Warning: session_start() [function.session-start]: Cannot send session cookie - headers already sent by (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:1) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19

Warning: session_start() [function.session-start]: Cannot send session cache limiter - headers already sent (output started at /www/sites/www.celesq.com/files/app/modules/programs/controller/programsController.class.php:1) in /www/sites/www.celesq.com/files/lib/classes/BSession.class.php on line 19
Celesq® Attorneys Ed Center
Print Catalog:

Programs in Securities & Investing

Programs are available online to all firms wishing to assist their attorneys in obtaining their CLE credits. Please email customer.care@celesq.com to obtain a coupon code for your firm. Once an attorney has completed a program, your firm will be billed $30 each for the cost of each certificate which will be issued as a download once the attorney has completed the affirmation for the particular program. CDs will be available for all programs upon request. Please email customer.care@celesq.com to purchase CDs for any course. Cost will be $95.00 per CD, plus shipping and handling.



Filter by State
Filter by Category
 
 

FISA: More of Everything You Didn’t Know

Program Number: 2946 Presenter: George W. Croner, Esq.

Electronic surveillance represents the most important foreign intelligence collection tool available to the U.S. government. Correspondingly, the ability to surveil constitutes one of those activities most susceptible to abuse by a government against its citizens. In the U.S., the government’s use of electronic surveillance is highly regulated and can be conducted for only two purposes: law enforcement, which is undertaken by both federal and state governments; and foreign intelligence collection, which is an exclusively federal government function conducted pursuant to a single authority - the Foreign Intelligence Surveillance Act or “FISA”. FISA governs not only electronic surveillance but the use of physical searches, pen registers, trap and trace devices, and business records collection to acquire foreign intelligence. It permits surveillance and other intrusive activities in the United States both with, and in limited circumstances, without a warrant. It covers virtually every major intelligence collection effort used by

$140.00Online Audio Add to Cart

Inspector General Whistleblower Investigations – How They Work & How to Manage if Under Investigation

Program Number: 2945 Presenter: Margaret Cassidy, Esq.

Federal Government inspector general offices are required to investigate whistleblower complaints against contractors in certain circumstances. If your company does business with the federal government, it is important to know: How inspector general offices work, When IG’s must investigate whistleblower complaints, How the “new” DoD alternative dispute resolution process for whistleblower complaints work, and What your company can do to mitigate the risk of an inspector general investigation as well as how to manage if your company is under investigation. This CLE will discuss applicable laws, regulations and best practices on making it through an IG investigation.

$95.00Online Audio Add to Cart

“I’m the controller!” “No, I am!”: Joint Controllers under the GDPR

Program Number: 2943 Presenter: Sean Christy, Esq., Tyler Thompson, Esq.

The relationship between controllers and processors under the EU’s GDPR is well understood, but what if neither party is a processor? Is the relationship a data pool, a professional engagement, or a shared marketing program or service? In these and many other scenarios it is possible that the relationship is instead that of joint controllers. This program will take an in-depth look on how to determine when a relationship is between a controller and a processor, separate controllers, or joint controllers and the ramifications of each construct. Additionally, learn how to structure a contractual relationship between joint controllers and receive template documents designed to make the relationship clear and compliant. Finally, hear practical guidance from BCLP attorneys who have structured large joint controller relationships, including those processing large amounts of sensitive data.

$95.00Online Audio Add to Cart

The Business of Online Business: Session One - Domain Names and Domain Name Disputes

Program Number: 2941 Presenter: Shari Claire Lewis, Esq.

Every business with a website is an e-business and, as a result, face challenges that are unique to online commerce and twists on traditional ones. For example, the maxim “location, location, location” applies in the virtual world as much as in the physical realm. In this first session, we will discuss issues concerning Internet domain names – an e-business’s virtual name, address and introductory marketing statement. We will explore the explosive growth of top-level domains as potential new “neighborhoods” in the virtual world. We will also cover cybersquatting and reverse cybersquatting, which continue to impact domain name use, and the variety of venues where a claim may be heard. We will review recent criteria that courts and dispute resolution groups consider in assessing whether a domain name registration has an improper commercial purpose, as well as the various dispute resolution practices offered by the domain name registrars as potential alternatives

$95.00Online Audio Add to Cart

DOL Issues New Guidance Rescinding the 20% Rule: What This Means for Managing Tipped Employees

Program Number: 2939 Presenter: Justin R. Barnes, Esq., Eric Magnus, Esq.

