The Intersection of Government Requests and Data Privacy: Europe meets the US

Cuneyt A. Akay
Cuneyt A. Akay
Greenberg Traurig, LLP

Cuneyt A. Akay is an anti-corruption lawyer focused on helping clients comply with the Foreign Corrupt Practices Act (FCPA) and the UK Bribery Act. Cuneyt designs, builds, and implements effective compliance programs for clients around the world.

David Zetoony
David Zetoony
Greenberg Traurig, LLP

David has helped hundreds of companies establish and maintain ongoing privacy and security programs, and he has defended corporate privacy and security practices in investigations initiated by the Federal Trade Commission, and other data privacy and security regulatory agencies around the world, as well as in class action litigation.

On-Demand: July 29, 2021

The Intersection of Government Requests and Data Privacy: Europe meets the US
MCLE Credit Information:

Select Your State Below to View CLE Credit Information

Unable to Attend Live Broadcast?

Receive access to recorded class and earn self-study credit. Recording is made available 5 business days after live broadcast.

Can't Decide Which CLE Progam?

Access All
Our Programs
Only $245yr

Annual Subscription includes access to:
  • 500+ Live CLE Webinars
  • National Hot Legal Topics
  • New Laws and Regulations
  • State Specific Programs
  • All Formats: Live, Replay, & On-Demand
Subscribe Today
Training 5 or more people?

Sign-up for a law firm subscription plan and each attorney in the firm receives free access to all CLE Programs

Program Summary

Companies can receive government requests for information from a variety of sources including subpoenas, CIDs, national security letters, and discovery requests. Such requests often seek personal information about individuals believed to have committed crimes. Growing concern has been raised internationally about the data privacy implications when companies respond to such requests, particularly when they originate from the United States government.

This course is co-sponsored with myLawCLE.

Key topics to be discussed:

  • Types of information requests that companies may receive from US government agencies (state and federal)
  • Process that US regulators expect companies will follow when responding to requests for information
  • Identify the tension between government requests for information and European data privacy laws including the European GDPR
  • Explain how multinational companies can attempt to navigate that tension by creating a law enforcement request policy
  • Describe the components of an effective law enforcement request policy
  • Provide practical takeaways for handling requests for personal information

Date / Time: July 29, 2021

  • 12:00 pm – 1:00 pm Eastern
  • 11:00 am – 12:00 pm Central
  • 10:00 am – 11:00 am Mountain
  • 9:00 am – 10:00 am Pacific

Choose a format:

Live Video Broadcast/Re-Broadcast: Watch Program "live" in real-time, must sign-in and watch program on date and time set above. May ask questions during presentation via chat box. Qualifies for "live" CLE credit.

On-Demand Video: Access CLE 24/7 via on-demand library and watch program anytime. Qualifies for self-study CLE credit. On-demand versions are made available 5 business days after the original recording date and are viewable for up to one year.

Closed-captioning available

Speakers

Cuneyt A. Akay_myLawCLECuneyt A. Akay | Greenberg Traurig, LLP

Cuneyt A. Akay is an anti-corruption lawyer focused on helping clients comply with the Foreign Corrupt Practices Act (FCPA) and the UK Bribery Act. Cuneyt designs, builds, and implements effective compliance programs for clients around the world.

Cuneyt’s experience includes conducting internal investigations, performing compliance risk assessments, handling pre-and post-acquisition compliance due diligence, training staff and third parties on compliance requirements, and assisting in the monitoring and auditing of anti-corruption programs.

Cuneyt also represents clients in complex civil litigation, class actions, and appellate proceedings in both state and federal courts throughout the country. In addition, he advises clients on governmental matters, including election law issues, ballot initiatives, campaign finance, and administrative proceedings.

David Zetoony_myLawCLE SpeakerDavid Zetoony | Greenberg Traurig, LLP

David Zetoony, Co-Chair of the firm’s U.S. Data, Privacy and Cybersecurity Practice, focuses on helping businesses navigate data privacy and cyber security laws from a practical standpoint.

David has helped hundreds of companies establish and maintain ongoing privacy and security programs, and he has defended corporate privacy and security practices in investigations initiated by the Federal Trade Commission, and other data privacy and security regulatory agencies around the world, as well as in class action litigation.

David receives regular recognition from clients and peers for his knowledge and experience in the fields of data privacy and security. The National Law Journal named him a “Cybersecurity and Data Privacy Trailblazer,” JD Supra recognized him four times as one of the most widely read names when it comes to data privacy, cybersecurity, or the collection and use of data, and Lexology identified him seven times as the top “legal influencer” in the area of technology, media, and telecommunications in the United States, the European Union, and in the context of cross-border transfers of information.

He is the author of the American Bar Associations primary publication on the European General Data Protection Regulation (GDPR) and is writing the American Bar Association’s primary publication on the California Consumer Privacy Act (CCPA).

Agenda

i. Types of information requests that companies may receive from US government agencies (state and federal) | 12:00pm – 12:10pm
ii. Process that US regulators expect companies will follow when responding to requests for information | 12:10pm – 12:20pm
iii. Tensions between government requests for information and European data privacy laws including the European GDPR | 12:20pm – 12:30pm
iv. Multinational companies can attempt to navigate that tension by creating a law enforcement request policy | 12:30pm – 12:40pm
v. Components of an effective law enforcement request policy | 12:40pm– 12:50pm
vi. Practical takeaways for handling requests for personal information | 12:50pm – 1:00pm