Science And Technology CLE
Quimbee's science and technology continuing legal education (CLE) courses deliver the content lawyers need with engaging videos that are fun to watch.
Start your free 7-day trialQuimbee's science and technology continuing legal education (CLE) courses deliver the content lawyers need with engaging videos that are fun to watch.
Start your free 7-day trialQuimbee Science and Technology Law Online CLE
If you're looking for a simple, engaging way to learn about science and technology law and fulfill your continuing legal education (CLE) requirements, look no further than Quimbee CLE online.
All Quimbee CLE online courses are built from the ground up by our world-class team of attorneys and designers. Our goal is to create a product that will not only help you meet your CLE requirements but will actually be enjoyable. Sign up for a Quimbee CLE course today!
Science and Technology Law Overview
Science and technology law is the study of how scientific and technological research and findings play into the legal process. For example, science and technology law can be used to study transactions involving technology and intellectual property. These transactions can be joint development projects, collaboration arrangements, and IP licensing. Technology transactions typically include products such as information technology, semiconductors, computers, and software.
Since the rise of widespread, high-speed internet access over the past two decades, the purview of technology law has grown exponentially. Many science & technology lawyers serve as de facto general counsel for the startups they advise. These lawyers might be involved in issues ranging from IP audits to mergers and acquisitions, to initial public offerings (IPOs).
Who Should Take CLE Courses in Science and Technology Law?
As one of the fastest-developing areas of law, science and technology law requires vigilance among its practitioners. Not only must science and technology attorneys be aware of new laws relevant to their work, but they must also stay abreast of the latest technological advances that could create entirely new markets. Quimbee CLE may not be able to help science and technology attorneys predict the future of innovation, but we can provide efficient, effective courses on technology law that will help lawyers fulfill their CLE requirements while staying updated on the newest developments in the law.
Do you friend, tweet, connect, or blog with colleagues, friends, clients, and others? If so, have you installed an automatic mental pause button before posting on social media? Are you now wondering about where and why to find said pause button? Well, you have come to the right course because we will explore the answers to these questions and more as we journey to uncover the impact of social media upon the practice of law. After a bit of historical context, the course will reveal why today’s lawyer must be imbued with social media savvy in order to effectively represent clients, market a law practice, and avoid ethical landmines that endanger a lawyer’s license to practice law.
Attorneys in firms of all sizes – from solo practitioners to lawyers are multinational Big Law firms - face a number of ethical issues relating to cybersecurity, and preserving the confidentiality and security of their clients’ data. Contrary to what some lawyers may believe, law firms are often a valuable target for hackers because they can hold vast collections of sensitive and highly valuable client-related data. These cybersecurity threats come from individual hackers, international cybercriminals, and even a firm’s own attorneys and other employees. This program provides a basic primer on attorneys’ ethical obligations to understand and address the cybersecurity risks they face, and provides practical advice for attorneys in addressing issues that arise will undoubtedly arise in their legal practice.
This course is designed to address the various evidentiary issues that arise with electronic evidence. For example, the presentation will cover the use of social media as evidence and how it is obtained and introduced into evidence. There will be a discussion of some of the preliminary evidence rules that are sometimes overlooked that can apply to social media and other electronic evidence. Issues with juries using social media during trial will also be covered. There will be a general discussion of the application of the hearsay rule to electronic evidence, and how to lay the proper foundation. Rules regarding spoliation of electronic evidence and the effect will be examined. The presentation will also deal with statutory provisions regarding discovery electronic information from third party providers. With the increased use of e-signatures, there will be coverage of issues that arise when introducing a document that has been electronically signed.
Cyber-based claims are an exponentially growing threat to attorneys. Cyber risks touch on every area of practice and overlap with the two greatest sources of professional risk to attorneys – ethical obligations and legal duties to clients. This course explores the basics of legal malpractice claims along with corresponding ethical considerations in the context of the cyber threat while providing practical advice for anticipating, mitigating and surviving cyber risks and related claims. Cyber-based causes of action, common defenses and jurisdictional considerations will be reviewed as well as risk management techniques and best practices, including an overview of how to develop a cyber risk management team and plan.
