Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
In this course, Dr. Carlson will present a broad overview of what scientific research has discovered...
This presentation teaches attorneys how to deliver memorized text—especially openings and clos...
This CLE program examines attorneys’ ethical duties in managing electronically stored informat...
Attorneys will receive a comparative analysis of GAAP and IFRS with emphasis on cross-border legal c...
This program provides a detailed examination of the Black Market Peso Exchange (BMPE), one of the mo...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
In “Choosing the Right Business Entity,” I will walk through the issues that matter most...
This presentation provides an overview of copyright law particularly as it applies to music. The pre...