Presented in plain-language English, this presentation will address the minimum necessary network security requirements, as well as identify regulated data fields and their key cybersecurity elements. Additionally, the presenter will discuss emerging litigation with common law causes of action that evade that the prohibitions against private rights of action found in several federal regulations. Through this course, attorneys will be armed with a pragmatic approach to regulated data, minimum security requirements, and litigations risk with which to better advise and inform their clients and peers.
Recent studies have shown that there has been a dramatic increase in impairment due to alcoholism, a...
This Shakespeare?inspired program illustrates how Shakespearean technique can enrich courtroom advoc...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
If there is one word we heard during our journey through the pandemic and continue to hear more than...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
Effective data privacy and artificial intelligence governance programs do not happen by accident. Th...
Loneliness isn’t just a personal issue; it’s a silent epidemic in the legal profession t...
This program explores listening as a foundational yet under-taught lawyering skill that directly imp...
This presentation explores courtroom staging—how movement, spatial awareness, posture, and pre...
This ethics program examines common, but often avoidable, professional responsibility mistakes that ...