Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
This program provides attorneys with a foundational understanding of the name, image, and likeness (...
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
Contracting with the Federal Government is not like a business deal between two companies or a contr...
This program introduces psychosocial evaluations as a valuable tool in civil litigation, particularl...
In “Choosing the Right Business Entity,” I will walk through the issues that matter most...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
This program is geared towards lawyers, experts, commercial property owners, and others in the envir...
This program explores the impact of complex trauma on criminal defendants through a developmental an...
This program examines mitigation strategies for white-collar defendants in the post-Booker sentencin...
This CLE program, “Your Most Powerful Trial Tool Isn’t What You Say—It’s How...