Podcast - The Basic Rules for Closing Argument
Closing Argument: Opportunity and Challenge
Podcast - Impeaching with a Deposition
Winning Cases on Legal Issues Before and During Trial | Texas Appellate Law Podcast
Opening Statements: The Prohibition Against Argument
Proof in Trial: University of Louisville
Work This Way: A Labor & Employment Law Podcast - Episode 6: Digital Forensics & Protecting Trade Secrets with Clark Walton
Dealing with Evidence of Time, Distance and Speed
Law School Toolbox Podcast Episode 417: Listen and Learn -- Authentication of Evidence
Law School Toolbox Podcast Episode 410: Listen and Learn -- Relevance Issues (Evidence)
Bar Exam Toolbox Podcast Episode 225: Listen and Learn -- Authentication of Evidence
Bar Exam Toolbox Podcast Episode 214: Listen and Learn -- Relevance Issues (Evidence)
California Employment News: Synthesizing Evidence in a Workplace Investigation (Part 3)
Evidence Preservation: Handling the Issues in New York and New Jersey
Law School Toolbox Podcast Episode 352: Listen and Learn -- Best Evidence Rule
Bar Exam Toolbox Podcast Episode 182: Listen and Learn -- Policy Exclusions (Evidence)
Bar Exam Toolbox Podcast Episode 177: Listen and Learn -- Best Evidence Rule
Facing a Deposition: Tips and Strategies
The Presumption of Innocence Podcast: Episode 3 - The Science of Modern Digital Forensics
Law School Toolbox Podcast Episode 326: Listen and Learn -- Multiple Hearsay
The amount of data stored on phones is overwhelming. In 95% of investigations, text messages and conversations are used as evidence sources. Investigators need to be able to be able to retrieve the full, comprehensive...more
The volumes of evidence available for litigation are such that privileged documents – a small but important subset of any evidence collection – can easily be overlooked, commingled, misplaced, or simply lost. In addition, the...more
Uncovering the most amount of device data in a digital investigation is key to finding implicating evidence. In 95% of investigations, text messages and conversations are used as evidence sources. Corporate...more
Security and confidentiality are paramount in legal matters. Even if a case matter has no protective order or confidential designation, you don’t want your clients’ information compromised in any way. It is a non-negotiable...more
In divorce and family law litigation, text, email and cell phone records are often important. In many cases, parties seek this evidence in discovery when it bears on relevant issues. Text, email and cell phone records can...more
Today, in Commonwealth v. Gelfgatt, No. SJC-11358 (Mass. June 25, 2014), a divided Massachusetts Supreme Judicial Court held that under certain circumstances, a court may compel a criminal defendant to provide the password to...more