The Appropriate Use of Protective Orders of Confidentiality in Complex Litigation and Mass Torts

18 Aug , 2021

To register for the upcoming live webinar, please Click Here

It has become quite routine for attorneys to utilize protective orders or confidentiality orders in complex litigation matters. The reasons are multi-faceted, and can include something as simple as protection of one party (or both) parties’ confidential and proprietary information, and can range from expediting the flow of discovery material to facilitating the prompt and efficient resolution of disputes. However, certain decisions have warned against the overuse of protective orders. This program will provide a diverse discussion among plaintiff and defense counsel and a retired federal magistrate judge relating to protective orders generally, the protection of propriety information, and practice tips for attorneys involved in complex litigation who are facing similar issues.

To register for the upcoming live webinar, please Click Here

More Webcasts

AI Agents in Your Fi...

AI agents and generative AI tools are rapidly entering law firm workflows, including legal research,...

Labor Law Compliance...

Contracting with the Federal Government is not like a business deal between two companies or a contr...

Borderline Personali...

This program provides a comprehensive framework for integrating Borderline Personality Disorder (BPD...

Complex Trauma in Cr...

This program explores the impact of complex trauma on criminal defendants through a developmental an...

Litigating at Civili...

My contract was terminated and the contracting officer did not pay my invoices – what can I do...

White Collar Sentenc...

This program examines mitigation strategies for white-collar defendants in the post-Booker sentencin...

Legal and Tax Consid...

In “Choosing the Right Business Entity,” I will walk through the issues that matter most...

Ethical Billing in t...

Protect your practice from the ethical vulnerabilities of AI by mastering Model Rules 1.1 and 1.5. T...

Cybersecurity Compli...

This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...

Escaping the Perfect...

 “Everyone tells me I’m doing a great job. My clients, my colleagues, my family. Wh...