Webinar: Conducting a Data Privacy Assessment: Scanning for Gaps in an Organization’s Privacy Program

July 25, 2017 at 12:00 p.m. EDT

Conducting an audit of an organization’s data privacy practices can reveal gaps and weak points in their privacy program. Please join David Zetoony in a one-hour webinar for all in-house and corporate counsel, including those involved in technology, compliance and corporate governance laws, on July 25 at 12:00 PM EDT as he discusses various methods for auditing compliance with United States data privacy laws.

Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Separating Fact from Fiction: Understanding, Providing for, and Mitigating the Actual Liabilities of a Cyber Attack

April 26, 2017 (12:00 noon ET)

There are numerous data privacy and security laws, and considerable disinformation concerning the legal liabilities associated with their non-compliance. One of the most poorly understood areas by attorneys involves the costs that a security/privacy event  may have on their clients, or organizations, in terms of legal liabilities, first party expenditures and reputation. This program by David Zetoony and Tim Burke, Director of Cyber Risk at IMA, Inc.,  will discuss how an attorney can help a client identify and quantify the various legal risks involved with privacy and data security, and how to take steps to mitigate and deal with those liabilities.

For more information or to register, click here.

 

Webinar: When the FTC Comes Knocking: Responding to an FTC Investigation Into Your Company’s Data Privacy or Security Practices

March 21, 2017

The Federal Trade Commission (FTC), which is the primary federal regulator of most companies’ data privacy and security practices, has conducted more than 60 privacy and security-related enforcement actions in the last 15 years. David Zetoony and Josh James will discuss what to expect and how to respond to a FTC investigation into a company’s data privacy and data security practices.

 

For more information or to register, click here.

Webinar (1/31): Conducting a Data Security and Cybersecurity Audit of your Organization: What In-House Counsel Should Know

January 31, 2017 at 12:00 p.m. EST

Security incidents impact all types of businesses. Along with conducting regular data security evaluations, businesses in all industries should utilize risk management as part of their security practices. The NIST Cybersecurity Framework uses risk management processes to facilitate organizations in their cybersecurity policies.

Please join David Zetoony and Art Ehuan, Managing Director of A&M’s Global Cyber Risk Services practice, in a one-hour webinar on January 31 at 12:00 PM EST as they discuss various methods for auditing an organization’s compliance with data security laws. Additionally, they will discuss the use of the NIST CyberSecurity Framework (CSF) to define the cyber risk profile of a company and how to minimize the identified risk throughout the organization.

Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

(2/22) IAPP KnowledgeNet Chapter Meeting: The Actual Costs of a Data Breach

February 22, 2017

Bryan Cave will host IAPP’s Denver KnowledgeNet Chapter meeting, which will discuss the costs of a data breach. The seminar will provide guidance on estimating the cost of a data breach by presenting an understanding of a variety of factors including the likelihood that different cyber-events will occur and the impact that each might have on your organization.  David Zetoony and Tim Burke will discuss how to approach building an estimate in a methodical and analytic manner. Boulder Partner David Zetoony is co-chair of the Colorado regional network of IAPP.

To register for this event, click here.

Time:
9 a.m. – 10:30 a.m.

Location:
CU Law School – Wittemyer Courtroom

2450 Kittredge Loop Drive

Boulder, CO 80309

Webinar: Drafting Enforceable Class Arbitration Waivers

Many companies have been the victim of consumer class actions that allege data privacy and data security violations.  In order to mitigate the risk of receiving a class action, companies often consider drafting arbitration clauses that incorporate “class action waiver” provisions – i.e., requiring that consumers arbitrate a data privacy or security dispute, and prohibiting the consumer from litigating as part of a class action.

My partners Alex Grimsley and Meridyth Andresen will be providing a webinar tomorrow at 12 pm EST discussing how to draft an enforceable class arbitration waiver provision. Information on how to register for the program is below.  As CLE is provided by WestLegalEdCenter and Celesq  AttorneysEd Center there is normally a small charge for attending the program.  Any firm clients that plan on attending the program, however, can contact Tamara Lakic in order to receive a code that waives the fee.

Click here for more information or to register.

