Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
Prior to the Supreme Court’s 2023 affirmative action decision, some predicted that this ruling...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
Disasters, whether natural or manmade, happen. Disasters can impact the practice of law and, among o...
This program provides a comprehensive framework for integrating Borderline Personality Disorder (BPD...
My contract was terminated and the contracting officer did not pay my invoices – what can I do...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
Philip A. Greenberg, Esq., who has been a litigator in the State and Federal Courts for 52 years, ha...
This program examines the strategic use of expert testimony in immigration court proceedings. Partic...
This program examines mitigation strategies for white-collar defendants in the post-Booker sentencin...
Discussion of religion and reasonable accommodation in the workplace. Thanks to the United States Su...