Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
Well, resolution time is coming up soon! Are you ready? Research has shown that within weeks,...
This CLE will cover the critical ethics issues involved in leaving government practice for the priva...
When lawyers represent clients in litigation, those lawyers assume the role of advocate. Of course, ...
A noncitizen’s legal status can present thorny issues you should consider in pursuing your cli...
This program has two parts. The first part examines the disciplines required to prepare contracts th...
This program has two parts. The first part examines anecdotally those skills required to conduct an ...
Part 1 of 2 - In this presentation, I will discuss strategies for cross-examining expert witnesses. ...
This CLE will cover the critical ethics issues involving multijurisdictional practice and avoiding t...
The CLE will discuss the role of New York Labor Law Section 201-d in regulating employee conduct ins...
AI is changing everything about the way we deliver legal services. But what is generative AI and how...