eCourses are individual online courses from renowned presenters at our live conferences. Learn via audio or video, receive the supporting materials, and fulfill MCLE requirements at your convenience with the best content available!
These courses are CLE accredited in Texas and California, with some accredited in Oklahoma.
If you need credit for an eCourse in other states please read through the disclaimerbefore purchasing an eCourse to make sure you will be able to self-report your MCLE credit after completion of the eCourse
Intellectual Property / Patent Law
Session 1: Technology’s Disruption of the Legal Profession - Explore various technologies and emerging platforms that continue to influence the legal industry, including key considerations in implementing these technologies and related ethical concerns.
Session 2: Cyber Ethics: Ensuring Compliance with Evolving Technology - Lawyers today find that keeping client information safe is more challenging when using today’s technology tools. You don’t have to have a degree in computer science to understand how to avoid ethical missteps related to technology. Lawyer-friendly information on cyber ethics is provided.
Session 3: Artificial Intelligence and its Effect on the Legal Industry - AI is getting a lot of attention, creating fears and in many cases unrealistic expectations. Explore the reality of AI, how it practically can impact legal work flows, and how it can be a positive force that enables lawyers to do their jobs faster, cheaper and better for their clients.
Session 4: Data Analytics: The Answer to Your Law Firm's Innovation Effort - Learn how to easily kick-start your firm’s innovation efforts, close the gender pay gap (for you and your clients), and use data to reduce bias, improve inclusion as part of a diversity and inclusion initiative, and simultaneously use proven scientific methods to improve bottom-line profitability!
Session 5: Avoiding Ethical Issues with Lawyers' Use of Social Media - The world of social media presents a multitude of pitfalls for practitioners and judges alike. Hear from pioneers in the field on how to make the most of social media's advantages without running afoul of applicable disciplinary rules. Listen to a discussion about cutting edge issues not yet addressed under Texas law and proposed disciplinary rules currently under consideration by the Texas Supreme Court.
Session 6: 30 Apps in 30 Minutes - A quick survey of useful apps and tech tips for lawyers, trust officers, and caregivers.
Session 7: Law Firm Data Security and the Ethical Duty of Technology Competence - As clients demand attorneys deliver legal services more efficiently by using technology it increases pressure to have technical knowledge and proficiency. Further, the American Bar Association and 28 states have created a model rule for the ethical duty of technology competence. Hear an overview of the significant material risks and impact on a law firm following a breach and the potential consequences from an ethics and disciplinary perspective. more »
Session 1: Artificial Intelligence and its Effect on the Legal Industry - AI is getting a lot of attention, creating fears and in many cases unrealistic expectations. Explore the reality of AI, how it practically can impact legal work flows, and how it can be a positive force that enables lawyers to do their jobs faster, cheaper and better for their clients.
Session 2: Strategic Use of E-Discovery - Fewer than one out of a hundred cases are tried. Accordingly, discovery strategy is often more vital than trial strategy. Yet, strategic use of e-discovery garners little attention, perhaps because the fundamentals demand so much focus that there is little room for flourishes. If you only know one way of doing things, how do you act strategically? Review methods to deploy e-discovery strategically, mindful of our opponent’s fears, goals, and pain points … as well as our own.
Session 3: The Business of Social Media - How are social media assets created and transferred? How are “visits” and “hits” measured and valued? Investigate the business of social media with profiles of prominent social media companies and get insight into many of the products in the social commerce space that help companies collect and make use of consumer-generated content.
Session 4: Hearsay in a Digital World - Review important hearsay issues, with an emphasis on hearsay appearing in social media, texts, and other new media.
Session 5: Getting from Internet to Evidence - Social media can be a goldmine in certain cases, if you can discover relevant data and get it into evidence. Learn ethical methods of eDiscovery related to social media, the nuts and bolts of admitting social media data into evidence, and strategies for using that evidence on both liability and damages claims.
Session 6: Social Media and Homeowners Insurance: Are Your Facebook Posts Covered? - Litigation stemming from social media activities has exploded in recent years. While the defendants in these cases often look to their homeowners insurance for protection, the typical policy gives insurers multiple ways out.
Session 7: Data Security Breach Litigation - Review what a litigator needs in order to prepare a client for litigation or an investigation by regulators after a data security breach. Takeaways include protocol for preserving the attorney client privilege and evidence before, during and after a breach; cybersecurity liability insurance litigation updates; and creating proof points, including a discussion of cybersecurity best practices and "cybersecurity basics," to effectively minimize damages, fines and penalties.
