Defamation Law has its origins in church doctrine and has undergone various significant changes over the last nearly 1,000 years. Because the action in the United States is based on state law, the elements one will need to prove may differ depending on the jurisdiction. In this Overview of Defamation Law, attorneys he presentation discusses both recent articles and cases addressing various aspects of a Defamation claim, including jurisdiction, venue, the requisite elements, and what is need to have success at summary judgment.
This program provides a basic overview of business bankruptcy, from both the troubled business’s perspective and the creditors’ perspective. We will discuss common reasons why businesses file bankruptcy, and the objectives that businesses seek to achieve through bankruptcy. We will also discuss the basic “nuts and bolts” of bankruptcy, including the automatic stay, the treatment of executory contracts and unexpired leases, Chapter 11 plan confirmation requirements, and preference and fraudulent transfer actions.
In this course, attorney and forensic expert Mark Silver delves into criminal mitigation strategies for the client suffering from Borderline Personality Disorder. Borderline Personality Disorder is among the least understood, and yet perhaps the most important mental health issues for criminal defense lawyers. As many as 6% of the population carry the diagnosis of Borderline Personality Disorder and the criteria for this mental health issue provide profound understanding regarding the criminal defendant's decision-making, behaviors and conduct, emotional instability, erratic conduct, impulsivity, depression and low self-esteem, and related matters. It is crucial for the criminal defense lawyer to be able to recognize borderline personality disorder in clients and know when to refer the case for an evaluation and/or how to use aspects of this disorder for mitigation purposes.Borderline Personality Disorder: Pre-plea and Pre-sentence Criminal Mitigation Strategies
Effective legal writing is a necessary skill in the practice of law and lawyers do tend to write well. However, regardless of how effective a lawyer’s writing skills are, there is always something useful to be gained from a review of effective writing guidelines and advice. This presentation describes the basics of legal writing. All other types of legal writing are built on these basics. Several specific types of legal writing are then addressed with guidelines and ideas to help your writing remain effective.
This course provides an advanced overview of criminal mitigation as a key strategic tool for criminal defense lawyers, and reviews various humanizing processes that a criminal law attorney can utilize to better advocate for his or her client. Mr. Silver discusses how the use of psycho-social analysis, which can also impact the factual analysis of the case, can provide a more positive and informed narrative of a client and increase their chances of success in the courtroom. Both experienced and novice lawyers will gain important insight into various criteria to consider and deploy at the pre-sentence or pre-plea stage of representation.
National attention has addressed the pay gap for women. Beyond that, there is an information gap, a power and understanding gap, and common perceptions of femininity that have resulted in institutional disadvantages for female attorneys, especially litigators. This program exposes nationwide statistics regarding the wage gap between female and male attorneys and pays special focus to recent academic and bar association studies addressing gender differences in the profession. The course also addresses practical ways to overcome this gender gap, including negotiation strategies and skills to foster leadership and opportunities for professional development. The goal of this program is not just to raise awareness of the issue but to also offer its participants the opportunity to solve the problem.
Do you friend, tweet, connect, or blog with colleagues, friends, clients, and others? If so, have you installed an automatic mental pause button before posting on social media? Are you now wondering about where and why to find said pause button? Well, you have come to the right course because we will explore the answers to these questions and more as we journey to uncover the impact of social media upon the practice of law. After a bit of historical context, the course will reveal why today’s lawyer must be imbued with social media savvy in order to effectively represent clients, market a law practice, and avoid ethical landmines that endanger a lawyer’s license to practice law.
From Jones to Riley to Carpenter, the Supreme Court has changed the landscape of 4th and 5th Amendment law in the digital realm. This CLE will explore the effects of these landmark cases and identify areas of further challenges for the defense. Attendees will learn about how courts are applying the 4th and 5th Amendments to new forms of digital evidence and will learn to spot potential Constitutional Issues involving digital devices. Section one will take a look at the three seminal cases from the US Supreme Court dealing with digital evidence: Jones, Riley, and Carpenter. Section two will review cases based on Carpenter, and its impacts on various platforms such as Google and Facebook. Section three covers current case law regarding compelling suspects to turn over passwords or fingerprints to unlock cellphones.
In this overview of trademark and trade dress law, we use famous and fun automobile cases to explore how trademark laws work in the realm of cars. We address the fundamentals of trademark law, including functionality, inherently distinctive trademarks, secondary meaning, and likelihood of confusion. We use fun car cases to explore the trademark limits of copying. And we see jurists sometimes disagreeing with each other on the role of trademark laws for automobiles. Along the way, we offer useful tips to protect and advise clients and prepare cases.
It is not always clear how a deposition or written discovery responses can be used by a party during an evidentiary hearing or trial. The applicable discovery rules provide guidance, but frequently the judge is unsure of what is and is not permissible, and whether the response even needs to be shown to the witness or whether the witness or opposing party is allowed to explain or rebut a discovery response. This presentation will discuss the permissible use of discovery responses and depositions under the applicable rules of civil procedure. Additionally, there will be a discussion of practical considerations for use of the discovery. Finally, this presentation will provide suggestions on methods to make the discovery responses more effective or useful at a hearing or trial.
This course is designed to address the various evidentiary issues that arise with electronic evidence. For example, the presentation will cover the use of social media as evidence and how it is obtained and introduced into evidence. There will be a discussion of some of the preliminary evidence rules that are sometimes overlooked that can apply to social media and other electronic evidence. Issues with juries using social media during trial will also be covered. There will be a general discussion of the application of the hearsay rule to electronic evidence, and how to lay the proper foundation. Rules regarding spoliation of electronic evidence and the effect will be examined. The presentation will also deal with statutory provisions regarding discovery electronic information from third party providers. With the increased use of e-signatures, there will be coverage of issues that arise when introducing a document that has been electronically signed.
Attorneys in firms of all sizes – from solo practitioners to lawyers are multinational Big Law firms - face a number of ethical issues relating to cybersecurity, and preserving the confidentiality and security of their clients’ data. Contrary to what some lawyers may believe, law firms are often a valuable target for hackers because they can hold vast collections of sensitive and highly valuable client-related data. These cybersecurity threats come from individual hackers, international cybercriminals, and even a firm’s own attorneys and other employees. This program provides a basic primer on attorneys’ ethical obligations to understand and address the cybersecurity risks they face, and provides practical advice for attorneys in addressing issues that arise will undoubtedly arise in their legal practice.
What is included in Quimbee CLE compliance bundles?
Our compliance bundles include a selection of courses that will meet all of your reporting requirements. The number of courses included in each bundle corresponds to the number of credit hours required in each state.
How much time do I have to finish the courses in my compliance bundle?
Once you buy a compliance bundle, you can finish the courses at any time. You will have access to each purchased course until its accreditation expires.
What if I want to take a CLE course that isn't included in my bundle?
Unlock the courses in your bundle and any other course in our CLE library for just $99 a year with CLE Unlimited.