Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
If there is one word we heard during our journey through the pandemic and continue to hear more than...
Aligning Your Legal Career with Your Values, explores the profound impact of values alignment on ind...
In an era of heightening geopolitical tension, the protection of sensitive personal data has moved f...
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
This program examines critical 2025-2026 developments in patent eligibility for software and AI inve...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
Part 1 - This program focuses specifically on cross?examining expert witnesses, whose credentials an...
This program explores listening as a foundational yet under-taught lawyering skill that directly imp...