Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
Balance billing in healthcare, especially in relation to Government Programs poses a significant ris...
As technology advances, the manipulation of digital content has become more sophisticated and access...
Join Steve Herman on December 8, 2025, for "Maintaining Ethical Standards: Essential Strategies for ...
"I think he drinks too much - but he's my boss!" “She's the firm's rainmaker, but something i...
Designed for beginning estate planning attorneys, this comprehensive course provides a practical fou...
Permission to Pivot: Ethics, Well-Being, and Redefining Your Legal Career examines the intersection ...
In this presentation, Vanessa Terzian uses examples from actual client documents to demonstrate comm...
There are many hidden dangers in frequently used digital tools and media platforms, including social...
In addition to the fears about Opening Statements and Closing Arguments that lawyers know about &nda...
The GENIUS Act — signed into law on July 18, 2025 — marks the first comprehensive U.S. l...