Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
AI, an innovative technology that was once a supporting act for digital transformation, business str...
This program provides attorneys with a foundational understanding of the name, image, and likeness (...
Contracting with the Federal Government is not like a business deal between two companies or a contr...
Most legal professionals are operating in survival mode whether they realize it or not. Not crisis-l...
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
Disasters, whether natural or manmade, happen. Disasters can impact the practice of law and, among o...
The Federal Tort Claims Act is the way that the federal government is sued for negligence. There are...
Social media has become a critical marketing and customer engagement channel for legal firms, banks,...
For most new attorneys, learning how to frame an oral argument can be a daunting task. L...