Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
Navigating Stress and Trauma in the Legal Profession, explores the unique challenges faced by legal ...
In 2016, the term “materiality” as it relates to the False Claims Act made a splash in t...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
Part 2 - This program will continue the discussion from Part 1 focusing specifically on cross?examin...
This program provides a detailed examination of the Black Market Peso Exchange (BMPE), one of the mo...
The program will cover the key issues for lawyer leaving government employment including the nuances...
In the rapidly evolving landscape of employment law, arbitration agreements have become a cornerston...
This program will address some of the most common intellectual property (IP) issues that arise in co...
This program provides a comprehensive analysis of the Sixth Amendment Confrontation Clause as reshap...