Bar Exam Toolbox Podcast Episode 319: Spotlight on Torts (Part 3 – Strict and Vicarious Liability)
Law School Toolbox Podcast Episode 513: Grappling with AI as a Law Student and Lawyer (1L Summer Series)
Podcast - Part II: The Do’s and Don’ts of Demonstratives
Wire Fraud Litigants Beware: Fourth Circuit Ruling Protects the Banks — The Consumer Finance Podcast
Balch’s Consumer Finance Compass: How Standing Can Make or Break Certification for Class Action Lawsuits in Debt Collection
Podcast - Persistence and Determination
Podcast - Part I - The Do’s and Don’ts of Demonstratives
Podcast - Walking Tall
Bar Exam Toolbox Podcast Episode 317: Spotlight on Torts (Part 2 – Intentional Torts)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Master the First Moves in Litigation for Courtroom Advantage – Speaking of Litigation Video Podcast
Podcast - The Seeds of Corruption
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Feeling Disillusioned with AI? You’re Not Alone
Current Regulatory, Legislative, and Litigation Developments on ADA Website Accessibility for Consumer Finance Digital Platforms — The Consumer Finance Podcast
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
The Trend of Threatening Physicians for Personal Gain
Podcast - Seek Out Feedback
The Three C’s for Addressing Prior Inconsistent Statements
A recent series of articles by the International Association of Privacy Professionals discusses a trend in privacy litigation focused on breach of contract and breach of warranty claims. Practical Takeaways- • Courts are...more
In this episode of BIZ LIT | TODAY, Shook, Hardy & Bacon Partners Gary Miller and Camila Tobón explore Tips for Building an AI Framework. Gary co-leads Shook’s Business Litigation Practice and Camila is the director of...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more