Events

2015 Technology Seminar Series

MAY 13, 2015 at 12:00 PM – 1:00 PM (EDT)
JUN 17, 2015 at 12:00 PM – 1:00 PM (EDT)
JUL 15, 2015 at 12:00 PM – 1:00 PM (EDT)
AUG 12, 2015 at 12:00 PM – 1:00 PM (EDT)
Porter Wright

Porter Wright
41 South High Street
29th Floor
Columbus, Ohio 43215

Part I: Big Data, Data Analytics and the Law: What Your Company Needs to Know About the Next Big Thing
Wednesday, May 13

"Big data" is one of today's most prevalent buzzwords across virtually all industries worldwide. But who truly understands what big data is and how it's used? How is information collected, stored and analyzed? How are businesses leveraging big data in the workplace and the marketplace? What's the right balance between data-driven trend-spotting and consumer protection? How can you be sure your company is acquiring and processing data ethically and in compliance with state, federal and international regulation or guidance? This seminar discusses each of these questions and provides attendees with specific examples of how big data affects their workplaces, customer outreach and business strategy.

Part II: Proactive Strategies for Combating "Patent Trolls"
Wednesday, June 17

Non-practice entities and patent-assertion entities, who some pejoratively called "patent trolls," have been on the FTC's radar for the past year — and they've had quite a bit to say about the matter. Gain insights about how your company can manage risk and, if needed, make a stand.

Part III: New Legal Developments Related to Promotions/Advertising and FTC Enforcement
Wednesday, July 15

With numerous social media and other digital outlets at our fingertips, advertising and customer engagement is more fun than ever. But having too much fun can lead to trouble. Hear the latest guidance drawing a line between what's clever and what's a legal minefield.

Part IV: Trends in Data Breach and What Your Business Should be Doing About it
Wednesday, August 12

Make sure your business is taking the appropriate steps to protect customer and employee data, and how you can be prepared to act if, or when, your data becomes compromised.