Missed a live conference? Experience the full conference online and earn CLE credits – on your time.
eConferences are CLE accredited in Texas and California.
If you need credit for an eConference in other states please read through the disclaimer before purchasing an eConference to make sure you will be able to self-report your MCLE credit after completion of the eConference.
Sessions and available hours may vary from live conference. Review the credit hours next to each eConference to verify the number of hours available. eConferences are available 6-8 weeks after the live conference.
For the best viewing experience, participants are encouraged to use Google Chrome web browser.
Data breaches are increasingly inevitable—and potentially devastating—to companies of all sizes. Essential Cybersecurity Law is an extensive program designed to walk through key phases and legal issues relating to breach preparedness and response. Hear directly from top officials at HHSC, DOJ, and the SEC, get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach. Topics include:
Cybersecurity Regulation and Enforcement, including HIPAA Compliance and HHS Enforcement
Internal Controls and Compliance
Incidence Response and Breach Disclosure
Privacy and Data Security in an Increasingly Globalized World
The In-House Perspective on Managing Cybersecurity
If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this course is for you.
UT Law’s Technology Law eConference brings together a nationally recognized faculty of technology and licensing practitioners, in-house counsel from leading tech companies, and experts in copyright, trademark, open source, and data privacy and security for the latest issues affecting the technology industry.
This year's program features:
A discussion of current technology policy and possible impacts under a Trump administration
Advanced licensing and service agreements—understanding key terms, practical negotiation and drafting strategies, and perspectives from the federal bench
Negotiating open source warranties and indemnities
GDPR Readiness in 2017
A look at the current cyber threat landscape and emerging issues for executive officers and board members
Innovative Approaches to Protecting IP in the Technology Sector
Programmable Money and the Future of Contracts
Key issues in technology M&A: the influence of activist shareholders, and navigating due diligence in technology transactions
Immigration Update: Trump-Era Policies and Impacts on the Technology Sector
A panel of U.S. District Court Judges discussing current issues in technology law and best practices as they occur in federal litigation
UT Law’s 31st Annual Technology Law eConference brings together a nationally-recognized faculty of technology and licensing practitioners, in-house counsel from leading tech companies, and experts in open source, data privacy and security, and emerging technology for the latest issues affecting the industry. This year’s program features:
A presentation by Texas Law Professor Robert M. Chesney on National Cybersecurity Policy and Security Issues.
GDPR is Effective Today!, with updates and discussion on compliance considerations.
Advanced licensing strategies and updates; plus discussion on the enforcement of open source and community licenses through copyright infringement.
A look at Core Aspects of Federal Procurement Law in Technology Transactions including the new cyber-security requirements for government contractors.
Practical tips for navigating ethical issues that arise in negotiating commercial and technical contracts abroad.
An in-house counsel discussion on current cybersecurity challenges and trends.
An easy-to-understand overview of cryptocurrencies, tokens, blockchain and other applications.
The latest law and policies surrounding self-driving cars and drones.
“Make or break” legal issues for startups, from entity formation to financing to regulatory compliance.
Key Considerations in the Acquisition of Private Technology Companies.
An essential ethics presentation on Law Firm Data Security and the Ethical Duty for Technology Competence.
A presentation on Technology and Access to Justice.