2025 Live Conference
coming up May 8 in Austin.
Info and registration »
2025 Materials
expected available
3-5 weeks from conference date.
UT Law CLE’s 38th Annual Technology Law Conference brings together a nationally-recognized faculty of technology and licensing practitioners; in-house counsel from leading tech companies; and experts in open source, data privacy/security, and emerging technology for the latest issues affecting the industry.
2024 Live Conference
recently concluded Sep 25 More info »
2024 Materials
expected available
3-5 weeks.
Cyber intrusions—ransomware attacks, data breaches, hacking, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through the latest legal issues, regulatory updates, and other considerations for protecting your company and clients during a cybersecurity incident and response. Hear directly from leading practitioners, including in-house counsel, to get the latest updates on regulatory actions and litigation, gain detailed and practical guidance for implementing internal controls and governance programs, and explore strategies for responding to a data breach. Topics include: Taking Your Incident Response Plan to the Next Level Overview of a Cyber Governance Program Cybersecurity Insurance Essentials Vendor Risk Management Anatomy of a Ransomware Negotiation: Lessons Learned from Negotiating with a Threat Actor Texas Privacy Law Update Developing and AI Governance Program Regulators Panel
UT Law CLE’s 37th Annual Technology Law Conference brings together a nationally-recognized faculty of technology and licensing practitioners; in-house counsel from leading tech companies; and experts in open source, data privacy/security, and emerging technology for the latest issues affecting the industry. Sessions this year include: • Key Considerations in Private M&A Deals in Uncertain Market Conditions • A Technology-Focused Introduction to Bankruptcy & Insolvency • Cybersecurity Legal Incident Response Preparedness in Today’s Threat Landscape • Navigating Tomorrow’s Health Tech Laws Today • Open Source: Changes in Licenses and Landscape • Gen AI Regulation and Legislation – Federal, State, and Global • Ethical Concerns of AI and the Practice of Law Following the conference, attendees will receive a bonus eSupplement to ensure practitioners can earn their required 15.00/3.00 Texas MCLE hours for the year.
Cyber intrusions—ransomware attacks, data breaches, hacking, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key legal issues, regulatory updates, and other considerations for protecting your company and clients during a cybersecurity incident and response. This year’s program features: Updates on current SEC priorities and pending state privacy legislation that will impact companies of all sizes A detailed walkthrough of the key components of an incident response plan, followed by an interactive luncheon workshop for a sample breach/response scenario A look at the legal and ethical implications of AI and other emerging technology A panel on “The Role of the Board: Before, During and After a Cyber Incident” Hear directly from leading practitioners, and in-house counsel, to get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach.
UT Law CLE’s 36th Annual Technology Law Conference brings together a nationally-recognized faculty of technology and licensing practitioners; in-house counsel from leading tech companies; and experts in open source, data privacy/security, and emerging technology for the latest issues affecting the industry. Sessions this year include: Developments and hot topics in open-source technologies. Advanced licensing updates and insights. Ethics on the Edge, explores ethical issues raised when counseling clients whose business models are so “disruptive” they might be illegal. Generative AI and the Ethics Involved. M&A Hot Topics. Lessons learned from recent antitrust tech cases. Following the conference, attendees will receive a bonus eSupplement to ensure practitioners can earn their required 15.00/3.00 Texas MCLE hours for the year.
Cyber intrusions—ransomware attacks, data breaches, hacking, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key legal issues relating to breach preparedness and response. Hear directly from leading practitioners, and in-house counsel, to get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach. If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this one-day course is for you.
