Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
This course provides a roadmap for ethical AI integration in high-volume practices through real-worl...
Disasters, whether natural or manmade, happen. Disasters can impact the practice of law and, among o...
This program will address some of the most common intellectual property (IP) issues that arise in co...
This program explores listening as a foundational yet under-taught lawyering skill that directly imp...
This Shakespeare?inspired program illustrates how Shakespearean technique can enrich courtroom advoc...
Part 1 - This program focuses specifically on cross?examining expert witnesses, whose credentials an...
This program provides a detailed examination of the Black Market Peso Exchange (BMPE), one of the mo...
This program examines listening as an active, strategic trial advocacy skill rather than a passive c...
Resilience in the Workplace, delves into the critical importance of resilience in navigating the cha...
This program provides a comprehensive analysis of the Sixth Amendment Confrontation Clause as reshap...