Print Catalog:

Programs in Florida Eligible



Filter by State
Filter by Category
 
 

What It Takes to be a Trial Lawyer If You’re Not a Man: The Ethical, Professional, and Personal Costs of Confronting Gender Bias in the Courtroom

Program Number: 2906 Presenter: Lara Bazelon

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Today, women make up more than one half of all law school graduates. Yet they remain dramatically underrepresented at the top echelons of the profession. Two thirds of state and federal judges are men, as are 83 percent of elected prosecutors; less than one percent are women of color. In the majority of law firms, large and small, women make up only a fraction of the powerful inner circle: partners who bring in clients, lead litigation teams, and sit on powerful management and compensation committees. In the coveted position of first chair at trial, the number of women shrinks further. In this MCLE, law professor and trial lawyer Lara Bazelon explores the systemic gender bias exhibited by judges, opposing counsel, jurors, or the clients themselves that impedes women’s

$95.00Audio CD Add to Cart

How Do You Solve a Problem Like E-mail?

Program Number: 2903 Presenter: Therese Craparo, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** For years, e-mail has been both a vital communications tool and a growing liability for many organizations. While e-mail may contain critical business records and data subject to legal hold, years of lax management, exponentially increasing volumes, and changing or aging e-mail systems present significant cyber-security, data privacy, litigation and operational risks. And with the advent of technology platforms that allow for more sophisticated indexing and analysis of data, including Microsoft 365, cleaning-up historical e-mail and developing processes that leverage new technology will be transformative for e-mail risk management. This program will review strategies for managing the risks associated with e-mail, including retention, Records categorization, legal hold implementation, auto-disposal, and centralization and will review case studies on: (i) the use of record classification technology to categorize 1.5 billion e-mail messages; (

$95.00Audio CD Add to Cart

The Practical Guide to the California Consumer Privacy Protection Act

Program Number: 2868 Presenter: David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** The California Consumer Privacy Protection Act of 2018 (“CPPA”) is arguably the most comprehensive - and complex - data privacy regulation in the United States. The CCPA was designed to emulate the European General Data Protection Regulation (“GDPR”) in many respects. The program will address how the CCPA is like, and how it differs from, the GDPR, and practical steps that companies should take to come into compliance with the regulation. The program’s presenter, a partner at the law firm of Bryan Cave Leighton Paisner, has been ranked by Lexology as the most read author on data privacy and security in the world, and is the author of the American Bar Association’s General Data Protection Regulation: Answers to the Most Frequently Asked Questions.

$95.00Audio CD Add to Cart

When Quasi-Municipalities Go Bad: How Does It End?

Program Number: 2867 Presenter: Karol K. Denniston, Esq., Travis A. McRoberts, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** When municipal subsidiaries and affiliated entities “quasi-municipalities” are distressed, investors often awaken to unexpected litigation regarding whether the entity is a governmental unit or not. The answer to this question determines whether a court supervised restructuring can take place at all and whether it must be filed as a chapter 11 restructuring or as a chapter 9 municipal restructuring. When states do not permit governmental entities to file chapter 9, the default is often chapter 11 and the courts, over investor objections, have permitted chapter 11 restructurings to move forward. Assessing the risk that arises from uncertainty regarding whether and what bankruptcy proceedings can be used should be part of the investor’s underwriting process. In this webinar we will review the case law and talk about specific due diligence that should be

$95.00Audio CD Add to Cart

All Good Things Come to an End: Preserving Value, Minimizing Liabilities and Taking Advantage of Opportunities During an Economic Downturn

Program Number: 2865 Presenter: Marc E. Hirschfield, Esq., Marc Skapof, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** A decade after the “Great Recession,” numerous indicators—some new, some old—point to the reemergence of troubled times in the near future. Regulators and investors have little to no visibility into the pools of hundreds of trillions of dollars of derivatives and other esoteric securities pegged to the debt markets; outstanding U.S. corporate debt exceeds $7.5 trillion; interest rates are on the rise; geopolitical uncertainty over trade policy and BREXIT contributes to market volatility and a wall of high yield debt is set to mature in 2019/2020. Against this backdrop, it would be fool hardy to assume the good times will never end; instead, prudence dictates preparing for the storm before it reaches shore. This program is designed to equip in-house and outside counsel alike with the knowledge