This CLE explores the Federal Rules of Evidence applicable to digital evidence. Attendees will learn about relevant case law and how to authenticate or challenge the admission of digital evidence at trial. We will explain how to use digital evidence effectively at trial and how to incorporate it into an overarching story or theory of a case. In Section 1, attorneys will be introduced to the topic and the types of evidence that will be covered in the presentation. Section 2 covers the applicable rules of evidence in the Federal system, particularly rules 901, 801, 803, and 703. Section 3 explores ideas in how to present digital evidence effectively to a judge or jury.
More and more homes contain smart devices: Amazon Alexa, Google Home, Nest Thermostat, Smart TVs, Roombas, and more. These devices store all kinds of activities and send that data to the cloud. This CLE explores the types of data available, looks at some cases where that data was used, and discusses the law regarding the collection of this type of data. Section 1 is an introduction to the CLE and covers some definitions relevant for the presentation. In Section 2, explore a variety of cases involving internet of things devices. In Section 3, attorneys will learn how to obtain data from various devices.
The purpose of this class is to educate legal professionals on how cell phone forensic evidence is extracted from cell phones, tablets, and other mobile devices. Explanations will be given on what is in accordance with forensic best practices, and how this evidence is properly preserved. In addition, attendees will learn about the fragile nature of digital evidence, and the extent to which this information can be changed if not handled correctly. Attendees will learn the types of evidence that can be recovered from cell phones, including location-based information, messaging application data, voicemails, multimedia such as photos and videos, meta-data, and more. The different forensic artifacts will be explained in detail. Given the rising instances of fake text messages and call spoofing, a section of this class will explain how this is commonly done, even by people with little technical knowledge, and how an investigation is performed todetermine the authenticity of such evidence. Upon completion of this class, attendees will have a working knowledge of how cell phone forensic data collections are performed, the types of forensic artifacts that are recoverable, how data is authenticated, and how such evidence can be used for their purposes when working a case.
Electronic communications and e-signatures have amplified the speed and number of contracts entered into everyday. The rapid changes in technology have also imposed rapid changes on a legal system that is traditionally slow to adapt - the Uniform Electronic Transaction Act has been implemented in almost every state for close to 20 years, yet many attorneys still insist on printing, signing and scanning signature pages. In this CLE course, attorney and eDiscovery specialist Aaron Cronan will cover some of the most important implications for contract formation and enforcement in the digital age. He will focus on a legislation overview, electronic signatures, Statute of Frauds, UCC, assent of the parties, Browser/Clickwrap, and best practices. This session will include examples and case law from across the county to identity trends and traps.
This class will explain the evolution of computer forensics into what is now known as digital forensics. As a part of this class, attorneys will learn about the foundations of digital forensics, including how digital evidence should be collected, forensically acquired (copied), preserved, examined, and analyzed. The class then uses numerous case examples to explain different forensic artifacts and how they can be used in cases. Evidence types include metadata, internet history, communication artifacts, searches, multimedia, location evidence, and much more. Actual case examples are utilized to illustrate the usefulness of these forensic artifacts in litigation. Attorneys will also learn the difference between an information technology expert and a digital forensics expert, with case examples illustrating the problematic outcomes of having information technology experts attempting to testify about digital forensics.
Business mergers and acquisitions are complicated transactions for any attorney representing a buyer or seller, but there are special challenges when representing a client who wishes to buy or sell a Web-based business. Unlike their “brick and mortar” counterparts, the assets of a Web-based business are primarily intangible and can easily lose value – or disappear entirely -- when the business changes hands. Making sure that all of the seller’s web domain names (URLs), e-mail and e-commerce accounts, social media pages, and web traffic transfer smoothly to the buyer without interruption requires an in-depth familiarity with Web-based businesses and how they operate. In this fast-paced presentation, hosted by a leading small business attorney, author of “Advising eBusinesses” and nationally syndicated legal columnist who has helped dozens of clients buy and sell Web-based businesses over the past 10 to 15 years, you will learn how to handle the special issues involved in selling and buying such businesses so that your M&A transactions close smoothly, on time, every time.