Session 8: Law Firm Data Security and the Ethical Duty of Technology Competence - As clients demand attorneys deliver legal services more efficiently by using technology it increases pressure to have technical knowledge and proficiency. Further, the American Bar Association and 28 states have created a model rule for the ethical duty of technology competence. Hear an overview of the significant material risks and impact on a law firm following a breach and the potential consequences from an ethics and disciplinary perspective. more »
Review recent developments in U.S. data breach and cyber class action litigation, as well as in new and emerging enforcement standards at the federal and state level, including the SEC Guidance On Cybersecurity Disclosures. more »
From corporate executives to contract employees, the use of ephemeral data and messaging applications to discuss company business increases daily. Hear an overview of what you need to know about this emerging technology—including how disappearing data works, options for preserving it (when necessary), how to implement and configure ephemeral applications for corporate use, and the benefits and risks associated with the technology (including the implications for document retention, document preservation, and discovery obligations). more »
The EU passed the General Data Protection Regulation (GDPR) in 2016 and, after a two-year grace period, the GDPR entered into force on May 25, 2018. Hear insights on the areas where companies continue to focus their time, resources, and concern following the GDPR’s entry into force. In addition, hear first-hand experience from an attorney who spent the first two months following the GDPR’s “go-live” date in Brussels, including meeting European privacy authorities, to provide updates on the first wave of GDPR enforcement. more »
HIPAA's Breach Notification Rule requires notification of patients, the Office for Civil Rights, and sometimes the media, following a breach of unsecured protected health information. Through case studies, examine challenging issues in breach reporting. more »
In the midst of a quickly changing legal environment, it can be a challenge to keep track of what's happening and what CLE can mean for your practice. Hear the latest in this special 4-hour bundle of our best programming. more »
Session 1: Internal Controls and Compliance - Explore a “how to” in identifying and prioritizing internal controls to prevent, detect, and respond to data security incidents, including selecting a framework, identifying an organization’s greatest security risks, and prioritizing implementation of, and compliance with, internal controls.
Session 2: Incident Response and Breach Disclosure - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and brand. Explore developments in incident response, and hear practical guidance from multiple perspectives for managing risk while satisfying legal obligations when the inevitable breach occurs.
Session 3: Third-Party Vendor Risk Management - Since the Target breach in 2014, companies have experienced a heightened anxiety about the potential risks associated with contractors and subcontractors who have access to customer data and other confidential and proprietary information. As a result, lawmakers in some states and the new General Data Protection Regulations now impose robust requirements to establish and be accountable for enforcing rigorous third-party vendor risk management programs to protect consumer data. Explore the developing standards and practical business practices for mitigating risk and demonstrating compliance practices to customers and regulators. more »
Cybersecurity is a realm that often conflates myth with reality, thereby obscuring certain threats and causing overreaction to others. A key to developing a sophisticated approach to cybersecurity is to dispel these fundamental myths that often cause organizations to incorrectly assess threats or misallocate resources. more »
Session 1: Advanced Licensing - With more and more companies monetizing their intellectual property through licensing arrangements and other forms of technology transactions, courts continue to develop licensing law and contract principles at an ever-increasing pace. Review important key agreement clauses in light of recent developments, with an emphasis on practical drafting and negotiating strategies.
Session 2: Open Source and Community License Enforcement - Enforcement of open source licenses via copyright infringement actions, in the US and abroad, is common. Learn about community efforts to reign in copyright trolls and gain a better understanding of current trolling activity. more »
Session 1: There’s Been an Incident Involving Your Self-Driving Car - Having a well-thought-out incident response plan that is thorough but flexible will not only allow for prompt action but also demonstrate that the risks have been properly considered. Hear a description of some of the questions and considerations to keep in mind when preparing for that dreaded call and some of the unique issues these vehicles raise.
Session 2: Legal and Policy Challenges in the Age of Drone Fever - Technology has moved quickly forward and what used to be considered toys are now tools of industry and public agencies. Drones provide significant safety and efficiency benefits to industry, but also present novel safety, security, and privacy issues to policymakers. Learn about the latest in commercial drone law and policy as we move toward an era of "highways in the sky." more »
Session 1: Special Considerations for the Business Data Breach - Effective response to cybersecurity incidents is critical to managing and minimizing regulatory and litigation risks, while protecting your customers and your brand. Explore developments in incident response and hear practical guidance for managing and insuring against risk while satisfying legal obligations when the inevitable breach occurs.
Session 2: Cybersecurity: In-House Counsel Challenges and Perspectives - A conversation with in-house counsel discussing salient and trending topics in cybersecurity, including balancing employee privacy and effective cyber defense, finding the “right” level of supplier cybersecurity diligence, and recommended practices for implementing data security governance. more »
Cybersecurity intersects substantially with national security giving rise to complex questions of policy and law. Hear Professor Chesney map the terrain and review important recent developments. more »
Modern companies are awash in data. Employees generate it and are usually looking for the most efficient way to share it internally and externally. Review the myriad of problems that can occur even with the most well-meaning of employees. From the possible export control risks of emailing technical information to an overseas colleague, to using Dropbox and other file sharing sites to exchange information, to providing data to contract employees, and more, explore the state of the law as it relates to data and what can happen if you lose control of it. more »
May 25, 2018 is the effective date for the European Union’s General Data Protection Regulation, the world’s most comprehensive privacy law. On this day for which so many have prepared, we share in-house and outside counsel perspectives on what the GDPR means for international companies that do business in the EU, which aspects of compliance efforts have been most challenging, and what lies ahead in maintaining GDPR “accountability” and in connection with the forthcoming, related ePrivacy Regulation. more »