Register Online - Add to Cart
Product ID: 403527EAU

Legal Implications of Doing Business on the Internet

OnDemand Webinar (90 minutes)

Learn effective strategies to protect your website and improve cybersecurity.

Online selling is being buffeted by the winds of change. Copycat pirates roam the internet seas plundering business ideas from unsuspecting online merchants and their unprotected websites. Social media sites and hackers pilfer personal information and credit card data. Online con artists, ransomware, malware, cyber squatters, and copyright trolls will inevitably storm your online decks. Cloud storage attacks may open the floodgates to a veritable invasion of privacy.

Don't get blown away. This material will teach you how to batten down the hatches with useful and sensible secrets to success and security in a cloud first, mobile first world . Best practices for website development, design, and content will be shared. Policies and procedures for successful customer, developer, marketer, and vendor relationships will be explained. Practical security tips will be presented for collecting and storing customer data, updating privacy policies and terms of use, and restricting social media overreach. Complying with data breach regulations both in the United States and abroad will be made simple, including compliance with the EU's regulations, like the GDPR will be made simple because the privacy policy updates you have been likely getting in your inbox do not just apply to the big guys - you need to be compliant too.


Nichole A. Sadek, Innovative Law Group Mark H. Zietlow, Innovative Law Group


Secrets to Online Selling

• Optimizing Ownership of Website Content (the Ship)

• Enhancing Website Policies and Procedures (the Map)

• Securing Intellectual Property and Data (the Treasure)

Secrets to Online Security

• Protecting the Ship and the Treasure

- Trademark Issues - Website Name, Logos, and Product Names

- Copyright Issues - Videos, Website Images, Content, and Copyrights

- Customer Data - Collection, Cloud Storage, Avoiding Breach

• Trust No One

- Mobile Devices

- Employee Training and Policies

- Vendor Contracts

- Confidential Information Policy

• Getting Attacked - Compliance, Liability, and Insurance