Unfortunately due to varying requirements among State by State CLE approval authorities for prerecorded material, we are not able to offer CLE credit for recorded webinars. We can only offer CLE credit for the live sessions.
December 1, 2015
In today’s digital age, organizations are constantly faced with the risk of costly consequences from delay in the implementation of a defensible deletion program for their electronically stored information (ESI). As data accumulates, companies waste precious resources to maintain that data, at the expense of innovation and revenue. In fact, 96 percent of respondents to an industry survey agreed a defensible deletion strategy is “absolutely necessary” to reduce the costs and risks associated with information retention, according to an article by the American Bar Association.
October 8, 2015
Many companies have rolled out some form of B.Y.O.D. programs, some a little more thought through than others. However, much like the rogue IT group that takes a large corporation to the “cloud” over a weekend without consulting legal, there are serious ramifications a lax B.Y.O.D. program can have on both Information Security and eDiscovery.
June 3, 2015
Does your organization adequately protect private and confidential information? How would you respond to a loss or breach of data? Data security breaches surged last year, exposing tons of sensitive customer, employee and corporate information to hackers. These breaches pose significant risks as companies are faced with costly claims and loss of customer trust.
March 25, 2015
The rise of Bring Your Own Device (“BYOD”) practices around the world and the differing legal standards for how to address them can lead to potential difficulties for the eDiscovery and Privacy professional. Listed in 2014 by Law Technology News as the “number one e-discovery challenge for the coming years,” this new movement is likely to raise issues for your […]
January 21, 2015
The government relies on your company and employees to keep data secure. It is a daunting task. Even slight security failures could create real harm for your company. The headlines remind us that nations, cyber criminals, and rogue employees, are penetrating computer systems at an accelerating pace. Join us for the answers to 5 Key Questions: What steps should federal […]