This year's Legal Seminar for Credit Professionals took place on Wednesday, May 18.
The agenda was as follows:
8:45-9:45 a.m. Protecting Sensitive Personal Data and Liability for Data Breach
Mark Manoukian and Luis Alcalde will present issues of critical importance to the credit professional who has collected sensitive personal and business information. Mark will discuss common means used by hackers to steal private business information. Luis will then describe theories of legal liability if private information is stolen or accessed for improper purposes
9:45-10:00 a.m. Break + refreshments
10:00-10:45 a.m. Securing Payment—Secured Transactions, PMSI and Consignments
Larry J. McClatchey will help credit managers understand how and when to use security agreements to ensure payment for goods, how a purchase money security interest can benefit a seller, and what is required for an effective consignment agreement.
10:45-11:30 a.m. Current Legal Issues in Bankruptcy and Collections
Christy A. Prince will cover recent bankruptcy and collection cases of interest to credit professionals, including how to use the most common defenses to preference cases: ordinary course of business and new value. Materials will be supplemented up to the day of the program to cover late breaking developments.
11:30a.m.-12:00 p.m. Discussion, questions and answers and wrap-up
If you missed the webinar Marianne Halvorsen of http://Halvorsenonrisk.com gave on March 25th, 2013, please take a look at the slide presentation that accompanied the webinar. In it you will learn the different types of risks to your company, the costs when an event happens, and how you can protect yourself in the event of a cyber breach.
Social media competence and ethics OklahomaJon Sutten
Jabez LeBret, author of Online Law Practice Strategies, speaks with the Oklahoma State Bar about the responsibility lawyers have to stay competent and up to date with social media. What are they ethically responsible to know?
If you missed the webinar Marianne Halvorsen of http://Halvorsenonrisk.com gave on March 25th, 2013, please take a look at the slide presentation that accompanied the webinar. In it you will learn the different types of risks to your company, the costs when an event happens, and how you can protect yourself in the event of a cyber breach.
Social media competence and ethics OklahomaJon Sutten
Jabez LeBret, author of Online Law Practice Strategies, speaks with the Oklahoma State Bar about the responsibility lawyers have to stay competent and up to date with social media. What are they ethically responsible to know?
Massachusetts New Data Security Laws Presentationbillanetworks
Secure Your Data. It\'s now the Law.
Massachusetts has issued new regulations that will soon go into effect mandating that “all persons that own, license, store or maintain personal information about a resident of the Commonwealth” comply with strict requirements for safeguarding and disposing of personal information.
Don\'t miss this opportunity to understand how
201 CMR 17.00 et seq. will affect your business.
If your company accepts credit cards or stores any customer information, you need to attend this important seminar to understand what will now be required of your company under Massachusetts law. Our experts will detail the regulations and how they impact Massachusetts-based companies. We will discuss the compliance structure as well as outline the steps you will need to take to be in compliance with these new regulations.
WARNING
Failure to comply with the new law exposes a company to substantial monetary penalties. Attorney advertising. Prior results do not guarantee a similar outcome.
http://events.anetworks.net
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...dmenken60
Law firms are increasingly becoming targets of hackers who realize that lawyers, while mostly good at being lawyers, are often terrible at securing their data. This article provides specific suggestions on how law firms can become more cyber safe.
Remember not so long ago when breaches created shocking headlines? Today, they’re so frequent that we’re becoming de-sensitized when we hear that household-name companies are robbed of customer data. While the news feels less shocking, the problem is actually getting worse. The bad guys are not only getting more sophisticated, they’re becoming better financed — so protecting corporate data has never been more crucial. In this session, hear how companies must improve how their data moves in an information-centric security environment, and how it’s no longer about the CIO aligning business and technology, but aligning business, technology and security.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
An overview of identity theft, the tactics criminals use and how to protect yourself and prevent identity theft in Canada. Created by an IT industry expert.
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
As the nation and the world adapted to the coronavirus pandemic, businesses became accustomed to employees working from home. Even as the states reopened from the mandated “lockdown”, many companies and employees alike found advantages to working remotely. Today, we live in a world where the hybrid of in-office work and remote work from home is the “new” normal. Home computers or other remote locations are more vulnerable than ever to cyber-attacks. Organizations need to build people-centric cybersecurity strategies to protect against business email compromises or email account compromises. Increasingly risky websites are being transmitted through corporate emails. The speaker will discuss some of the newest trends in cyberattacks which are continually evolving and growing. Ransomware can hit in seconds. Credit card use is higher than ever, and some cyber-crime groups live to target payment card information. This program has been designed to offer real-life examples and practical steps which may be taken to thwart business-fraud and cyber-crime.
Inside the following year, individuals will confront
new troubles to the ability to guarantee the insurance and
security of their own information. With these sorts of security
strategies being utilized, there is much weakness. Another
option is bio-metric confirmation. Biometrics are propelled ver-
ification systems; it prompts numerous protection and security
issues. Real security what’s more, security issues on Radio
Frequency Identification (RFID) chips were distinguished and
dissected. Likewise, Biometric security dangers that connected
to e-international ID have been dissected and a few proposals
were given which have been investigated for numerous years.
