eCourse art

eCourse

Answer Bar: Global Data Security Considerations for the Corporate Client

Contains material from Jun 2022 to Dec 2023

Answer Bar: Global Data Security Considerations for the Corporate Client
3.63 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

Technical Questions?
512.475.6700
service@utcle.org



Session 01: Beyond IT Security: Legal and Cyber Security Considerations in the OT World - Industrial Control Systems and Operational Technology have unique challenges and risks. Explore some of those risks from service disruption and data disclosure, as well as the legal and technical considerations and mitigations and some of the risk implications of emerging AI technology.

Session 02: Data Governance - Review the “lifecycle” of data (mis)managed by our clients and by our own organizations. Texas Disciplinary Rules of Professional Conduct and ABA Model Rules guide how proactive approaches to data governance keep us ethical and sane, and save future time and tempers.

Session 03: Assessing Your Privacy Law Risk: What Does Reasonable Security Actually Mean? - All of the recently enacted and effective state consumer data privacy laws require that covered businesses implement a “reasonable” security program. Likewise, covered businesses are required to include clauses in their agreements with service providers, contractors and other third parties that impose a duty to protect disclosed personal data with “reasonable” security. Learn from a regulator, an in-house general counsel and an outside privacy counsel what this means and what it looks like and how to do it in your own law firm or company.

Session 04: Developing an Effective Incident Response Plan - Walk through the main components you want to have in place for your incident response plan, including what to include and what NOT to include, OFAC implications, and more.

Session 05: Contracting with Third-Party Vendors: Top Risk and Privacy Law Considerations - A primer on how to revise third-party vendor contracts to include cybersecurity and privacy law provisions, perform cybersecurity vendor due diligence, and what you need to know to best protect yourself or clients from regulatory scrutiny.

Session 06: Do You Know What Your Outside Counsel is Doing to Protect Client Information? - Law firms are now targets for hackers, including nation-state actors that seek to steal sensitive and valuable client information and cause disruption and other damages. Are your outside counsel taking the appropriate steps to ensure the safety of your information?

Session 07: The Role of the Board: Before, During and After a Cybersecurity Incident - A summary from sitting board members and board governance experts on obligations, tips, and best practices for boards in preparing for and responding to cybersecurity incidents, and in affectively evaluating and addressing the attendant risks.

Includes: Video Audio Paper Slides No Materials

  • Total Credit Hours:
  • 5.50 | 2.25 ethics
  • Credit Info
  • TX, CA
  • TX MCLE credit expires: 12/31/2024

Preview mode. You must be signed in, have purchased this eCourse, and the eCourse must be active to have full access.
Preview Sessions
Credit

Show session details

1. Beyond IT Security: Legal and Cyber Security Considerations in the OT World (Jul 2023)

Bart W. Huffman, Serge Jorgensen

0.75 0.00 0.00 0.75
Preview Materials

Download session materials for offline use

(mp4)
45 mins
(mp3)
45 mins
(pdf)
8 pgs
Session 1 —45 mins
0.75
Beyond IT Security: Legal and Cyber Security Considerations in the OT World (Jul 2023)

Industrial Control Systems and Operational Technology have unique challenges and risks. Explore some of those risks from service disruption and data disclosure, as well as the legal and technical considerations and mitigations and some of the risk implications of emerging AI technology.
 

Originally presented: May 2023 Technology Law Conference

Bart W. Huffman, Holland & Knight LLP - Houston, TX
Serge Jorgensen, Sylint - Sarasota, FL

Show session details

2. Data Governance (Jul 2022)

Jessica Cassidy Katz

0.50 0.50 0.00 0.50 | 0.50 ethics
Preview Materials

Download session materials for offline use

(mp4)
30 mins
(mp3)
29 mins
(pdf)
48 pgs
(pdf)
16 pgs
Session 2 —30 mins
0.50 | 0.50 ethics
Data Governance (Jul 2022)

Review the “lifecycle” of data (mis)managed by our clients and by our own organizations. Texas Disciplinary Rules of Professional Conduct and ABA Model Rules guide how proactive approaches to data governance keep us ethical and sane, and save future time and tempers.

