eCourse
Answer Bar: Global Data Security Considerations for the Corporate Client
Contains material from Jun 2022 to Dec 2023
Super content, many great presenters.
Technical Questions?
512.475.6700
service@utcle.org
- System Test
-
$255 Add to Cart
Session 02: Data Governance - Review the “lifecycle” of data (mis)managed by our clients and by our own organizations. Texas Disciplinary Rules of Professional Conduct and ABA Model Rules guide how proactive approaches to data governance keep us ethical and sane, and save future time and tempers.
Session 03: Assessing Your Privacy Law Risk: What Does Reasonable Security Actually Mean? - All of the recently enacted and effective state consumer data privacy laws require that covered businesses implement a “reasonable” security program. Likewise, covered businesses are required to include clauses in their agreements with service providers, contractors and other third parties that impose a duty to protect disclosed personal data with “reasonable” security. Learn from a regulator, an in-house general counsel and an outside privacy counsel what this means and what it looks like and how to do it in your own law firm or company.
Session 04: Developing an Effective Incident Response Plan - Walk through the main components you want to have in place for your incident response plan, including what to include and what NOT to include, OFAC implications, and more.
Session 05: Contracting with Third-Party Vendors: Top Risk and Privacy Law Considerations - A primer on how to revise third-party vendor contracts to include cybersecurity and privacy law provisions, perform cybersecurity vendor due diligence, and what you need to know to best protect yourself or clients from regulatory scrutiny.
Session 06: Do You Know What Your Outside Counsel is Doing to Protect Client Information? - Law firms are now targets for hackers, including nation-state actors that seek to steal sensitive and valuable client information and cause disruption and other damages. Are your outside counsel taking the appropriate steps to ensure the safety of your information?
Session 07: The Role of the Board: Before, During and After a Cybersecurity Incident - A summary from sitting board members and board governance experts on obligations, tips, and best practices for boards in preparing for and responding to cybersecurity incidents, and in affectively evaluating and addressing the attendant risks.
Includes: Video Audio Paper Slides No Materials
- Total Credit Hours:
- 5.50 | 2.25 ethics
- Credit Info
- TX, CA, PA
- TX MCLE credit expires: 12/31/2024
Preview Sessions
Show session details
Bart W. Huffman, Serge Jorgensen
Download session materials for offline use
Session 1
—45 mins
0.75
Beyond IT Security: Legal and Cyber Security Considerations in the OT World (Jul 2023)
Industrial Control Systems and Operational Technology have unique challenges and risks. Explore some of those risks from service disruption and data disclosure, as well as the legal and technical considerations and mitigations and some of the risk implications of emerging AI technology.
Originally presented: May 2023 Technology Law Conference
Bart W. Huffman,
Holland & Knight LLP - Houston, TX
Serge Jorgensen,
Sylint - Sarasota, FL
Show session details
Jessica Cassidy Katz
Download session materials for offline use
Session 2
—30 mins
0.50 | 0.50 ethics
Data Governance (Jul 2022)
Review the “lifecycle” of data (mis)managed by our clients and by our own organizations. Texas Disciplinary Rules of Professional Conduct and ABA Model Rules guide how proactive approaches to data governance keep us ethical and sane, and save future time and tempers.
Originally presented: May 2022 Technology Law Conference
Jessica Cassidy Katz,
Whole Foods Market - Austin, TX
Show session details
Elizabeth Rogers, Esther Chavez, Ashley Fischer
Download session materials for offline use
Session 3
—62 mins
1.00
Assessing Your Privacy Law Risk: What Does Reasonable Security Actually Mean? (Dec 2023)
All of the recently enacted and effective state consumer data privacy laws require that covered businesses implement a “reasonable” security program. Likewise, covered businesses are required to include clauses in their agreements with service providers, contractors and other third parties that impose a duty to protect disclosed personal data with “reasonable” security. Learn from a regulator, an in-house general counsel and an outside privacy counsel what this means and what it looks like and how to do it in your own law firm or company.
Originally presented: Oct 2023 Essential Cybersecurity Law
Elizabeth Rogers,
Michael Best & Friedrich LLP - Austin, TX
Esther Chavez,
Assistant Attorney General, Office of the Attorney General - Austin, TX
Ashley Fischer,
Tiff's Treats - Austin, TX
Show session details
Jeremy Rucker, John B. Sapp Jr.
Download session materials for offline use
Session 4
—51 mins
0.75 | 0.50 ethics
Developing an Effective Incident Response Plan (Dec 2023)
Walk through the main components you want to have in place for your incident response plan, including what to include and what NOT to include, OFAC implications, and more.
Originally presented: Oct 2023 Essential Cybersecurity Law
Jeremy Rucker,
Spencer Fane - Plano, TX
John B. Sapp Jr.,
Texas Mutual Insurance Company - Austin, TX
Show session details
David Curtis, Hannah Levin
Download session materials for offline use
Session 5
—44 mins
0.75
Contracting with Third-Party Vendors: Top Risk and Privacy Law Considerations (Dec 2023)
A primer on how to revise third-party vendor contracts to include cybersecurity and privacy law provisions, perform cybersecurity vendor due diligence, and what you need to know to best protect yourself or clients from regulatory scrutiny.
Originally presented: Oct 2023 Essential Cybersecurity Law
David Curtis,
Orrick, Herrington & Sutcliffe LLP - Seattle, WA
Hannah Levin,
Orrick, Herrington & Sutcliffe LLP - Washington, DC
Show session details
Robert L. Levy
Download session materials for offline use
Session 6
—41 mins
0.75 | 0.75 ethics
Do You Know What Your Outside Counsel is Doing to Protect Client Information? (Jun 2022)
Law firms are now targets for hackers, including nation-state actors that seek to steal sensitive and valuable client information and cause disruption and other damages. Are your outside counsel taking the appropriate steps to ensure the safety of your information?
Originally presented: Apr 2022 Corporate Counsel Institute
Robert L. Levy,
Exxon Mobil Corporation - Houston, TX
Show session details
Jay Johnson, Rebecca A. Klein, Kristen Edwards Marquardt, Mary P. Ricciardello
Download session materials for offline use
Session 7
—62 mins
1.00 | 0.50 ethics
The Role of the Board: Before, During and After a Cybersecurity Incident (Dec 2023)
A summary from sitting board members and board governance experts on obligations, tips, and best practices for boards in preparing for and responding to cybersecurity incidents, and in affectively evaluating and addressing the attendant risks.
Originally presented: Oct 2023 Essential Cybersecurity Law
Jay Johnson,
Charles Schwab & Co., Inc. - Westlake, TX
Rebecca A. Klein,
Klein Energy, LLC - Austin, TX
Kristen Edwards Marquardt,
Hakluyt - McClean, VA
Mary P. Ricciardello,
Eagle Materials, Pro Petro - Houston, TX