Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
Explore the transformative potential of generative AI in modern litigation. “Generative AI for...
This program examines mitigation strategies for white-collar defendants in the post-Booker sentencin...
This program is geared towards lawyers, experts, commercial property owners, and others in the envir...
My contract was terminated and the contracting officer did not pay my invoices – what can I do...
Prior to the Supreme Court’s 2023 affirmative action decision, some predicted that this ruling...
The Fair Debt Collection Practices Act (FDCPA) remains one of the most important consumer protection...
Protect your practice from the ethical vulnerabilities of AI by mastering Model Rules 1.1 and 1.5. T...
This program focuses on asylum claims based on sexual orientation, addressing the unique clinical, c...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
This course analyzes federal contractor obligations under the Trade Agreements Act. Learn how to ens...