Cryptography innovation and a few conventions are utilized
to counter-measure the dangers and assaults. Nowadays, E-
passports permits are generally sent in the vast majority
of the created nations that stores the bio-metric data on a
modest RFID chip. So that’s why, Identity Theft has forced
incalculable hardships upon its casualties which is a major
challenge in this new era. In this paper, we investigate the
powerlessness of informal community clients to Identity Theft
when they share individual distinguishing proof data on the
web. Personality crooks abuse informal organization clients and
the shortcomings of interpersonal interaction destinations to
assemble the data expected to submit Identity Theft what’s
more, character misrepresentation utilizing this id data. A
trouble in having precaution components set up is that person
to person communication locales have a personal stake in
advancing as opposed to keeping the sharing of information.
Further, character wrong-doing is unavoidable which makes
the improvement of dangers troublesome. Taking everything
into account, endeavors have been made in this paper to
blueprint contentions that will help with settling the wrong-
doings given helplessness of informal organization clients to
Identity Theft.
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing the Impact of a Breach
Encryption has been viewed as the ultimate way to protect sensitive data for compliance. But it has also been considered very complex to implement. Today, encryption is essential to meet compliance objectives, and has become much simpler to implement. The challenge is knowing when and where to use encryption, how it can simplify compliance, what controls need to be in place, and the options for good encryption key management. This session will cover the options for encryption and key management, what each provides, and their requirements. Encryption and key management topics include application-level encryption for data in use, network encryption of data in motion, and storage encryption for data at rest.
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
In the last year, hacker techniques have become even more sophisticated and every business’ threat landscape has widened making companies increasingly vulnerable to cyberattacks and breaches. The average cost of a data breach today in the United States is ~$8.19 Million. Ransomware attacks occur every 11 seconds. Cybercriminals are ready – exploiting employees working from home and companies operating on unsecured networks.
Withum cybersecurity expert Matthew Ferrante and Eric Jackson discussed how organizations can successfully reduce the likelihood of compliance failures and mitigate the impact of cybersecurity incidents. They were joined by Capital One Commercial Bank Treasury Management Lead Stephen Susnak, who discussed how to build more effective defenses against payments fraud.
Massachusetts New Data Security Laws Presentationbillanetworks
Secure Your Data. It\'s now the Law.
Massachusetts has issued new regulations that will soon go into effect mandating that “all persons that own, license, store or maintain personal information about a resident of the Commonwealth” comply with strict requirements for safeguarding and disposing of personal information.
Don\'t miss this opportunity to understand how
201 CMR 17.00 et seq. will affect your business.
If your company accepts credit cards or stores any customer information, you need to attend this important seminar to understand what will now be required of your company under Massachusetts law. Our experts will detail the regulations and how they impact Massachusetts-based companies. We will discuss the compliance structure as well as outline the steps you will need to take to be in compliance with these new regulations.
WARNING
Failure to comply with the new law exposes a company to substantial monetary penalties. Attorney advertising. Prior results do not guarantee a similar outcome.
http://events.anetworks.net
Cyber Security For Law Firms - February 2015 -Westchester County Bar Associat...dmenken60
Law firms are increasingly becoming targets of hackers who realize that lawyers, while mostly good at being lawyers, are often terrible at securing their data. This article provides specific suggestions on how law firms can become more cyber safe.
Remember not so long ago when breaches created shocking headlines? Today, they’re so frequent that we’re becoming de-sensitized when we hear that household-name companies are robbed of customer data. While the news feels less shocking, the problem is actually getting worse. The bad guys are not only getting more sophisticated, they’re becoming better financed — so protecting corporate data has never been more crucial. In this session, hear how companies must improve how their data moves in an information-centric security environment, and how it’s no longer about the CIO aligning business and technology, but aligning business, technology and security.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
An overview of identity theft, the tactics criminals use and how to protect yourself and prevent identity theft in Canada. Created by an IT industry expert.
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
As the nation and the world adapted to the coronavirus pandemic, businesses became accustomed to employees working from home. Even as the states reopened from the mandated “lockdown”, many companies and employees alike found advantages to working remotely. Today, we live in a world where the hybrid of in-office work and remote work from home is the “new” normal. Home computers or other remote locations are more vulnerable than ever to cyber-attacks. Organizations need to build people-centric cybersecurity strategies to protect against business email compromises or email account compromises. Increasingly risky websites are being transmitted through corporate emails. The speaker will discuss some of the newest trends in cyberattacks which are continually evolving and growing. Ransomware can hit in seconds. Credit card use is higher than ever, and some cyber-crime groups live to target payment card information. This program has been designed to offer real-life examples and practical steps which may be taken to thwart business-fraud and cyber-crime.
