Public and private entities are presented with, and urged to implement, new technologies on a regular basis. At the same time, officers or employees may use new technologies such as ephemeral messaging apps that are part of existing IT systems and become “shadow IT.”
This session will examine possible use cases for new technologies, how these might be evaluated, the pros and cons of adopting new technologies. The session will also suggest a checklist to use when looking at new technologies.
Many law firms now rely on AI?driven research, drafting, and workflow tools without fully understand...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
The Federal Tort Claims Act is the way that the federal government is sued for negligence. There are...
Join us for Part 2 of a program tailored for attorneys seeking a better understanding of the ongoing...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
This program examines the complex intersection of criminal convictions and immigration law under the...
This program, conducted by a seasoned litigation and trial lawyer, will emphasize what litigators ca...
Separation of Powers in United States and Israel from a Perspective of the Ongoing Debates in Both C...
Class action litigation continues to evolve rapidly in response to an innovative plaintiffs’ b...
Trademark doctrine was built for a marketplace that no longer exists, leaving practitioners to litig...