Our world is becoming increasingly hyper-connected. The objective of the Internet of things is for everything to communicate and interface with everything. From wearable technology and smart home assistants, to Internet connected medical ingestibles and social credit scores, more data is being collected about us than ever, and this data can and is being used in litigation. This course will explain how this data is collected from the Internet of things devices, and the places that they store data such as the cloud, cell phones, and computers. Cases involving Internet of things devices such as digital pacemakers, fitness wearables, and smart home assistants will be discussed, with an eye to the future of how this data will become more prevalent and pervasive.
Before the Internet, there was no such thing as cybersquatting. But once the Internet came into existence, domain-name disputes soon followed. Although cybersquatting does not fit into the traditional trademark paradigm, in 1999 Congress passed The Anti-Cybersquatting Consumer Protection Act ("ACPA"), 15 U.S.C. 1125(d), and it became part of the Lanham Act, 15 U.S.C. 1051 et seq., which is the primary federal trademark statute in the United States. The ACPA established a legal recourse for entities who are the victims of others registering, trafficking in, or using a domain name that is confusingly similar to, or dilutive of, an entity's trademark or a person's name. In this "Introduction to Cybersquatting", attorneys learn the origins and history of cybersquatting, as well as the elements of the cause of action. Participants will also analyze several cases in which courts have addressed cybersquatting at various stages of litigation.
Lawyers generate tons of paper. Receiving, reviewing, producing, sharing, filing, and retrieving paper documents has a huge cost to a practice, whether it is a solo or small firm, a large firm, a corporate legal department, or a government or public interest office. Fortunately, lawyers can save time and money by transitioning to a paperless office. In fact, during the pandemic, lawyers quickly realized that if their offices were not digitized – that is, every document scanned and available for viewing online – they were not able to function. This course will take users through the basics of becoming paperless and highlight the benefits of a digitized workflow. You’ve put it off for years. It’s time to learn how reducing the amount of paper in your practice will increase your productivity.
e-Discovery has exploded onto the scene of commercial litigation. From its rudimentary beginnings around the start of the 21st Century, it has now become a major component of such litigation. Some have even dubbed it “The Tail that Wags the Dog in Complex Commercial Litigation.” In this Introduction to e-Discovery, attorneys learn e-Discovery from both the vendor’s and the litigator’s perspective. Participants will analyze several cases in which courts have admonished, sanctioned, or ruled harshly against attorneys who have been nonchalant about preserving, collecting, reviewing, or producing e-Discovery.
From Jones to Riley to Carpenter, the Supreme Court has changed the landscape of 4th and 5th Amendment law in the digital realm. This CLE will explore the effects of these landmark cases and identify areas of further challenges for the defense. Attendees will learn about how courts are applying the 4th and 5th Amendments to new forms of digital evidence and will learn to spot potential Constitutional Issues involving digital devices. Section one will take a look at the three seminal cases from the US Supreme Court dealing with digital evidence: Jones, Riley, and Carpenter. Section two will review cases based on Carpenter, and its impacts on various platforms such as Google and Facebook. Section three covers current case law regarding compelling suspects to turn over passwords or fingerprints to unlock cellphones.
This course is designed to give guidance to lawyers on various issues under the umbrella of technology law. In every aspect of a lawyer’s career, technology plays a role. Technology is so important to today’s lawyer that state bar associations are starting to add a technology element to required CLEs. This course provides a summary of issues related to counseling clients in content of technology-related contracts, document retention policies, and e-discovery issues should litigation ensue.
Cyber attacks threaten all businesses and, sooner or later, every business finds themselves to be the victim of one. Responding to a cyber incident quickly and effectively can help businesses avoid substantial fines and litigation. But how do you prepare? By using facts and scenarios from actual cases, and reviewing the latest developments in the law, this course will provide practical advice for attorneys in helping their clients prepare for and respond to a data breach.
Have you ever wondered which laws and rules govern space activity? This course will provide an overview of the different ways that international, national, and state authorities regulate space travel and exploration, basic terminology, and jurisdiction. It will also cover licensing procedures for commercial space travel.
