Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Novel Admissibility Considerations for AI Image

Novel Admissibility Considerations for AI

Jonathan Bick

Software is generally admissible as evidence if it is relevant, material, and competent. However, AI differs from traditional software, perhaps requiring novel admissibility considerations.

Features

Waiver of Corporate Privilege By An Individual Defendant Image

Waiver of Corporate Privilege By An Individual Defendant

Benjamin Rosenberg

Individual employees often act pursuant to advice from their in-house counsel. If named as a defendant in which her action is challenged, the employee may want to assert advice of corporate counsel as a defense. But the privilege belongs to the employer, not the employee, and the employer may refuse to waive the privilege. Can the court abrogate the employer's privilege over the objection of the employer, and if so under what circumstances?

Features

You Won't Know It When You See It: The Challenges of Fabricated Evidence in the Digital Age Image

You Won't Know It When You See It: The Challenges of Fabricated Evidence in the Digital Age

John G. Browning & Jonathan Bailie

How significant is the threat of fabricated digital evidence that can alter the outcome of a case? In today's wired workplace, it's considerable.

Features

21st Century Data Dumps and the 'Brady' Rule Image

21st Century Data Dumps and the 'Brady' Rule

Peter A. Crusco

What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.

Features

Why Are Courts Making Cybersecurity Forensics Reports Not Privileged? Image

Why Are Courts Making Cybersecurity Forensics Reports Not Privileged?

David P. Saunders

Internal corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.

Features

Fifth Amendment Protection of Cellphone Passwords Remains Murky As Supreme Court Declines to Weigh In Image

Fifth Amendment Protection of Cellphone Passwords Remains Murky As Supreme Court Declines to Weigh In

Robert J. Anello & Richard F. Albert

When law enforcement seeks to compel a subject to provide a passcode to allow them to rummage through a cellphone, courts have not spoken with a unified voice. Some, including New Jersey's highest court, have arrived at the dubious conclusion that requiring an individual to communicate cellphone passcodes to the government does not warrant Fifth Amendment protection. Commentators had hoped that the U.S. Supreme Court would reject that expansive view, however, the Supreme Court declined to wade in, seemingly guaranteeing that continued uncertainty on this critical issue will continue to bedevil criminal practitioners.

Features

Looking Ahead to Avoid Spoliation Sanctions Image

Looking Ahead to Avoid Spoliation Sanctions

Daniel J. Melman & Sarah Benowich

A recent Federal Circuit decision denying a petition for a writ of mandamus should serve as a cautionary tale and reminder for corporate entities regarding the critical importance of preserving documentary evidence in a timely and appropriate manner.

Features

Which Method Is for You? Not All Surveys Are Made the Same Image

Which Method Is for You? Not All Surveys Are Made the Same

Laura O'Laughlin, Harriet Ho & Duy (Joey) Duong

As survey evidence has become increasingly common in litigation, it is important to remember that not all surveys are made the same. It's important to be able to identify the right survey methodology for the matter at hand. Third in a series

Features

<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics Image

<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics

Khizar A. Sheikh, Lynne Strober & Jennifer Presti

Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this section will focus on informal methods of acquisition.

Features

<b><i>Daubert</i></b> Motions Really Do Work Image

<b><i>Daubert</i></b> Motions Really Do Work

John L. Tate

<b><I>Part Two of a Three-Part Article</I></b><p>The starting point for any successful challenge under Federal Rules of Evidence (FRE) 702 and <I>Daubert</I> is the form and content of the witness's disclosure under Federal Rules of Civil Procedure (FRCP) 26(a)(2). Here is all you have to know.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Voice of the Client: Hearing the Client Through the Noise
    At the end of the day, a lot of noise is created in the effort to hear the voice of the client. We propose that while these efficiencies and innovations in law are valuable, the clients keep asking for something different: a lawyer who deeply understands their business and their specific issue — at the time they need it.
    Read More ›