Membership Video Library

Search
Exact matches only
Search in title
Search in content
Search in comments
Search in excerpt
Filter by Custom Post Type

9/3/2015

(September 3, 2015) Presented by Don Galvez, Esq., Alex Khoury, Esq. and Paul Zimmerman, Esq. via Webinar. In this 60-minute WebEx, our speakers discussed: What is Cyber Liability Insurance? How do you find the best Cyber Liability Insurance policy? How should you negotiate sublimits? How do you address coverage gaps? How can you curb risks going forward?


10/29/2015

(October 29, 2015) Presented by Judge Michael Putnam, Paul Zimmerman, Esq. and Melissa Rogozinski, Statewide in Alabama. In this 90-minute CLE, our speakers discuss: Acknowledging the Reality of ESI, Standard for Malpractice, Fear Factors, Competence & Cooperation, Preservation & Privilege.
Authentication




8/27/2015

(August 13, 2015) Presented by Don Galvez, Esq., Alex Khoury, Esq. and Paul Zimmerman, Esq. via Webinar. In this 60-minute WebEx, our speakers discussed how to prepare your cyber security plan by executing the following: Factors of good retention & deletion policies, Change default credentials and avoid shared credentials, Protecting against social engineering and manipulation and Creating an incident response plan,.


5/23/2014

(May 23, 2014) Presented by Marty Burke, Esq. and Randy Girouard, Project Manager in Birmingham, AL. A detailed who, what, when, where, and how introduction for identifying and interviewing custodians or persons of interest with access to data, where the data is located, and how it is used/backed up. Based on that information, Messrs. Girouard and Burke discuss the best practices for issuing a legal hold and employee education/privacy policies…


8/28/2014

(August 28, 2014) Presented by Carrie Fowler, Esq. & Susan Hammond, Esq. at ESI Roundtable’s 2nd Annual Hands-On Training Workshop in Birmingham, Alabama. #HOT14 provided law firms and corporations with eDiscovery training as well as the opportunity to dive into the most relevant and practical eDiscovery technologies available. It is predicted by 2017 that 55% of all US companies will phase out corporate-owned technology and will require employees to “Bring Your Own Device” (BYOD) (tablets, smart phones, and to a lesser extent desktop computers). Employee technology reimbursements or device subsidies in lieu of corporate owned technology will save substantial revenue; however, it poses risk consideration…


8/28/2014

(August 28th, 2014) Presented by Alex Khoury, Esq. at ESI Roundtable’s 2nd Annual Hands-On Training Workshop in Birmingham, Alabama. #HOT14 provided law firms and corporations with eDiscovery training as well as the opportunity to dive into the most relevant and practical eDiscovery technologies available. Data security is more than safeguarding records from hackers; it also protects data from misuse or unauthorized removal of information from a system. Hackers target law firms for access to high profile client data – such as insider information on mergers and acquisitions, trade secrets, patent information, financial records, medical records, other personally identifiable information, and litigation strategy…


ESI Roundtable

Community | Cooperation | CLEs

Contact Us

P.O. Box 1103
Birmingham, Alabama 35201
Phone: (205) 873-1234

On the Web

Follow us!

Simple Follow Buttons