Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...
Contracting with the Federal Government is not like a business deal between two companies or a contr...
Disasters, whether natural or manmade, happen. Disasters can impact the practice of law and, among o...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
AI agents and generative AI tools are rapidly entering law firm workflows, including legal research,...
Trademark doctrine was built for a marketplace that no longer exists, leaving practitioners to litig...
My contract was terminated and the contracting officer did not pay my invoices – what can I do...
Contracting with the Federal Government is not like a business deal between two companies or a contr...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
Recent studies have shown that there has been a dramatic increase in impairment due to alcoholism, a...