Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
Boundaries and Burnout: The Hidden Crisis in Law is a 60-minute California MCLE Competence Credit pr...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
Contracting with the Federal Government is not like a business deal between two companies or a contr...
This program provides a comprehensive analysis of the Sixth Amendment Confrontation Clause as reshap...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
The CLE will cover the Ins and Outs of Internal Corporate Investigations, including: Back...
This program examines listening as an active, strategic trial advocacy skill rather than a passive c...
In this seminar, we will talk about the process of taking a deposition, why you should (or should no...
Attorneys hopefully recognize that, like many other professionals, their lives are filled to the bri...
This program examines critical 2025-2026 developments in patent eligibility for software and AI inve...