Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
As artificial intelligence becomes the engine of the global economy, the value of "AI-ready" data ha...
This program provides a detailed examination of the Black Market Peso Exchange (BMPE), one of the mo...
This Shakespeare?inspired program illustrates how Shakespearean technique can enrich courtroom advoc...
The direct examination presentation outlines how attorneys can elicit truthful, credible testimony w...
This program focuses on overcoming the inner critic—the perfectionist, self?doubting voice tha...
This advanced CLE dives into complex GAAP topics relevant to attorneys advising corporate, regulator...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
This CLE session introduces attorneys to budgeting and forecasting concepts used in corporate planni...
In “Choosing the Right Business Entity,” I will walk through the issues that matter most...
Effective data privacy and artificial intelligence governance programs do not happen by accident. Th...