Warning: session_start() [function.session-start]: Cannot send session cookie - headers already sent by (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:1) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19

Warning: session_start() [function.session-start]: Cannot send session cache limiter - headers already sent (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:1) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19
Celesq® Attorneys Ed Center
Print Catalog:

Programs in Information Technology

Programs are available online to all firms wishing to assist their attorneys in obtaining their CLE credits. Please email customer.care@celesq.com to obtain a coupon code for your firm. Once an attorney has completed a program, your firm will be billed $30 each for the cost of each certificate which will be issued as a download once the attorney has completed the affirmation for the particular program. CDs will be available for all programs upon request. Please email customer.care@celesq.com to purchase CDs for any course. Cost will be $95.00 per CD, plus shipping and handling.



Filter by State
Filter by Category
 
 

“I’m the controller!” “No, I am!”: Joint Controllers under the GDPR

Program Number: 2943 Presenter: Sean Christy, Esq., Tyler Thompson, Esq.

The relationship between controllers and processors under the EU’s GDPR is well understood, but what if neither party is a processor? Is the relationship a data pool, a professional engagement, or a shared marketing program or service? In these and many other scenarios it is possible that the relationship is instead that of joint controllers. This program will take an in-depth look on how to determine when a relationship is between a controller and a processor, separate controllers, or joint controllers and the ramifications of each construct. Additionally, learn how to structure a contractual relationship between joint controllers and receive template documents designed to make the relationship clear and compliant. Finally, hear practical guidance from BCLP attorneys who have structured large joint controller relationships, including those processing large amounts of sensitive data.

$95.00Online Audio Add to Cart

Structuring Options for ESOP Transactions: Advanced Techniques for ERISA Counsel and Plan Sponsors

Program Number: 2920 Presenter: David R. Johanson, Esq., Roberta Casper Watson, Esq.

An employee stock ownership plan or “ESOP” can be an extremely useful tool in terms of tax and employee benefits that it provides and in the contexts of business succession planning and corporate mergers and acquisitions. The design and structure of ESOP transactions and the administration of ESOPs in general, however, remain subject to heightened scrutiny. To help ERISA counsel, accountants, and corporate directors and officers understand the statutory and regulatory framework that governs ESOP transactions, our panel will discuss applicable laws and regulations impacting ESOP transactions, available regulatory guidance, and other critical considerations for structuring ESOP transactions. This program on advanced structuring alternatives for ESOP transactions will address the available financing alternatives for ESOP transactions, ESOP transaction structure alternatives, how management incentive plans may factor into transaction planning and procedures, clawbacks and earn-outs in ESOP transactions, and potential conflicts of interests in structuring ESOP transactions.

$95.00Online Audio Add to Cart

Planning an Effective Response to a Cyber Incident

Program Number: 29108 Presenter: Carole Buckner, Esq., Christopher Todd Doss

A competent and effective response to a cyber incident requires advance consideration of many issues. In this program, Carole Buckner, Partner at the Procopio law firm in San Diego and a member of the firm’s Privacy and Cybersecurity Practice Group, and Christopher “Todd” Doss, Managing Director at Ankura in Washington DC, will assist attendees in developing an incident response plan in advance of a data breach. The speakers will discuss who should be on the incident response team, including internal and external members, and strategies for training for an effective response. The panel will also discuss the roles of legal counsel (in-house and outside counsel) in the development of a response strategy and preservation of attorney client privilege. Insurance considerations in a data breach incident will be addressed. Partnering with an external forensic consultant is a cornerstone of a strong incident response plan, both to address the breach and

$95.00Online Audio Add to Cart

Issues Facing In-House Counsel Working on Autonomous Vehicles

Program Number: 2910 Presenter: Jeffrey Jones, Esq.

This program will cover ethical issues and other unique questions facing in-house counsel working on Autonomous Vehicles, including the artificial intelligence applied in Autonomous Vehicles and the regulatory environment applicable to such work. The program will explore the applicable rules of professional responsibility, hypothetical considerations for debate and analysis, and the regulatory framework that may impact such issues.

$95.00Online Audio Add to Cart

Blockchain for Lawyers 101

Program Number: 2909 Presenter: Jason D. Haislmaier, Esq.

Blockchain technology has swiftly risen to become one of the hottest technology (and legal) topics of today. While the "blockchain" is often equated with crypto-currency, the true impact of blockchain technology is being felt across a far wider variety of industries. Join us for this webinar to learn about the history of blockchain technology, how blockchain technology operates, the role it is playing in shaping current and future technologies, and the legal impact of those technologies.

$95.00Online Audio Add to Cart

How Do You Solve a Problem Like E-mail

Program Number: 2903 Presenter: Therese Craparo, Esq., Anthony J. Diana, Esq.

For years, e-mail has been both a vital communications tool and a growing liability for many organizations. While e-mail may contain critical business records and data subject to legal hold, years of lax management, exponentially increasing volumes, and changing or aging e-mail systems present significant cyber-security, data privacy, litigation and operational risks. And with the advent of technology platforms that allow for more sophisticated indexing and analysis of data, including Microsoft 365, cleaning-up historical e-mail and developing processes that leverage new technology will be transformative for e-mail risk management. This program will review strategies for managing the risks associated with e-mail, including retention, Records categorization, legal hold implementation, auto-disposal, and centralization and will review case studies on: (i) the use of record classification technology to categorize 1.5 billion e-mail messages; (ii) the centralization of multiple e-mail data sources and billions of e-mail to facilitate retention, legal hold management and automated disposal; and (

$95.00Online Audio Add to Cart

Defensibly Deleting Data

Program Number: 2856 Presenter: Anthony J. Diana, Esq.

With the rising risks associated with retaining large volumes of data, such as the regulatory focus on cyber-security and data privacy, organizations (with the urging of board members and investors) have made a priority of disposing of data and documents that are not needed for business or required to meet regulatory and legal obligations. Unfortunately, most organizations have neglected the management of documents and data for many years, and developing a program to routinely dispose of documents and data requires a balancing of risks and costs by a multi-disciplinary team (Legal, Compliance, Records, IT and the business). This program will provide some key lessons learned by a team who has assisted organizations defensibly decommission thousands of legacy systems, defensibly dispose of millions of boxes, and defensibly delete billions of electronic documents.

$95.00Online Audio Add to Cart

Cross-Border Discovery After the GDPR

Program Number: 2855 Presenter: David R. Cohen, Partner

The new European General Data Protection Regulation imposes strict restrictions on the processing, transfer and retention of documents containing information about European data subjects. Violations of the GDPR, even if only to comply with U.S. discovery obligations, can be met with fines of up to 20 Million Euro, or 4% of a company's world-wide gross revenue. So what should companies do when faced with discovery obligations relating to data located in Europe or concerning European data subjects? Is there any middle ground to comply with both U.S. and European law? This program will cover key parts of the GDPR and options for compliance.

$95.00Online Audio Add to Cart

Categories