Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
This program addresses the critical intersection of criminal and immigration law, focusing on how mi...
The Fair Debt Collection Practices Act (FDCPA) remains one of the most important consumer protection...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
Prior to the Supreme Court’s 2023 affirmative action decision, some predicted that this ruling...
Social media has become a critical marketing and customer engagement channel for legal firms, banks,...
The Federal Tort Claims Act is the way that the federal government is sued for negligence. There are...
The General Data Protection Regulation (GDPR) continues to impact legal firms and organizations worl...
The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
This program provides a comprehensive and practice-oriented framework for integrating criminal mitig...