Inside the following year, individuals will confront
new troubles to the ability to guarantee the insurance and
security of their own information. With these sorts of security
strategies being utilized, there is much weakness. Another
option is bio-metric confirmation. Biometrics are propelled ver-
ification systems; it prompts numerous protection and security
issues. Real security what’s more, security issues on Radio
Frequency Identification (RFID) chips were distinguished and
dissected. Likewise, Biometric security dangers that connected
to e-international ID have been dissected and a few proposals
were given which have been investigated for numerous years.
Cryptography innovation and a few conventions are utilized
to counter-measure the dangers and assaults. Nowadays, E-
passports permits are generally sent in the vast majority
of the created nations that stores the bio-metric data on a
modest RFID chip. So that’s why, Identity Theft has forced
incalculable hardships upon its casualties which is a major
challenge in this new era. In this paper, we investigate the
powerlessness of informal community clients to Identity Theft
when they share individual distinguishing proof data on the
web. Personality crooks abuse informal organization clients and
the shortcomings of interpersonal interaction destinations to
assemble the data expected to submit Identity Theft what’s
more, character misrepresentation utilizing this id data. A
trouble in having precaution components set up is that person
to person communication locales have a personal stake in
advancing as opposed to keeping the sharing of information.
Further, character wrong-doing is unavoidable which makes
the improvement of dangers troublesome. Taking everything
into account, endeavors have been made in this paper to
blueprint contentions that will help with settling the wrong-
doings given helplessness of informal organization clients to
Identity Theft.
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing the Impact of a Breach
Encryption has been viewed as the ultimate way to protect sensitive data for compliance. But it has also been considered very complex to implement. Today, encryption is essential to meet compliance objectives, and has become much simpler to implement. The challenge is knowing when and where to use encryption, how it can simplify compliance, what controls need to be in place, and the options for good encryption key management. This session will cover the options for encryption and key management, what each provides, and their requirements. Encryption and key management topics include application-level encryption for data in use, network encryption of data in motion, and storage encryption for data at rest.
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Withum
In the last year, hacker techniques have become even more sophisticated and every business’ threat landscape has widened making companies increasingly vulnerable to cyberattacks and breaches. The average cost of a data breach today in the United States is ~$8.19 Million. Ransomware attacks occur every 11 seconds. Cybercriminals are ready – exploiting employees working from home and companies operating on unsecured networks.
Withum cybersecurity expert Matthew Ferrante and Eric Jackson discussed how organizations can successfully reduce the likelihood of compliance failures and mitigate the impact of cybersecurity incidents. They were joined by Capital One Commercial Bank Treasury Management Lead Stephen Susnak, who discussed how to build more effective defenses against payments fraud.
Where to focus event innovation? - An audience led approachLive Union
Presented by Live Union at Tech Fest in July 2013. In the face of so much new event technology and format deign, this presentation is designed to help event professionals identify where to focus their innovation.
"Cross-Border Transactions from a US Perspective” was presented by Martijn Steger on September 12, 2008, to Deutscher Handels-und Gesellschaftsrechtstag in Berlin Germany.
Martijn discussed the attorney/client relationship, due diligence, break-up fees and selected German law provisions that U.S. clients have trouble understanding or accepting.
Ejemplo de integración de un analizador léxico (lexer) y un analizador sintáctico (parser) implementados en JLex y CUP. Fuente: http://www.cis.uab.edu/courses/cs602/
This morning, Kegler Brown hosted a packed room for its “Exporting to India: Strategies for Success” seminar in partnership with JPMorgan Chase and the Ohio Department of Development. The half-day event also featured insights from Prem Behl, managing director of India’s Ohio Office, international business students from the University of Findlay, and a panel of practical experts on the Indian market, comprising providers of both goods and services. Presenters and attendees discussed financial strategies for success with Martha Gabrielse, director of global trade finance for JPMorgan Chase, and best practices in legal intelligence with Kegler Brown’s Asia-Pacific Team Leader, Vinita Mehra and its Global Team Leader, Martijn Steger. Also in attendance were local appointed and elected officials, business leaders from across Ohio, and previous winners of the Ohio Governor’s e-Award for Excellence in Exporting.
On July 18, Kegler Brown attorneys and guest speakers presented on a variety of current issues relevant to credit professionals, including collections, managing privacy + security risk, accounts receivable and bankruptcy case updates.
On July 25, Kegler Brown attorneys and guest speakers presented in Cleveland on a variety of current issues relevant to credit professionals, including collections, managing privacy + security risk, accounts receivable and bankruptcy case updates.
In the digital age, where almost every aspect of our lives is intertwined with the internet, cybersecurity and online privacy have become paramount concerns. As we increasingly rely on the digital realm for communication, shopping, banking, and more, the protection of our personal data and sensitive information is crucial. This article explores the significance of cybersecurity and online privacy, the threats we face, and practical measures to safeguard our digital lives.
Jax london2016 cybercrime-and-the-developerSteve Poole
In the emerging world of DevOps and the Cloud, most developers are trying to learn new technologies and methodologies. The focus tends to be on adding capabilities such as resiliency and scaling to an application. Still, one critical item consistently overlooked is security.
