Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
This program introduces psychosocial evaluations as a valuable tool in civil litigation, particularl...
This program provides a comprehensive framework for integrating Borderline Personality Disorder (BPD...
This program, conducted by a seasoned litigation and trial lawyer, will emphasize what litigators ca...
Trademark doctrine was built for a marketplace that no longer exists, leaving practitioners to litig...
The Protections and Limits of the First Amendment when it comes to Expressive Conduct. This PowerPoi...
This program is geared towards lawyers, experts, commercial property owners, and others in the envir...
Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...
Most legal professionals are operating in survival mode whether they realize it or not. Not crisis-l...
My contract was terminated and the contracting officer did not pay my invoices – what can I do...
This program focuses on asylum claims based on sexual orientation, addressing the unique clinical, c...