UT Law CLE’s 35th Annual Technology Law Conference brings together a nationally-recognized faculty of technology and licensing practitioners; in-house counsel from leading tech companies; and experts in open source, data privacy/security, and emerging technology for the latest issues affecting the industry. This year’s program features: The latest updates on what you need to know to field open source issues, such as developments in active compliance litigation, the effect on open source of the 2021 White House's Executive Order on Improving the Nation’s Cybersecurity, and interaction of open source with new technology trends like NFTs and DAOs. The Anatomy of a Cyber Attack provides through a rundown of techniques that have resulted in some of the biggest hacks of companies. A discussion on key privacy and data protection issues including cross-border personal data transfers, implementation of new privacy laws like China’s PIPL and India’s DPB, and global trends likely to impact your clients. Incident Response Table Tops: Best Practices for Planning and Executing Your Next Table Top shares the importance of practicing the scenario of a cybersecurity incident, and how to effectively execute a table top in order to be better prepared to respond through best practices. Hear from an internal counsel, outside M&A counsel, and leading insurance broker on the key issues in private company mergers and acquisitions focusing on trends in representation and warranty insurance, and other matters. Following the conference, attendees will receive a bonus eSupplement to ensure practitioners can earn their required 15.00/3.00 Texas MCLE hours for the year.
Cyber intrusions—data breaches, hacking, ransomware, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key legal issues relating to breach preparedness and response. Hear directly from leading practitioners, and in-house counsel, to get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach. If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this one-day course is for you.
UT Law CLE’s 34th Annual Technology Law Conference virtually brings together a nationally-recognized faculty of technology and licensing practitioners; in-house counsel from leading tech companies; and experts in open source, data privacy/security, and emerging technology for the latest issues affecting the industry. This year’s virtual program is three half-days and features: Artificial Intelligence and Machine Learning: Legal and Ethical Considerations, including real-world examples of such concerns, the role AI and ML systems may play, and the associated legal implications Compliance and Cooperation for Open Source in Business focuses on what practicing attorneys should know about the risks and rewards of using open source software, as well as contributing or releasing open-source software written by private companies. Mergers and Acquisitions of Private Companies—discussions on both Recent Developments in Deal Terms and Case Law and Post-Acquisition Integration as Seen from Both Houses. Living it Up in Privacy Law California: Hot Topics in CCPA and CPRA Goodbye Third-Party Cookies: Why They’re Going Away, and What’s the Impact to Adtech for Our Companies? Following the conference, attendees will receive a bonus eSupplement to ensure practitioners can earn their required 15.00/3.00 Texas MCLE hours for the year.
Cyber intrusions—data breaches, hacking, ransomware, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key legal issues relating to breach preparedness and response. Hear directly from leading practitioners, in-house counsel, and top government officials to get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach. Topics include: Civil Litigation and Regulatory Update International and State Privacy Laws and Enforcement First Steps to Cybersecurity Compliance Emerging, Disruptive, and Game-Changing Technology Legal Nuances of Breach Response Cybersecurity Insurance Discovery Issues The In-House Perspective on Managing Current Threats and Challenges If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this one-day course is for you.
UT Law CLE’s 33rd Annual Technology Law Conference virtually brings together a nationally-recognized faculty of technology and licensing practitioners; in-house counsel from leading tech companies; and experts in open source, data privacy/security, and emerging technology for the latest issues affecting the industry. This year’s virtual program features: Beyond SaaS: Licensing Strategies for Today’s Tech, including recent developments in licensing such as aggregation of rights under the FTC’s and DOJ’s updated Antitrust Guidelines for Licensing of Intellectual Property. Discussion on key issues in private company merger and acquisition transactions from the perspective of both internal counsel and external M&A counsel. Hear practical compliance and operational considerations presented by the current (and forthcoming) wave of privacy and data protection laws and regulations. Combatting Creepiness in Big Data, offers recommendations to better set and manage data use expectations and realities. Counterfeits, Knockoffs and Knockdowns: Controlling Your Company and Product Image on E-Commerce Platforms. Following the conference, attendees will receive a bonus eSupplement containing up to an additional 0.50 hour of MCLE to ensure practitioners can earn their required 15.00/3.00 Texas MCLE hours for the year.
