Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
A litigator’s role is to shape how key decision-makers - judges, jurors, and opposing counsel ...
This CLE program covers the most recent changes affecting IRS information reporting, with emphasis o...
This presentation examines how “sense memory,” a core acting technique, can help lawyers...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
This attorney-focused training provides deeper insight into GAAP’s framework and its legal app...
This CLE session introduces attorneys to budgeting and forecasting concepts used in corporate planni...
This program explains the architecture of storytelling in the courtroom, using narrative arc, rhythm...
Scam typologies help legal professionals by providing a framework to understand, identify, and preve...
Protect clients and yourself by knowing some of the more common ethical issues that can affect your ...
Insurance companies are interesting because they are beholden to the policy holder and to investors....