Amidst a pandemic quickly turning endemic, people are learning the value and power of the virtual world, from education to work to healthcare. A doctor on vacation in Hawaii conducts a follow-up appointment with her 83-year-old cancer patient in New York City while a Florida Cardiologist checks in to see why his patient in Nevada has such a low heart rate at the moment. These are just some of the exciting ways that telehealth can benefit patients and providers, but what are the rules in this fast-changing environment? This course will provide you with the tools you need to advise your clients on the legal and regulatory aspects of telehealth from both a federal and state perspective.
Have you ever thought about what is stored in your mobile phone, smartwatch, or laptop when you travel, and who can access that information? This course will address the current state of the law governing searches of international travelers’ electronic devices at the U.S. border. The course will then discuss the changing legal landscape in light of technological advancements in the amount of digital data that people carry with them when they travel.
As drone technology continues to evolve and drones evolve from novelty items to a central part of business operations in a variety of fields ranging from logistics and public utilities to real estate and construction, commercial drone operators must ensure that their operations comply with emerging federal drone privacy law. In this overview of the provisions of the FAA Reauthorization Act of 2018 governing the privacy practices of commercial drone operators, we cover key provisions governing operators’ privacy policies and compliance with the emerging patchwork of state and local information privacy and security laws. We also address emerging issues in federal preemption law related to the applicability of state and local information privacy and security laws to the aviation sector.
Telehealth has exploded in recent years due to the COVID-19 public health emergency, although it has been around for a number of years. Similarly, telepharmacy is currently growing at a rapid pace, however, many states still have not adopted this practice yet or are not aligned with each other regarding the types of telepharmacy services that should be permissible. During this session, we will move through the timeline of how telehealth and telepharmacy first began, where the industries are now, and how much further we have to go. We cover the law, the practice, and the money to help stakeholders understand all considerations that are at play when thinking about telehealth and telepharmacy.
In 2012, the American Bar Association implemented “technical amendments” to a number of the Model Rules of Professional Conduct in order to address the evolution of technology in legal practice and the obligation to secure client data. We will discuss the amendments, subsequent ABA Formal Opinions clarifying the Rules’ application in practice, and basic steps needed to comply with the Rules. We will cover measures to secure the confidential client data on your firm network, individual computers, and mobile devices.
This course is designed to expand on various issues under the umbrella of technology law. In every aspect of a lawyer’s career, technology plays a role. Technology is so important to today’s lawyer that state Bars are starting to add a technology element to required CLEs. This course provides a summary of issues related to e-discovery issues should litigation ensue and addresses attorney duties in regards to data security.
This course will review the practical and legal principles involved in determining whether, and to what extent, space flight participants can recover from commercial human spaceflight companies for injury or death. It will cover common definitions, including commercial spaceflight operators and participants, state and federal statutes, and common law doctrine. It will then provide frameworks for weighing factors that may come into play when negligence occurs in commercial spaceflight.
This course will address the impact of artificial intelligence (AI) on civil rights and civil liberties in the United States. AI issues constitute a fast-changing legal landscape in which courts and regulators are attempting to keep pace with rapid technological changes. Automated decision systems now affect the housing, employment, education, and credit opportunities people are given. They also affect liberty and due process rights when used by government agencies. This course will provide an overview of key legal issues that are emerging in civil rights and liberties contexts because of the use of artificial intelligence.
Ransomware permeates the news. But what do you really know about it? Well, if you watch this three-part series, the answer will be a lot. We will talk about ransomware, how to respond, how to report, and how to take steps to minimize the impact of an attack. In Part 1, we will talk about ransomware and how to respond to an attack.
Now you know about ransomware. You know the types, you know how the attacks work, and you know what to do and not do in response to an attack. But so far, we’ve focused on how to stop the attack and resume operations as soon as possible. But in most cases, a ransomware attack also impacts individuals outside of an organization – customers and clients.
