informative
Technical Questions?
512.475.6700
service@utcle.org
Includes: Video Audio Paper Slides
Art Ehuan, Robyn K. Bacon, LeeAnne Pelzer, Stefan Richards
Download session materials for offline use
The term "Reasonable Security" is appearing in news headlines and inside court rooms. Regulators are increasingly conducting examinations of breached corporations to determine if preventative “Reasonable Security” measures are being deployed across the enterprise. Class action litigation representatives are also questioning, if a lack of "Reasonable Security” contributed to breaches in their complaints. Hear how “Reasonable Security” can be achieved across the pillars of people, process, and technology--including the implementation and management of proactive "Reasonable Security" measures. And explore how to evaluate and measure if “Reasonable Security” is in place, and how to identify gaps that may exist in a cybersecurity program.
Originally presented at: Jul 2020 Essential Cybersecurity Law
Art Ehuan,
Crypsis - McLean, VA
Robyn K. Bacon,
Munger, Tolles & Olson LLP - Los Angeles, CA
LeeAnne Pelzer,
Crypsis - McLean, VA
Stefan Richards,
CorVel - Portland, OR
Daniel J. Felz, Wim Nauwelaerts
Download session materials for offline use
Originally presented at: Jul 2020 Essential Cybersecurity Law
Daniel J. Felz,
Alston & Bird LLP - Dallas, TX and Brussels, Belgium
Wim Nauwelaerts,
Alston & Bird - Brussels, Belgium
Wendy Elsa Bozzolasco, Devika Kornbacher
Download session materials for offline use
Enforcement of the California Consumer Privacy Act is set to commence in July 2020. Explore how companies are grappling with how to integrate the recently revised CCPA regulations into their ordinary business activities. Hear practical guidance on operationalizing compliance with the CCPA as well as other state data privacy laws (e.g., Illinois’ Biometric Information Protection Act).
Originally presented at: Jul 2020 Essential Cybersecurity Law
Wendy Elsa Bozzolasco,
SunPower - Austin, TX
Devika Kornbacher,
Vinson & Elkins LLP - Houston, TX
Elizabeth Rogers, Jeff Adams, George R. Gooch, Elaine Nicholson
Download session materials for offline use
Originally presented at: May 2020 Technology Law Conference
Elizabeth Rogers,
Michael Best & Friedrich LLP - Austin, TX
Jeff Adams,
WP Engine - Austin, TX
George R. Gooch,
Texas Health Services Authority - Austin, TX
Elaine Nicholson,
City of Austin - Austin, TX
David M. Hoffman, Robert Arthur Rodriguez
Download session materials for offline use
Modern companies are awash in data. Employees generate it and are usually looking for the most efficient way to share it internally and externally. Review the myriad of problems that can occur even with the most well-meaning of employees. From the possible export control risks of emailing technical information to an overseas colleague, to using Dropbox and other file sharing sites to exchange information, to providing data to contract employees, and more, explore the state of the law as it relates to data and what can happen if you lose control of it.
Originally presented at: May 2018 Technology Law Conference
David M. Hoffman,
Fish & Richardson P.C. - Austin, TX
Robert Arthur Rodriguez,
Advanced Micro Devices - Austin, TX
William R. Daugherty, Andy Sawyer
Download session materials for offline use
Explore the ethical and legal obligations of attorneys and law firms to protect client data and communications from the latest cybersecurity threats.
Originally presented at: Apr 2018 Oil, Gas and Mineral Law Institute
William R. Daugherty,
Baker & Hostetler LLP - Houston, TX
Andy Sawyer,
Locke Lord LLP - Dallas , TX
Arnold J. Johnson
Ethics and professionalism are being influenced by many factors in today’s global environment. Consider some of these factors, along with areas of commonality amongst the legal ethics rules from a sampling of jurisdictions.
Originally presented at: Jun 2015 International Upstream Energy
Arnold J. Johnson,
Noble Energy Inc. - Houston, TX