Why you should attend
This program focuses on critical issues of information privacy, security and data protection faced by all companies. The Internet and other evolving information technologies, wired and wireless, have prompted the development of powerful tools for the collection, processing, storage and use of personal information. These trends create numerous issues regarding limitations on corporate rights to use that information and obligations to protect it from a variety of new risks and vulnerabilities. Legislators, regulators and the courts are rapidly developing new law and compliance obligations to address the privacy and security implications of the information economy. This annual conference focuses on these developments with the goal of keeping attorneys and other privacy professionals informed and up-to-date in this complex and dynamic area of laws and regulations.
What you will learn
- The latest federal and state legislation, regulations and decisions regarding privacy and security
- Foreign developments in data protection law and their impact on U.S. companies
- The current enforcement priorities of the FTC and the state attorneys general
- Information privacy and security issues raised by technology trends, such as cloud computing, social networking, and texting
- Best practices in data security compliance
- The latest legislative developments pertaining to information security requirements
- Ethical and risk management issues for lawyers in using information technology
- Evolving online data collection and marketing techniques and their impact on privacy law
- Earn one hour of CLE Ethics credit
- Earn Continuing Privacy Education credit
Who should attend
Day One: 9:00 a.m. - 5:00 p.m.
Morning Session: 9:00 a.m. - 12:45 p.m.
9:00 Welcome and Opening Remarks
9:15 Big Data: The Privacy and Security Implications
- What is big data?
- How are organizations leveraging big data and related analytics?
- When is big data personal data?
- Balancing the benefits against privacy concerns
- Integrating big data practices into data privacy and security programs
Laura Berger, Barbara Lawler
10:15 The Mobile Revolution: New Challenges for Privacy and Data Security
- Understanding the mobile ecosystem
- Unique privacy and data security issues for mobile apps
- What are acceptable data collection practices?
- Security requirements for mobile apps
- Industry efforts to self-regulate and establish guidelines and accountability
- Regulatory initiatives
- Mobile payment considerations
Kristy Browder Edwards, Chris J. Hoofnagle, Manas Mohapatra
11:15 Networking Break
11:30 Late-Breaking News: Key New Regulations in Privacy and Data Security
James X. Dempsey, Reece Hirsch, Manas Mohapatra
12:45 Lunch Break
Afternoon Session: 1:45 p.m. - 5:00 p.m
1:45 Information Security: Complying with the Latest Requirements
- What is data security?
- Basic data security legal obligations for all companies
- The new world of cybersecurity
- Deciphering the legal requirement for “reasonable” security
- Developing and implementing a legally compliant WISP
- Common security compliance pitfalls
Thomas J. Smedinghoff
2:45 Networking Break
3:00 CPO’s Guide to Developing and Maintaining a Global Privacy Program
- One size fits all vs. country-specific approach
- Reconciling differing cultures, laws, and business models
- Current harmonization efforts
- Global training and monitoring for compliance
Sharon A. Anolik, Jonathan Fox, Francoise Gilbert
4:00 International Data Security and Breach Requirements
- International data security requirements from A to Z
- How they compare to U.S. breach laws
- Compliance challenges
- Managing a global data breach
Cathy Bump, Lara Kehoe Hoffman, Paola Zeni
DAY TWO: 9:00 a.m. - 4:45 p.m.
Morning Session: 9:00 a.m. - 12:15 p.m.
9:00 Workplace Privacy
- Social media policies and the NLRB
- Employer access to employee social media accounts
- Managing BYOD use and risks
- Background checks
- Recent workplace privacy litigation
John F. Hyland, Katherine L. Kettler
10:00 Negotiating Privacy and Security Contract Terms
- Key privacy and security issues
- Contract terms that need to be included
- Negotiating strategies with trading partners, cloud providers, and other third party service providers
- Allocating compliance obligations and liability for regulatory requirements
- Monitoring compliance
Rudy Guyon, Corey M. Miller
11:00 Networking Break
11:15 Straight Talk from Privacy and Security Regulators: Trends and Targets for 2013 and Beyond
- Who and what practices are the regulators targeting?
- What regulators look for in policies and practices; what gets their attention
- How to work with regulators
Alexandra Ross (Moderator), Laura Berger, Travis LeBlanc, Paul Singer, Shannon Smith
12:15 Lunch Break
Afternoon Session: 1:30 p.m. - 4:45 p.m.
1:30 Making and Responding to Third Party Requests for Personal Data
- What’s appropriate and what’s not in litigation
- Protective orders and security measures to consider
- Special issues in cross-border discovery and litigation
- Managing government requests for data
Ian C. Ballon, James G. Snell
2:30 Networking Break
2:45 The Digital Marketing Ecosystem: Trends, Risks, and Obligations
- Trends in the online behavioral advertising marketplace
- Self-regulatory efforts
- Enforcement efforts
Nicholas Gadacz, Sarah Hudgins, Lee Tien
3:45 Privacy and Security Ethics and Risk Management
- Do lawyers need information security policies under the new ethics rules?
- Social media guidelines for lawyers
- E-discovery risks
- Recent bar opinions, cases and guidance on technology use in law practice
Merri A. Baldwin, Kathryn J. Fritz
Sharon A. Anolik
~ Vice President, Global Privacy Risk and Strategy Leader, McKesson Corporation
~ Attorney, Division of Privacy and Identity Protection, Federal Trade Commission
~ Senior Privacy Compliance Councel, Expedia Inc
James X. Dempsey
~ Vice President for Public Policy, Center for Democracy & Technology
~ (former) Director of Product, Marin Software, Incorporated,
Travis G. LeBlanc
~ Special Assistant Attorney General, California Department of Justice, Office of the Attorney General
~ Assistant Attorney General, Office of Texas Attorney General
Shannon E. Smith
~ Senior Counsel, Chief, Consumer Protection Division, Washington Attorney General's Office
~ Senior Staff Attorney, Electronic Frontier Foundation
~ Director, Global Privacy - Legal and Public Affairs, Symantec Corporation
San Francisco Seminar Location
PLI California Center, 685 Market Street, San Francisco, California 94105. (415) 498-2800
San Francisco Hotel Accommodations
The Palace Hotel, 2 New Montgomery Street, San Francisco, California 94105. Call (800) 917-7456 seven days a week from 6:00 am to 12:00 am (PDT) and mention you are attending this program at Practising Law Institute to receive the preferred rate. For online reservations, go to www.sfpalace.com/pli to receive the preferred rate.
Due to high demand we recommend reserving hotel rooms as early as possible.
PLI's live programs are approved in all states that require mandatory continuing legal education for attorneys, except Arizona. Please be sure to check with your state for details.
Please check the CLE Calculator above each product description for CLE information specific to your state.
Special Note: In New York, newly admitted attorneys may receive CLE credit only for attendance at "transitional" programs during their first two years of admission to the Bar. Non-traditional course formats such as on-demand web programs or recorded items, are not acceptable for CLE credit. Experienced attorneys may choose to attend and receive CLE credit for either a transitional course or for one geared to experienced attorneys. All product types, including on-demand web programs and recorded items, are approved for experienced attorneys.
Please note: The State Bar of Arizona does not approve or accredit CLE activities for the Mandatory Continuing Legal Education requirement.
If you have already received credit for attending some or the entire program, please be aware that state administrators do not permit you to accrue additional credit for repeat viewing even if an additional credit certificate is subsequently issued.
Credit will be granted only to the individual on record as the purchaser unless alternative arrangements (prearranged groupcast) are made in advance.