Safeguarding Against Financial Exploitation

October 28th, 2022|Categories: Featured On-Demand, HB Emerging Law Notes, HB Risk Notes, Risk-On-Demand-CLE|Tags: , , , , , , , , , |

An on-demand CLE-eligible webinar Safeguarding Against Financial Exploitation   America’s senior population is growing. Nearly one in five U.S. residents will be 65 or older in 2030. Which means the average age of U.S. investors is climbing too. With that comes the risk that they will be exploited by people with access – or gain access through nefarious methods – to their investment portfolio. Seniors and vulnerable persons lose billions of dollars each year. Remarkably, 90% of the people to take advantage of senior investors are members of their own family. Attorneys who represent senior clients need to know the signs of vulnerability, red flags that their clients are being exploited, what laws apply, and rules lawyers must follow in these matters.   Questions our speakers answer: What is senior / vulnerable investor exploitation?   Who is protected by state and federal laws?   How prevalent is senior financial exploitation? What do the numbers tell us?  What is the pace of financial abuse SAR filings by securities firms?  What are the most popular scams?   What is diminished capacity?  What are the red flags indicating possible exploitation?  What are the laws, rules, and regulations governing law firms?  What are some best practices for law firms?  How can firms best protect their senior clients?   On Demand CLE Webinar [...]

Epiq Class Action Settlement Efficiency

August 19th, 2022|Categories: Emerging-On-Demand-CLE, Featured On-Demand, Risk-On-Demand-CLE, Torts-On-Demand-CLE|Tags: , , , , , , , |

Epiq presents a CLE-eligible webinar Wait Wait ... Don't Settle! Essential elements of effective class action settlements. When it comes to complex class action litigation, once the hard work is done – litigation and settlement – more hard work begins – administering it.  But is the deal really ready? After years of arduous proceedings, discovery, motions, appeals, hearings, negotiations, and more, the scope and structure of your settlement has been drafted. Everyone is in agreement. The hard work of the courts, the attorneys, the legal teams, and the litigants is complete. Now it's time to administer the settlement. Send out notices. Cut the checks. Get people paid. Boom! Sit back and relax. Get a claims administrator to take it from there. But wait … you find out that the terms of the agreement, the promises made, the budget established, and the deadlines calendared are not only inefficient, they are completely unworkable. Now the settlement is in jeopardy. The clients are frustrated. The court is frustrated. And you have a headache. That is a situation you, as a class action attorney, never want to find yourself in. The best way to avoid this quagmire is for attorneys to work with a professional and experienced claims administrator before you agree on settlement terms, someone who has been to this rodeo [...]

The Antitrust Case Against Google

October 30th, 2020|Categories: Emerging Issues Webinars, Emerging Litigation & Risk, Emerging-On-Demand-CLE, HB Emerging Law Notes, Risk-On-Demand-CLE|Tags: , , , , , , , |

The Antitrust Case Against Google Perspectives from highly regarded competition law attorneys, litigators, and economists. This overview and Q&A has been developed for advertisers, mobile device makers, app developers,corporate counsel, business writers, and search market participants. The U.S. Department of Justice and 11 states have filed a sweeping antitrust suit against Google alleging the tech giant  abuses its position as "monopoly gatekeeper for the internet" to block competitors. The complaint says Google has used anticompetitive tactics to maintain and extend its monopolies in the markets for general search services, search advertising, and general search text advertising. The federal and state governments charge Google uses "exclusionary agreements, including tying arrangements" to "lock up distribution channels and block rivals." Google's considerable wealth helps make this happen. Google pays billions of dollars a year to distributors to secure their position as the default search engine, and prohibits these companies from dealing with Google competitors. Google's exclusionary strategy is being applied more harshly in newer technologies, such as voice assistants, and in its goal of dominating other platforms in the IoT category, such as smart speakers, home appliances, and autonomous cars. Without a court order, the government plaintiffs say, "Google will continue executing its anticompetitive strategy, crippling the competitive process, reducing consumer choice, and stifling competition." What does all of this mean to [...]

The Intersection of Antitrust & Privacy | A MoginRubin Webinar | 10.31.2019

September 14th, 2019|Categories: Emerging-On-Demand-CLE, HB Risk Notes, Risk-On-Demand-CLE|Tags: , , , , , , |

Recorded: Oct. 31, 2019 Duration: 100 minutes Presented by:  MoginRubin LLP Produced by: HB Litigation Conferences The Panel Moderator Daniel J.  Mogin | Managing Partner, MoginRubin LLP Speakers Jennifer M. Oliver, CIPP/US | Partner, MoginRubin LLP Thomas N. Dahdouh | Director, Western Region, Federal Trade Commission Franklin M. Rubinstein | Partner, Wilson Sonsini Goodrich & Rosati Randi W. Singer, CIPP/US, CIPT | Partner, Weil, Gotshal & Manges Contributor Dina Srinivasan | Independent Researcher & Author of The Antitrust Case Against Facebook Dina was unable to present but we thank her for her content contributions.  What you will get: At least 1 hour of CLE credit. Answers to your questions via email. The opportunity to share with others on your team. The complete Powerpoint. The Antitrust Case Against Facebook Dina Srinivasan's statement to the House Committee on the Judiciary, Subcommittee on Antitrust, Commercial, and Administrative Law The Chicago Booth School Stigler Center Committee on Digital Platforms Final Report Write to us at CLE@LitigationConferences.com to: Ask about CLE Request the materials Send a question for the speakers Market Behavior and Data-Driven Market Power Highly publicized cases and investigations in the U.S. and Europe of big technology, e-commerce, and social media companies demonstrate how anti-competition laws are being used to scrutinize and challenge not only how these corporations conduct themselves in the [...]

Cyber Insurance Policy Language Review: A Deep Dive Into Key Policy Provisions and Important Differences Among Cyber Policies | Oct. 25, 2018 | Now On-Demand!

October 3rd, 2018|Categories: Cyber Risk Litigation, HB Risk Notes, Risk-On-Demand-CLE|Tags: , |

Now Available On Demand PLACE: Your computer or mobile device PRICE:  $197 CLE: 1 credit Please send CLE questions to CLE@LitigationConferences.com SPEAKERS: Judy Selby Principal Judy Selby Consulting LLC  Scott Godes Partner Barnes & Thornburg Please contact us with any registration questions: Brownie.Bokelman@LitigationConferences.com Kathleen.McFadden@LitigationConferences.com Your registration includes: •  A site license to attend this webinar (invite as many people in one location as you can fit around your computer at no extra charge). • Downloadable PowerPoint presentations from our speakers. •  The opportunity to connect directly with speakers via email to        HBWebinars@LitigationConferences.com •  At least one-hour of CLE credit. Produced in collaboration with Judy Selby Consulting LLC   Also available as part of your subscription at the Thomson Reuters West LegalEdcenter.   What's in your cyber policy? Cyber insurance can provide a lifeline to companies dealing with today’s high stakes and constantly evolving cyber risk and regulatory compliance landscape. But not all cyber policies are created equal, and a single policy word can mean the difference between a covered and an uncovered claim.   In this session, we analyze various cyber insurance coverage terms, conditions, and exclusions and describe how the words can impact coverage for real-life claims. What you will learn: • Important differences among generally available insurance coverages for cyber and privacy risks  • Understanding basic cyber insurance policy [...]

Go to Top