Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
The Federal Tort Claims Act is the way that the federal government is sued for negligence. There are...
This program focuses on asylum claims based on sexual orientation, addressing the unique clinical, c...
Trademark doctrine was built for a marketplace that no longer exists, leaving practitioners to litig...
Contracting with the Federal Government is not like a business deal between two companies or a contr...
Learn about the best strategies and tactics to file bid protests at the agency level, U.S. Governmen...
This program provides immigration attorneys with a structured and strategic approach to developing e...
Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...
This program examines mitigation strategies for white-collar defendants in the post-Booker sentencin...
The Fair Debt Collection Practices Act (FDCPA) remains one of the most important consumer protection...