Law School Toolbox Podcast Episode 511: Listen and Learn -- Landlord/Tenant Law (Part 1)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Podcast - How Do You Define Success?
The Three C’s for Addressing Prior Inconsistent Statements
Understanding Discovery in Commercial Litigation
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
Podcast - "Ready for Trial?"
Podcast - Every Case Is a New World
Law School Toolbox Podcast Episode 501: Listen and Learn -- Present and Future Estates (Part 1)
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Eyes on the Evidence: Powerful Legal Presentations – Speaking of Litigation Video Podcast
The Presumption of Innocence Podcast: Episode 57 - Wired for Truth: The Art & Science of Polygraphs
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Podcast: How Delaying Third Party Discovery Can End Up Costing You Dearly
Podcast - Connecting Separate Pieces of Evidence Clearly, Persuasively
5 Key Takeaways | Building a Winning Evidentiary Record at the PTAB (and Surviving Appeal)
If you’re involved in eDiscovery in any way, you’ve undoubtedly come across JSON files. These files increasingly act as the way in which we access and interact with digital evidence—especially as the limitations of screenshot...more
If you’re an attorney, a paralegal, an investigator, a law enforcement officer, or even if you just watch a lot of legal dramas on television, you’re likely familiar with the term “chain of custody”....more
Boshea v. Compass Marketing, Inc., 2023 WL 2743333 (D. Md. Mar. 31, 2023)(Hollander, J.), involved authentication of disputed electronically stored information. “Authentication” is a necessary predicate to all uses of ESI:...more
By using our smartphones, tablets and computers, we create and exchange a vast amount of electronic data every day, but what some may not know is that there is a whole other world of information hidden beneath the surface —...more
Read these ediscovery collection best practices to learn why self-collection – or allowing clients to collect their own data – is dangerous. Picture this: it’s 1988 and you’re at your desk, poring over a veritable...more
The submission of digital evidence traditionally required a sponsoring witness—something that could be time-consuming and expensive. Thankfully, as more and more online content, such as social media posts and chats, play a...more