Cyber intrusions—data breaches, hacking, ransomware, and other threats—continue to make headlines and affect companies and organizations of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key phases and legal issues relating to breach preparedness and response. Hear directly from top government officials, get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach. Topics include: Civil Litigation and Regulatory Update Taking Internal Controls and Compliance to the Next Level Cybersecurity and Data Privacy Regulation and Enforcement Breach Disclosures Ephemeral Data and Other Emerging Technology Cybersecurity Insurance The In-House Perspective on Managing Current Threats and Challenges If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this one-day course is for you.
UT Law CLE’s 32nd Annual Technology Law Conference brings together a nationally-recognized faculty of technology and licensing practitioners; in-house counsel from leading tech companies; and experts in open source, data privacy/security, and emerging technology for the latest issues affecting the industry. This year’s program features: Smart Cities: Privacy in the Public Sector, and the applicable legal and regulatory issues associated with “Smart Cities” initiatives especially with regard to privacy and cybersecurity. A look at Copyright, Interfaces, and Implications of Oracle v. Google. Advanced licensing strategies and updates; plus discussion on the latest developments in software licensing and monetization of open source software development. A review of California and Other Privacy Law Developments in the Wake of GDPR. The growing role of data analytics in traditional employment decision-making and the legal risk associated. The latest updates in trade secret law including increased protection concerns in light of Epic v. Tata. 3.50 hours of Ethics, including presentations on Evolving Ethics in the Application of AI and Ethics on the Edge: Disruptive Technology and Compliance. Multiple opportunities for networking, including the Thursday Evening Reception for all attendees.
UT Law’s 31st Annual Technology Law Conference brings together a nationally-recognized faculty of technology and licensing practitioners, in-house counsel from leading tech companies, and experts in open source, data privacy and security, and emerging technology for the latest issues affecting the industry. This year’s program features: A luncheon presentation by Texas Law Professor Robert M. Chesney on National Cybersecurity Policy and Security Issues. GDPR is Effective Today!, with updates and discussion on compliance considerations. Advanced licensing strategies and updates; plus discussion on the enforcement of open source and community licenses through copyright infringement. A look at Core Aspects of Federal Procurement Law in Technology Transactions including the new cyber-security requirements for government contractors. Practical tips for navigating ethical issues that arise in negotiating commercial and technical contracts abroad. An in-house counsel discussion on current cybersecurity challenges and trends. An easy-to-understand overview of cryptocurrencies, tokens, blockchain and other applications. The latest law and policies surrounding self-driving cars and drones. “Make or break” legal issues for startups, from entity formation to financing to regulatory compliance. Key Considerations in the Acquisition of Private Technology Companies. An essential ethics presentation on Law Firm Data Security and the Ethical Duty of Technology Competence. 3.00 hours of Ethics, including a presentation on Technology and Access to Justice. Multiple opportunities for networking, including the Thursday Evening Reception for all attendees.
Data breaches are increasingly inevitable—and potentially devastating—to companies of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key phases and legal issues relating to breach preparedness and response. Hear directly from top officials at HHSC, DOJ, and the SEC, get the latest updates on regulatory actions and litigation, and gain detailed and practical guidance for implementing internal controls and responding to a data breach. Topics include: Cybersecurity Regulation and Enforcement, including HIPAA Compliance and HHS Enforcement Litigation Update Internal Controls and Compliance Incidence Response and Breach Disclosure Cybersecurity Insurance Privacy and Data Security in an Increasingly Globalized World The In-House Perspective on Managing Cybersecurity If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this one-day course is for you.