Now you know about ransomware. You know the types, you know how the attacks work, and you know what to do and not do in response to an attack. (Part 1) And you know how to message the attack, when to report to the FBI, and how to negotiate a ransom demand (that is if you watched Part 2). Wouldn’t it have been nice to avoid all of that? While no one can guarantee a ransomware attack won’t occur, your organization can take steps to minimize the likelihood of one happening and minimizing the impact if one does. Interested? Then watch part three of this three-part series.
Determining the location of an individual at a specific point in time can make or break a case. You can use location data to present an alibi in defense, discredit a witness or party, show how long someone was on the road prior to a crash, establish where a digital contract was signed, and more. This unique webinar will show you how to find and use location data in your case. We will answer your live questions, and walk through realworld location analysis. You will come away knowing where to find data to support your case, as well as how to analyze some of the data yourself.
The term “5G” has become ubiquitous in recent months, appearing in everything from technology news reports and discussions on national security to wireless carrier advertising campaigns. Along with widespread marketing campaigns has come a crush of land use applications by carriers seeking to install small cell facilities in the public rights-of-way as well as to upgrade existing rooftop and tower sites with 5G equipment. This has caused concern and anxiety among many local land-use officials who are unsure of how to handle the expanded number of applications. This course begins with a brief overview of the wireless telecommunications space. We then dive right into current developments in the telecommunications industry, including new and updated federal laws and regulations, and how they impact a local jurisdiction’s capacity to manage its own rights-of-way, and to draft land use regulations that hold up against federal telecommunications preemptions. This course will benefit municipal, county and state level attorneys, local land use boards and their counsel, zoning board attorneys, as well as county and state counsel and private land owners with cell towers on their property: that is, it will benefit anyone who deals with wireless communications facilities on a proprietary or regulatory level.
Over the course of the past few decades, the proliferation of internet connectivity and new technology has allowed stalkers to terrorize their victims from afar. Many state stalking laws are difficult to apply in the best of circumstances, but cyberstalking is often more anonymous, and a stalker’s identify can be hard to prove. This program will discuss the law that applies to stalking, special considerations when cyberstalking is involved, and strategies for collecting, preserving, and preparing to introduce evidence of cyberstalking.
NFTs have been all over the news lately. You have likely heard about them but do you really understand how they work and the intellectual property issues that can arise with their use? This program will provide a clear explanation of what NFTs are and the underlying technology so you can more fully understand how they work and what you need to know to provide NFT-related legal advice. This program will also cover key issues with IP protection and enforcement, NFT license and partnership agreements and provide a summary of real world examples of IP-related legal disputes with NFTs and practical advise for avoiding such disputes.
Web3 has become an oft used buzz word. But what exactly is it, how will it drive new business models and what are the legal issues that will ensue? This course will break down the meaning of Web3 and explore how decentralization and community governance will be at the center of this revolution. It will cover the role of blockchain technology in the Web3 ecosystem, including NFTs, DAOs and metaverses. One of the things that makes Web3 more revolutionary than evolutionary is the need for companies to significantly change their business models. The course will address the Web3 business models and explore the different business considerations facing Web2 companies versus Web3 companies. One of the key business issues is the changing role of IP rights and monetization in these business models. This will lead us into the fascinating legal issues that arise in the Web3 world. We will cover IP issues and the challenges that companies are facing and will continue to face in Web3. We will also cover the approaches to regulating decentralized, community based projects and other related legal issues. Lastly, the course will consider whether Web3 is elusive (in the near term) and whether for business and legal reasons the world will have to settle for Web2.5.
With legal practice reforms enabling law firms to build their tech stacks and scale their services, coupled with the accelerating rate of innovation, now more than ever, embracing technology is necessary for legal practitioners to stay afloat in the era of digitalization. This 1-hour long CLE will explore how technology is the reshaping of key elements of the law firm business model and what lawyers can do to future-proof their practices and mitigate the problems that most firms and practitioners face today.
The promise of autonomous vehicles has been discussed for decades, but technological advancements have turned this vision into reality. Like with many new technologies, the law and societal acceptance are still working to catch up to reality. This presentation will provide an overview of the current state of the law, consider the regulatory divide between federal jurisdiction and state jurisdiction, and provide insight on where the law may be going. The presentation will also provide an opportunity to consider the open questions of liability and insurance for situations in which there is no human driver.
