Narrow Your Results
Narrow Your Results

Display:

Seminars & Webcasts

On-Demand

Publications

Faculty/Authors

News/Blogs

CLE and Other Credit Types

CLE  

CPD  

CFE  

HRCI Recertification  

Privacy CPE (IAPP)  

Search for programs by jurisdiction or CLE credit type:

 
 
  Not all credit types are available in all jurisdictions. If you choose multiple states and multiple credit types, you may end up with 0 results.  
 



 

   
      

Search for Programs with CPD Credits in:


   

   

Showing 1 - 25 of 104 Results

List View Table View

A Consultant's Perspective on the Financial Services Industry

Transcripts  Transcripts    

Recorded on: May. 21, 2015

RICHARD: We've heard from a lot of lawyers. And I thought it'd be nice to get a view from the consultant side, so I was able to locate an authentic consultant, John Rogers. And John and I have actually co-authored an article together as part of the materials in the book. And John is a chief technologist for Booz Allen Hamilton in New York City. He has expensive information security, experience in a variety of industries including financial services-- ...

Financial Services IT 2015: Avoidance of Risk

On-Demand Web Programs  On-Demand Web Programs    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Financial Services IT 2015: Avoidance of Risk

Released on: Jun. 3, 2015

The Financial Services Industry is one of the most heavily regulated industries and the regulations are constantly changing.  The Dodd-Frank Wall Street Reform and Consumer Protection Act changed the landscape and companies must maintain their vigilance to comply with its requirements, even four years after it was enacted.  The last six months has yielded further regulations.  In October 2013, the OCC implemented compliance requirements ...

Addressing Advertising and Marketing Risks

Transcripts  Transcripts    

Recorded on: May. 27, 2015

LOIS F. HERZECA: Welcome back, everyone, to all of you who are here in the room with us today. I am very pleased to present to our next speaker of the day, Linda Goldstein. She's widely recognized as one of the leading advertising lawyers in the country. She's a partner and chair of the advertising, marketing, and media division at Manatt Phelps, and she represents the world's leading consumer products, services, and advertising, and marketing companies ...

Addressing Advertising and Marketing Risks

MP4 - Mobile Video Seg  Video Download (MP4)    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    

Recorded on: May. 27, 2015

Taken from the Web Program Fashion and Retail Law 2015: Trends and Developments recorded May, 2015 in New York. Addressing Advertising and Marketing Risks [00:58:24] FTC and state enforcement trends and priorities Key legal issues and brand risks in social media Mobile marketing pitfalls Sweepstakes, contests and other consumer promotions Linda A. Goldstein The purchase price of this segment includes the following ...

Addressing Data Privacy and Data Security Challenges

Transcripts  Transcripts    

Recorded on: May. 27, 2015

LOIS HERZECA: So first I would like to introduce our first speaker of the day, Stacey Brandenburg of the Zwillgen firm. Stacey is a veteran of the FTC's Division of Privacy and Identity Protection and regularly advises clients on a range of privacy and data security issues. Stacey will address for us the very important subject of data privacy and data security in the current environment. Stacey. STACEY BRANDENBURG: So good morning. I first want to ...

Advertising Law Institute 2015 -- Big Data Is Changing Advertising: Are You Ready?

Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Advertising Law Institute 2015

Recorded on: Oct. 19, 2015

Taken from the Web Program Advertising Law Institute 2015 recorded October, 2015 in San Francisco. Big Data Is Changing Advertising: Are You Ready? [01:17:45] Advertisers now have access to more and more information about consumers. From online behaviors to mobile tracking, there is a wealth of information available for sale. Should you buy it?  Should you use it? What red flags should you think about if negotiating an agreement with vendors ...

A Hacker’s Perspective

Transcripts  Transcripts    

Recorded on: Sep. 29, 2015

LISA J. SOTTO: Let me introduce our next panel. This panel is called A Hacker's Perspective. So now, we're going to hear the really fun stuff. And for me, at least, as a lawyer, it's really interesting to hear from these guys and what they do. So first, Vinny Liu. Vinny is a partner at Bishop Fox, a security consulting firm that provides services to the Fortune 500. He is a recognized expert with regular columns in Dark Reading and Security Week. ...

Cybersecurity 2015: Managing the Risk

On-Demand Web Programs  On-Demand Web Programs    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Cybersecurity 2015: Managing the Risk

Released on: Sep. 30, 2015

Cyber attacks have wreaked havoc on organizations in nearly every industry sector. From Sony to JPMorgan Chase to Target, cyber criminals have made it clear that no entity is immune. In today’s interconnected world, cybercrime targets are found in every industry sector. Media reports of the staggering number of increasingly sophisticated cyber attacks attest to this trend, and the events of 2014 have dwarfed earlier hacking incidents. In the ...