UT Law’s 30th Annual Technology Law Conference brings together a nationally recognized faculty of technology and licensing practitioners, in-house counsel from leading tech companies, and experts in copyright, trademark, open source, and data privacy and security for the latest issues affecting the technology industry. This year's program features: A discussion of current technology policy and possible impacts under a Trump administration Advanced licensing and service agreements—understanding key terms, practical negotiation and drafting strategies, and perspectives from the federal bench Negotiating open source warranties and indemnities GDPR Readiness in 2017 A look at the current cyber threat landscape and emerging issues for executive officers and board members Innovative Approaches to Protecting IP in the Technology Sector Programmable Money and the Future of Contracts Key issues in technology M&A: the influence of activist shareholders, and navigating due diligence in technology transactions Immigration Update: Trump-Era Policies and Impacts on the Technology Sector A panel of U.S. District Court Judges discussing current issues in technology law and best practices as they occur in federal litigation 3.00 hours of Ethics, including a presentation on Technology’s Disruption of the Legal Profession Multiple opportunities for networking, including Thursday Evening Reception for all attendees
Data breaches are increasingly inevitable—and potentially devastating—to companies of all sizes. Essential Cybersecurity Law is a one-day, extensive program designed to walk through key phases of breach preparedness and response. It provides detailed and practical guidance for implementing internal controls, developing an incident response plan, and responding to a data breach, as well as update on regulatory actions and class action litigation. Topics include: Top 10 Myths About Cybersecurity Internal Controls and Compliance HIPAA Breach Reporting Developing and Testing an Incident Response Plan Responding to a Data Breach Cybersecurity Insurance Policies Regulatory Actions and Civil Litigation Update The In-House Perspective: Latest Challenges and Solutions in Managing Cybersecurity If you are a practitioner, in-house counsel, or board member undertaking cybersecurity issues for your organization, this one-day course is for you.
UT Law’s 29th Annual Technology Law Conference brings together a nationally-recognized faculty of technology and licensing practitioners, in-house counsel from leading tech companies, and experts in copyright, trademark, open source, and data privacy and security for the latest issues affecting the technology industry. This year's program features: Advanced licensing—learn practical negotiation and drafting strategies, including key clauses in light of recent developments Open source software licensing and developments in compliance initiatives The Evolving U.S. and EU Privacy Framework, with insight from Dell and BP International Ethical issues involved in the use and regulation of big data, as well as the intersection of data mining and political activities Cybersecurity—recent legal and regulatory developments, tips for developing and testing incident response plans, and best practices for cyber risk management Protecting Trademarks and Copyrights Online A look at how technology is changing the employee-employer relationship—agreements for protecting yourself from the “moonlighting employee,” as well as the evolving difference between employees and “end-users” when Working for the App Key Issues in Corporate Transactions, plus legal and business considerations for taking a company public A panel of U.S. District Court Judges discuss current issues in technology law and best practices as they occur in federal litigation Network with program faculty and attendees at the Thursday Evening Reception.
Join a nationally-recognized faculty of technology and licensing practitioners, in-house counsel from leading tech companies, and experts in copyright, trademark, open source, and data privacy and security at UT Law’s 28th Annual Technology Law Conference for the latest issues affecting the technology industry. This year’s program features: Advanced licensing—learn practical negotiation and drafting strategies, including key clauses in light of recent developments Cloud computing—gain insight into business, legal and regulatory issues, as well as negotiation strategies for service agreements Explore key issues and challenges that arise in spin-out and carve-out transactions What’s New with Crowdfunding and the implications of changes to the Texas Securities Act Better to Ask Forgiveness than Permission? GCs from HomeAway and Green Dot Corporation discuss the legal and ethical issues faced by tech startups with innovative business models Hear an update on the Texas Uniform Trade Secrets Act and get tips for minimizing risk when hiring key talent from direct competitors Responses to a Data Breach: Incident Response Planning and Advanced Preparedness Examine dispute resolution clauses used in technology transactions and gain practical advice on drafting and negotiating key contracts A distinguished panel of U.S. District Court Judges and practitioners discuss the Ethics of Electronic Discovery and New Technology Recent developments in technology case law, plus the latest on open source licensing, digital media streaming, and more Network with program faculty and attendees at the Thursday Evening Reception