Celesq® Attorneys Ed Center
Print Catalog:

Programs in Technology Law

** URGENT UPDATE **

Our checkout cart is not currently working properly. In an effort to continue addressing your CLE needs, we would like to offer you a manual solution. Please go through our programs list. If you see a program that you would like to take to help satisfy your CLE needs, and it is past the program date (future dates are not yet available, of course), please send us the name of the program and the program number associated with it.

We will send you: 1) the audio file 2) the pdf of the presentation materials and 3) a manual affirmation form that you can fill out affirming that you listened to the entire program.

Once we receive the affirmations from you, we will issue manual certificates that you will be able to use to certify your CLE requirements.

Thank you so much and we apologize for the extreme inconvenience.

Please email customer.care@celesq.com with the above mentioned requests and we will get back to you as soon as possible!

Filter by State
Filter by Category
 
 

One Step Ahead of the Bad Guys: Preventing and Responding to Ransomware Attack (02/12/2021)

Program Number: 3139 Presenter: Tony Kirtley, Jena M. Valdetero, Esq

It seems you can’t read the news without seeing a story about another company who fell victim to a ransomware attack. This CLE will cover the legal landscape of preventing a ransomware, including regulatory requirements concerning minimum cybersecurity measures, and responding to a ransomware attack, including how to comply with the patchwork of laws governing data breaches and recent U.S. Treasury warnings on paying a threat actor. You’ll also hear from a forensic investigation specialist for inside tips on preventing and responding to ransomware attacks from a technical perspective.

$95.00Audio Tape Add to Cart

Targeting Law Firms: Inside the Cyber Criminal Economy (01/22/2021)

Program Number: 3133 Presenter: Mark Sangster

Law firms are a proven target for everything from smash-and-grab, fraudulent wire transfers, to sophisticated and elaborate schemes designed to garner a huge criminal payday after crippling your firm. Unfortunately, most firms don’t take the threat seriously or see their adversary as opportunistic amateurs. The reality is, a robust cybercriminal economy exists to bring together experts in phishing lures, intrusion and exfiltration of data, malware deployment and detonation, the fencing of stolen data and laundering of ransoms. Mark Sangster cybersecurity expert and author of “No Safe Harbor: The Inside Truth About Cybercrime and How to Protect Your Business” as he exposes the economic operations and technical apparatus behind real world cyberattacks, and provides a lightweight framework that law firms can protect their business and clients.

$95.00Audio Tape Add to Cart

What is “Authorized Access” and How Do Employers Deal with Misuse of Access Credentials Post-VanBuren vs United States (02/03/2021)

Program Number: 3122 Presenter: Michelle A. Schaap, Esq.

As this summary is being written on December 1, 2020, the United States Supreme Court is considering the fate of the Computer Fraud and Abuse Act (“CFAA”) in Van Buren v. United States. CFAA had been used by employers in certain circuit courts successfully to hold employees accountable for misuse and/or misappropriation of employers’ data to which the employees were otherwise authorized to access in the course of their employment. At the time this program is presented, we expect the Court will have rendered its ruling in Van Buren. Regardless of the fate of the CFAA, employers can and should employ other means, statutorily, contractually, and technologically, to protect their trade secrets and other confidential and proprietary information from misuse, exfiltration and alteration. Moreover, for employers who are attorneys, they are ethically required to not only keep client information confidential, but to stay abreast technology that may facilitate the protection of

$95.00Audio Tape Add to Cart

To Embed, or Not to Embed, that is the Question (01/22/2021)

Program Number: 3114 Presenter: Michael D. Hobbs, Jr. Esq., Shaleen J. Patel, Esq.

A discussion on an increasingly tumultuous area of on-line copyright law. The discussion focuses on a trend where courts are increasingly allowing cases to proceed on the merits in instances of media publishers embedding, a practice of displaying content from one platform into another without actually hosting the underlying content. For years, such a practice seemed safe under the Ninth Circuit’s “server test.” However, districts in other circuits are rejecting that the server test is settled law and questioning the legality of embedding. As social media makes embedding content a more available feature, this broadcast discusses the risks of continuing to embed content without first acquiring permission and possible alternatives.