Originally presented: May 2022 Technology Law Conference

Jessica Cassidy Katz, Whole Foods Market - Austin, TX

Show session details

3. Assessing Your Privacy Law Risk: What Does Reasonable Security Actually Mean? (Dec 2023)

Elizabeth Rogers, Esther Chavez, Ashley Fischer

1.00 0.00 0.00 1.00
Preview Materials

Download session materials for offline use

(mp4)
62 mins
(mp3)
62 mins
Session 3 —62 mins
1.00
Assessing Your Privacy Law Risk: What Does Reasonable Security Actually Mean? (Dec 2023)

All of the recently enacted and effective state consumer data privacy laws require that covered businesses implement a “reasonable” security program. Likewise, covered businesses are required to include clauses in their agreements with service providers, contractors and other third parties that impose a duty to protect disclosed personal data with “reasonable” security. Learn from a regulator, an in-house general counsel and an outside privacy counsel what this means and what it looks like and how to do it in your own law firm or company.

Originally presented: Oct 2023 Essential Cybersecurity Law

Elizabeth Rogers, Michael Best & Friedrich LLP - Austin, TX
Esther Chavez, Assistant Attorney General, Office of the Attorney General - Austin, TX
Ashley Fischer, Tiff's Treats - Austin, TX

Show session details

4. Developing an Effective Incident Response Plan (Dec 2023)

Jeremy Rucker, John B. Sapp Jr.

0.75 0.50 0.00 0.75 | 0.50 ethics
Preview Materials

Download session materials for offline use

(mp4)
51 mins
(mp3)
51 mins
Slides
(pdf)
6 pgs
Session 4 —51 mins
0.75 | 0.50 ethics
Developing an Effective Incident Response Plan (Dec 2023)

Walk through the main components you want to have in place for your incident response plan, including what to include and what NOT to include, OFAC implications, and more.

Originally presented: Oct 2023 Essential Cybersecurity Law

Jeremy Rucker, Spencer Fane - Plano, TX
John B. Sapp Jr., Texas Mutual Insurance Company - Austin, TX

Show session details

5. Contracting with Third-Party Vendors: Top Risk and Privacy Law Considerations (Dec 2023)

David Curtis, Hannah Levin

0.75 0.00 0.00 0.75
Preview Materials

Download session materials for offline use

(mp4)
44 mins
(mp3)
43 mins
(pdf)
16 pgs
Session 5 —44 mins
0.75
Contracting with Third-Party Vendors: Top Risk and Privacy Law Considerations (Dec 2023)

A primer on how to revise third-party vendor contracts to include cybersecurity and privacy law provisions, perform cybersecurity vendor due diligence, and what you need to know to best protect yourself or clients from regulatory scrutiny.

Originally presented: Oct 2023 Essential Cybersecurity Law

David Curtis, Orrick, Herrington & Sutcliffe LLP - Seattle, WA
Hannah Levin, Orrick, Herrington & Sutcliffe LLP - Washington, DC

Show session details

6. Do You Know What Your Outside Counsel is Doing to Protect Client Information? (Jun 2022)

Robert L. Levy

0.75 0.75 0.00 0.75 | 0.75 ethics
Preview Materials

Download session materials for offline use

(mp4)
41 mins
(mp3)
41 mins
Slides
(pdf)
5 pgs
Session 6 —41 mins
0.75 | 0.75 ethics
Do You Know What Your Outside Counsel is Doing to Protect Client Information? (Jun 2022)

Law firms are now targets for hackers, including nation-state actors that seek to steal sensitive and valuable client information and cause disruption and other damages. Are your outside counsel taking the appropriate steps to ensure the safety of your information?

Originally presented: Apr 2022 Corporate Counsel Institute

Robert L. Levy, Exxon Mobil Corporation - Houston, TX

Show session details

7. The Role of the Board: Before, During and After a Cybersecurity Incident (Dec 2023)

Jay Johnson, Rebecca A. Klein, Kristen Edwards Marquardt, Mary P. Ricciardello

1.00 0.50 0.00 1.00 | 0.50 ethics
Preview Materials

Download session materials for offline use

(mp4)
62 mins
(mp3)
62 mins
No Materials
(pdf)
1 pgs
Session 7 —62 mins
1.00 | 0.50 ethics
The Role of the Board: Before, During and After a Cybersecurity Incident (Dec 2023)

A summary from sitting board members and board governance experts on obligations, tips, and best practices for boards in preparing for and responding to cybersecurity incidents, and in affectively evaluating and addressing the attendant risks.

Originally presented: Oct 2023 Essential Cybersecurity Law

Jay Johnson, Charles Schwab & Co., Inc. - Westlake, TX
Rebecca A. Klein, Klein Energy, LLC - Austin, TX
Kristen Edwards Marquardt, Hakluyt - McClean, VA
Mary P. Ricciardello, Eagle Materials, Pro Petro - Houston, TX