Bar Exam Toolbox Podcast Episode 301: Listen and Learn -- Professional Responsibility: Fee Agreements
ABA Sound Advice: Five Tips for Successful Local Counsel Engagements
A Primer on the Texas Bar Disciplinary System | Seana Willing | Texas Appellate Law Podcast
Digital Issues for Individuals Working at Home (Digital Planning Podcast)
Last year, the Illinois Judicial Conference Task Force on Artificial Intelligence (IJC) was created to develop recommendations for how the Illinois Judicial Branch should regulate and use artificial intelligence (AI) in the...more
Traduction en cours. Can the buyer in a M&A transaction who takes possession of the seller’s or target company’s privileged communications on closing use those communications in a post-closing dispute against the seller?...more
Lawyers, ask yourselves: Can I ethically connect my work laptop computer to an unsecured public Wi-Fi network? What data security measures are in place at the technology vendors that store and process my clients’...more
Confidentiality – Electronically Stored Information – Unauthorized Access - The State Bar of California's Standing Committee on Professional Responsibility and Conduct Formal Opinion Interim 16-0002 - Risk Management...more
With offices shuttered and stay-home orders still in place across much of the country due to the COVID-19 pandemic, the task of providing legal services means working from home for nearly everyone, including attorneys and...more
The Digital Planning Podcast is designed to educate individuals about all things digital in connection with estate planning, business planning and estate administration. Your hosts, Jennifer Zegel, Ross Bruch and Justin...more
Most attorneys are well aware of statutory obligations that require private and governmental entities to notify individuals of data breaches that involve the loss or disclosure of personally identifiable information. An area...more
In June 2017, companies, government entities, and law firms faced a global ransomware attack from a type of malware where attackers lock certain data or components of a system and demand payment in exchange for returned...more