- Home
- Privacy & Cybersecurity
- technology
Privacy & Cybersecurity
{"id":11558006284,"title":"Course #656- Cybersecurity Risk Management - webinar","handle":"course-656-cybersecurity-webinar","description":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003e \u003ciframe id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/accounts\/10812142\/events\/7532779\/videos\/161828532\/player?width=640\u0026amp;height=360\u0026amp;enableInfo=true\u0026amp;defaultDrawer=\u0026amp;autoPlay=true\u0026amp;mute=false\" width=\"640\" height=\"360\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"\"\u003e \u003c\/iframe\u003e\u003cscript type=\"text\/javascript\" data-embed_id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/assets\/plugins\/referrer_tracking.js\"\u003e\u003c\/script\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSpeaker: Erin Hill, JD\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 656\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCybersecurity Risk Management\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eGoals:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThe goal of this course is to provide a voluntary, risk based set of standards, guidelines and practices to help organizations assess and manage cybersecurity risks.\u003c\/p\u003e\n\u003cdiv id=\"zype_599df11cb0cc5b15bc000b88\" style=\"width: 100%; min-width: 300px; max-width: 560px;\"\u003e\u003c\/div\u003e\n\u003cstrong\u003e\u003cscript src=\"https:\/\/play.zype.com\/javascripts\/subscription_embed.js\" type=\"text\/javascript\"\u003e\u003c\/script\u003e\u003cscript type=\"text\/javascript\"\u003e\/\/ \u003c![CDATA[\nzype.siteId = \"nQxMdqycvGlSxCakHpT8PxDR0kioTqyjOFzvwxWYfB4sPJRZiUgKfxTTcZx1bgGx\";zype.videoId = \"599df11cb0cc5b15bc000b88\";zype.videoEmbed(\"zype_599df11cb0cc5b15bc000b88\");\n\/\/ ]]\u003e\u003c\/script\u003e\u003c\/strong\u003e\n\u003cp\u003e\u003cstrong\u003e Outline:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e1) An Effective Risk Assessment Framework, 3 pm to 310 pm\u003c\/p\u003e\n\u003cp\u003e2) Critical Elements Scope 3:10 p to 320 pm\u003c\/p\u003e\n\u003cp\u003e3) Thorough Risk Assessment 320 pm to 340 pm\u003c\/p\u003e\n\u003cp\u003e4) Proactive Incident Response Planning 340 pm to 350pm\u003c\/p\u003e\n\u003cp\u003e5) Dedicated Cybersecurity Resources 350 pm to 4 pm\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eDr Erin Hill is a licensed attorney and is a professor at William Jessup University in Rocklin, CA, and has spent decades working in business management. She stays current in her field by maintaining international certifications in finance, law, quality control, and project management.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eCall 916 652 3000 to enroll.\u003c\/p\u003e","published_at":"2017-07-27T14:51:57-07:00","created_at":"2017-08-25T09:32:20-07:00","vendor":"aaroncle.com","type":"Webinar","tags":["advanced","counseling clients on IP","credit-state_alabama","credit-state_alaska","credit-state_arizona","credit-state_california","credit-state_colorado","credit-state_connecticut","credit-state_delaware","credit-state_florida","credit-state_georgia","credit-state_missouri","credit-state_nevada","credit-state_new-jersey","credit-state_new-york","credit-state_pennslyvania","credit-state_texas","credit-state_vermont","cyberlaw","email","Internet","internet technology","IP","privacy-cybersecurity","single-course","technology","webinar","your email can hurt you"],"price":5900,"price_min":5900,"price_max":5900,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":43969979532,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"","requires_shipping":true,"taxable":true,"featured_image":null,"available":true,"name":"Course #656- Cybersecurity Risk Management - webinar","public_title":null,"options":["Default Title"],"price":5900,"weight":0,"compare_at_price":null,"inventory_quantity":1,"inventory_management":null,"inventory_policy":"deny","barcode":"","requires_selling_plan":false,"selling_plan_allocations":[]}],"images":["\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773"],"featured_image":"\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773","options":["Title"],"media":[{"alt":null,"id":457868247119,"position":1,"preview_image":{"aspect_ratio":1.0,"height":480,"width":480,"src":"\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773"},"aspect_ratio":1.0,"height":480,"media_type":"image","src":"\/\/www.clelaw.com\/cdn\/shop\/products\/Screen_Shot_2017-09-06_at_1.24.58_PM.png?v=1504729773","width":480}],"requires_selling_plan":false,"selling_plan_groups":[],"content":"\u003cmeta charset=\"utf-8\"\u003e\n\u003cp\u003e \u003ciframe