Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
This presentation provides an overview of copyright law particularly as it applies to music. The pre...
This program explores listening as a foundational yet under-taught lawyering skill that directly imp...
This course clarifies the distinction between profit and cash flow from a legal perspective. Attorne...
This program provides a detailed examination of the Black Market Peso Exchange (BMPE), one of the mo...
Part II builds on the foundation established in Part I by examining how classical rhetorical styles ...
This course provides a strategic roadmap for attorneys to transition from administrative burnout to ...
This Shakespeare?inspired program illustrates how Shakespearean technique can enrich courtroom advoc...
This ethics program examines common, but often avoidable, professional responsibility mistakes that ...
This program provides a comprehensive analysis of the Sixth Amendment Confrontation Clause as reshap...
Attorneys hopefully recognize that, like many other professionals, their lives are filled to the bri...