eCourse art

eCourse

Answer Bar: Global Data Security Considerations for the Corporate Client

Contains material from Jul 2015 to Aug 2020

Answer Bar: Global Data Security Considerations for the Corporate Client
4.17 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

informative

Technical Questions?
512.475.6700
service@utcle.org



Session 1: Is Reasonable Security Achievable in the Corporation? - The term "Reasonable Security" is appearing in news headlines and inside court rooms. Regulators are increasingly conducting examinations of breached corporations to determine if preventative “Reasonable Security” measures are being deployed across the enterprise. Class action litigation representatives are also questioning, if a lack of "Reasonable Security” contributed to breaches in their complaints. Hear how “Reasonable Security” can be achieved across the pillars of people, process, and technology--including the implementation and management of proactive "Reasonable Security" measures. And explore how to evaluate and measure if “Reasonable Security” is in place, and how to identify gaps that may exist in a cybersecurity program.

Session 2: International Privacy Laws and Enforcement

Session 3: The ABCs of Operationalizing the CCPA, BIPA, and Other State Data Privacy Laws - Enforcement of the California Consumer Privacy Act is set to commence in July 2020. Explore how companies are grappling with how to integrate the recently revised CCPA regulations into their ordinary business activities. Hear practical guidance on operationalizing compliance with the CCPA as well as other state data privacy laws (e.g., Illinois’ Biometric Information Protection Act).

Session 4: The Ultimate Cheat Sheet for Cybersecurity and Privacy ComplianceIt seems like a new global or domestic privacy law is being introduced every week. Just when you thought that your program was complete and running smoothly, all of a sudden you must figure out a way to implement and maintain a new requirement. Learn about reliable management tools for a data privacy and cybersecurity compliance program from the experts. Our panel of in-house lawyers from the public and private sector discuss how to make it easy to operationalize overlapping laws and how to make sure that your compliance program is always up to date.

Session 5: Do You Know Where Your Data is?: Data Sharing and the State of the Law - Modern companies are awash in data. Employees generate it and are usually looking for the most efficient way to share it internally and externally. Review the myriad of problems that can occur even with the most well-meaning of employees. From the possible export control risks of emailing technical information to an overseas colleague, to using Dropbox and other file sharing sites to exchange information, to providing data to contract employees, and more, explore the state of the law as it relates to data and what can happen if you lose control of it.  

Session 6: Protecting Client Information-Cyber Protection Duties as an Attorney - Explore the ethical and legal obligations of attorneys and law firms to protect client data and communications from the latest cybersecurity threats.

Session 7: Ethics and Professionalism in a Global Environment - Ethics and professionalism are being influenced by many factors in today’s global environment. Consider some of these factors, along with areas of commonality amongst the legal ethics rules from a sampling of jurisdictions.

Includes: Video Audio Paper Slides

  • Total Credit Hours:
  • 5.75 | 2.00 ethics
  • Credit Info
  • TX, CA
  • TX MCLE credit expires: 8/31/2021

Preview mode. You must be signed in and have purchased this eCourse to have full access.
Preview Sessions
Credit

1. Is Reasonable Security Achievable in the Corporation? (Aug 2020)

Art Ehuan, Robyn K. Bacon, LeeAnne Pelzer, Stefan Richards

0.75 0.00 0.00 0.75
Preview Materials

Download session materials for offline use

(mp4)
45 mins
(mp3)
45 mins
(pdf)
9 pgs
Session 1 — 45 mins, credit 0.75
Is Reasonable Security Achievable in the Corporation? (Aug 2020)

The term "Reasonable Security" is appearing in news headlines and inside court rooms. Regulators are increasingly conducting examinations of breached corporations to determine if preventative “Reasonable Security” measures are being deployed across the enterprise. Class action litigation representatives are also questioning, if a lack of "Reasonable Security” contributed to breaches in their complaints. Hear how “Reasonable Security” can be achieved across the pillars of people, process, and technology--including the implementation and management of proactive "Reasonable Security" measures. And explore how to evaluate and measure if “Reasonable Security” is in place, and how to identify gaps that may exist in a cybersecurity program.

Originally presented at: Jul 2020 Essential Cybersecurity Law

Art Ehuan, Crypsis - McLean, VA
Robyn K. Bacon, Munger, Tolles & Olson LLP - Los Angeles, CA
LeeAnne Pelzer, Crypsis - McLean, VA
Stefan Richards, CorVel - Portland, OR

2. International Privacy Laws and Enforcement (Aug 2020)

Daniel J. Felz, Wim Nauwelaerts

0.50 0.00 0.00 0.50
Preview Materials

Download session materials for offline use

(mp4)
29 mins
(mp3)
29 mins
(pdf)
8 pgs
Session 2 — 29 mins, credit 0.50
International Privacy Laws and Enforcement (Aug 2020)

Originally presented at: Jul 2020 Essential Cybersecurity Law

Daniel J. Felz, Alston & Bird LLP - Dallas, TX and Brussels, Belgium
Wim Nauwelaerts, Alston & Bird - Brussels, Belgium