$95.00Audio Tape Add to Cart

Evolving Foreign Trade Risks Under CFIUS: What Lies Ahead? (02/10/2021)

Program Number: 3112 Presenter: Michael Clark, Esq., Alan F. Enslen, Esq., Aldo M. Leiva, Esq., Hon. Joe D. Whitley, Esq.

The panelists will provide an overview of key changes to U.S. dual-use export controls in the past 18 months and enforcement initiatives relating to ongoing interagency efforts to designate and safeguard U.S. emerging and foundational technologies, and the continued evolution of regulations and policies governing national security reviews of foreign direct investment into the United States—along with observations about the anticipated status of these initiatives in the next year. Attention will also be given to cybersecurity due diligence for covered transactions, how investigations get launched, opportunities for assisting clients, such as internal investigations and examining compliance issues, and an overview of potentially applicable federal statutes that may be implicated.

$95.00Audio Tape Add to Cart

Everything You Wanted to Know About Blockchain But Didn’t Know to Ask (02/19/2021)

Program Number: 3110 Presenter: Dr. Sharon Meit Abrahams, Valerie Pennacchio, Esq., Teresa Walker, Esq.

You may be familiar with Bitcoin or other cryptocurrencies but do you know anything about the underlying technology and why it will become so important to the legal industry? Of all the emerging technologies, blockchain, also referred to as distributed ledger technology (DLT) might be the least understood. We are all searching for truth these days and to find resources upon which we can depend, especially in the legal industry. Learn about how blockchain technology is already in use in the legal industry and consider ways in which it will continue to grow in the industry.

$95.00Audio Tape Add to Cart

How to Ethically Mitigate Risk in Remote Meetings and Depositions (01/12/2021)

Program Number: 3105 Presenter: Joanna Storey, Esq.

Many elementary school students have mastered the art of remote meetings during distance learning, but some seasoned lawyers still do not understand how to effectively use mute. In this 60-minute presentation, we navigate through the risky waters of using remote depositions and meetings in your law practice. We offer practical tips for meeting four primary ABA Model Rules of Professional Conduct: Competence (Rule 1.1), Communications (Rule 1.4), Confidentiality of Information (Rule 1.6) and Responsibilities Regarding Nonlawyer Assistance (Rule 5.3). The key takeaways will be understanding the technology, training, practicing and being mindful of your video and audio surroundings.

$95.00Audio Tape Add to Cart

Filters, Curse Words, and “Lessons Learned”: Best Practices and Tips for Effective Discovery Searches (04/23/2020)

Program Number: 3081 Presenter: Todd Heffner, Esq.

In this one-hour CLE learn some of the most cost-effective processes, filters, searches, and technologies to aid in document review. While it may seem counter-intuitive, the point of document review is not to review documents. Instead, the point of document review is to identify relevant documents that will be used moving forward. To achieve that goal, this CLE will give you ideas and strategies to implement for when reviewing every single document is not an option.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Demystifying Blockchain and Cryptocurrencies (05/07/2020)

Program Number: 3078 Presenter: David Kalat

In conventional usage, the term “hacking” generally refers to an unauthorized user gaining access to an electronic resource. Hackers use various means to steal, guess, calculate, or otherwise obtain credentials to access systems and data they are not allowed to access. When we talk about “hacking” a blockchain, however, this does not adequately or accurately describe what has happened and blinds us to understanding where the real risks lie in this new technology of distributed ledgers and crypto-assets. The high-profile, most destructive, and expensive “hacks” in blockchain environments actually represent *authorized* users misbehaving. In some cases, these are authorized users acting on their own behalf to exploit weaknesses in the system to their own gain at the expense of other users, in other cases these are authorized users who are misusing the trust placed in them by their customers. The key to protecting yourself against fraud in this new alien

$95.00Online Audio Add to Cart

Fintech 2020 and Beyond: The Decade of Regulatory Collaboration (03/17/2020)

Program Number: 3073 Presenter: Joann Needleman, Esq.

The past two decades have seen rapid expansion and exponential growth of financial services technology (“fin-tech”) and financial services innovation. After a decade of intense regulation of the financial services industry, regulators are now looking to promote financial innovation through regulatory engagement. This webinar will explore the opportunities financial services entities have both at the state and federal level to engage regulators with new ideas that can promote new ways to deliver financial services product and services.

$95.00Online Audio Add to Cart

Categories