Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
Effective representation depends on trust, communication, and responsiveness, yet these can break do...
This program provides attorneys with a practical examination of how legal, regulatory, and liability...
This program examines the role of psychosocial evaluations in spousal abuse-based immigration petiti...
Lawyers often work with clients, colleagues, and opposing counsel who are navigating some of the har...
Philip A. Greenberg, Esq., who has been a litigator in the State and Federal Courts for 52 years, ha...
This program provides attorneys with a foundational understanding of derivatives and their role in m...
This program will address the ethical obligations of Lawyer Advocates representing clients in arbitr...
This program provides a comprehensive framework for integrating Borderline Personality Disorder (BPD...
Workplace investigations are now more complex, high-stakes, and scrutinized than ever before. Employ...
Trademark doctrine was built for a marketplace that no longer exists, leaving practitioners to litig...