Public and private entities are presented with, and urged to implement, new technologies on a regular basis. At the same time, officers or employees may use new technologies such as ephemeral messaging apps that are part of existing IT systems and become “shadow IT.”
This session will examine possible use cases for new technologies, how these might be evaluated, the pros and cons of adopting new technologies. The session will also suggest a checklist to use when looking at new technologies.
This program provides a comprehensive framework for integrating Borderline Personality Disorder (BPD...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
Prior to the Supreme Court’s 2023 affirmative action decision, some predicted that this ruling...
The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
Disasters, whether natural or manmade, happen. Disasters can impact the practice of law and, among o...
“Everyone tells me I’m doing a great job. My clients, my colleagues, my family. Wh...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
This program addresses the critical intersection of criminal and immigration law, focusing on how mi...
Between 1986 and now, the U.S. Government collected approximately $85 billion from Federal Contracto...