Celesq® Attorneys Ed Center
Print Catalog:

Programs in Privacy and Data Security

** URGENT UPDATE **

Our checkout cart is not currently working properly. In an effort to continue addressing your CLE needs, we would like to offer you a manual solution. Please go through our programs list. If you see a program that you would like to take to help satisfy your CLE needs, and it is past the program date (future dates are not yet available, of course), please send us the name of the program and the program number associated with it.

We will send you: 1) the audio file 2) the pdf of the presentation materials and 3) a manual affirmation form that you can fill out affirming that you listened to the entire program.

Once we receive the affirmations from you, we will issue manual certificates that you will be able to use to certify your CLE requirements.

Thank you so much and we apologize for the extreme inconvenience.

Please email customer.care@celesq.com with the above mentioned requests and we will get back to you as soon as possible!

Filter by State
Filter by Category
 
 

Lessons in Disaster: Learning from Law Firm Cyber Breaches (02/23/2021)

Program Number: 3134 Presenter: Mark Sangster

Given an outcome, we often exaggerate our ability to predict and therefore avoid the same fate. In cybersecurity, this misconception can lead to a false sense of corporate security, or worse, bury the true causes of incidents and lead to repeated data breaches or business disrupting cyber incidents. In this session, we will explore real-world incidents and threats to assemble an actionable cyber resilience framework that adapts to distributed assets, remote workers, and virtual workloads.

$95.00Audio Tape Add to Cart

Evolving Foreign Trade Risks Under CFIUS: What Lies Ahead? (02/10/2021)

Program Number: 3112 Presenter: Michael Clark, Esq., Alan F. Enslen, Esq., Aldo M. Leiva, Esq., Hon. Joe D. Whitley, Esq.

The panelists will provide an overview of key changes to U.S. dual-use export controls in the past 18 months and enforcement initiatives relating to ongoing interagency efforts to designate and safeguard U.S. emerging and foundational technologies, and the continued evolution of regulations and policies governing national security reviews of foreign direct investment into the United States—along with observations about the anticipated status of these initiatives in the next year. Attention will also be given to cybersecurity due diligence for covered transactions, how investigations get launched, opportunities for assisting clients, such as internal investigations and examining compliance issues, and an overview of potentially applicable federal statutes that may be implicated.

$95.00Audio Tape Add to Cart

Evaluating a Vendor's Privacy Practices: The Rise of the Vendor Privacy Assessment Questionnaire (01/13/2021)

Program Number: 3102 Presenter: Karin E. Ross, Esq., David A. Zetoony, Esq.

Many companies have institutionalized the practice of conducting due diligence on their vendors’ security practices. A familiar component of the diligence process is to have a vendor complete a security assessment questionnaire or SAQ . Historically, vendor privacy due diligence has been a less common phenomena. New cases, statutes, rules, and regulations are changing that. The program will discuss the growing need and upward trend for conducting privacy due diligence in light of the European court of justice decision in Schrems II, the CCPA, and the CPRA. It will also provide in-house counsel with practical insights into what to include in a privacy assessment questionnaire, and how to institutionalize the practice of conducting them

$95.00Audio Tape Add to Cart

Privacy in the Skies: Navigating the New Federal Drone Privacy Law (04/10/2020)

Program Number: 3095 Presenter: Bradford P. Meisel, Esq., Diane D. Reynolds, Esq.

The new federal drone privacy law enacted as part of the FAA Reauthorization Act of 2018 imposes significant information privacy requirements on commercial drone operators in nearly all industries and sectors including requiring them to adopt and implement privacy policies governing all data collected by their drones and may effectively force commercial drone operators to comply with the emerging patchwork of state information privacy and security laws. This program will explain the new law's requirements, the relationship between the new law and the law governing the preemption of state information privacy laws as applied to aviation, and how to best assist commercial drone operators in developing and implementing compliant privacy policies and practices and ensure compliance with applicable state information privacy and security laws.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Digital Risks and Digital Duties: Finding a Standard of Care in Cyberspace - Part 1 (05/28/2020)

Program Number: 3090 Presenter: Michael A. Goode, Esq., James M. Paulino II, Esq.

