eCourses are individual online courses from renowned presenters at our live conferences. Learn via audio or video, receive the supporting materials, and fulfill MCLE requirements at your convenience with the best content available!
These courses are CLE accredited in Texas and California, with some accredited in Oklahoma.
If you need credit for an eCourse in other states please read through the disclaimerbefore purchasing an eCourse to make sure you will be able to self-report your MCLE credit after completion of the eCourse
Session 1: GDPR is Effective Today! - May 25, 2018 is the effective date for the European Union’s General Data Protection Regulation, the world’s most comprehensive privacy law. On this day for which so many have prepared, we will share in-house and outside counsel perspectives on what the GDPR means for international companies that do business in the EU, which aspects of compliance efforts have been most challenging, and what lies ahead in maintaining GDPR “accountability” and in connection with the forthcoming, related ePrivacy Regulation.
Session 2: Do You Know Where Your Data is?: Data Sharing and the State of the Law - Modern companies are awash in data. Employees generate it and are usually looking for the most efficient way to share it internally and externally. Review the myriad of problems that can occur even with the most well-meaning of employees. From the possible export control risks of emailing technical information to an overseas colleague, to using Dropbox and other file sharing sites to exchange information, to providing data to contract employees, and more, explore the state of the law as it relates to data and what can happen if you lose control of it.
Session 3: Data Breaches, Big Data, and FTC Oversight - Learn how and why the FTC polices data breaches and the collection and exploitation of big data.
Session 4: Protecting Client Information-Cyber Protection Duties as an Attorney - Explore the ethical and legal obligations of attorneys and law firms to protect client data and communications from the latest cybersecurity threats.
Session 5: Ethics and Professionalism in a Global Environment - Ethics and professionalism are being influenced by many factors in today’s global environment. Consider some of these factors, along with areas of commonality amongst the legal ethics rules from a sampling of jurisdictions.
Session 6: Law Firm Data Security and the Ethical Duty of Technology Competence - As clients demand attorneys deliver legal services more efficiently by using technology it increases pressure to have technical knowledge and proficiency. Further, the American Bar Association and 28 states have created a model rule for the ethical duty of technology competence. Hear an overview of the significant material risks and impact on a law firm following a breach and the potential consequences from an ethics and disciplinary perspective. more »
This eCourse outlines the basic structure of a compliance program and the regulatory framework used to develop a program. Learn how to analyze the regulatory framework and build a program that works for the company’s risk environment. more »
This eCourse explores how to conduct an effective risk assessment using a given regulatory framework and compliance program data. This framework is applicable to any subject matter from Anti-Corruption to Privacy. more »
This eCourse explores key elements of effective policies and procedures. How to draft them, what makes them effective, and how to update them. It also provides insight into modern trends, including best practices for drafting a Code of Conduct. more »
Session 1: Artificial Intelligence and its Effect on the Legal Industry - AI is getting a lot of attention, creating fears and in many cases unrealistic expectations. Explore the reality of AI, how it practically can impact legal work flows, and how it can be a positive force that enables lawyers to do their jobs faster, cheaper and better for their clients.
Session 2: Strategic Use of E-Discovery - Fewer than one out of a hundred cases are tried. Accordingly, discovery strategy is often more vital than trial strategy. Yet, strategic use of e-discovery garners little attention, perhaps because the fundamentals demand so much focus that there is little room for flourishes. If you only know one way of doing things, how do you act strategically? Review methods to deploy e-discovery strategically, mindful of our opponent’s fears, goals, and pain points … as well as our own.
Session 3: The Business of Social Media - How are social media assets created and transferred? How are “visits” and “hits” measured and valued? Investigate the business of social media with profiles of prominent social media companies and get insight into many of the products in the social commerce space that help companies collect and make use of consumer-generated content.
Session 4: Hearsay in a Digital World - Review important hearsay issues, with an emphasis on hearsay appearing in social media, texts, and other new media.
Session 5: Getting from Internet to Evidence - Social media can be a goldmine in certain cases, if you can discover relevant data and get it into evidence. Learn ethical methods of eDiscovery related to social media, the nuts and bolts of admitting social media data into evidence, and strategies for using that evidence on both liability and damages claims.
