockchain technology and digital currencies and are putting them to use. This is especially true for companies in the financial sector which are deploying these technologies to help with everything from capital raising to securities trading to asset tracking. At the same time, lawmakers and regulators have their eyes on the benefits and risks associated with these emerging technologies and are adopting new laws and regulatory guidance both to facilitate their use and to protect the public. Join Mark Rasmussen and David Kern as they explain the fundamentals of Blockchain technology and digital currencies, describe how they are being utilized in the financial industry, and discuss key legal issues for all companies.

$95.00Audio CD Add to Cart

What In-House, Corporate and Securities Counsel Should Know about System and Organization Controls (SOC) Reports and their Applicability to Reporting on Internal Controls

Program Number: 2743 Presenter: Michael Pinna, CPA

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** In today’s world, almost every type of public or private company needs to assess its internal control environment. This is especially true of public and SEC registered companies which are required to report on their internal control environments in their annual reports and filings. With technological, cybersecurity and other issues that have arisen, System and Organization Controls (SOC) Reports necessarily have become the standard for assessing internal controls as the reporting has become more complex. This program provides a brief history of the SOC reporting landscape; an understanding of the types of SOC reporting (i.e., SOC 1, SOC 2, SOC 3, and the new SOC for Cybersecurity) and their reporting structures and coverages; and an overview of recent changes to the SOC standards.

$95.00Audio CD Add to Cart

What Attorneys Should Know about Advising Boards and Management on How to Avoid Struggles When it Comes to Data Breaches

Program Number: 2742 Presenter: David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Boards and senior management often look to attorneys to advise them when a data breach arises. Providing sound and practical legal advice can be complicated if management has not gone through a data breach before, and does not understand the legal implications of the choices that they may make. This program focuses on how attorneys can explain the legal implications of a data breach in order to help management make decisions, either before or after a breach occurs, concerning how the company can position itself.

$95.00Audio CD Add to Cart

Ethics and Cybersecurity: A Lawyer’s Professional Obligations under New ABA Formal Opinion 477R, Opinion 99-413, and the ABA Model Rules

Program Number: 2739 Presenter: David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** In addition to complying with data security statutes and regulations, lawyers must comply with ethical obligations under the rules of professional conduct to protect their clients’ privacy and security. In this program, David Zetoony covers the attorney’s ethical considerations including requirements under ABA Model Rule 1.1, Model Rule 1.6(c), new ABA Formal Opinion 477R, Securing Communication of Protected Client Information, and its previous ABA Formal Opinion 99-413, Protecting the Confidentiality of Unencrypted E-Mail (1999).

$95.00Audio CD Add to Cart

Recent Amendments to the Federal Rules of Civil Procedure and the Mandatory Initial Discovery Pilot Program: Navigating the New 2017 Rules and Procedures

Program Number: 2738 Presenter: Megan Lopp Mathias, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** In this important program for in-house and outside counsel and litigators, Megan Mathias provides an overview of recent 2017 amendments to the Federal Rules of Civil Procedure and discusses the Mandatory Initial Discovery Pilot (MIDP) Program which has commenced in the Northern District of Illinois and the District of Arizona. The MIDP changes, in a significant way, the mandatory disclosures required of parties early in the litigation, and failure to follow the requirements can have major implications for your client.

$95.00Audio CD Add to Cart

What In-House Counsel Should Know about the NIST and AICPA Frameworks and other Steps to Mitigate or Avoid Cybersecurity Risks and Threats

Program Number: 2733 Presenter: Michael Pinna, CPA

This program describes the problem of cybersecurity, including common vulnerabilities that can be exploited in order to gain unauthorized access to systems and data, and discusses some common frameworks, such as the National Institute of Standards and Technology ("NIST") Cybersecurity Framework and the new American Institute of Certified Public Accountants (“AICPA") Cybersecurity Risk Management Framework that can be used to understand and address the cybersecurity risks and threats in any type of organization. Also covered are cyber liability insurance which is becoming more prevalent in today’s marketplace, and key steps that organizations should consider implementing to make an immediate impact in their cybersecurity risk profile.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Long Live Open Source! Current Developments for IP, Technology, Corporate, and Compliance Attorneys

Program Number: 2728 Presenter: Jason D. Haislmaier, Esq., Matthew Jacobs, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Open source software burst onto the scene over a dozen years ago, and since then, the pervasiveness and importance of open source has only continued to grow. Today, the growth of open source is driving an expanded range of legal and regulatory issues, including: • Addressing open source compliance in cloud and hosted environments • Understanding new open source license enforcement efforts • Vetting open source for IT security concerns • Dealing with open source risk in corporate transactions Keeping pace with these issues poses new challenges, both for companies with established compliance programs and those still relatively new to open source. Join our presenters for a discussion of these issues and solutions to help address them.

$95.00Audio CD Add to Cart

Dealing with Data Privacy and Data Security in Cloud and IT Vendor Agreements: A Guide for In-House Counsel

Program Number: 2725 Presenter: Jason D. Haislmaier, Esq.

While cloud computing and other hosted and online services have become fundamental resources for many companies, using them can also lead to significant legal concerns over data privacy and security. As a result, the provisions involving these issues in such service agreements have become hotly contested. Join Jason Haislmaier of Bryan Cave LLP as he discusses significant data privacy and security concerns that can arise in cloud and other hosted and online services agreements and provides tools for addressing these issues and mitigating the risks that come with them.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Conducting a Data Privacy Assessment: Scanning for Gaps in an Organization’s Privacy Program

Program Number: 2719 Presenter: David A. Zetoony, Esq.

Conducting an audit of an organization’s data privacy practices can be imposing. In this program of particular interest to all in-house and corporate counsel, including those involved in technology, compliance and corporate governance laws, David Zetoony, the Chair of Bryan Cave LLP’s data privacy and security team, discusses various methods for auditing compliance with United States data privacy laws.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Separating Fact from Fiction: Understanding, Providing for, and Mitigating the Actual Liabilities of a Cyber Attack

Program Number: 2718 Presenter: Tim Burke, MBA, David A. Zetoony, Esq.

There are numerous data privacy and security laws, and considerable disinformation concerning the legal liabilities associated with their non-compliance. One of the most poorly understood areas by attorneys involves the costs that a security/privacy event may have on their clients, or organizations, in terms of legal liabilities, first party expenditures and reputation. This program discusses how an attorney can help a client identify and quantify the various legal risks involved with privacy and data security, and how to take steps to mitigate and deal with those liabilities.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories