Key Discovery Points: ESI Protocol Objection Denial Party
Just Press "Play"
The Journey of Litigation
Podcast - Part II: The Do’s and Don’ts of Demonstratives
Podcast - Persistence and Determination
Podcast - Part I - The Do’s and Don’ts of Demonstratives
Podcast - Walking Tall
Podcast - The Seeds of Corruption
Bar Exam Toolbox Podcast Episode 316: Spotlight on Torts (Part 1 – Negligence)
Podcast - How Do You Define Success?
Podcast - Seek Out Feedback
The Three C’s for Addressing Prior Inconsistent Statements
Podcast - Part II: Being an Expert Is a Lonely Business
Bar Exam Toolbox Podcast Episode 313: Spotlight on Criminal Law (Part 3)
Podcast - Part I: Being an Expert Is a Lonely Business
Podcast: Don't Just Say It – Show It
Podcast - Finding Common Ground
Law School Toolbox Podcast Episode 504: Listen and Learn -- Motions for Judgment as a Matter of Law and Motions for New Trial (Civ Pro)
Podcast - "Ready for Trial?"
Bar Exam Toolbox Podcast Episode 311: Spotlight on Criminal Law (Part 1)
Preparing for a deposition can be challenging whether it is a person’s first or hundredth time testifying under oath. Being questioned frequently causes anxiety. But the experience does not have to be so daunting with...more
Hosted by American Conference Institute, the 11th Annual Advanced Forum on False Claims and Qui Tam Enforcement returns for another exciting year for lively discussions on FCA enforcement including the ramifications of two...more
In the fourth episode of his "Ethical Witness Preparation" podcast series, "Finding the Balance," litigation attorney Dan Small draws a parallel between witness preparation and translating different languages. Mr. Small also...more
In the third episode of his "Ethical Witness Preparation" podcast series, "A Tortured Journey with the Lying Witness," litigation attorney Dan Small takes an in-depth look at a Massachusetts Supreme Judicial Court Rule and...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more
One of the most problematic questions facing companies simultaneously undergoing a review by external counsel and responding to a government inquiry is whether the information shared with or created by counsel will be...more
Any recorded communication (for example: e-mails, recorded phone conversations (including voicemails), letters, memoranda, computer records etc) may have to be produced to the other party in a subsequent legal dispute or...more