The world of the Cyber Criminal is closer than you realize. Watch a real man-in-the-middle demonstration and learn just how simple it can be for others to steal your secrets. In this talk you’ll learn about other practical examples of how you can inadvertently leave the doors open and what you can do to keep your system secure. In the end, security is everyone’s concern and this talk will teach you a few of simple actions you can take (and some behaviours you must change) to create a more secure application in the Cloud.
What i learned at the infosecurity isaca north america expo and conference 2019Ulf Mattsson
Infosecurity ISACA North America Expo and Conference will debut in New York City’s Javits Convention Center 20-21 November 2019. The event will leverage ISACA’s Cybersecurity Nexus (CSX) community and solutions with Infosecurity Group, Reed Exhibition’s immersive event series staged worldwide for the infosecurity industry.
Download Event Brochure
ISACA will bring experience developed since the 2015 launch of its CSX Conferences, expert workshop series, certification preparation sessions, and latest developments related to the CSX Training Platform, all to the new event programming. Infosecurity, which entered the North American conference arena in 2017, will build on its strengths in industry expositions, media, immersive learning and leadership networks.
Chief information security officers are taking center stage more often than not these days given the security of personal identifiable information and trade secrets are under relentless assault. We've prepared 5 data breach awareness charts and why it is important, for you to consider as you prepare for your next security operations or board meeting.
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Logikcull.com
In June, a massive cyberattack brought down one of the country's biggest law firms. DLA Piper, its systems ravaged by the Petya ransomware program, was forced to shut down its phones service, email, and internal computer network--potentially costing millions in lost income. Weeks later, the firm was still digging itself out.
Such attacks are increasingly an existential threat to firms of all sizes: the difference between being billing and nothingness. Join us as we discuss this urgent issue.
3 aspects where the 'virtual world' interacts now and in the future with us in a very real way.
. Thought Works Introduction to Blockchain
. Cyber Security
. Cloud Accounting
Protecting Your Business, Cybersecurity, and working remotely during COVID-19ArielMcCurdy
From the webinar "Protecting Your Business, Cybersecurity, and working remotely during COVID-19" presented by BARR Credit Services, March 26, 2020.
From this webinar, you will learn what steps you can take to protect yourself and your company from cyber-fraud. With most businesses moving to remote work because of COVID-19, we want to bring some insight on how to best protect your business activities from home.
More educational content can be found at: barrcredit.com/learningcenter/
On Thursday, May 9, 2024, Kegler Brown presented its annual Managing Labor + Employee Seminar. The in-person and virtual seminar focused on timely information regarding labor and employee relations, and allowed attendees to earn CLE and SHRM credit hours.
On Wednesday, May 24, 2023 Kegler Brown presented its annual Managing Labor + Employee Seminar. The in-person and virtual seminar focused on timely information regarding labor and employee relations, and allowed attendees to earn CLE and SHRM credit hours.
On Thursday, February 23, Kegler Brown’s Construction lawyers, Don Gregory and Mike Madigan, presented an informative strategy session on ways to deal with central Ohio’s labor shortage and diversity and inclusion goals.
On April 24, Tony spoke to attendees of the Ohio SHRM State Council, HR Florida State Council and Aspect Marketing and Communications’ 2022 HR Cruise, presenting on how the post-pandemic workplace issues will affect the HR profession. Tony took attendees on a journey through workplaces of the past and future spanning a century starting with the Jetson’s future from the 1960s to the metaverse worlds in Ready Player One and Free Guy. Attendees learned about changes in local, state, and federal laws and regulations as well as court decisions, which attempt to stay ahead of such workplace changes. He also outlined ideas on how to address post-pandemic workplace issues to attract and retain a talented workforce. He finally touched on how to enable professionals to communicate the challenges facing the workplace to elected officials.
On Tuesday, March 8, 2022 Kegler Brown presented its annual Managing Labor + Employee Seminar. The virtual seminar focused on timely information regarding labor and employee relations, and allowed attendees to earn CLE and SHRM credit hours.
On Tuesday, March 9. 2021 Kegler Brown presented its annual Managing Labor + Employee Seminar. The virtual seminar focused on timely information regarding labor and employee relations, and allowed attendees to earn CLE and SHRM credit hours.
Danielle Crane kicked things off walking through the implications on the labor and employment sectors and how to prepare for anticipated changes with Joe Biden taking office and his inauguration. Our litigation attorney, Jane Gleaves covered how courts have had to adjust to the pandemic, how lawyers are taking litigation virtual and the noticed trends in litigation in light of the COVID-19 pandemic. Brendan Feheley, the chair of our Labor + Employment practice closed the seminar by providing an update on the employment law issues surrounding the global pandemic and America’s response to it.
As part of our 2020 LGBTQ SCOTUS Ruling webinar on July 7th, Brendan and Danielle hosted an in-depth discussion about the recent SCOTUS decision protecting the employment rights of LGBTQ employees under Title VII. The webinar primed employers for what we think will be coming, provided advice on the issues and questions to think about moving forward, and gave important employment considerations as we begin to receive guidance from the EEOC and federal courts.
