Modern litigation is increasingly driven by electronic evidence. Sometimes the only copy of critical evidence takes the form of a screenshot, or resides in a temporary cache, or third-party “web archive.” Recent caselaw demonstrates that litigators must take additional steps to overcome authentication challenges and ensure that such evidence is admitted.
This program will discuss that caselaw and suggest best practices for ensuring the admissibility of electronic evidence.
Law firms across the country are rethinking traditional staffing models to stay competitive, reduce ...
This program focuses on overcoming the inner critic—the perfectionist, self?doubting voice tha...
This companion program to Part 1 goes deeper into the rhetorical power of Shakespeare, emphasizing h...
This course clarifies the distinction between profit and cash flow from a legal perspective. Attorne...
The “Chaptering Your Cross” program explains how dividing a cross?examination into clear...
The False Claims Act continues to be the federal Government’s number one fraud fighting tool. ...
Whether from poor drafting, conflicting case law, or simply the amounts in dispute, certain key cont...
“Maybe I drink more than I should, but it isn’t affecting my life-I’m ‘High-...
This CLE program covers the most recent changes affecting IRS information reporting, with emphasis o...
Scam typologies help legal professionals by providing a framework to understand, identify, and preve...