In this CLE, we look at:
- Rules 1.1 (competence) and 1.6 (confidentiality of information)
- Technology overview of cloud computing
- Rules 1.1 and 1.6 applied to cloud computing
- Technology overview of email
- Rules 1.1 and 1.6 applied to email in general
- Rules 1.1 and 1.6 applied to email tracking (“spymail”)
You can view the video here
You can download the slides here
You can download the CLE certificate of attendance request and course evaluation here.
You can email questions to CLE@mailcontrol.net and Chad Gilles (or other qualified commentator) will respond ASAP.