Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
This course will provide a detailed overview of the Medicare Secondary Payer act as well as provide ...
This program focuses on asylum claims based on sexual orientation, addressing the unique clinical, c...
The Fair Debt Collection Practices Act (FDCPA) remains one of the most important consumer protection...
This course analyzes federal contractor obligations under the Trade Agreements Act. Learn how to ens...
Join us for Part 2 of a program tailored for attorneys seeking a better understanding of the ongoing...
This program, conducted by a seasoned litigation and trial lawyer, will emphasize what litigators ca...
Recent studies have shown that there has been a dramatic increase in impairment due to alcoholism, a...
My contract was terminated and the contracting officer did not pay my invoices – what can I do...
Recent studies have shown that there has been a dramatic increase in impairment due to alcoholism, a...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...