Anatomy of a Master Services Agreement

Transcripts  Transcripts    

Recorded on: Nov. 2, 2015

SPEAKER: It's my pleasure to introduce John Delaney, who as Ken indicated in the introductions, is one of the country's leading outsourcing lawyers, and leads the practice in New York at [INAUDIBLE] office. John and I believe this is one of the oldest outsourcing conferences. We started it when we were in 10th grade, so we're pretty confident. Just for a quick question, how many people have been here before? OK. John, all yours. JOHN F. DELANEY: ...

Outsourcing 2015: Sourcing Critical Services

On-Demand Web Programs  On-Demand Web Programs    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Outsourcing 2015: Sourcing Critical Services

Released on: Nov. 9, 2015

Outsourcing has firmly established itself as a common practice - often being standard for new companies.  Sourcing agreements raise numerous legal and compliance concerns that counsel are challenged to manage.  Whether in the pre-contract negotiation phase or when problems arise during fulfillment, attorneys on both sides of the agreement must know the risks that might befall them, as well as the available countermeasures. Outsourcing ...

Open Source and Free Software 2015: Benefits, Risks and Challenges - New York

On-Demand Web Programs  On-Demand Web Programs    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Open Source and Free Software 2015: Benefits, Risks and Challenges - New York

Released on: Nov. 9, 2015

This program will address the critical issues that IP, technology and business lawyers need to consider when handling open source software in today’s economy. Armed with this information, you will be better able to help your clients make intelligent choices and decisions about how to take advantage of the benefits and manage the risks presented by open source software. This program is designed for computer/technology lawyers, IP lawyers, ...

Best Practices for Negotiating Privacy and Cybersecurity Issues in Transactions - Forum of In-house Counsel

Transcripts  Transcripts    

Recorded on: Nov. 11, 2015

LORI E. LESSER: OK, everybody, welcome back from lunch. This starts our hour of the in-house panel. I had some introductory remarks for the panel in general, before I'll introduce the panelists. The first thing is that this panel is entirely off the record and not for attribution whether an anonymous basis, name basis, no basis. So it's completely off the record. The second thing is just for your own internal processing of what the panelists say. ...

Think Like a Lawyer and Talk Like a Geek 2015: Get Fluent in Technology

On-Demand Web Programs  On-Demand Web Programs    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Think Like a Lawyer, Talk Like a Geek 2015: Get Fluent in Technology

Released on: Nov. 16, 2015

The lawyer who understands his or her client’s technology will stand out as a trusted counselor who can be given the most challenging and complex issues. It has been thirty years since Apple’s introduction of the original Macintosh computer started the personal computing revolution. The original floppy disk has been replaced by current thumb drives that can store an entire library on a single device. The availability of cheap and ubiquitous ...

Big Data Is Changing Advertising: Are You Ready?

Transcripts  Transcripts    

Recorded on: Oct. 19, 2015

HOLLY: Welcome back guys from break. It is now my honor to introduce Lisa Thomas, my coach here. I think we've all said a lot about Lisa so far. Obviously, she was instrumental in putting this whole PLI together several years ago, is the driving force behind getting all of the great speakers we've had. She's basically pulled favors from an amazing network of have people in contact she has, and I know you guys can all read her bio, and she's literally ...

Breaking Bad Technology Habits: Email, Social Media and Document Management

Transcripts  Transcripts    

Recorded on: Apr. 30, 2015

AMY TAUB: Hello. My name is Amy Taub and I'm a program attorney with PLI. I would like to welcome you to today's briefing, Breaking Bad Technology Habits-- Email, Social Media, and Document Management. Before we begin, I have some administrative announcements. This briefing will be one hour in length. Please feel free to send questions at any time during the briefing. Please remember that you have access to materials for this briefing via the course ...

Breaking Bad Technology Habits: Email, Social Media and Document Management

Audio Only On-Demand Web  Audio Only On-Demand Web    

From the program: Breaking Bad Technology Habits: Email, Social Media and Document Management

Released on: Apr. 30, 2015

Taken from the briefing Breaking Bad Technology Habits: Email, Social Media and Document Management recorded April, 2015 in New York. The practice of law has gone digital, for better or worse. Technology can make the practice of law easier for attorneys but it also creates a new set of risks. Fortunately, many such risks are foreseeable and avoidable. Even though the paperless law practice is a fairly recent development for attorneys, many ...