Key Legal + Business Issues - Navigating Complexities in Doing Business in th...Kegler Brown Hill + Ritter
On Friday, May 1, Vinita Mehra and Cody Myers presented at Indo-American Chamber of Commerce’s Key Legal + Business Issues: Navigating Complexities in Doing Business in the U.S. webinar. The webinar covered a variety of topics including: drivers + trends of Indian outbound investments to the U.S., EDO incentive programming, negotiating contracts, protecting intellectual property, and impact of COVID-19 on Indo-U.S. businesses.
On December 3, Luis shared an update on Ohio’s medical marijuana law with the National Business Institute. He also discussed marijuana at a national level, detailing tax collections and the IRS sections related to doing business in marijuana. Using recent case studies, Luis illustrated how businesses can and cannot deduct or capitalize indirect expenses. Issues such as labor and licenses were also addressed. Luis also presented this topic at a December 17 event put on by the National Business Institute in Dayton, Ohio
On October 22, Luis spoke to the Mid-Ohio Regional Planning Commission about the history, status and future of legalization and the cannabis industry. Along with looking at the global medical marijuana industry and the tax revenues of adult use states, Luis also updated attendees on the structure of licensure in Ohio. Discussing the changing views and impacts on cities of marijuana, Luis broke down moratoriums, industry and zoning regulations, and new frontiers for decriminalization.
Luis spoke at a luncheon for the Paralegal Association of Central Ohio on April 23 and detailed the history, structure and impact of legalized marijuana. With a focus on Ohio’s Medical Marijuana Control Program, Luis reviewed several scientific, economic, cultural and legal aspects of legalization throughout the US. Along with taking questions from attendees, Luis also discussed what the future looks like for marijuana in Ohio.
Speaking to the Ohio Chamber of Commerce on April 5, Luis discussed several issues related to employment and medical marijuana. He detailed what the OMMCP does not do, such as how it does not require an employer to permit or accommodate an employee's use, or prohibit an employer from establishing and enforcing a drug testing policy, drug-free workplace policy, or zero-tolerance drug policy. He also highlighted other employment concerns, such as how the Worker’s Compensation Bureau will not pay for medical marijuana, and briefly reviewed the medical marijuana industry, looking at topics from sales figures to collegiate cannabis courses.
On February 27, Luis presented at a seminar put on by the Columbus Bar Association examining Ohio’s medical marijuana industry from a legal perspective. Including not only statutory and regulatory issues, this seminar also looked at commercial transactions and ownership/licensure transfers. It also discussed concerns typical of any industry, such as employment issues and capital raising, but that have unique challenges when it comes to medical marijuana. They also looked ahead to discuss the possible future of marijuana in Ohio, including questions of federal regulation and recreational use.
On January 29, Tony and Luis spoke to attendees of the Ohio Agribusiness Association’s 2020 Industry Conference, providing vital education on cannabis, cannabinoids, and the differences between hemp and marijuana. They also broke down what Ohio’s Medical Marijuana Act does not include in order to provide attendees with guidance on employer rights. Focusing on further employment concerns, Luis and Tony explained what the Ohio Bureau of Workers’ Compensation will and will not cover, and discussed testing, workplace policies, ongoing legalization trends and more.
Presented on 11/21 by Eric Duffee and Randy Gerber, Founder and Principal of Gerber LLC, as part of a four part series. This segment of the series covered equity-based employee incentives. It offered a clear description as to what they are, why companies use them, as well as some things to consider. Randy and Eric showcased a variety of examples along with a few alternatives in regard to compensation.
Kegler Brown's annual seminar on professional responsibility was presented on Friday, October 18, 2019 at the Columbus Bar Association (CBA). This year's seminar featured guest speaker, Kent Markus, who is a part of the Bar and General Counsel at the CBA, showcased an overview of the disciplinary system featuring an in-depth flowchart along with practical tips and best practices.
A panel discussion Q+A about topics ranging from advisory opinions, recent ethics developments, identifying issues, and the duty to report, were all covered by Kegler Brown litigators Jane Gleaves and Jason Beehler.
Moderator, Chris Weber discussed ways to navigate Ohio's Advocate-Witness rule, and his personal recommendations for best practices.
Grow + Sell Your Business Part Three: Practical Tips To Facilitate a TransactionKegler Brown Hill + Ritter
Presented by Eric Duffee and Michael Shaw, Copper Run Capital, on 10/17 as part of a Four Part Series. This segment of the series offered 8 clear steps to follow in pursuit of facilitating a successful transaction. It covered areas such as securing your assets, awareness of current market trends, a visual analysis of our current market update, and surrounding yourself with the right team.
Attorneys Jane Gleaves and Brendan Feheley presented various concerns related to the Gig Economy. They discussed topics such as the differences between an independent contractor or an employee, along with why this is important in our current economy. The seminar also covered the misclassification of employees as independent contractors and the effects of this. Finally, they offered a number of solutions for ways to avoid these issues.
