Print Catalog:

Programs in Intellectual Property Law



Filter by State
Filter by Category
 
 

Complying with the EU General Data Protection Regulation (GDPR): Revising Incident Response Plans and Data Breach

Program Number: 2818 Presenter: Christopher M. Achatz, Esq., David A. Zetoony, Esq.

This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the obligations that the GDPR imposes in Articles 33 and 34 to respond in the event of a data breach. The program explores changes to incident response plans that may be needed to document compliance. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Complying with the EU General Data Protection Regulation (GDPR): Data Subject Requests

Program Number: 2817 Presenter: David A. Zetoony, Esq.

This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the rights provided to data subjects in Articles 16-20. The program explores the ways in which companies seek to comply with requests by data subjects to exercise those rights, and provides practice pointers for the creation of such policies. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Complying with the EU General Data Protection Regulation (GDPR): Conducting Data Inventories

Program Number: 2816 Presenter: David A. Zetoony, Esq.

This program discusses the requirements of the EU General Data Protection Regulation (“GDPR”), which becomes effective May 2018, with specific focus on the requirements of Article 6, to have a permissible purpose with respect to all data processed, and Article 30, to keep records of processing activities. The program explores the ways in which companies seek to comply with these requirements and discusses in particular the use of data inventories or data maps as a compliance tool, and addresses the challenges that organizations face when attempting to conduct such inventories/maps. A must program for in-house, corporate and compliance counsel for companies needing to comply with the new European data privacy and security regulations.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Data Privacy and Security Issues in M&A Transactions for Transactional, Technology and Corporate Lawyers

Program Number: 2813 Presenter: Jason D. Haislmaier, Esq.

Data privacy and data security present unique obligations and potentially significant liabilities for both buyers and sellers involved in M&A transactions. In addition, data itself is now often a key asset in driving the value of many M&A transactions. Starting with the initial stages of a deal, and extending through negotiation and signing to post-closing integration, this program focuses on strategies for identifying and addressing these obligations and liabilities, while capturing and preserving the value of data in M&A transactions.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What Attorneys Should Know about the Ever-Expanding Role of Open Source and Third-Party Software in Cybersecurity

Program Number: 2812 Presenter: Jason D. Haislmaier, Esq.

As open source software has grown in importance, so too have the number of cybersecurity breaches involving hackers exploiting vulnerabilities in open source software. In this program of particular interest to IP, technology, corporate, and compliance attorneys, Jason Haislmaier examines the intersection of open source software and cybersecurity. Topics include: the legal and regulatory risks involved in the use of open source software, the role open source has played in several high-profile security incidents, lessons learned regarding the unique security challenges posed by open source, and actions to take to address those challenges.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Key Legal Issues in the Internet of Things

Program Number: 2749IP Presenter: Brian A. Jones, Esq., Amol Parikh, Esq.

Internet of Things (IoT), including artificial intelligence and robotics, have now entered the mainstream social narrative. However, the proliferation of this exciting and transformative technology raises a wide range of legal issues. This presentation focuses on the key legal issues surrounding the Internet of Things, including data ownership and privacy, security, intellectual property, and product liability, as well as ethical implications of the use of such technology.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What In-House, Corporate and Securities Counsel Should Know about System and Organization Controls (SOC) Reports and their Applicability to Reporting on Internal Controls

Program Number: 2743 Presenter: Michael Pinna, CPA

In today’s world, almost every type of public or private company needs to assess its internal control environment. This is especially true of public and SEC registered companies which are required to report on their internal control environments in their annual reports and filings. With technological, cybersecurity and other issues that have arisen, System and Organization Controls (SOC) Reports necessarily have become the standard for assessing internal controls as the reporting has become more complex. This program provides a brief history of the SOC reporting landscape; an understanding of the types of SOC reporting (i.e., SOC 1, SOC 2, SOC 3, and the new SOC for Cybersecurity) and their reporting structures and coverages; and an overview of recent changes to the SOC standards.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

What Attorneys Should Know about Advising Boards and Management on How to Avoid Struggles When it Comes to Data Breaches

Program Number: 2742 Presenter: David A. Zetoony, Esq.

Boards and senior management often look to attorneys to advise them when a data breach arises. Providing sound and practical legal advice can be complicated if management has not gone through a data breach before, and does not understand the legal implications of the choices that they may make. This program focuses on how attorneys can explain the legal implications of a data breach in order to help management make decisions, either before or after a breach occurs, concerning how the company can position itself.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Remedies in Trademark Infringement Litigation

Program Number: 2741IP Presenter: Anthony F. Lo Cicero, Esq.

When planning litigation for trademark infringement, attorneys should consider the nature of the remedies available, legal and equitable. These remedies, if obtained, will often determine success or failure in the eyes of the client. Anthony Lo Cicero of Amster, Rothstein & Ebenstein LLP explains the ways to obtain available remedies, preliminary and permanent injunctive relief, destruction of merchandise, awards of actual and statutory damages, disgorgement of profits and more.

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Ethics and Cybersecurity: A Lawyer’s Professional Obligations under New ABA Formal Opinion 477R, Opinion 99-413, and the ABA Model Rules

Program Number: 2739 Presenter: David A. Zetoony, Esq.

In addition to complying with data security statutes and regulations, lawyers must comply with ethical obligations under the rules of professional conduct to protect their clients’ privacy and security. In this program, David Zetoony covers the attorney’s ethical considerations including requirements under ABA Model Rule 1.1, Model Rule 1.6(c), new ABA Formal Opinion 477R, Securing Communication of Protected Client Information, and its previous ABA Formal Opinion 99-413, Protecting the Confidentiality of Unencrypted E-Mail (1999).

$95.00Audio CD Add to Cart $95.00Online Audio Add to Cart

Categories