Webinar: Advising Board Members and Executives on Data Security and Data Privacy Risks

December 1st, 2016 at 1:00 PM ET

Data security and data privacy issues have risen to become top priorities for boards and executives. The legal, regulatory, and fiduciary requirements placed on board members and executives continue to grow. Board members and executives are also confronted by ever increasing shareholder expectations regarding their roles in data security and privacy compliance. In this webinar, Boulder Partner Jason Haislmaier will discuss the rapidly increasing responsibilities of board members and executives to safeguard data security and privacy, and how they can best comply. Among other things, you’ll learn about:

  • The current legal, regulatory, and fiduciary requirements and expectations regarding data security and privacy
  • How board members and executives can effectively manage their new responsibilities
  • Strategies for advising and supporting board members and executives

Click here for more information or to register.

Event: US Privacy Regulations – Mobile and Out-of-Home Location-Based Advertising

 October 17, 2016

Bryan Cave will host IAPP’s Denver KnowledgeNet Chapter meeting, which will cover U.S. privacy regulations in regards to mobile and out-of-home  location-based advertising. The seminar will provide an overview of location-based advertising, as well as discuss the patchwork framework of privacy  laws, FTC and AG enforcement, industry self-regulation, and industry best practices for mobile and out-of-home advertising. Boulder Partner David Zetoony is co-chair of the Colorado regional network of IAPP.

To register for this event, click here.

Time:
11:30 a.m. – 1 p.m.

Location:
Bryan Cave
1700 N Lincoln Street
Suite 4100
Denver, CO 80203

Webinar: The Legal Issues Involved with Commercializing Data

Aug. 25, 2016 at 12 p.m. Eastern

In today’s technology-driven world with the use of the cloud, big data, mobile applications, and digital-collaboration platforms becoming commonplace for businesses of all shapes and sizes, every company is becoming a data company, and new data assets are created every day. In this webinar, Boulder Partner Jason Haislmaier and Associate Chris Achatz will discuss the legal issues of commercializing data and the common questions regarding the creation of commercial data products. Topics include legal aspects of data products, including creating and aggregating data sets, acquiring data from private and public sources, providing effective data analytics, selecting a data distribution model, and licensing.

Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Valdetero Presents at ACC Data Privacy Program

Aug. 17-18, 2016

Chicago Partner Jena Valdetero participated in panel discussions Aug. 17 and 18 hosted by the Association of Corporate Counsel Chicago and Jordan Lawrence: Assessing Your Data Security & Privacy Risks: Pragmatic Advice for Mitigating & Managing Liabilities. Bryan Cave co-sponsored the events, and the Aug. 18 event was held in Bryan Cave’s Chicago office. Valdetero heads up the firm’s data breach response team, with a specific focus on counseling, compliance, and litigation. She is a member of the International Association of Privacy Professionals.

Webinar: Cyber Extortion — What are the Laws that Protect Against It and How Should Lawyers Respond?

Aug. 10, 2016 at 12 p.m. Eastern 

Back by popular demand, we are once again presenting our cyber extortion webinar (originally presented June 16).

While extortion is not a new concept, in the digital world, it is taking on a new dimension. Individuals, companies, organized crime, and even terrorist groups are increasingly threatening cyber-attacks, public disclosure of personal information, or reporting security vulnerabilities to regulators if companies do not accede to their demands. Join Mary Beth Buchanan and David Zetoony as they:

  • discuss different types of cyber-extortion,
  • describe the interaction between criminal laws preventing extortion and the data security laws, and
  • provide practical advice on how lawyers should respond to cyber-extortion demands.

Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: Developments in Cyber Insurance for In-House Lawyers – Are You Getting the Coverage You Expect?

July 28, 2016 at 12 p.m. EDT

Five years ago only a minority of companies had cyber insurance. With high profile breaches insurance has quickly become the standard, and not the exception, but a cyber insurance policy is far from standardized. Bryan Cave’s David Zetoony discusses how in-house counsel should read cyber insurance policies to make sure that their clients receive the coverage that they expect. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

IAPP Boulder Event Featuring Update on BREXIT

July 14, 2016

Bryan Cave is hosting an International Association of Privacy Professionals (IAPP) informal evening of networking on July 14 in its Boulder office. While there is no formal agenda, special guest Sarah Delon Bouquet from Bryan Cave in Paris will give a quick update on the GDPR and BREXIT. Boulder Partner David Zetoony is co-chair of the Colorado regional network of IAPP. Click here for more information or to register.

Time:
5 – 6:30 p.m.