No longer merely a sci-fi concept, the Metaverse has become the latest iteration of the Internet for businesses, employers, and social gatherings. With a variety of tech companies creating Metaverse platforms, companies hosting virtual reality workspaces, factories setting up shop with digital twins, and groups socializing at simulated concerts, lawyers must take the reins in guiding how this new world is regulated. The body of Internet Law is constantly evolving, especially due to the fast-moving nature of technology. The Metaverse is gaining in popularity, and before universal adoption, we must consider the legal concepts necessary for this immersive, virtual world - and the ethical dilemmas it already faces.
This course discusses the rules surrounding audio recordings, the wiretap act and video and audio surveillance. The course details the basic statutory and common law rules regarding private party surveillance and how that applies to civil litigation.
Blockchain technology and cryptocurrencies present many complicated legal issues and attorneys need to be aware of these issues to provide competent legal representation. In addition, blockchain technology and cryptocurrencies are creating a new area of law that presents an excellent opportunity for attorneys looking to expand their practice or to be seen as a legal thought leader in their organization.
This course further expands the principles learned in Part I by comparing the statutory framework to common law invasion of privacy. This course will address how both those systems interplay with new technology such as social media, GPS tracking devices, facial recognition, and drone technology. These rules will center on their applicability to private party surveillance as opposed to government surveillance and how it affects civil litigation.
“The metaverse is the new virtual and visual frontier, a user-interactive digital environment based in computer-generated spaces of augmented and virtual realities in which visual imagery predominates, cryptocurrency is lucre and NFTs are fashion and decor." 1 The technology is new but the legal rights regulating imagery and art are not new-- copyright, trademark, publicity rights. We will discuss art, sports, entertainment and rap examples of how rights owners, including Quentin Tarantino and Pulp Fiction, Andy Warhol and Prince, rapper Lil Yachty, heirloom and iconic brands like Hermes, Patek Philippe, Cartier and Bulgari, are asserting their claims and defenses in the metaverse world of appropriation. This presentation connects the Andy Warhol fair use case [Section 107 of Title 17 of the US Code] before the U.S. Supreme Court with appropriation concepts in metaverses and NFTs and other appropriation types of litigation in copyright and trademark infringement, publicity rights, unfair competition. Participants will gain a general understanding of what they need to know in this evolving technology space to ethically and responsibly advise clients in a climate of rapid change and inconclusive precedent.
Internet based technologies, such as email, document management software, teleconferencing, and ediscovery, for all their upsides, are in fact making it harder to do diligent lawyering. This course analyzes how technology has changed the way lawyers work and even think, and how some basic rules of evidence can no longer be followed. Due to professional pressures we are forced into technologies we don’t need and forced to practice in sloppy ways where mistakes are more likely. We are increasingly surrounded by “dark matter”, case file materials or relevant evidence which cannot be accessed and which we may not even know exists. Strange as it might seem much of our time now is waiting for software to execute, time which we cannot devote to other matters. The presentation ends with simple suggestions on how to get the digital beast under control.
On May 1, 2020, the U.S. Department of Health and Human Services (HHS) implemented a paradigm shift in the manner in which patient electronic health information (EHI) is accessed, used, and disclosed through its publication of the Information Blocking Rule. Shifting from a landscape dominated by the Health Insurance Portability and Accountability Act (HIPAA), which imposed a permissible data disclosure framework under its Privacy Rule, the newly passed Information Blocking Rule imposes mandatory disclosure requirements on healthcare actors. Implementing the Information Blocking Rule’s requirements has proven challenging to many health care actors, who still struggle to achieve compliance amidst the shifting regulatory standards. This CLE provides an overview of the Information Blocking Rule and its exceptions, highlights common compliance challenges that have arisen in the information blocking context, and proposes risk mitigation strategies to help health care actors achieve compliance.
