Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
MODERATED-Session 5 of 10 - Mr. Kornblum, a highly experienced trial and litigation lawyer for over ...
Scam typologies help legal professionals by providing a framework to understand, identify, and preve...
For decades, the Rule of Two in government contracting required federal agencies to set aside contra...
Whether the Federal Government or individual State Governments, fraud enforcement, especially in hea...
MODERATED-This CLE will cover the critical ethics issues involving multijurisdictional practice and ...
MODERATED-This CLE will discuss the critical issues relating to the use of social media and legal et...
Explore the transformative potential of generative AI in modern litigation. “Generative AI for...
MODERATED-Session 4 of 10 - Mr. Kornblum, a highly experienced trial and litigation lawyer for over ...
This one-hour program will look at the key differences in policies available in the marketplace, dif...
MODERATED-Session 9 of 10 - Mr. Kornblum, a highly experienced trial and litigation lawyer for over ...