Session 6: Social Media and Homeowners Insurance: Are Your Facebook Posts Covered? - Litigation stemming from social media activities has exploded in recent years. While the defendants in these cases often look to their homeowners insurance for protection, the typical policy gives insurers multiple ways out.
Session 7: Data Security Breach Litigation - Review what a litigator needs in order to prepare a client for litigation or an investigation by regulators after a data security breach. Takeaways include protocol for preserving the attorney client privilege and evidence before, during and after a breach; cybersecurity liability insurance litigation updates; and creating proof points, including a discussion of cybersecurity best practices and "cybersecurity basics," to effectively minimize damages, fines and penalties.
Session 8: Law Firm Data Security and the Ethical Duty of Technology Competence - As clients demand attorneys deliver legal services more efficiently by using technology it increases pressure to have technical knowledge and proficiency. Further, the American Bar Association and 28 states have created a model rule for the ethical duty of technology competence. Hear an overview of the significant material risks and impact on a law firm following a breach and the potential consequences from an ethics and disciplinary perspective. more »
Survey the current cyber threat landscape and explore ways to manage the related risks. Gain a view from the front lines of recent attacks along with tips on how to mitigate the risks and manage a crisis should a company become a victim. more »
Review recent developments in U.S. data breach and cyber class action litigation, as well as in new and emerging enforcement standards at the federal and state level, including the SEC Guidance On Cybersecurity Disclosures. more »
From corporate executives to contract employees, the use of ephemeral data and messaging applications to discuss company business increases daily. Hear an overview of what you need to know about this emerging technology—including how disappearing data works, options for preserving it (when necessary), how to implement and configure ephemeral applications for corporate use, and the benefits and risks associated with the technology (including the implications for document retention, document preservation, and discovery obligations). more »
The EU passed the General Data Protection Regulation (GDPR) in 2016 and, after a two-year grace period, the GDPR entered into force on May 25, 2018. Hear insights on the areas where companies continue to focus their time, resources, and concern following the GDPR’s entry into force. In addition, hear first-hand experience from an attorney who spent the first two months following the GDPR’s “go-live” date in Brussels, including meeting European privacy authorities, to provide updates on the first wave of GDPR enforcement. more »
HIPAA's Breach Notification Rule requires notification of patients, the Office for Civil Rights, and sometimes the media, following a breach of unsecured protected health information. Through case studies, examine challenging issues in breach reporting. more »
THIS MONTH: The GDPR: Insights from Years of Preparation and Two Months of Enforcement • Outsourcing Legal Work • Craft Breweries and Downtown Revitalization • Legal Issues in the Onboarding Process • Developing Your Trial Cross Through Adverse Deposition • To Tell the Truth more »
Session 1: Partnership by Ambush: Lessons from ETP v. Enterprise Products - Can companies effectively disclaim the existence of a joint venture or partnership and the fiduciary duties they entail under current Texas law? What is the likelihood that the $319 million jury verdict against Enterprise Products will be overturned on appeal? If not, what steps should companies take in their preliminary agreements and subsequent conduct to minimize the risk of liability for alleged breach of fiduciary duties?
Session 2: Liability Issues for Managers, General Partners, and other Agents - Analyze liability issues for managers of LLCs, partners in LLCs and agents acting on behalf of principals for damages resulting from actions. Hear a discussion of the efficacy of statutory language, the liability of managers, partners, or agents for damages resulting from actions taken in their official capacities; and the economic loss rule which prevents recovery for negligence when the duty breached is a contractual duty (and harm incurred is a result of failure of purpose of contract).
Session 3: Remedies of Minority Owners Post Ritchie - After the Texas Supreme Court radically altered 25 years of Texas law on shareholder rights in close corporations, minority owners must be creative and vigilant at protecting their investments. Hear practical tips for minimizing risk and litigation options that remain available. more »
Session 1: Internal Controls and Compliance - Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.
Session 2: Incident Response and Breach Disclosure - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.
Session 3: Third-Party Vendor Risk Management - Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators. more »
Cybersecurity is a realm that often conflates myth with reality, thereby obscuring certain threats and causing overreaction to others. A key to developing a sophisticated approach to cybersecurity is to dispel these fundamental myths that often cause organizations to incorrectly assess threats or misallocate resources. more »