This program will be covering the following topics:
• What types of confidential information employers may protect from online exposure.
• What types of information they may discipline an employee for disclosing on-line.
• When an employer may and may not monitor its employees’ social media activity.
• Who owns an employee’s business-related social media contacts – the employer or the employee?
Part II builds on the foundation established in Part I by examining how classical rhetorical styles ...
Protect clients and yourself by knowing some of the more common ethical issues that can affect your ...
Part 2 of 2 - Lawyers at all levels of experience and even sophisticated law firms and general couns...
This Shakespeare?inspired program illustrates how Shakespearean technique can enrich courtroom advoc...
Synthetic identity fraud creates a significant legal and compliance challenge for professionals by c...
Explore the transformative potential of generative AI in modern litigation. “Generative AI for...
This program examines the strategy and artistry of closing argument, positioning it as a lawyer&rsqu...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
This CLE program examines attorneys’ ethical duties in managing electronically stored informat...
This course breaks down GAAP’s ten foundational principles and explores their compliance impli...