Public and private entities are presented with, and urged to implement, new technologies on a regular basis. At the same time, officers or employees may use new technologies such as ephemeral messaging apps that are part of existing IT systems and become “shadow IT.”
This session will examine possible use cases for new technologies, how these might be evaluated, the pros and cons of adopting new technologies. The session will also suggest a checklist to use when looking at new technologies.
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
This program provides attorneys with a foundational understanding of derivatives and their role in m...
The Fair Debt Collection Practices Act (FDCPA) remains one of the most important consumer protection...
Disasters, whether natural or manmade, happen. Disasters can impact the practice of law and, among o...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
This program focuses on asylum claims based on sexual orientation, addressing the unique clinical, c...
Explore the transformative potential of generative AI in modern litigation. “Generative AI for...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
The Protections and Limits of the First Amendment when it comes to Expressive Conduct. This PowerPoi...
Class action litigation continues to evolve rapidly in response to an innovative plaintiffs’ b...