There are myriad local, state, federal, and international laws, regulations, and industry standards relating to information security and privacy. All too often, practitioners can easily fail to see the forest for the trees in this area.
In this session, we pull back from the individual trees to get a look at the entire forest. This is done by identifying the three common threads that run through almost every law, regulation, or industry standard in the privacy/information security space. By focusing on the commonalities between and among the many laws, regulations, and standards, non-specialist can obtain a solid grasp of the fundamentals in this practice area. The discussion will also include many real-world examples.
This CLE will discuss the causes of action and potential causes of action in the bankruptcies relate...
If you own or manage a business that uses independent contractors, you need to know when you can or ...
Part 1 of this 4 Part series. Neither cybersecurity nor risk management are evaporating. To the cont...
Part 3 of this 4 Part series. Building on Parts 1 and 2, Part 3 of this series represents a deeper d...
There is no shortage of issues to keep in mind at each stage of the employment process. From job pos...
This is a short summary of how New Jersey practice is similar to, and different from, practice in ot...
This CLE will discuss the causes of action and potential causes of action in the litigations involvi...
Evidential issues are questions of law. By ruling on motions and objections, the judge determines wh...
The Supreme Court is set to hear oral argument in VIP Prods. LLC v. Jack Daniel’s Properties, ...
In this presentation, tax attorney Mike DeBlis will teach you how the government gathers information...