Location:
Bryan Cave LLP
1801 13th Street
Suite 300
Boulder, CO 80302

Webinar: An In-House Attorney’s Guide to Creating an Effective Privacy Policy

June 28, 2016 at 12 p.m. EDT

Almost every company now has an online presence and, with it, an online privacy policy. While privacy policies are not new, attorneys need to keep current with the laws and regulations and to draft the policies effectively so that consumers can understand them. Boulder Partner David Zetoony and Associate Christopher Achatz discuss the legal issues involved with drafting privacy policies and explore best practices on how to create effective policies. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

IAPP June Denver Event

June 21, 2016

Bryan Cave is hosting an International Association of Privacy Professionals (IAPP) lunch event on June 21 in its Denver office. Boulder Partner David Zetoony is co-chair of the Colorado regional network of IAPP. Click here for more information or to register.

Speaker:
Philip L. Gordon, Shareholder, Littler Mendelson

Topic:
Background Checks And BYOD: How Employers Can Control the Risk and Reap the Rewards

Time:
11:30 a.m. – 1 p.m.

CPE Credits:
CIPM, CIPP/G, CIPP/US and CIPT certificate holders will automatically receive 1.5 Group A continuing privacy education (CPE) credits for attending this KnowledgeNet Chapter meeting. For all other IAPP certifications, credits will be applied to Group B. If you have certification questions, please read our cpe policy or e-mail cpe@iapp.org.

Webinar: Cyber Extortion — What are the Laws that Protect Against It and How Should Lawyers Respond?

June 16, 2016 at 12 p.m. EDT

While extortion is not a new concept, in the digital world, it is taking on a new dimension. Individuals, companies, organized crime, and even terrorist groups are increasingly threatening cyber-attacks, public disclosure of personal information, or reporting security vulnerabilities to regulators if companies do not accede to their demands. Join Mary Beth Buchanan and David Zetoony as they:

  • discuss different types of cyber-extortion,
  • describe the interaction between criminal laws preventing extortion and the data security laws, and
  • provide practical advice on how lawyers should respond to cyber-extortion demands.

Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: What In-House Lawyers Should Know about the Legal Risks of Identity Theft and the Role of Credit Monitoring Services

May 24, 2016 at 12 p.m. EDT

Following a data security breach many companies assuage consumer fears by offering credit monitoring, ID restoration services, or ID theft insurance. Many in-house counsel misunderstand the legal risks of identity theft and the role that credit monitoring products play in protecting consumers from harm when such theft occurs. Boulder Partner David Zetoony discusses ID theft risks and the legal issues that in-house counsel need to consider when selecting a credit monitoring service. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

IAPP Denver Event

May 23, 2016

Bryan Cave is hosting an International Association of Privacy Professionals (IAPP) lunch event on May 23 in its Denver office. Boulder Partner David Zetoony is co-chair of the Colorado regional network of IAPP. Click here for more information or to register.

Speaker:
Steven Fritz, Special Counsel, Law Offices of Louise Bouzari

Topic:
Responding to Government Investigations of Data Privacy and Security Practices

Time:
11:30 a.m. – 1 p.m.

CPE Credits:
CIPM, CIPP/G, CIPP/US and CIPT certificate holders will automatically receive 1.5 Group A continuing privacy education (CPE) credits for attending this KnowledgeNet Chapter meeting. For all other IAPP certifications, credits will be applied to Group B. If you have certification questions, please read our cpe policy or e-mail cpe@iapp.org.

Zetoony to Speak at AIJA Conference

May 19, 2016

Warwick Allerton Hotel
701 North Michigan Avenue
Chicago, IL 60611

Boulder Partner David Zetoony will discuss the intersection of data privacy and labor and employment law at the Association Internationale des Jeunes Avocats (AIJA) / International Association of Young Lawyers Half-Year Conference. His May 19 panel, “Technology at Work – Employee Data Privacy, Security and Transfers,” is part of the international labor and employment law seminar, which Bryan Cave is sponsoring.

AIJA is the only global association devoted to lawyers and in-house counsel aged 45 and younger. Miami Associate Giovanni Angles is a member of the conference’s organizing committee.

Click here for more information.

Bryan Cave to Host Cyber Insurance CLE Seminar

May 18, 2016

Bryan Cave will host a CLE seminar in its Chicago office with separate panels on cyber insurance and public policy. The May 18 seminar will be presented by guest speakers and lawyers across multiple Bryan Cave offices.

The cyber insurance panel will be moderated by Chicago Of Counsel Maria Vathis. Panelists will include Boulder Partner David Zetoony; Aaron Carlson, director of business development at Rust Consulting; and Ryan Griffin, vice president of the cyber/E&O practice at JLT Specialty.

