Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
This companion program to Part 1 goes deeper into the rhetorical power of Shakespeare, emphasizing h...
Part 2 dives deeper into advanced cross?examination techniques, teaching attorneys how to maintain c...
Evidence Demystified Part 1 introduces core evidentiary principles, including relevance, admissibili...
Evidence Demystified Part 2 covers key concepts in the law of evidence, focusing on witnesses, credi...
Designed for attorneys without formal accounting training, this course provides a clear, practical f...
Whether from poor drafting, conflicting case law, or simply the amounts in dispute, certain key cont...
Large World Models (LWMs)— the next generation of AI systems capable of generating...
In this course, Dr. Carlson will present a broad overview of what scientific research has discovered...
This presentation provides an overview of copyright law particularly as it applies to music. The pre...
Part 1 - This program focuses specifically on cross?examining expert witnesses, whose credentials an...