Public and private entities are presented with, and urged to implement, new technologies on a regular basis. At the same time, officers or employees may use new technologies such as ephemeral messaging apps that are part of existing IT systems and become “shadow IT.”
This session will examine possible use cases for new technologies, how these might be evaluated, the pros and cons of adopting new technologies. The session will also suggest a checklist to use when looking at new technologies.
This program examines the strategic use of expert testimony in immigration court proceedings. Partic...
This program provides attorneys with a practical examination of how legal, regulatory, and liability...
Effective representation depends on trust, communication, and responsiveness, yet these can break do...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
My contract was terminated and the contracting officer did not pay my invoices – what can I do...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
The General Data Protection Regulation (GDPR) continues to impact legal firms and organizations worl...
What are the left and rights limits, penalties, and best practices for export controls under Interna...
Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...