Just Press "Play"
Key Discovery Points: Be a Team Player When It Comes to Production
Podcast - “I Lied Like a Dog!”
Law School Toolbox Podcast Episode 511: Listen and Learn -- Landlord/Tenant Law (Part 1)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Podcast - How Do You Define Success?
The Three C’s for Addressing Prior Inconsistent Statements
Understanding Discovery in Commercial Litigation
The JustPod: Defending the "Evil Genius:" A Conversation with Leonard Ambrose
Podcast - "Ready for Trial?"
Podcast - Every Case Is a New World
Law School Toolbox Podcast Episode 501: Listen and Learn -- Present and Future Estates (Part 1)
The JustPod: The King of Cross: A Discussion with Larry Pozner, a Leading Expert on Cross-Examination
Bar Exam Toolbox Podcast Episode 305: Spotlight on Civil Procedure (Part 2 – Discovery)
Eyes on the Evidence: Powerful Legal Presentations – Speaking of Litigation Video Podcast
The Presumption of Innocence Podcast: Episode 57 - Wired for Truth: The Art & Science of Polygraphs
Podcast - Parting Thoughts: Be a "Peddler of Common Sense"
Key Discovery Points: Timing Sweet Spots for Spoliation Motions
Key Discovery Points: Should Hyperlinked Files Be Treated as Modern Attachments?
Podcast: Are Legal Holds Protected by Privilege? Insights from the FTC's Battle with Amazon
Truck crash scenes reveal only part of the full story through their debris. Hidden deep within the cab of that 18-wheeler may be a crucial piece of evidence: The electronic control module (ECM), which serves as the truck’s...more
In one of the most closely watched issues before the Georgia Legislature this year, Georgia law has been amended through two tort reform bills, Senate Bills 68 and 69. These bills will impact various aspects of Georgia’s...more
In today’s digital age, text messages play a significant role in communication. Whether through SMS, WhatsApp, or other messaging platforms, people send millions of messages daily, often discussing everything from social...more
Liability insurers often receive policy limit demands from third-party claimants that allege serious injuries without corroborating medical records or bills. Since the enactment of California Civil Procedure Code section 999...more
Recent case law confirms that trade secret owners should proactively investigate any suspicions of theft, and if they do not, they may be at greater risk of being barred under the statute of limitations than they may expect....more
Filing a personal injury claim can be challenging, especially in a state full of unusual laws like California. Each year thousands of Californians seek compensation for injuries and accidents. California has specific laws,...more
Section 130 of the Building Safety Act 2022 (BSA) allows the High Court to make building liability orders (BLO) if it considers it just and equitable to do so. Section 132 allows the court to make an information order to...more
Brown v. Brooks, 2024 WL 5008506, No. 23-2966 (E.D. Pa. Dec. 6, 2024) - This matter involved a motor vehicle accident between the plaintiff and a laundry truck driver, and it illustrates the danger of errors during discovery....more
1) Preservation Demand. Send an evidence preservation notice to anyone you think may be liable or contributed to the fire (so the entity is on notice not to destroy, delete, or alter relevant evidence)....more
Here is a case from the opposite coast of the United States. This case may be looked at as persuasive authority in cases filed in the 9th circuit...more
Wise or not, parties have a right to waive discovery from the other party and settle their matter. Sometimes, both parties have access to and/or knowledge of all of the finances. Sometimes, the rely on the parties sworn Case...more
The concept of corporate legal separateness has long been a fortress protecting affiliated business entities such as parents, subsidiaries, and sister companies from various kinds of liability and litigation. However, how...more
Let us assume a company has done all the right things. Preemptive security was a concern, so the company tightened up its written cybersecurity controls and associated technical controls, including policies and...more