Presented by Eric Duffee and Steve Barsotti on 9/19 as Part 2 of a Four Part Series. This seminar introduced the basics of Patent Requirements, Copyrights and confidential information (including Trade Secrets) and explained the strategies for and significance of protecting them. Discussions included necessary criteria for registration, how rights are established, and steps for filing and enforcement.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
How to Obtain Permanent Residency in the NetherlandsBridgeWest.eu
You can rely on our assistance if you are ready to apply for permanent residency. Find out more at: https://immigration-netherlands.com/obtain-a-permanent-residence-permit-in-the-netherlands/.
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordinary And Special Businesses And Ordinary And Special Resolutions with Companies (Postal Ballot) Regulations, 2018
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselThomas (Tom) Jasper
Military Commissions Trial Judiciary, Guantanamo Bay, Cuba. Notice of the Chief Defense Counsel's detailing of LtCol Thomas F. Jasper, Jr. USMC, as Detailed Defense Counsel for Abd Al Hadi Al-Iraqi on 6 August 2014 in the case of United States v. Hadi al Iraqi (10026)
5. z
Consequences of Data Breach
+ Money
+ Identity Theft
+ Ransom
+ Useful Secrets
+ Punishment
+ Damage to Reputation Loss of Business
+ Civil Liability
+ Criminal Liability
6. z
Major Data Breaches of 2015
From http://www.zdnet.com/pictures/worst-largest-security-data-breaches-
2015/
+ Kapersky Labs
+ LastPass
+ CVS, Walgreen’s, Costco
+ Carhone Warehouse (UK)
+ UCLA Health
+ Hacking Team
+ Ashley Madison
+ Anthem
+ IRS
+ Office of Personnel
Management
8. z
Protecting Our Data in the Old Days
1. Communications were secure in that virtually all
communications were internal.
2. Data was secure in that it was stored on our servers in our
offices.
3. Access is restricted access by usernames and passwords?
4. You had full control over your PC, but it was
inconsequential.
5. Points of entry – desktop PCs in our office – were secure.
6. The only real threat was known viruses attached to e-mail.
7. Our firewall kept uninvited guests out.
8. We were low-value targets.
10. z
Communications
+ Employees are able to access our network remotely
across the public Internet.
+ We routinely use 3rd party services, typically web
sites, wherein we are communicating across the
public Internet.
11. z
Data
+ We store sensitive data of our clients.
+ Third parties store our sensitive data.
12. z
Points of Entry
+ Home PCs
+ Mobile Devices, Lots of Them
+ Public PCs Devices
13. z
Viruses Have Evolved Into
Malware
+ Malware > Viruses.
+ Some malware is indefensible…
+ …in that it attacks flaws in the software that are unknown to
all, including the makers of the software.
+ …sometimes bespoke, just for you.
+ …it piggybacks on other, legit apps or web sites– e.g. Java,
Adobe Flash.
15. z
Net Effect
1. Communications were secure in that virtually all
communications were internal.
2. Data was secure in that it was stored on our servers in our
offices.
3. Access is restricted access by usernames and passwords,
which may be easily broken.
4. You had full control over your PC, but it was
inconsequential.
5. Points of entry – desktop PCs in our office – were secure.
6. The only real threat was known viruses attached to e-mail.
7. Our firewall kept uninvited guests out.
8. We are a high-value low-value target.
16. z
Order of Events in Hack of RSA, Inc.
Recon
• Research public info about RSA employees
E-Mail
• Create e-mail accounts purporting to be a close friend or employee
Payload
• Payload is an indefensible piece of malware
Malware
• Malware leverages privileges to gain access
Damage
• Data is stolen
17. z
Recourse?
+ Yes, it’s illegal.
+ Remediation is difficult-to-impossible.
+ Prevention is the best strategy.
18. z
Action Items For…
+End Users – That’s You
+I.T. Staff
+Firm Management
+Technology Vendors
+Non-Technology Vendors
19. z
Action Item #1 for Employees:
Don’t let them in by e-mail.
+ Who is the e-mail actually from?
+ If you have to ask me if it is legit then you’ve already
told me that you don’t know this person.
+ Verify by an alternate method.
27. z
Test Yourself on #1 and #2
E-Mail Phishing Quiz:
http://www.sonicwall.com/phishing/
Web Site Phishing Quiz:
https://www.opendns.com/phishing-quiz/
28. z
Action Item #3: Maintain Your
Software
+ If you didn’t go looking for it then don’t install it.
+ If you installed it, then update it. The vast majority of
patches go to security.
+ If you don’t use it then uninstall it.
29. z
Action Item #4: Protect Your
Passwords
+ Don’t reuseshare passwords across high-value
accounts.
+ Keep them secure, in a password vault or paper in a
locked drawer in your desk.
+ Not in a Word or Excel document.
30. z
Action Item #5: Secure Your
Mobile Devices
+ Laptops
+ Smartphones
+ Tablets
+ Fitness gadgets
31. z
Action Item #6: This is a
mindset.
+ This is a marathon not a sprint.
+ There will be more action items.
+ For the rest of your life.
+ This is a perpetually, quickly moving target.
32. z
Recurring THEMES
Your PC + data are more valuable than you realize
Person using PC is the weakest link
Phishing is the most common attack vector
Test yourself!
