Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
The Federal Tort Claims Act is the way that the federal government is sued for negligence. There are...
Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...
The General Data Protection Regulation (GDPR) continues to impact legal firms and organizations worl...
Prior to the Supreme Court’s 2023 affirmative action decision, some predicted that this ruling...
Learn about the best strategies and tactics to file bid protests at the agency level, U.S. Governmen...
This program, conducted by a seasoned litigation and trial lawyer, will emphasize what litigators ca...
Separation of Powers in United States and Israel from a Perspective of the Ongoing Debates in Both C...
My contract was terminated and the contracting officer did not pay my invoices – what can I do...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...