id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/accounts\/10812142\/events\/7532779\/videos\/161828532\/player?width=640\u0026amp;height=360\u0026amp;enableInfo=true\u0026amp;defaultDrawer=\u0026amp;autoPlay=true\u0026amp;mute=false\" width=\"640\" height=\"360\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"\"\u003e \u003c\/iframe\u003e\u003cscript type=\"text\/javascript\" data-embed_id=\"ls_embed_1551132355\" src=\"https:\/\/livestream.com\/assets\/plugins\/referrer_tracking.js\"\u003e\u003c\/script\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eSpeaker: Erin Hill, JD\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse 656\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1 hour MCLE Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCybersecurity Risk Management\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eGoals:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eThe goal of this course is to provide a voluntary, risk based set of standards, guidelines and practices to help organizations assess and manage cybersecurity risks.\u003c\/p\u003e\n\u003cdiv id=\"zype_599df11cb0cc5b15bc000b88\" style=\"width: 100%; min-width: 300px; max-width: 560px;\"\u003e\u003c\/div\u003e\n\u003cstrong\u003e\u003cscript src=\"https:\/\/play.zype.com\/javascripts\/subscription_embed.js\" type=\"text\/javascript\"\u003e\u003c\/script\u003e\u003cscript type=\"text\/javascript\"\u003e\/\/ \u003c![CDATA[\nzype.siteId = \"nQxMdqycvGlSxCakHpT8PxDR0kioTqyjOFzvwxWYfB4sPJRZiUgKfxTTcZx1bgGx\";zype.videoId = \"599df11cb0cc5b15bc000b88\";zype.videoEmbed(\"zype_599df11cb0cc5b15bc000b88\");\n\/\/ ]]\u003e\u003c\/script\u003e\u003c\/strong\u003e\n\u003cp\u003e\u003cstrong\u003e Outline:\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e1) An Effective Risk Assessment Framework, 3 pm to 310 pm\u003c\/p\u003e\n\u003cp\u003e2) Critical Elements Scope 3:10 p to 320 pm\u003c\/p\u003e\n\u003cp\u003e3) Thorough Risk Assessment 320 pm to 340 pm\u003c\/p\u003e\n\u003cp\u003e4) Proactive Incident Response Planning 340 pm to 350pm\u003c\/p\u003e\n\u003cp\u003e5) Dedicated Cybersecurity Resources 350 pm to 4 pm\u003c\/p\u003e\n\u003cp\u003e \u003c\/p\u003e\n\u003cul\u003e\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eDr Erin Hill is a licensed attorney and is a professor at William Jessup University in Rocklin, CA, and has spent decades working in business management. She stays current in her field by maintaining international certifications in finance, law, quality control, and project management.\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003eCall 916 652 3000 to enroll.\u003c\/p\u003e"}

Course #656- Cybersecurity Risk Management - webinar
$ 59.00
Speaker: Erin Hill, JD Course 656 1 hour MCLE Credit Cybersecurity Risk Management Goals: The goal of this course is to provide a voluntary, risk based set of standards, guidelines and practices to help organizations assess and manage cybersecurity risks. Outline: 1) An Effective Risk Assessment Framework, 3 pm to 310 pm 2) Critical Eleme...
{"id":11517562252,"title":"Course #680- Ethics: Issues of Email and Technology in Legal Practice - MP3","handle":"course-341-ethics-issues-of-email-and-technology-in-legal-practice-mp3","description":"\u003cp\u003e\u003cstrong\u003eSpeaker: James Griffiths, Course 680\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1.5 hours MCLE Ethics Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eDo you ever use email in your law practice? How about drafting legal documents and pleadings on the computer? Or drafting discovery documents or transactional documents and emailing them or filing them online? In this session, we will discuss important emerging areas of legal ethics and technology. \u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. Metadata - definitions, hazards, confidential vs. privileged information\u003c\/p\u003e\n\u003cp\u003e2. How to remove embedded data\u003c\/p\u003e\n\u003cp\u003e3. Ethical issues involved for attorneys receiving electronic documents\u003c\/p\u003e\n\u003cp\u003e4. Different state jurisdictions \u003c\/p\u003e\n\u003cp\u003e5. Recent developments in metadata and electronically stored information (ESI)\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the rules governing client files containing electronic documents created by the attorney\u003c\/li\u003e\n\u003cli\u003eIdentify the dangers of having metadata and how clients or other attorneys can use it against you\u003c\/li\u003e\n\u003cli\u003eCompare and contrast the privacy levels of email and electronic communication to phone calls and personal meetings\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJames Griffiths is an attorney at in San Diego, California. He focuses his practice on business litigation, personal injury, and non-profit corporation.