In this two-part presentation, we will begin by discussing the patchwork of data privacy statutes, regulations and case law in an effort to define the baseline for reasonable security measures, and then apply these standards to recent breach events in the medical, construction, agricultural, retail, manufacturing, financial and legal industries to highlight common security failures, and opportunities for improvement. At the conclusion of the presentation, we will discuss best practices to consider to assist in reducing the risk of data breach incidences as well as the potential exposure in the event an incident occurs.

$95.00Online Audio Add to Cart

The Shield Act: Are You Compliant (05/20/2020)

Program Number: 3077 Presenter: Nick Akerman, Esq.

On March 20th a new law in New York went into effect requiring all businesses holding personal data belonging to New York residents to institute specific data security measures. Known as the “Stop Hacks and Improve Electronic Data Security Act" (the “Shield Act”), this new statute will be enforced by the New York Attorney General and mandates that a company must implement a number of “administrative, technical and physical safeguards” and appoint an employee to manage the cybersecurity program. Among other changes, the new law expands the definition of personal information and the definition of what constitutes a data breach. Failure to comply with this new statute authorizes the Attorney General to obtain statutory damages and the actual damages to consumers.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Legal Elements of Cybersecurity (02/13/2020)

Program Number: 3040 Presenter: John Lande, Esq.

Rarely a day goes by without news about a cybersecurity incident affecting a national company. Fraudsters are targeting companies of all kinds and sizes with the goal of divesting companies of their money and confidential information. This presentation will discuss current cybersecurity legal issues through the lens of real case studies, and specifically cover: (1) current threats, (2) liability issues, (3) insurance coverage, and (4) mitigating legal cybersecurity risk.

$95.00Audio Tape Add to Cart $95.00Online Audio Add to Cart

Botnet Extortion and Disparagement and Section 230: Do Businesses Have Any Recourse? (01/28/2020)

Program Number: 3037 Presenter: Bradford P. Meisel, Esq., Diane D. Reynolds, Esq.

Cybercriminals have presented targeted businesses with a frightening choice: pay up or have Botnets post thousands of negative reviews in a matter of minutes. Botnets, which are groups of computers controlled by a single person, have also famously flooded social media platforms with disparaging posts about politicians and political parties in the days before recent elections in the United States and other industrialized countries. Businesses, politicians, and other victims of Botnet-mediated disparagement seeking damages face a daunting obstacle in the form of Section 230, the controversial federal statute that immunizes computer service providers from liability for content provided by another person or entity. This program will examine the legal arguments regarding whether or not Botnet-mediated disparagement is subject to Section 230-a question which courts have yet to address. This program will also examine the intensifying debate in Congress regarding both the Botnet epidemic and Section 230 and how it could impact litigation

$95.00Online Audio Add to Cart

March 2020: How to Be Ready for New York’s New Data Protection Law (the SHIELD Act) (01/16/2020)

Program Number: 3032 Presenter: Nawa Lodin, Esq., Caroline A. Morgan, Esq.

On October 23, 2019, the Stop Hacks and Improve Electronic Data Security Act (the SHIELD Act) went into effect. The New York law imposes data breach notification requirements on any business that owns or licenses certain private information of New York residents, regardless of whether it conducts business in New York. In March 2020, the second part of the Act goes into effect, requiring businesses to develop, implement and maintain a data security program to protect private information. Through this course, attorneys can gain an understanding of the SHIELD Act with an emphasis on key actions businesses should take to comply, the penalties for not doing so, and cybersecurity best practices to mitigate loss.

$95.00Online Audio Add to Cart

Legal Ethics and Cyber Security 2020 (01/10/2020)

Program Number: 3031 Presenter: Carole Buckner, Esq.

Lawyers and law firms are at risk of data security breaches and must have reasonable measures in place to address cyber security. This presentation will discuss some of the practical risks associated with data security and the ethical obligations of lawyers in dealing with cybersecurity issues. A lawyer’s primary ethical duties involve the duty of competency, which requires a reasonable understanding of issues involving technology and data security, and the duty of confidentiality, which requires that lawyers take reasonable steps to protect their communications with clients and their clients’ electronic data, and the duty to disclose significant developments related to the representation, including possible security breaches. We will discuss ethics opinions concerning reasonable measures and preparation for cyber incidents, as well as several common scenarios including ransomware, phishing, lost laptops, missing smartphones, and cybersecurity when working remotely. In addition, we will discuss the availability of cyber insurance. In addition,

$95.00Online Audio Add to Cart

Categories