Think Like a Lawyer and Ask Questions Like a Geek: Understanding Cybersecurity, Social Media and Mobile Technology 2011
Monday, November 21, 2011, New York, NY
Monday, November 21, 2011, New York, NY
In almost every area of legal practice increasingly
complex technology is part of a transaction or client dispute. Lawyers
are routinely expected to negotiate contracts for launching content on
the Internet, outsourcing data storage to server farms or purchasing
Cloud Computing services. A client’s data security is routinely tested
by hackers half way across the world or by those in-house. Litigation
often involves bots stealing content on the Internet or cookies
compromising the privacy of individuals. Every court now requires
counsel to address electronic discovery issues but many lawyers don’t
understand their client’s data infrastructure.
Indeed, most lawyers do not have the technical training or experience to fully understand the technology which is the core of their clients’ technology driven businesses. As a result, they waste time on the wrong issues or, worse yet, don’t know the right questions to ask their clients or litigation opponents.
This unique program is designed to give every lawyer a sound foundation in the complex technologies which drive the Internet, corporate information infrastructures and mobile computing. It will give you the insights and experience of technology experts and the lawyers who deal with them on a daily basis. This is a program for lawyers called upon to counsel clients or lead litigations in the minefields of technology. In this first ever Think Like a Lawyer and Ask Questions Like a Geek: Understanding Cybersecurity, Social Media and Mobile Technology 2011 you will hear simple and direct explanations about current technologies, including: the structure of Internet communications and the problems inherent in moving large quantities of data; the basics of how Cloud Computing works and why your clients can trust these providers; the tricks hackers use to compromise your personal data and the data of governments and corporations; the structure of corporate data systems and where to look for electronic evidence in a litigation party’s infrastructure, and; the technology that allows mobile computing systems to locate users and send customized, location-based content.
Lecture Topics [Total time 06:17:30]
Segments with an asterisk (*) are available only with the purchase of the entire program.
Indeed, most lawyers do not have the technical training or experience to fully understand the technology which is the core of their clients’ technology driven businesses. As a result, they waste time on the wrong issues or, worse yet, don’t know the right questions to ask their clients or litigation opponents.
This unique program is designed to give every lawyer a sound foundation in the complex technologies which drive the Internet, corporate information infrastructures and mobile computing. It will give you the insights and experience of technology experts and the lawyers who deal with them on a daily basis. This is a program for lawyers called upon to counsel clients or lead litigations in the minefields of technology. In this first ever Think Like a Lawyer and Ask Questions Like a Geek: Understanding Cybersecurity, Social Media and Mobile Technology 2011 you will hear simple and direct explanations about current technologies, including: the structure of Internet communications and the problems inherent in moving large quantities of data; the basics of how Cloud Computing works and why your clients can trust these providers; the tricks hackers use to compromise your personal data and the data of governments and corporations; the structure of corporate data systems and where to look for electronic evidence in a litigation party’s infrastructure, and; the technology that allows mobile computing systems to locate users and send customized, location-based content.
Lecture Topics [Total time 06:17:30]
Segments with an asterisk (*) are available only with the purchase of the entire program.
- Introduction* [00:12:05]
Peter Brown - Privacy and Data Security [01:04:11]
Ian C. Ballon, Alan Chapell - ESI/Databases [00:59:36]
Peter J. Chirlian, Alberto Rodriguez - Social Networks [01:00:55]
Peter Brown, Sherra Pierre-March, Willard Alonzo Stanback - Dealing With Hackers [01:00:11]
David W. Opderbeck, Timothy Ryan - Advertising and Behavioral Marketing [00:58:43]
Richard Raysman, Jonathan Taqqu - Mobile Technology and Location Based Services [01:01:49]
Paul Anuszkiewicz, Heidi Salow
- Privacy Law: Issues and Checklist, Excerpted from Chapter 26
(Data Privacy) of E-Commerce and Internet Law: A Legal Treatise with
Forms, Second Edition
Ian C. Ballon - Cloud Litigation: Suing Over Data Privacy and Behavioral Advertising
Ian C. Ballon - Reducing the Cost and Headache of E-Discovery with a Comprehensive Retention Plan for Electronically Stored Information
Fernando A. Bohorquez, Jr. - The Technology Behind Popular Social Networking Websites
Peter Brown, Sherra Pierre-March, Willard Alonzo Stanback - Hackers
David W. Opderbeck - A Practical Look at Social Media Policies
Richard Raysman - Cell Phone Technology: The Business of Mobile Data, and the Emergence of Location Based Services
Peter Brown, Heidi Salow, Paul Anuszkiewicz - Index to Think Like a Lawyer and Ask Questions Like a Geek
- Privacy and Data Security
Ian C. Ballon, Alan Chapell - ESI/Databases
Peter J. Chirlian, Alberto Rodriguez - The Technology Behind Popular Networking Websites
Peter Brown, Sherra Pierre-March, Willard Alonzo Stanback - Dealing With Hackers
David W. Opderbeck, Timothy Ryan - Advertising and Behavioral Marketing
Richard Raysman - Mobile Technology and Location Based Services
- Mobile Technology and Location Based Services
Heidi Salow
Labels: Speaking