$95.00Audio CD Add to Cart

Cyber Liability 101: The Threats of Cyber / Data / Network Liability

Program Number: 2864 Presenter: Ralph A. Pasquariello, CLCS

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** The exposure to Cyber threats for companies has escalated over the past 10 years. What was once a random act, simple hacking has grown into a wave of unstoppable organized crime. Firewalls are no longer a defense for the pinpoint accuracy of Spear Phishing. The criminals of the past that stole simple information and data have been replaced by massive attacks resulting in severe business interruption, ransom demands, and information/data destruction. Cyber security is a must, but more import is a Cyber Liability Insurance Policy which will cover your costs in the event of a Cyber Attack. There are many facets of Cyber-crime with its endpoint targets constantly changing, thus: the need for carefully designed coverages which can blend Cyber/Crime/Technology coverages to defend today’s electronic

$95.00Audio CD Add to Cart

The High Court and Securities Law: A Look Back at the 2018 Term and the Coming Term

Program Number: 2863 Presenter: Thomas O. Gorman, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Digital Realty Trust. Cyan and Lucia defined key securities law issues regarding whistleblowers, class actions and perhaps the future of government administrative enforcement actions. While the Supreme Court has only agreed to hear one securities case to date in the coming term, it has the potential to be a blockbuster: Lorenzo will consider the long simmering question about what constitutes scheme liability and whether the SEC can use the theory to evade Janus on false statements and perhaps wipe out the distinction between primary and secondary liability. If Judge Kaveanaugh from the D.C. Circuit is confirmed the case may be more interesting – he wrote the dissent in Lorenzo in the D.C. circuit which is highly critical of the SEC’s position.

$95.00Audio CD Add to Cart

Answers to the GDPR’s Most Frequently Asked Questions

Program Number: 2862 Presenter: David A. Zetoony, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** The European General Data Protection Regulations (“GDPR”) is a complex, comprehensive, regulatory framework that purports to apply to companies in Europe and the United States. While the GDPR is many things – intuitive, it is not. The presenter collected over 150 of the most common (and perplexing) questions concerning the GDPR from companies across the United States. This program will focus on the most popular of those questions and explore the answers under the European regulation.

$95.00Audio CD Add to Cart

Detecting Bias: Model Rule of Professional Responsibility 8.4(g) Viewed Through the Lens of Sherlock Holmes Movies and Television

Program Number: 2861 Presenter: Gregory R. Hanthorn, Esq., Daniel J. Merrett, Esq., Joanna Heiberg Sutton, Esq.

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** Hidden bias is difficult to root out. We are all incapable of completely impartially examining our reasons for acting; that’s why hidden bias is “hidden.” This CLE program seeks to explore differences between “bias” and “deduction and inference” through the innovative technique of following alongside one of fiction’s great ratiocinators – Sherlock Holmes. Using video clips from decades of Sherlock Holmes movies and television episodes our Moderator and Panelists will take you on a guided tour through ways in which Holmes, Watson, London and rural police inspectors and constables have either fallen prey to bias or avoided bias by thinking clearly. The end result? The program presents a series of positive and negative examples of interacting with the ABA’s amended Model Rule addressing bias and beyond.

$95.00Audio CD Add to Cart

Money Laundering via Cryptocurrencies: Regulatory, Enforcement and Intel Perspectives

Program Number: 2859 Presenter: Ross S. Delston, Lourdes C. Miranda, John E. Rollins

**** CD's are pre-order only and not available until after the program date - Online is not available until after the program date **** This program focuses on compliance and regulatory challenges as well as understanding the use of cryptocurrencies to launder money or finance terrorism. Like any store of value—including fiat currency, precious metals and precious stones—cryptocurrencies can facilitate a broad range of illicit activities, including the sale of illicit goods and services, fraud schemes, and terrorism. Come hear our three experts discuss the challenges regulators, law enforcement and the intelligence community have in collecting, analyzing, and investigating cryptocurrency transactions and mitigating threats.

$95.00Audio CD Add to Cart

Categories