This one hour presentation will highlight some of the legal issues arising out of the use of social media both in the workplace and off duty. We will consider the various considerations affecting both employers and attorneys when monitoring and reviewing social media activity. Attorneys who take this course will be better able to identify some of the many legal risks related to the use of social media and will be better able to mitigate those risks.
Through the context of a mock technology-assisted deal, this hour-long presentation aims to educate attendees on how to leverage technology to mitigate risk throughout the due diligence and deal closing process and why now, more than ever, embracing technology is necessary for legal practitioners to stay afloat in the era of digitalization.
For the past 10 years the DOJ has remained mostly silent on the issue of website accessibility, which silence has led to an onslaught of private litigation. However, in March of 2022, the DOJ publicly released its "Guidance on Web Accessibility and the ADA" purportedly establishing "how state and local governments and businesses open to the public can make sure that their websites are accessible to people with disabilities as required by the Americans with Disabilities Act (ADA).” This course will explore:
Depositions are an aspect of litigation that is fraught with ethical peril. There is little ability by the opposing party to regulate the preparation of the deponent, because the opposing party is not present. Unless the parties invite court intervention, no judge is present during the deposition itself to police the way the deposition is defended and taken. The format of online depositions present additional challenges. In this course we’ll discuss ethical traps for the unwary in the context of a realistic hypothetical employment discrimination case where online depositions are occurring
With legal practice reforms enabling law firms to build their tech stacks, coupled with the accelerating rate of innovation, now more than ever, embracing technology is necessary for litigators to stay afloat in the era of digitalization. This 1-hour long CLE will explore how innovation is the reshaping litigation practice. We will identify the pain points and risks that litigators face and how legal technology solutions can streamline workflows throughout the lifecycle of a civil action.
This one hour presentation will help lawyers regain control of their email inboxes and enhance their communication practices to adhere with ethical standards through the utilization of available technologies. We will discuss various legal ethical standards that apply to controlling your email inbox, while discussing ways to organize and sort your inbox. This course will also provide demonstrations of different software programs for both intra-office and client communications.
Professor Tim Chinaris, former Ethics Director of the Florida Bar, will explore how attorneys may find themselves facing ethical problems unknowingly and how to avoid these ethical traps. This course will discuss various ethics-related “technology traps” when getting, communicating with, and representing clients. The course will also analyze the various technological developments that are affecting the legal profession, including AI and technology-driven legal help websites.
Have you ever wondered how opposing counsel and experts view the same event? In 2017, a major nor’easter brought accumulating snow to much of the mid-Atlantic and Northeast. As a result of this storm, numerous slip and fall injuries on snow and ice created ongoing litigation. In this CLE course, a plaintiff’s attorney, a defense attorney, and an expert meteorologist will walk you through a hypothetical slip and fall case from their unique perspectives.
First, we will discuss the chronology of meteorological events that created the hazardous situation. Next, a plaintiff’s attorney will present their perspective, with a focus on when and how to retain and use a meteorologist expert. Lastly, the case will be presented from the perspective of the defense attorney, with a similar focus on the role of the meteorologist in slip and fall litigation.
AI-ChatGPT is sweeping the nation. It is one of the fastest growing platforms for personal and professional use. It can generate human phrased responses to questions and inquiries and so much more! But should lawyers jump on the bandwagon and use AI-ChatGPT in their practice? What are the ethical implications for lawyers using AI-ChatGPT? This seminar will answer these questions and more. There are many items that lawyers should be aware when using AI-ChatGPT. This is a seminar you will not want to miss to stay current on the latest and new technology.
Artificial Intelligence (AI) is has unquestionably penetrated into the practice of law. In today’s hands-on course, attorneys will experience a detailed demonstration of what AI can do and how its use can be relevant to the practice of law. While AI can function as an aid to attorneys, there are limitations to AI that must be recognized. This course will help attorneys understand how to carefully use AI in their practice.
This course will take a deep dive into various legal technology used in law firms today, specifically addressing the efficiency of such technology, the ethical implications created by using this technology, and compliance considerations when managing data. We will also discuss legal analytics to address how and why law firms use them. This course will also provide practical considerations for using technology tools to establish law firm processes and review best practices for attorneys when working virtually.