The public policy panel will discuss, from both sides of the aisle, the anticipated legal, business, and political environment, post-2016 presidential election. Panelists will include St. Louis and DC Senior Policy Advisor Jack Oliver and DC Partner Miguel Rodriguez.

Click here for more information or to register for the seminar.

clersvp

Webinar: mCommerce — A Guide to Legal Issues in the Evolving Mobile Landscape

May 12, 2016 at 12 p.m. EDT

The days of swiping a credit card on a card reader are over. Companies are increasingly exploring new and creative ways to allow their customers to pay for items using smartphones, computers, and mobile technologies. Boulder Partner David Zetoony and Courtney Stout will discuss the legal, regulatory and industry privacy and data security issues that arise when developing, deploying, or utilizing the latest mobile commerce solutions.  Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: What In-House Counsel Need to Know about Data Privacy in the Sharing Economy

April 21, 2016 at 12 p.m. EDT 

Sharing Economy companies have unleashed new technologies to reduce barriers to economic participation, giving millions of would-be entrepreneurs the tools to share their time, vehicles, homes and other assets to help cover expenses. Many of these tools also give sharing economy companies access to sensitive personal data regarding their users, including GPS coordinates, driving records, criminal history information and more. However, because these industries tend to be highly regulated, many companies are required by regulation to collect and store this data beyond the period dictated by business necessity. Join San Francisco Partner Daniel Rockey as he discusses some of the key privacy issues facing sharing economy companies and strategies to reduce the legal risks inherent in collecting and storing sensitive personal data. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: How to Improve Data Security in Payment Systems — Changing Risks and Changing Technology for In-House Counsel

March 31, 2016 at 12 p.m. EDT

With new technology behind how credit card transactions are processed and protected, accepting credit cards carries new data security risks and potential legal liabilities. In addition to the normal repercussions of a data security breach (reputation damage, the risk of class action litigation, and the risk of a regulatory investigation), if a retailer’s credit card system is compromised, the retailer may be contractually liable to its payment processor, its merchant bank, and ultimately the payment card brands. Boulder Partner David Zetoony and Courtney Stout discuss new payment processing technologies, their impact on data security, the risk implications for companies, and how in-house counsel can negotiate third party vendor contracts to minimize these risks. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: Life After the Safe Harbor Under the “Privacy Shield”

March 3, 2016 at 12 p.m. EST

Companies of all types were caught off guard when the EU-U.S. Safe Harbor data transfer framework was invalidated in October 2015. In the months following the invalidation, many companies anxiously awaited a replacement for the original Safe Harbor framework. That replacement has now been announced in the form of the newly-negotiated “Privacy Shield” framework. Join Jana Fuchs and Jason Haislmaier as they discuss the details of the Privacy Shield framework, provide an update on the current status and timeline for the formal adoption of the Privacy Shield, and provide strategies for compliance in EU-U.S. cross border data transfers both now and following adoption of the Privacy Shield. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Live Event: Data Breach & Privacy Litigation Conference

DBPCon16Zetoony1PgFeb. 11, 2016

Julia Morgan Ballroom, San Francisco

Bryan Cave LLP is proud to participate in the Data Breach & Privacy Litigation Conference — this is the first conference to be dedicated specifically to privacy and security litigation.  David Zetoony, a partner in our Boulder/Washington offices has been invited to co-Chair the conference.  Dan Rockey, a partner in our San Francisco office, and Mary Beth Buchannan, a partner in our New York office, will both be speaking.  Please consider joining us in San Francisco on Feb. 11, 2016.

Webinar (2/23): Internet of Things: Data Security and Data Privacy Where Everything is Connected

February 23, 2017 at 12:00 p.m. EST

The “Internet of Things” (IoT) is producing dramatic changes in the way personal data is collected, shared, and used over countless interconnected devices and services. These changes have created new data security and data privacy challenges for businesses and regulators alike. Please join Jason Haislmaier in this one-hour program for all attorneys as he discusses how to handle the data security and data privacy issues and the legal, regulatory, and policy risks posed by dealing with data in the IoT.

Mr. Haislmaier frequently lectures on topics involving open source software, cloud computing and other areas of intellectual property. He is currently the Board Chair of the Silicon Flatirons Center for Technology and Entrepreneurship, Intellectual Property & Information Technology.

Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: What Attorneys Should Know about Designing the Most Effective Data Security Vendor Management Program

Nov. 17, 2016 at 12 p.m. Eastern

Companies today are reliant on a broad array of software and other information technology (IT) offerings to operate their businesses. For companies of all sizes, many of these IT offerings are now provided by third party vendors. In recognition of the increasingly fundamental role played by IT vendors, programs to evaluate and manage are now priorities for many companies. Join Boulder Partner Jason Haislmaier as he discusses the role of IT vendor management programs, key strategies for establishing and maintaining those programs, and tools for addressing the significant legal and regulatory data privacy and security compliance issues that can arise in IT vendor relationships. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: Advising Your Board and Executives about Data Security and Privacy Risks – Latest Developments and Guidance for Attorneys

Sept. 29, 2016 at 12 p.m. Eastern

Data security and data privacy issues have risen to become top priorities for boards and executives.  The legal, regulatory, and fiduciary requirements placed on board members and executives continue to grow.  Board members and executives are also confronted by ever increasing shareholder expectations regarding their roles in data security and privacy compliance.  Join Boulder Partner Jason Haislmaier for a discussion of strategies and best practices for advising and supporting board members and executives to help them meet their quickly-expanding roles in these areas. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: Recommendations for Data Privacy and Security in the Age of Drones – Latest Developments and Guidance for Attorneys

Oct. 25, 2016 at 12 p.m. Eastern

The commercial use of unmanned aircraft systems (“UAS”), more commonly known as “drones,” has continued to experience exponential growth. Much of the regulatory focus to date has been on establishing requirements for the commercial use of drones. However, the Federal Trade Commission (FTC) and other regulators have begun to focus on the unique data privacy and security concerns raised by the commercial use of drones. In the wake of the FTC’s planned drone workshop on Oct. 13, Boulder Partner Jason Haislmaier discusses these data privacy and security legal and regulatory concerns raised by the commercial use of drones and available tools and strategies for in-house and outside counsel in meeting the challenges in these areas. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

The New Cop in Town – What You Need to Know about the FCC and Data Security

Sept. 15, 2016 at 12 p.m. Eastern

The Federal Trade Commission (FTC) was one of the first federal agencies to establish and enforce data privacy and data security requirements in the United States. Now the Federal Communication Commission (FCC) has made a well-publicized and controversial foray into the world of data privacy and data security, going beyond FTC efforts to establish broadly applicable rules and regulations governing data privacy and data security. Join Boulder Partner Jason Haislmaier for a discussion of what in-house and outside counsel need to know regarding the latest legal developments in the FCC’s ongoing efforts to regulate data privacy and data security and what these efforts mean for all companies, not just those subject to FCC regulation. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Business Law Institute 2016

Sept. 15-16, 2016

Marriott City Center Hotel
1701 California Street
Denver, CO 80202

Boulder Partner David Zetoony will present at the Colorado Bar Association’s Business Law Institute 2016, Sept. 15-16 in Denver, Colo.  The program, co-sponsored by the Business Law and Tax Law Sections of the Colorado Bar Association, will have six plenary sessions followed by 21 optional breakout sessions. Zetoony will lead a Sept. 15 breakout session, “What Business Lawyers Need to Know When Advising Their Business Clients About Data Breaches.” He will discuss how to reduce the risk of data breaches and mitigate harm as well as what constitutes reasonable security. Click here for more information.

EU-US Cross Border Transfers, Privacy Shield, Model Clauses, and Binding Corporate Rules

Sept. 8, 2016 at 12 p.m. Eastern

Multinational companies and U.S.-based service providers have long struggled with transferring information from the European Union to the United States, and balancing legal compliance with practical need. With the invalidation of the Safe Harbor in 2015, the struggle became even more difficult. Although there remains uncertainty concerning how long the different methods for transferring information will continue to be recognized, with the approval of Privacy Shield, we have finally reached at least a temporary period of stability. Join Boulder Partner David Zetoony and Hamburg Associate Carolyn Krampitz as they discuss the legal and regulatory issues involved with transferring information from the European Union to the United States, and discuss the three methods that are recognized for doing so: the Privacy Shield, standard model clauses, and binding corporate rules. Click here for more information or to register.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Note: The Privacy Shield after the Safe Harbor is also the subject of a recent program, EU-U.S. Data Transfer—Life after the Safe Harbor under the “Privacy Shield” (2605), available now on demand.

