Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Generally speaking, the Federal Rules of Evidence require evidence to be authenticated before it can be admitted. Typically evidence is authenticated by some form of extrinsic proof sufficient to support a finding that the evidence is what the proponent claims it is. Often that proof comes in the form of a witness who can verify the evidence through testimony.
By Laura Jehl, Robert Musiala, Linda Goldstein, Fernando Bohorquez and Amy Mudge
While inflated expectations abound, the advertising industry is emerging as one of the more immediate, substantive and compelling use cases for blockchain technology.
By Thomas McThenia and Richard Markow
Like poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.
By Michael Bahar and Kristen Bertch
Technologies are often pitched as solutions, if not game-changing solutions. Indeed, many times they are, but no solution comes without the seeds of its own costs and challenges. For pragmatic and regulatory compliance reasons, it is increasingly important for boards, senior executives and general counsel to sufficiently understand technologies, not just their potential promise.
By Jeffrey Atteberry
The social, economic, and political forces pushing for a comprehensive overhaul of the nation’s privacy regime are numerous, and many see 2019 as presenting the best opportunity yet for passage of federal data privacy legislation.