3. The ABCs of Operationalizing the CCPA, BIPA, and Other State Data Privacy Laws (Aug 2020)

Wendy Elsa Bozzolasco, Devika Kornbacher

0.75 0.00 0.00 0.75
Preview Materials

Download session materials for offline use

(mp4)
45 mins
(mp3)
45 mins
(pdf)
16 pgs
Session 3 — 45 mins, credit 0.75
The ABCs of Operationalizing the CCPA, BIPA, and Other State Data Privacy Laws (Aug 2020)

Enforcement of the California Consumer Privacy Act is set to commence in July 2020. Explore how companies are grappling with how to integrate the recently revised CCPA regulations into their ordinary business activities. Hear practical guidance on operationalizing compliance with the CCPA as well as other state data privacy laws (e.g., Illinois’ Biometric Information Protection Act).

Originally presented at: Jul 2020 Essential Cybersecurity Law

Wendy Elsa Bozzolasco, SunPower - Austin, TX
Devika Kornbacher, Vinson & Elkins LLP - Houston, TX

4. The Ultimate Cheat Sheet for Cybersecurity and Privacy Compliance  (Jun 2020)

Elizabeth Rogers, Jeff Adams, George R. Gooch, Elaine Nicholson

1.00 0.00 0.00 1.00
Preview Materials

Download session materials for offline use

(mp4)
57 mins
(mp3)
57 mins
Paper
(pdf)
1 pgs
Paper
(pdf)
5 pgs
(pdf)
7 pgs
Session 4 — 57 mins, credit 1.00
The Ultimate Cheat Sheet for Cybersecurity and Privacy Compliance  (Jun 2020)

It seems like a new global or domestic privacy law is being introduced every week. Just when you thought that your program was complete and running smoothly, all of a sudden you must figure out a way to implement and maintain a new requirement. Learn about reliable management tools for a data privacy and cybersecurity compliance program from the experts. Our panel of in-house lawyers from the public and private sector discuss how to make it easy to operationalize overlapping laws and how to make sure that your compliance program is always up to date.

Originally presented at: May 2020 Technology Law Conference

Elizabeth Rogers, Michael Best & Friedrich LLP - Austin, TX
Jeff Adams, WP Engine - Austin, TX
George R. Gooch, Texas Health Services Authority - Austin, TX
Elaine Nicholson, City of Austin - Austin, TX

5. Do You Know Where Your Data is?: Data Sharing and the State of the Law (Jun 2018)

David M. Hoffman, Robert Arthur Rodriguez

0.75 0.00 0.00 0.75
Preview Materials

Download session materials for offline use

(mp4)
48 mins
(mp3)
48 mins
(pdf)
20 pgs
Session 5 — 48 mins, credit 0.75
Do You Know Where Your Data is?: Data Sharing and the State of the Law (Jun 2018)

Modern companies are awash in data. Employees generate it and are usually looking for the most efficient way to share it internally and externally. Review the myriad of problems that can occur even with the most well-meaning of employees. From the possible export control risks of emailing technical information to an overseas colleague, to using Dropbox and other file sharing sites to exchange information, to providing data to contract employees, and more, explore the state of the law as it relates to data and what can happen if you lose control of it.  

Originally presented at: May 2018 Technology Law Conference

David M. Hoffman, Fish & Richardson P.C. - Austin, TX
Robert Arthur Rodriguez, Advanced Micro Devices - Austin, TX

6. Protecting Client Information-Cyber Protection Duties as an Attorney (May 2018)

William R. Daugherty, Andy Sawyer

1.00 1.00 0.00 1.00 | 1.00 ethics
Preview Materials

Download session materials for offline use

(mp4)
61 mins
(mp3)
61 mins
(pdf)
22 pgs
Session 6 — 61 mins, credit 1.00 | 1.00 ethics
Protecting Client Information-Cyber Protection Duties as an Attorney (May 2018)

Explore the ethical and legal obligations of attorneys and law firms to protect client data and communications from the latest cybersecurity threats.

Originally presented at: Apr 2018 Oil, Gas and Mineral Law Institute

William R. Daugherty, Baker & Hostetler LLP - Houston, TX
Andy Sawyer, Locke Lord LLP - Dallas , TX

7. Ethics and Professionalism in a Global Environment (Jul 2015)

Arnold J. Johnson

1.00 1.00 0.00 1.00 | 1.00 ethics
Preview Materials

Download session materials for offline use

(mp3)
63 mins
(pdf)
37 pgs
Session 7 — 63 mins, credit 1.00 | 1.00 ethics
Ethics and Professionalism in a Global Environment (Jul 2015)

Ethics and professionalism are being influenced by many factors in today’s global environment. Consider some of these factors, along with areas of commonality amongst the legal ethics rules from a sampling of jurisdictions.

Originally presented at: Jun 2015 International Upstream Energy

Arnold J. Johnson, Noble Energy Inc. - Houston, TX

Subscribe to Our Hooked on CLE Monthly Newsletter