33. z
Mark B. Manoukian
Director of Information Technology
Kegler Brown Hill + Ritter
mmanoukian@keglerbrown.com
keglerbrown.com/manoukian
614-462-5429
Thank You!
45. z
Applicable U.S. Law
+ No common set of laws
governing civil liability
+ Claimants use patchwork
of federal and state
statutory claims +
common law claims
46. z
Federal Statutes
Health Insurance
Portability and
Accountability
Act (HIPPA)
Health Information
Technology for
Economic and
Clinical Health
Act (HITECH)
Stored
Communications
Act (SCA)
Fair Credit
Reporting
Act (FCRA)
Graham-Leach-Bliley
Act (GLBA)
47. z
State Law Claims
Consumer protection statutes
Unfair trade practices statutes
Negligence
Invasion of privacy
Breach of implied or express contract
Unjust enrichment
48. z
Standing + Injury Requirement
Need to establish injury in-fact to support Article III
standing in federal court (biggest impediment so far)
Concrete + particularized
Actual + imminent, not conjectural or hypothetical
Possible future injury not enough
Threatened injury must be impending
Plaintiffs often allege risk of future injury + expenses
to mitigate that risk
50. z
Lack of evidence of what
happened to the PII
Lack of evidence of financial
loss or proof of identity theft
Lack of loss because claimants
were reimbursed within
payment card system
Federal courts dismiss on mere
possibility of future harm
Plaintiff’s principal theory of
harm is risk that loss of PII puts
at higher risk of identity theft
Some district courts have found
standing on facts falling short
of actual financial harm
52. z
re Sony Gaming Networks
…996 F. Supp 2d 942
(S.D. Cal. 2014)
April 2011: hackers attacked computer network
used to provide Sony PlayStation Network (PSN)
and related networks
53. z
re Sony Gaming Networks
…996 F.Supp 2d 942
(S.D. Cal. 2014)
Lawsuit claims that Sony did not adequately
protect networks and hackers were able to
access certain account holder information
54. z
re Sony Gaming Networks
…996 F.Supp 2d 942
(S.D. Cal. 2014)
Claims were that hackers stole information to
commit fraud and identity theft + account holders
were legally injured by the unavailability of the
network while temporarily off-line for 24 days
66. z
Obstacles to Securing Payment
+ Type of Goods
+ Seller’s Existing Credit Terms + Conditions
+ Buyer’s Existing Credit Terms + Conditions
+ PO + Supply Agreements
67. z
UCC – Nationwide Rules for
Commerce
+ Rules for Sales + Leases
+ Banking, Checks + Letters of Credit
+ Procedures for Warehouse Receipts + Bills of Lading
+ Agreement to Grant Security to Seller
68. z
Not All Transactions +
Collateral Covered
Secured Transactions
Under Article 9
Classification of Collateral
69. z
Security Agreements
+ Identifies Parties
+ Buyer Grants Security Interest
+ Describes Collateral
+ Specific listing
+ Category of Goods
+ Type of Goods
+ Include Proceeds and Products of Collateral
+ Specifies Indebtedness to be Secured
70. z
Attachment of
Security Interests
+ Value given by creditor
+ Debtor has rights in collateral
+ Authenticated Security Agreement
1
Formal Requirements
72. z
Filing Rules
+ Name of Individual Debtor
+ Name of Registered Organization
+ Place of Filing
+ Changes in Name or Location
+ Sufficient description of Collateral
3
73. z
Basic Rules of Priority
+ First to File or Perfect
+ Filing Before Loan Closing
+ Lapse in Filing
4
74. z
The Purchase Money
Security Interest
A PMSI is distinguished from a standard security
interest in two main ways: its manner of creation
and the priority it receives relative to other
security interests in the same collateral.
75. z
Collateral Subject to PMSI:
+ Goods
+ Software
+ Consignor’s Inventory
The Purchase Money
Security Interest
80. z
True Consignment Characteristics
+ Generally consumer goods
+ Value of goods less than $1000.
+ Delivered to merchant for sale
+ Merchant/auctioneer known to sell on consignment
+ Usually subject to state bailment law
81. z
UCC “Consignment”
Characteristics
+ Merchant deals with goods other than under
consignor’s name
+ Merchant is not an auctioneer
+ Not generally known as reseller
+ Aggregate value of goods over $1000
+ Inapplicable to consumer goods
+ Transaction does not create a security
interest to secure an obligation.
82. z
Common Commercial
“Consignment”
+ Security for payment of an obligation
+ Consignment of goods treated as PMSI in inventory
+ Rights between consignor and consignee unimpaired
+ Several practical problems with consignments
83. z
Priority of Consignor’s Claim
Dependent on Perfection
+ Priority over floating inventory lien
+ Must create and perfect as PMSI
+ Financing statement and notice
84. z
Practical Problems in Securing
Payment Under UCC
+ Transactional Costs
+ Change of Name of Debtor
+ Mergers/Successor Debtor
+ Remedies Upon Default
+ Disposition of Recovered Collateral
85. z
Issues to Consider
+ What Agreements in Effect Already?
