Unfortunately due to varying requirements among State by State CLE approval authorities for prerecorded material, we are not able to offer CLE credit for recorded webinars. We can only offer CLE credit for the live sessions.
November 17, 2016
If your organization has implemented or is implementing an Information Governance program, congratulations! Information Governance programs are key to controlling legal and business risk by limiting how much data your organization holds, controlling where data is kept, and improving accessibility of important data. But, not so fast… has your organization actually achieved all of those things?
July 19, 2016
Most lawyers know that amendments were recently enacted to the discovery provisions of the Federal Rules of Civil Procedure, and much of the commentary on the amendments has taken the position that they will cure all of the present ills afflicting the discovery process. However, despite many useful improvements, the recent rule changes will have little to no effect on the manner in which discovery is conducted today without a corresponding change in discovery culture. For such a culture change to occur, lawyers must spearhead changes within their organizational clients that can ultimately lead to reduced costs, speedier resolutions, and better traction in court.
December 1, 2015
In today’s digital age, organizations are constantly faced with the risk of costly consequences from delay in the implementation of a defensible deletion program for their electronically stored information (ESI). As data accumulates, companies waste precious resources to maintain that data, at the expense of innovation and revenue. In fact, 96 percent of respondents to an industry survey agreed a defensible deletion strategy is “absolutely necessary” to reduce the costs and risks associated with information retention, according to an article by the American Bar Association.
October 8, 2015
Many companies have rolled out some form of B.Y.O.D. programs, some a little more thought through than others. However, much like the rogue IT group that takes a large corporation to the “cloud” over a weekend without consulting legal, there are serious ramifications a lax B.Y.O.D. program can have on both Information Security and eDiscovery.
June 3, 2015
Does your organization adequately protect private and confidential information? How would you respond to a loss or breach of data? Data security breaches surged last year, exposing tons of sensitive customer, employee and corporate information to hackers. These breaches pose significant risks as companies are faced with costly claims and loss of customer trust.