Skip to main content

Not Found
Text-Based CLE

Faculty:
Roy Ginsburg
Duration:
1:00
Short Description:
The representation of women and minorities in major U.S. law firms, especially at the partnership level, remains abysmally low. The numbers indicate that relative to the overall population (half women; one-third minority) and that of the demographic makeup of law students, women and minorities continue to be under-represented among the partnership ranks at major law firms. According to the latest

Not Found
Text-Based CLE

Faculty:
Roy Ginsburg
Duration:
1:00
Short Description:
During the past 3-4 decades, achieving diversity in the legal profession has been the goal of many within, as well as outside, of the profession. If you google the terms “diversity” and “legal profession,” there are over a million and half results. Many of them describe the efforts of the American Bar Association (ABA), numerous state and local bar associations, law firms,

Not Found
Text-Based CLE

Faculty:
Mark Rosch |  Carole Levitt
Duration:
1:00
Short Description:
Lawyers looking for evidence need to start thinking about looking "virtually." With increasing amounts of "paperless" information being added to the Internet every minute of every day, there is an increasing chance lawyers could find potentially relevant evidence there. Evidence to prove or refute a point in contention, get the upper hand in a settlement conference, or decide w

Not Found
Books

Author:
Sharon D. Nelson, Esq. |  John W. Simek
Publication Date:
Jul 02, 2019
Short Description:
The popular annual guide to legal technology is back with its 2019 edition. The Solo and Small Firm Legal Technology Guide is the only book of its kind that helps solo and small firm lawyers find the best value for their dollars in legal tech. In clear, understandable language, that authors give a vendor-neutral overview of and recommendations for computers, servers, networking equipment, legal software, printers, security products, smartphones, tablets, and more.

Not Found
Books

Locked Down

Practical Information Security for Lawyers

Author:
Sharon D. Nelson, Esq. |  John W. Simek
Publication Date:
Aug 07, 2016
Short Description:
In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard client data and confidential information? This second edition of Locked Down explains the wide variety of information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget. Written in clear, non-technical language that any lawyer can understand, this book will help you:

Not Found
Books

Author:
Sharon D. Nelson, Esq. |  John W. Simek
Publication Date:
Jan 07, 2016
Short Description:
Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client's information as well. Fortunately, easy-to-use options are available today for encryption.

Not Found
Books

The Cybersleuth's Guide to the Internet

Conducting Effective Internet Investigative and Background Research

Author:
Mark Rosch |  Carole Levitt
Short Description:
Short Description

Not Found
On Demand

Faculty:
Daniel J. Siegel, Esq.
Duration:
1 Hour
Format:
Audio and Video
Short Description:
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information. This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...

Not Found
On Demand

Faculty:
Katy Goshtasbi, Esq. |  Janice Walshok
Duration:
1:00
Format:
Audio and Video
Short Description:
Everyone has biases. It’s natural. While me might recognize our own explicit biases, the unconscious nature of implicit bias makes them easier to ignore. Unfortunately, ignoring our implicit biases impacts not only our practice success, but our entire life and reputation.   When we are able to recognize our own biases, and those of others, we can be in control of changing systematic biases within our workplace and society...

Not Found
On Demand

Faculty:
Sharon D. Nelson, Esq. |  John W. Simek
Duration:
1 Hour 1 Minutes
Format:
Audio and Video
Short Description:
One of the most overlooked aspects of security is training for employees. Employees are unwittingly involved in more than 80% of successful attacks. It has never been more critical for organizations to implement effective risk mitigation strategies, enhance security posture and protect information assets – which is hard to do without educating your employees. This is very important training

Please wait ...

Back to Top