Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
This presentation provides an overview of copyright law particularly as it applies to music. The pre...
Part I introduces the foundational principles of cross?examination, explaining how lawyers must meth...
Recent studies have shown that there has been a dramatic increase in impairment due to alcoholism, a...
Effective data privacy and artificial intelligence governance programs do not happen by accident. Th...
Explore the transformative potential of generative AI in modern litigation. “Generative AI for...
Attorneys and law firms are well known vectors for money laundering risk. Banks regularly labe...
Part 2 - This program will continue the discussion from Part 1 focusing specifically on cross?examin...
This session highlights the legal and compliance implications of divergences between GAAP and IFRS. ...
Part 2 dives deeper into advanced cross?examination techniques, teaching attorneys how to maintain c...
This program explores listening as a foundational yet under-taught lawyering skill that directly imp...