Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
Learn about the best strategies and tactics to file bid protests at the agency level, U.S. Governmen...
The Fair Debt Collection Practices Act (FDCPA) remains one of the most important consumer protection...
AI agents and generative AI tools are rapidly entering law firm workflows, including legal research,...
This course analyzes federal contractor cyber security obligations under the Federal Acquisition Reg...
The “Preventing Access to U.S. Sensitive Personal Data and Government-Related Data by Countrie...
This program explores the impact of complex trauma on criminal defendants through a developmental an...
Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...
This course analyzes federal contractor obligations under the Trade Agreements Act. Learn how to ens...
This program introduces psychosocial evaluations as a valuable tool in civil litigation, particularl...
The General Data Protection Regulation (GDPR) continues to impact legal firms and organizations worl...