Webinar: Monitoring Employee Use of Computers, Phones, Social Media and More: Latest Developments for In-House Corporate and Employment Lawyers Program date

January 26, 2016

Employers have a variety of technological means to monitor employees’ communications and activities, and new technologies provide additional means. Yet employees still have legally protected privacy rights that must be respected. Join Dan Prywes and Josh James as they discuss:

  • basic principles respecting different monitoring tools and areas of legal uncertainty,
  • the development of employer policies and employee-consent forms to best advance employers’ legitimate goals, and variations among state laws, union bargaining over monitoring, and emerging issues.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Webinar: Autonomous Vehicles Privacy and Cybersecurity Issues

January 20, 2016

With even GM investing in a driverless future, autonomous vehicles, or self-driving cars, may be the greatest disruptive innovation to travel that we have experienced in decades. A fully-automated, self-driving car is able to perceive its environment, determine the optimal route, and drive unaided by human intervention for the entire journey. Self-driving cars have the potential to drastically reduce accidents, travel time, and the environmental impact of road travel. However, obstacles remain for the full implementation of this autonomous technology. Of particular concern with regard to autonomous vehicles are data privacy and security risks that attorneys need to know. David Zetoony and Chris Achatz, Bryan Cave LLP, discuss the evolution of the technology, provide an overview of current legal and regulatory data privacy and security issues that are implicated, and explore specific data privacy and security concerns that will need to be addressed to enable the adoption of autonomous vehicles.

We are presenting this audio web cast through Celesq® Attorneys Ed Center in partnership with West LegalEdcenter.

Preventing Your Own Peach-Breach: A Week-long Program on Preparing for a Data Breach

Nov. 30 – Dec. 4, 2015

Headlines have focused on the “Peach Breach” — the Georgia Secretary of State’s inadvertent disclosure of sensitive information about over 6 million Georgia voters.  In response to requests from clients in Georgia, and around the country, for information on how to prepare for, and respond to, a data breach, we have put together a week-long series consisting of a one-hour webinar each day during the first week in December on a different data breach topic.  Click on the thumbnail for registration information . . . PeachBreachWeekLongProgramSeries

Data Breach Investigations: Ethical Considerations for In-House Counsel when Publicly Reporting a Security Incident

December 3, 2015

Data security and data privacy issues have risen with extraordinary speed to become “top ten” priorities for boards of both public and private companies alike. Yet board members and executives often find themselves ill-equipped to assess and address their quickly expanding responsibilities in these areas. Join Jason Haislmaier of Bryan Cave LLP for a discussion of the growing legal, regulatory, and shareholder requirements and expectations regarding data security and privacy confronted by board members and executives. More than just another rundown of why board members and executives should be concerned with data security and privacy issues, this presentation also provides strategies and practices for both advising and supporting board members and executives in these quickly expanding areas.

Live Event: Privacy Policy Fundamentals

November 11, 2015
Bryan Cave, Denver

Please join us for lunch on November 11, 2015 for a panel discussion regarding privacy policy fundamentals. We will discuss the role of privacy policies in establishing data rights and obligations, and explore the core principles, industry requirements, geographic considerations, and future of privacy policies.  The event is sponsored by the IAPP.  Click here to register.

Nov11,2015PrivacyPolicyFundamentals

Event: Data as a Product – Dealing with the Issues of Commercializing Data

Sept. 17, 2015

ABA Business Law Section Annual Meeting
Chicago, IL

Bryan Cave Partner Jason Haislmaier and Associate Chris Achatz will present a CLE on “Dealing with the issues of Commercializing Data” at the upcoming ABA Business Law Section Annual Meeting. The program will provide insights into the common questions regarding the creation of commercial data products.  The topic line-up will include  legal aspects of data products, including creating data sets, acquiring data from private and public sources, aggregating data sets, providing effective data analytics, selecting a data distribution model, and licensing.

For registration information, please visit the ABA Business Law Section website.

Webinar: Data Security Boot Camp: A Crash Course for In-House Counsel

September 17, 2015

With management increasingly looking to in-house counsel for guidance in complying with data security laws and in mitigating regulatory, litigation, and reputational risk following a data security breach.

More information to come.

Webinar: Data Privacy Boot Camp: A Crash Course for In-House Counsel

September 2, 2015

With management increasingly looking to in-house counsel for guidance in complying with data privacy laws, Jason Haislmaier, Bryan Cave LLP, offers in-house counsel a working understanding of data privacy laws in the UnitedStates.

More information to come.

