Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
During this presentation, you will learn about the regulations and caselaw controlling claims and re...
Contracting with the Federal Government is not like a business deal between two companies or a contr...
This program provides attorneys with a foundational understanding of the name, image, and likeness (...
For most new attorneys, learning how to frame an oral argument can be a daunting task. L...
Protect your practice from the ethical vulnerabilities of AI by mastering Model Rules 1.1 and 1.5. T...
Effective representation depends on trust, communication, and responsiveness, yet these can break do...
“Everyone tells me I’m doing a great job. My clients, my colleagues, my family. Wh...
The Federal Tort Claims Act is the way that the federal government is sued for negligence. There are...
This interactive course is designed to equip legal professionals with the knowledge, tools, and stra...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...