+ Eligible for Statutory Lien?
+ Would PMSI Be Effective?
+ Do We Sell Type of Goods Suitable for Security
Agreement?
+ Practical Problems with Collateral?
86. z
Thank You!
Larry J. McClatchey, Director
Kegler Brown Hill + Ritter
lmcclatchey@keglerbrown.com
keglerbrown.com/mcclatchey
614-462-5463
88. z
What is a Preference?
Payment or transfer made during the
ninety days prior to bankruptcy
Debtor makes a payment or payments
to some creditors and not to others
90
89. z
Purpose of Preference Law?
Prevent “piecemeal” dismemberment of a debtor
Avoid the “race to the court house” among creditors
To promote equal distribution among creditors
similarly situated
90. z
Who Can Avoid a
Preferential Transfer?
1
Bankruptcy trustee or
“debtor in possession”
2
Representative of Liquidating
Trust in chapter 11 case
91. z
Elements of a
Preference Claim
Transfer of
property of
a debtor
To or for
benefit of
creditor
On account
of an
antecedent
debt
Made while
debtor was
insolvent
Enables creditor
to receive more
than if transfer
had not been
made
Within 90
days prior to
bankruptcy
95. z
+ Debtor owes Creditor, and Creditor owes ABC Company
+ Debtor pays ABC Company for Creditor’s debt in
consideration of Debtor’s debt to Creditor
+ Debtor can recover the transfer from Creditor
96. z
+ Creditor applies credit for damaged goods to Debtor’s
account, reducing amount due from Debtor to Creditor
+ Application of credit to Debtor’s account is not a transfer
for the benefit of Creditor
+ Review records of alleged preferential transfers to weed
out credits
107. z
Element: Creditor Receives More
If debt fully secured
by collateral,
transfer didn’t allow
creditor to obtain
more than it would
have in bankruptcy
108. z
Element: Creditor Receives More
If creditors will be
paid in full through
bankruptcy, this
element would not
be met
109. z
Debtor/trustee must prove each
element of preference
Burden of proof for elements is
on debtor/trustee
Creditor can establish an
“affirmative defense”
Creditor has burden of proof on
any affirmative defense
Defense Considerations
111. z
Ordinary Course of
Business Defense
The debt was incurred in the ordinary course of the business
between debtor and creditor, AND:
EITHER
Payment is made in the ordinary course of business
of the debtor and the transferee
OR
Payment is made according to
ordinary business terms in the industry
112. z
Ordinary Course of Business
Between the Parties
Payment that is “normal” in parties’
course of dealing
Consistency with other business
transactions between parties
Examines course of conduct + payment
history prior to filing
Historical period v. preference period
Consistency late payments may qualify
as ordinary payments
113. z
Payment NOT in Subjective
Ordinary Course of Business
Creditor requires a cashier’s check for the first time
Creditor imposes new terms during the preference period
Payment results from coercive collection practices
Creditor imposes or threatens credit hold
114. z
Ordinary Business Terms:
Objective Ordinary Course
Payment is “ordinary” in relation to
the relevant industry standard
Examine industry as a whole
Explore practices common to
similarly situated businesses
Usually requires expert testimony
117. z
Subsequent New Value
Transfer by creditor after payment received
Not secured by “otherwise unavoidable” security interest
On account of which new value debtor did not make
an otherwise unavoidable transfer to or benefit of creditor
New value determined as of petition date,
so post-petition payments are not relevant
118. z
May not be available if
Creditor retains a
security interest
May not be available if
Debtor later paid for the
new goods prior to the
petition date
Subsequent New Value
119. z
+ June 1: Debtor pays Creditor $200,000
+ June 15: Creditor ships new goods on credit
+ August 1: Debtor files bankruptcy
+ Zero preference exposure because of SNV
+ Creditor has a proof of claim for $200,000
120. z
+ June 1: Debtor owes creditor $500,000
+ June 15: Debtor pays creditor $200,000
+ June 30: Creditor ships new goods ($100,000) on credit
+ August 1: Debtor files bankruptcy
+ $100,000 preference exposure because of SNV
+ Creditor has a proof of claim for $400,000
121. z
+ June 1: Creditor ships new goods ($200,000) on credit
+ June 15: Debtor pays creditor $200,000
+ August 1: Debtor files bankruptcy
+ $200,000 preference exposure
124. z
Transfer <$5,000 in business cases<$5000
Amount in controversy
Case filed too late (statute of limitations)
Transfer to holder of unperfected lien rights
Other Potential Defenses
+
Transfer <$600 in consumer cases <$600
125. z
Where is the lawsuit filed?
When was the lawsuit filed?
How much is the claim?
Did the debtor make the transfer?
Checklist of Defenses
Against Preference Claims
126. z
Checklist of Defenses
Against Preference Claims
Do lien rights exist? PMSI?
Did debtor receive “20 day goods”?
Has debtor made “critical vendor” offer?
Section 503(b)(9) bargaining chip?