Ethics and Data Breach Investigations

Thursday, June 18, 2015, 9:00 – 1:00 CT

Live Event: St. Louis

As legal departments are increasingly being called upon to help their organizations navigate a breach investigation, the program will discuss how to effectively investigate a security incident as well as the types of ethical issues that may arise.

 

LawandEthics

Advising Your Board and Executives About Data Security and Privacy Risks

November 3, 2015 12:00 ET

Data security and data privacy issues have risen with extraordinary speed to become “top ten” priorities for boards of both public and private companies alike. Yet board members and executives often find themselves ill-equipped to assess and address their quickly expanding responsibilities in these areas. Join Jason Haislmaier of Bryan Cave LLP for a discussion of the growing legal, regulatory, and shareholder requirements and expectations regarding data security and privacy confronted by board members and executives. More than just another rundown of why board members and executives should be concerned with data security and privacy issues, this presentation also provides strategies and practices for both advising and supporting board members and executives in these quickly expanding areas.  Click here to register for the program, or to listen to a recording.

Webinar: Understanding Data Security Litigation: A guide for In-house counsel

October 6, 2015

This program provides an overview of the types of legal and regulatory claims a company may be faced with in the wake of a data breach. In-house counsel should walk away understanding the potential exposure faced by their companies and strategies for defeating such claims.  Click here to register for the live program, or to access a recording.

Live Event: Data Security Boot Camp for In-House Counsel

November 3, 2015

In-House CLE Institute
Bryan Cave, Denver

With management increasingly looking to in-house counsel for guidance in complying with data security laws and in mitigating regulatory, litigation, and reputational risk following a data security breach.  To register for this in-person event, click here.

Investigating Data Breaches: A Guide for In-House Counsel

Tuesday, June 16,  2015, 12:00 ET

Webinar

Bryan Cave LLP has investigated more than 400 data security breaches. As legal departments are increasingly being called upon to help their organizations navigate a breach investigation, the program will discuss the “how to” for effectively investigating a security incident.

June16,2015Webinar

 

Denver Event: Cyberinsurance Wx4: who really needs it? What is it? Where do I get it? Why is it so complicated?

May 21, 2015

This in-person event in Denver, sponsored by the IAPP, will include a panel discussion of cyberinsurance.

cyberinsurance wx4

Webinar: A Guide for In-House Counsel on How To Draft the Terms of a Cybersecurity “Bounty” Program.

May 19, 2015

Companies are often contacted by individuals claiming to be “white hat” hackers who purport to have identified a security vulnerability and are willing to share it with the company –for a price. The requests are often perceived as extortion or blackmail when they are unsolicited. In order to avoid this scenario companies . . .

The program is sponsored by West Law Legal Ed and Celesq.  Participants can register here.

Data Privacy, Data Security, and Cloud and IT Vendor Agreements: A Guide for In-House Counsel

May 12, 2015

The services provided by cloud computing, hosting, data storage, outsourcing, and other information technology (IT) vendors have become fundamental resources for most companies. Data privacy and data security issues have rapidly risen to the forefront in vendor agreements for these services and are now often among the most hotly contested provisions in those agreements. . .

The program is sponsored by West Law Legal Ed and Celesq for CLE credit.  Participants can register here.

Webinar: How the FTC Identifies, Targets, and Tracks Companies Alleged to Engage in Improper Data Privacy, Data Security, Advertising, or Marketing Practices: A Guide for In-House Counsel

May 5, 2015

consumer protection webinarThe FTC files around 70 actions each year for alleged bad practices concerning data privacy, data security, advertising, or marketing.In addition, the FTC may conduct hundreds more investigations of corporate practices that do not ultimately lead to an enforcement action.The program discusses the ways in which the FTC identifies its enforcement targets and focuses in particular on the FTC’s use of consumer complaint data to track companies and potentially identify enforcement targets.

The program is sponsored by West Law Legal Ed and Celesq for CLE credit.  Participants can register here.

Webinar: How the FTC Identifies, Targets, and Tracks Companies Alleged to Engage in Improper Data Privacy, Data Security, Advertising, or Marketing Practices: A Guide for In-House Counsel

April 9, 2015

how the ftc identifies targetsThe FTC files around 70 actions each year for alleged bad practices concerning data privacy, data security, advertising, or marketing.In addition, the FTC may conduct hundreds more investigations of corporate practices that do not ultimately lead to an enforcement action.The program discusses the ways in which the FTC identifies its enforcement targets and focuses in particular on the FTC’s use of consumer complaint data to track companies and potentially identify enforcement targets.

