Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
Most legal professionals are operating in survival mode whether they realize it or not. Not crisis-l...
The landscape of global finance is undergoing a seismic shift as traditional assets migrate to the b...
The General Data Protection Regulation (GDPR) continues to impact legal firms and organizations worl...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
ChatGPT is rapidly entering law firm workflows, including drafting, summarizing, brainstorming, lega...
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
This program provides immigration attorneys with an in-depth understanding of competency issues in r...
During this course, we will go over your rights under the Freedom of Information Act (FOIA) and Priv...
This program will address the ethical obligations of Lawyer Advocates representing clients in mediat...
Contracting with the Federal Government is not like a business deal between two companies or a contr...