Case Study: Managing Compliance Risk in Multi-Country Sourcing

Transcripts  Transcripts    

Recorded on: Nov. 2, 2015

WILLIAM A. TANENBAUM: While we're getting set up, I'm going to introduce this panel because it's an important topic with a lot to say and I want to keep everything on schedule. The topic is a case study, Managing Compliance Risk in Multi-country Sourcing. We're very privileged to have with us two very experienced lawyers in this field. Let me first introduce David Ross, who is at MetLife and will present the very large company perspective on this ...

CISO Panel

Transcripts  Transcripts    

Recorded on: Sep. 29, 2015

LISA J. SOTTO: Our last panel is really very well placed to wrap up the day. These are the folks who live and breathe everything that we've been talking about today. We have with us for this panel Jenny Menna. Jenny is the cybersecurity partnership executive at US Bankcorp. She leads sector-wide efforts to strengthen public and private partnerships and promote meaningful cybersecurity legislation. Jenny also leads the bank's information systems security ...

Cloud-Based Service, Big Data and Health Care Cyber Security

Transcripts  Transcripts    

Recorded on: Jun. 1, 2015

WILLIAM TANENBAUM: Hello this is Bill Tanenbaum again. I'd like to welcome you to the next portion of our conference. The next presentation is cloud-m base service, big data and health care cyber security. And we have an excellent panel to address various aspects of this. I'd to introduce our first speaker, who is Anshu Prasad, who leads A.T. Kearney's global analytics team, which has over 230 specialists who focus on applying advanced analytic techniques ...

Health Care IT 2015: Critical Issues

On-Demand Web Programs  On-Demand Web Programs    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Health Care IT 2015: Critical Issues

Released on: Jun. 11, 2015

IT and Health Care are rapidly converging as a result of fast-paced innovation in health-focused information technology and new regulatory and operational requirements posed by those innovations. This requires institutions, IT companies and the lawyers who advise them  to reevaluate and revise existing agreements, address intellectual property issues, and formulate new forms of agreements for new technology -- including those used in remote, ...

Cloud Computing 2015: Key Issues and Practical Guidance

On-Demand Web Programs  On-Demand Web Programs    Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Cloud Computing 2015: Key Issues and Practical Guidance

Released on: Jun. 22, 2015

Corporations, government organizations and millions of consumers are shifting massive quantities of data and their software applications to cloud computing facilities. Cloud computing uses the Internet to give every size organization access to large, dynamically scalable resources (data storage, software applications and computing power). “The Cloud” allows users, at all levels, to avoid large capital outlays for hardware and up-front ...

Communications Law in the Digital Age 2015 -- Hot Issues in Social Media

Web Segment  Web Segment    MP3 Audio  Audio Download (MP3)    MP4 - Mobile Video Seg  Video Download (MP4)    

From the program: Communications Law in the Digital Age 2015

Recorded on: Nov. 16, 2015

Taken from the Web Program Communications Law in the Digital Age 2015 recorded November, 2015 in New York. Hot Issues in Social Media [01:15:07] What are Elonis’ implications for social media speech? How is traditional media taking advantage of social media platforms to deliver content and attract audiences? What's new with Section 230 and social media? How do terms of use of social media platforms govern content? ...

Contracting for Cloud Services: Aligning Customer Demands With Market Reality

Transcripts  Transcripts    

Recorded on: Nov. 11, 2015

PETER BROWN: All right, a nice smooth transition. We're now going to probably cover the similar issues in a different context, by covering the issues relating to outsourcing. And we've got two really terrific experts for you. Down at that far part, way down there to my left, is Ken Adler. Ken is a partner and chair of the technology and outsourcing practice at the law firm of Loeb & Loeb over in their New York office. Ken specializes in complex global ...

Contracting for ‘Worst Case’ Contingencies and Liabilities

Transcripts  Transcripts    

Recorded on: Nov. 2, 2015

WILLIAM A. TANENBAUM: Concession now. And our next panel is one that's very interesting, I think, and one that we've tried very hard to reflect our view here at running the panel and running the conference that we hit the kind of over the horizon issues. So this may not be over the horizon for all of you, but our next panel is entitled contracting for worst case contingencies and liabilities. And I'm pleased to introduce two friends, two longstanding ...

Contract Issues

Transcripts  Transcripts    

Recorded on: Jun. 9, 2015

TANYA L. FORSHEIT: All right, everybody, we're back. And this is our final session. We're going to be focused on contracts, which we've been alluding to all day. And so we're going to get into the good stuff now. And please don't hesitate to ask your questions as we go along. We try to make this an interactive session, and today's been a little different usually. We usually have more panels where we have more than one panelist, and today's been a ...


  • FOLLOW PLI:
  • facebook
  • twitter
  • LinkedIn
  • GooglePlus
  • RSS

All Contents Copyright © 1996-2016 Practising Law Institute. Continuing Legal Education since 1933.