Speakers

David Zetoony

Webinar: What In-House Counsel Should Know about Data Privacy and Data Security in a Big Data World

March 12, 2015

The term “Big Data” has become synonymous with the ability to rapidly analyze large volumes of data to predict outcomes and draw other insights.Big Data has grown exponentially as the insights reaped from data analysis have become crucial to the success of many companies.With this growth have come a number of data security and data privacy considerations and requirements for companies involved with big data.Join Jason Haislmaier of Bryan Cave LLP for a discussion of these considerations and requirements, including established and emerging legal standards, regulatory requirements, and best practices for data privacy and data security in a “Big Data” world.

Speaker:

Jason Haislmaier

Webinar: Data Privacy and Security Challenges in Global Employment Management: A Guide for In-House Attorneys

The presentation includes an interactive case study showing the challenges companies have to solve when operating a global HR system. Topics include the regulatory framework for collection and processing of personal employee data, the transfer of such data within a corporate group, purpose limitation and conflicts of law.  Webinar archived by West Law Legal Ed Group.  Search: “Data Privacy Challenges in Global Employment Management.”

 PrivacyHRManagement

St. Louis Event: Financial Institution Roundtable and Data Breach Simulation (half day)

February 26, 2015

financial institutions roundtableJoin Bryan Cave and Speartip for a rountable discussion and simulation on cyber-threats and data security with a special presentation by FBI cyber-specialist, Craig Byrkit.

Webinar: Data Breach Investigations: Ethical Considerations for In-House Counsel

February 10, 2015

Data Breach InvestegationsData security breaches are now unavoidable. The question is whether in-house counsel are prepared to deal with a breach when it occurs. In addition to the legal and practical questions that arise from a data breach, in-house counsel must often navigate several ethical dilemmas. David Zetoony, Jena M. Valdetero and Jennifer Mammen discuss ethical issues that typically arise when investigating a security incident. These include coordinating an incident response, interactions with employees that may be responsible for causing a security incident, and managing external resources such as forensic investigators and outside counsel. The program focuses on issues of confidentiality and conflicts. Specific ethical rules, cases, opinions to be discussed include: ABA Model Rules (e.g., Confidentiality of Information (1.6), Conflict of Interest (1.7), Organization as client (1.13), Duties to prospective client (1.18), Advisor (2.1), Lawyer as witness (3.7), Truthfulness in statements to others (4.1)); Upjohn; and various state bar ethics opinions.

Speakers

Jena Valdetero

David Zetoony

Jennifer Mammen

New York Event: Data Privacy Day co-sponsored with OTA (Full day)

February 3, 2015

data privacy day co-sponsoredPublic and private sector experts providing prescriptive and actionable advice about data privacy and protection to the business community.

Speakers

Maureen K. Ohlhausen

Webinar: PCI Data Breach Preparedness

January 27, 2015
PCI Data BreachThe Bryan Cave Payments Team along with special guest speaker Andi Baritrichi, the principal in charge of Verizon’s PCI Practice, hosted a webinar that focused on PCI data breaches.

Speakers

Courtney Stout

Jena Valdetero

Webinar: Data Security and Credit Cards for In-House Counsel: How Your Organization’s Contractual Relationship with Credit Card Processors Is Changing

January 22, 2015

Data Security and Credit CardA liability shift is forcing credit and debit card transactions to be conducted using chip-based (i.e., EMV) payment cards by 2015. This transition could impact your organization in more ways than one. Join us for this important discussion of new requirements of the payment card network rules (i.e., Visa, MasterCard, American Express and Discover), the Payment Card Industry Data Security Standards (PCI DSS), and President Obama’s Executive Order (October 2014) regarding chip technology, and for additional measures (a combination of EMV, Tokenization and Encryption) that can be taken to increase your organization’s data security practices and procedures for your credit and debit card processing and Corporate Purchasing Card programs.

Speakers:

Courtney Stout

Jennifer Crowder

Boulder Event: Conducting a Data Map or a Data Inventory

August 18, 2015 (4:30MT – 6:00 MT)

This in-person event is sponsored by the IAPP and will be held in Bryan Cave’s Boulder, Colorado office.  The event will discuss how to conduct a data map or a data inventory.  It will also include a networking happy hour showcasing Boulder’s award winning microbreweries.  Click here to register.  If you are not a member of the IAPP you will be prompted to “sign up” for an IAPP account as part of registration.

 

DatamappingKnowledgeNetInvitation