Public and private entities are presented with, and urged to implement, new technologies on a regular basis. At the same time, officers or employees may use new technologies such as ephemeral messaging apps that are part of existing IT systems and become “shadow IT.”
This session will examine possible use cases for new technologies, how these might be evaluated, the pros and cons of adopting new technologies. The session will also suggest a checklist to use when looking at new technologies.
This program addresses the critical intersection of criminal and immigration law, focusing on how mi...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
Review the basic software concepts and effective uses of generative AI, prompting strategies, and me...
Effective data privacy and artificial intelligence governance programs do not happen by accident. Th...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
This program is geared towards lawyers, experts, commercial property owners, and others in the envir...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
In 2016, the term “materiality” as it relates to the False Claims Act made a splash in t...
Part 1 - This program focuses specifically on cross?examining expert witnesses, whose credentials an...
Resilience in the Workplace, delves into the critical importance of resilience in navigating the cha...