\u003cmeta charset=\"utf-8\"\u003e\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e","published_at":"2014-06-17T14:40:47-07:00","created_at":"2017-08-14T11:40:11-07:00","vendor":"Aaron \u0026 Aaron Inc. (dba Ulrich, Nash \u0026 Gump) CLE","type":"MP3","tags":["credit-state_alabama","credit-state_alaska","credit-state_arizona","credit-state_california","credit-state_colorado","credit-state_connecticut","credit-state_delaware","credit-state_florida","credit-state_georgia","credit-state_missouri","credit-state_nevada","credit-state_new-jersey","credit-state_new-york","credit-state_pennslyvania","credit-state_texas","credit-state_vermont","ethics","intellectual-property","intermediate","law-practice-management","legal-research-writing","mp3","privacy-cybersecurity","single-course","technology"],"price":5900,"price_min":5900,"price_max":5900,"available":true,"price_varies":false,"compare_at_price":null,"compare_at_price_min":0,"compare_at_price_max":0,"compare_at_price_varies":false,"variants":[{"id":43661346060,"title":"Default Title","option1":"Default Title","option2":null,"option3":null,"sku":"Course# 341","requires_shipping":false,"taxable":true,"featured_image":null,"available":true,"name":"Course #680- Ethics: Issues of Email and Technology in Legal Practice - MP3","public_title":null,"options":["Default Title"],"price":5900,"weight":0,"compare_at_price":null,"inventory_quantity":-3,"inventory_management":null,"inventory_policy":"deny","barcode":"","requires_selling_plan":false,"selling_plan_allocations":[]}],"images":["\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_f9673f51-3f83-4647-9a60-522d8e84b51d.jpg?v=1502736011"],"featured_image":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_f9673f51-3f83-4647-9a60-522d8e84b51d.jpg?v=1502736011","options":["Title"],"media":[{"alt":null,"id":442206289999,"position":1,"preview_image":{"aspect_ratio":1.653,"height":484,"width":800,"src":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_f9673f51-3f83-4647-9a60-522d8e84b51d.jpg?v=1502736011"},"aspect_ratio":1.653,"height":484,"media_type":"image","src":"\/\/www.clelaw.com\/cdn\/shop\/products\/shutterstock_595254203s_800x_f9673f51-3f83-4647-9a60-522d8e84b51d.jpg?v=1502736011","width":800}],"requires_selling_plan":false,"selling_plan_groups":[],"content":"\u003cp\u003e\u003cstrong\u003eSpeaker: James Griffiths, Course 680\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003eCourse \u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cstrong\u003e1.5 hours MCLE Ethics Credit\u003c\/strong\u003e\u003c\/p\u003e\n\u003cp\u003eDo you ever use email in your law practice? How about drafting legal documents and pleadings on the computer? Or drafting discovery documents or transactional documents and emailing them or filing them online? In this session, we will discuss important emerging areas of legal ethics and technology. \u003c\/p\u003e\n\u003cp\u003eKey Points:\u003c\/p\u003e\n\u003cp\u003e1. Metadata - definitions, hazards, confidential vs. privileged information\u003c\/p\u003e\n\u003cp\u003e2. How to remove embedded data\u003c\/p\u003e\n\u003cp\u003e3. Ethical issues involved for attorneys receiving electronic documents\u003c\/p\u003e\n\u003cp\u003e4. Different state jurisdictions \u003c\/p\u003e\n\u003cp\u003e5. Recent developments in metadata and electronically stored information (ESI)\u003c\/p\u003e\n\u003cp\u003eObjectives:\u003c\/p\u003e\n\u003cul\u003e\n\u003cli\u003eUnderstand the rules governing client files containing electronic documents created by the attorney\u003c\/li\u003e\n\u003cli\u003eIdentify the dangers of having metadata and how clients or other attorneys can use it against you\u003c\/li\u003e\n\u003cli\u003eCompare and contrast the privacy levels of email and electronic communication to phone calls and personal meetings\u003c\/li\u003e\n\u003c\/ul\u003e\n\u003cp\u003e\u003cem\u003eJames Griffiths is an attorney at in San Diego, California. He focuses his practice on business litigation, personal injury, and non-profit corporation.\u003cmeta charset=\"utf-8\"\u003e\u003c\/em\u003e\u003c\/p\u003e\n\u003cp\u003e\u003cbr\u003e\u003c\/p\u003e"}

Course #680- Ethics: Issues of Email and Technology in Legal Practice - MP3
$ 59.00
Speaker: James Griffiths, Course 680 Course 1.5 hours MCLE Ethics Credit Do you ever use email in your law practice? How about drafting legal documents and pleadings on the computer? Or drafting discovery documents or transactional documents and emailing them or filing them online? In this session, we will discuss important emerging areas of ...