Learn the ins-and-outs of collecting, analyzing, and recovering evidence from mobile devices. Discover how digital forensic capabilities have grown by reviewing real-world situations. What seems hidden may be revealed after all. Game on!
Participants can expect to learn the following during this session:
• Explore forensic process from preservation to reporting.
• Identify the latest types...
Join veteran attorney Cindy Sharp and certified contemplative practices teacher and attorney Becky Howlett as they unpack age bias in the legal field—what it is, why it matters, and ways to enhance collaboration across all age levels. Addressing ageism in the legal profession can strengthen cross-generational collaboration, meaning better service for clients and more fulfilling workplaces ...
Join veteran attorney Cindy Sharp and certified contemplative practices teacher and attorney Becky Howlett as they unpack age bias in the legal field—what it is, why it matters, and ways to enhance collaboration across all age levels. Addressing ageism in the legal profession can strengthen cross-generational collaboration, meaning better service for clients and more fulfilling workplaces ...
Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client's information as well. Fortunately, easy-to-use options are available today for encryption.
Social media sites such as Facebook, Twitter and LinkedIn have become part of every lawyer’s daily life, and they can be helpful tools for expanding your professional presence and marketing your practice, as well as valuable investigative tools. But the same ethical rules that govern lawyers’ conduct also apply to their use of social media, and that can raise some concerns for lawyers in their use of these tools.
This webinar will focus on the ethical use of LinkedIn as a ma
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...
In this program, attorney/songwriter Jim Jesse discusses the unique issues faced when representing an organization as a client, particularly one as unique as a musical group. in this case, Jesse uses The Beatles and Rolling Stones as examples. Picture yourself as General Counsel for the two biggest bands in the world. And there's plenty of overlap between the two bands...
In this program, attorney/songwriter Jim Jesse discusses the unique issues faced when representing an organization as a client, particularly one as unique as a musical group. in this case, Jesse uses The Beatles and Rolling Stones as examples. Picture yourself as General Counsel for the two biggest bands in the world. And there's plenty of overlap between the two bands...
Ethical conduct is a key to being an effective attorney. Each week we read about disciplinary cases where attorneys are suspended for misconduct involving clients, the courts, or other attorneys.
In this presentation we examine disciplinary cases involving the misuse of social media and the types of conduct that result in disciplinary action and suspensions. We will examine the rules of professional...