On November 8, 2018, the Wage and Hour Division of the Department of Labor (DOL) rescinded the so-called “20% Rule,” which purported to segregate the duties of tipped employees between allegedly tip-generating duties and related non-tipped duties (sometimes referred to as a “side work”), and thereby limit the availability of the tip credit. The rule has been replaced with prior DOL guidance issued in 2009. Speakers Eric Magnus and Justin Barnes will discuss the new guidance, implications of this change for the service industry, and offer advice on how employers can assign work to tipped employees without jeopardizing use of the tip credit.

$95.00Online Audio Add to Cart

Class Action Settlements: Getting Approval to Get the Deal Done

Program Number: 2935 Presenter: Michael Thompson, Esq.

After months or years of hard-fought litigation, you’ve reached a settlement of a class action lawsuit. The settlement procedure, however, has more steps than your typical settlement. In this program, Michael Thompson and Redi Kasollja will guide you through the class action settlement process. From drafting the agreement through final approval, Michael and Redi will give you tips and alert you to pitfalls that will help you get through the class settlement process unscathed.

$95.00Online Audio Add to Cart

A FISA Primer- Everything You Didn’t Know, You Didn’t Know

Program Number: 2878 Presenter: George W. Croner, Esq.

Electronic surveillance represents the most important foreign intelligence collection tool available to the U.S. government. Correspondingly, the ability to surveil constitutes one of those activities most susceptible to abuse by a government against its citizens. For years, electronic surveillance for foreign intelligence purposes was considered an exclusively Executive Branch authority, and every president from Franklin Roosevelt to Richard Nixon authorized its use. When serious abuses by U.S. intelligence agencies were revealed during congressional hearings held in the aftermath of Watergate, Congress reacted by passing the Foreign Intelligence Surveillance Act which, for the first time, subjected foreign intelligence electronic surveillance conducted in the United States to a statutory regimen that included approval by a newly created Foreign Intelligence Surveillance Court. Today, there is more discussion, and controversy, about FISA than at virtually any other time in its history. This program is going to discuss the evolution of the use

$95.00Online Audio Add to Cart

Mastering Bitcoin, Blockchain and Digital Currency Law

Program Number: 2873a Presenter: John Rafferty, Esq.

Bitcoin and other cryptocurrencies are unique from other currencies in that they exist on a continuously growing, immutable database, that when linked together, form a blockchain. Cryptocurrencies are largely decentralized and as such, are subject to competing regulations. This raises some interesting legal issues, especially with regard to the recovery of lost assets. In 2018, individuals around the world are using hundreds of different cryptocurrencies to pay for coffee, new homes and even legal services. But blockchain-use cases are not limited just to cryptocurrency. Increasingly, blockchains are being used for supply-chain management, intellectual property, fraud detection, regulatory compliance, audits, data storage and even smart-contract creation.

$95.00Online Audio Add to Cart

The Practical Guide to the California Consumer Privacy Protection Act

Program Number: 2868 Presenter: David A. Zetoony, Esq.

The California Consumer Privacy Protection Act of 2018 (“CPPA”) is arguably the most comprehensive - and complex - data privacy regulation in the United States. The CCPA was designed to emulate the European General Data Protection Regulation (“GDPR”) in many respects. The program will address how the CCPA is like, and how it differs from, the GDPR, and practical steps that companies should take to come into compliance with the regulation. The program’s presenter, a partner at the law firm of Bryan Cave Leighton Paisner, has been ranked by Lexology as the most read author on data privacy and security in the world, and is the author of the American Bar Association’s General Data Protection Regulation: Answers to the Most Frequently Asked Questions.

$95.00Online Audio Add to Cart

Cyber Liability 101: The Threats of Cyber / Data / Network Liability

Program Number: 2864 Presenter: Ralph A. Pasquariello, CLCS

The exposure to Cyber threats for companies has escalated over the past 10 years. What was once a random act, simple hacking has grown into a wave of unstoppable organized crime. Firewalls are no longer a defense for the pinpoint accuracy of Spear Phishing. The criminals of the past that stole simple information and data have been replaced by massive attacks resulting in severe business interruption, ransom demands, and information/data destruction. Cyber security is a must, but more import is a Cyber Liability Insurance Policy which will cover your costs in the event of a Cyber Attack. There are many facets of Cyber-crime with its endpoint targets constantly changing, thus: the need for carefully designed coverages which can blend Cyber/Crime/Technology coverages to defend today’s electronic perils.

$95.00Online Audio Add to Cart

Categories