Podcast - Walking Tall
Bar Exam Toolbox Podcast Episode 317: Spotlight on Torts (Part 2 – Intentional Torts)
Key Discovery Points: A Judicial Approach to Handling AI-Generated Evidence
Master the First Moves in Litigation for Courtroom Advantage – Speaking of Litigation Video Podcast
Podcast - The Seeds of Corruption
Key Discovery Points: Don’t Get Caught with Your Hand in the Production Cookie Jar
Key Discovery Points: BYOD Case Law Covering Subpoenas and Employee Handbooks
Feeling Disillusioned with AI? You’re Not Alone
Current Regulatory, Legislative, and Litigation Developments on ADA Website Accessibility for Consumer Finance Digital Platforms — The Consumer Finance Podcast
Key Discovery Points: Petty Finger Pointing Over Search Terms Results in Wasted Time
The Trend of Threatening Physicians for Personal Gain
Podcast - Seek Out Feedback
The Three C’s for Addressing Prior Inconsistent Statements
Podcast - Part II: Being an Expert Is a Lonely Business
Understanding Discovery in Commercial Litigation
Follow the Rules … Most of the Time
Bar Exam Toolbox Podcast Episode 313: Spotlight on Criminal Law (Part 3)
Divorce Fees: When Your Spouse Might Have to Pay
Key Discovery Points: Navigating Clawbacks When In-House Counsel Are Included
Podcast - Part I: Being an Expert Is a Lonely Business
In the chaos following a cyberattack, forensic reports are often pulled together under intense pressure and can assist companies in responding to and remediating the incident. However, if you're not careful, these reports...more
Concerns about claims of legal professional privilege over third-party investigation reports produced in the course of responding to cyberattacks, and the extent to which such reports can be shielded from disclosure in legal...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more
In the wake of a data breach, counsel will often require the assistance of a forensic firm in order to provide legal advice to their client. The forensic analysis—which is often memorialized in a report to counsel—is crucial...more
Requires More than Merely Adding Counsel’s Name to a Forensic Report. Technical investigations conducted following cyber-incidents often have both legal and ordinary-course business purposes. In certain jurisdictions,...more
With cybercrime on the rise, organizations have increasingly found themselves subject to litigation or regulatory investigations related to breaches. Documents and information created before breaches, such as security...more
When assisting clients with emergency data breach response, and preparing and implementing a data privacy and security plan, it often becomes efficient, cost effective and necessary to hire outside vendors to assist with...more