In this course, attorney Michael Overly of Foley & Lardner LLP, will provide an overview of cybersecurity risk and response. This course will explore the ethical implications of attorney duties in regards to data breaches, virtual practice, and competence in the use of technology. when We will discusses the sources of cyber risk and how to manage them, including the human factor involved as both the greatest risk and first line of defense. Finally, this course will review the basics of developing a cybersecurity program.
In order to navigate some of the legal challenges that come with new tech, you must understand the hidden biases in artificial intelligence systems and their legal impact. This course will dive into how AI discrimination occurs and its real-world consequences. We will review practical advice and strategies for avoiding discrimination when using AI.
In today’s digital landscape, data breaches are an ever-present threat. This course provides a comprehensive guide to understanding and preparing for data breaches. Participants will learn what constitutes a data breach, explore two common types of breaches, and develop strategies to effectively plan for and mitigate their impact. The course emphasizes proactive measures to limit the likelihood of unauthorized access and reduce potential harm in case a breach occurs. Equip yourself with the tools to safeguard sensitive information and protect your organization’s reputation.
Do you friend, tweet, connect, or blog with colleagues, friends, clients, and others? If so, have you installed an automatic mental pause button before posting on social media? Are you now wondering about where and why to find said pause button? Well, you have come to the right course because we will explore the answers to these questions and more as we journey to uncover the impact of social media upon the practice of law. After a bit of historical context, the course will reveal why today’s lawyer must be imbued with social media savvy in order to effectively represent clients, market a law practice, and avoid ethical landmines that endanger a lawyer’s license to practice law.
Attorneys in firms of all sizes – from solo practitioners to lawyers are multinational Big Law firms - face a number of ethical issues relating to cybersecurity, and preserving the confidentiality and security of their clients’ data. Contrary to what some lawyers may believe, law firms are often a valuable target for hackers because they can hold vast collections of sensitive and highly valuable client-related data. These cybersecurity threats come from individual hackers, international cybercriminals, and even a firm’s own attorneys and other employees. This program provides a basic primer on attorneys’ ethical obligations to understand and address the cybersecurity risks they face, and provides practical advice for attorneys in addressing issues that arise will undoubtedly arise in their legal practice.
This course is designed to address the various evidentiary issues that arise with electronic evidence. For example, the presentation will cover the use of social media as evidence and how it is obtained and introduced into evidence. There will be a discussion of some of the preliminary evidence rules that are sometimes overlooked that can apply to social media and other electronic evidence. Issues with juries using social media during trial will also be covered. There will be a general discussion of the application of the hearsay rule to electronic evidence, and how to lay the proper foundation. Rules regarding spoliation of electronic evidence and the effect will be examined. The presentation will also deal with statutory provisions regarding discovery electronic information from third party providers. With the increased use of e-signatures, there will be coverage of issues that arise when introducing a document that has been electronically signed.
Cyber-based claims are an exponentially growing threat to attorneys. Cyber risks touch on every area of practice and overlap with the two greatest sources of professional risk to attorneys – ethical obligations and legal duties to clients. This course explores the basics of legal malpractice claims along with corresponding ethical considerations in the context of the cyber threat while providing practical advice for anticipating, mitigating and surviving cyber risks and related claims. Cyber-based causes of action, common defenses and jurisdictional considerations will be reviewed as well as risk management techniques and best practices, including an overview of how to develop a cyber risk management team and plan.
Become a member and get unlimited access to our massive library of law school study materials, including 1,295 video lessons and 7,000+ practice questions in 1L, 2L, & 3L subjects, as well as 46,300+ case briefs keyed to 988 law school casebooks.
Quimbee’s professional development courses are available exclusively to CLE Unlimited subscribers. Start your free trial now to unlock access to this course and Quimbee’s entire library of CLE programs.
Try CLE Unlimited for FreeCancelIt looks like your session has changed, probably due to logging in or out in another tab or window. If you were in the middle of doing something, the action may not have been saved. We highly recommend that you refresh the page and log in again if necessary.
Refresh