This program discusses the constantly evolving threat of ransomware and the legal implications associated with such cyber attacks. We will explore the various types of ransomware attacks, threat actor tactics, and the potential resulting legal obligations often faced by impacted companies based upon our significant experience responding to data security incidents. This program also discusses the current regulatory environment related to data breaches and provides some important considerations for complying with all of the various potentially applicable state and federal laws.
In “Choosing the Right Business Entity,” I will walk through the issues that matter most...
If there is one word we heard during our journey through the pandemic and continue to hear more than...
United States patent law and the United States Patent and Trademark Office’s patent-related gu...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
Many lawyers may not fully understand the Bar rules and ethical considerations regarding client repr...
Attorneys are judged every time they speak—in client meetings, depositions, hearings, negotiat...
This program provides a comprehensive analysis of the Sixth Amendment Confrontation Clause as reshap...
Loneliness isn’t just a personal issue; it’s a silent epidemic in the legal profession t...
This Shakespeare?inspired program illustrates how Shakespearean technique can enrich courtroom advoc...