Public and private entities are presented with, and urged to implement, new technologies on a regular basis. At the same time, officers or employees may use new technologies such as ephemeral messaging apps that are part of existing IT systems and become “shadow IT.”
This session will examine possible use cases for new technologies, how these might be evaluated, the pros and cons of adopting new technologies. The session will also suggest a checklist to use when looking at new technologies.
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
This program provides attorneys with a comprehensive framework for incorporating psychosocial evalua...
During this course, we will go over your rights under the Freedom of Information Act (FOIA) and Priv...
ChatGPT is rapidly entering law firm workflows, including drafting, summarizing, brainstorming, lega...
The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...
The General Data Protection Regulation (GDPR) continues to impact legal firms and organizations worl...
AI agents and generative AI tools are rapidly entering law firm workflows, including legal research,...
Join us for Part 2 of a program tailored for attorneys seeking a better understanding of the ongoing...
State attorneys general continue to play a central and increasingly aggressive role in consumer prot...