Bar Exam Toolbox Podcast Episode 319: Spotlight on Torts (Part 3 – Strict and Vicarious Liability)
Law School Toolbox Podcast Episode 513: Grappling with AI as a Law Student and Lawyer (1L Summer Series)
Podcast - Part II: The Do’s and Don’ts of Demonstratives
Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
Balch’s Consumer Finance Compass: How Standing Can Make or Break Certification for Class Action Lawsuits in Debt Collection
Podcast - Persistence and Determination
Podcast - Part I - The Do’s and Don’ts of Demonstratives
Podcast - Walking Tall
Bar Exam Toolbox Podcast Episode 317: Spotlight on Torts (Part 2 – Intentional Torts)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Master the First Moves in Litigation for Courtroom Advantage – Speaking of Litigation Video Podcast
Podcast - The Seeds of Corruption
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Feeling Disillusioned with AI? You’re Not Alone
Current Regulatory, Legislative, and Litigation Developments on ADA Website Accessibility for Consumer Finance Digital Platforms — The Consumer Finance Podcast
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
The Trend of Threatening Physicians for Personal Gain
Podcast - Seek Out Feedback
The Three C’s for Addressing Prior Inconsistent Statements
In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more
By now, companies across all industries have become familiar with the lifecycle and stages of a ransomware incident. Generally, once an attack is contained, remediation and rebuilding will follow. Shortly after, the crisis...more
Hosted by American Conference Institute, the 11th Annual Advanced Forum on False Claims and Qui Tam Enforcement returns for another exciting year for lively discussions on FCA enforcement including the ramifications of two...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more
As we previously reported, the Magistrate Judge in In re: Capital One Customer Data Security Breach Litigation, found that a forensic report that Capital One had claimed was protected by the privilege and work product...more
Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more