Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
How did E. Jean Carroll successfully bring a sexual assault lawsuit against Donald J. Trump when the...
This course, presented by Ana Juneja, founder of Ana Law LLC, delves into the vulnerabilities of IP ...
Part 2 in a 2-part series - Human expression has always fascinated me. In this presentation, I begin...
This CLE will focus on running a remote law practice with emphasis on the following: • B...
This course is designed to alert patent practitioners with the PTO rules on the “Duty of Discl...
This program will cover the important (but often forgotten) professional responsibility and risk iss...
Join Asset Protection Attorney Blake Harris as he conducts a deep dive into the critical examination...
Recent legislative developments may significantly impact the Franchisor- Franchisee relationship mor...
In this presentation on the intersection of hashtags and trademark law, the panelists will address p...
This course will benefit attorneys who assist clients with subjects they're not entirely knowledgeab...