Features
Novel Admissibility Considerations for AI
Software is generally admissible as evidence if it is relevant, material, and competent. However, AI differs from traditional software, perhaps requiring novel admissibility considerations.
Features
Waiver of Corporate Privilege By An Individual Defendant
Individual employees often act pursuant to advice from their in-house counsel. If named as a defendant in which her action is challenged, the employee may want to assert advice of corporate counsel as a defense. But the privilege belongs to the employer, not the employee, and the employer may refuse to waive the privilege. Can the court abrogate the employer's privilege over the objection of the employer, and if so under what circumstances?
Features
You Won't Know It When You See It: The Challenges of Fabricated Evidence in the Digital Age
How significant is the threat of fabricated digital evidence that can alter the outcome of a case? In today's wired workplace, it's considerable.
Features
21st Century Data Dumps and the 'Brady' Rule
What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.
Features
Why Are Courts Making Cybersecurity Forensics Reports Not Privileged?
Internal corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.
Features
Fifth Amendment Protection of Cellphone Passwords Remains Murky As Supreme Court Declines to Weigh In
When law enforcement seeks to compel a subject to provide a passcode to allow them to rummage through a cellphone, courts have not spoken with a unified voice. Some, including New Jersey's highest court, have arrived at the dubious conclusion that requiring an individual to communicate cellphone passcodes to the government does not warrant Fifth Amendment protection. Commentators had hoped that the U.S. Supreme Court would reject that expansive view, however, the Supreme Court declined to wade in, seemingly guaranteeing that continued uncertainty on this critical issue will continue to bedevil criminal practitioners.
Features
Looking Ahead to Avoid Spoliation Sanctions
A recent Federal Circuit decision denying a petition for a writ of mandamus should serve as a cautionary tale and reminder for corporate entities regarding the critical importance of preserving documentary evidence in a timely and appropriate manner.
Features
Which Method Is for You? Not All Surveys Are Made the Same
As survey evidence has become increasingly common in litigation, it is important to remember that not all surveys are made the same. It's important to be able to identify the right survey methodology for the matter at hand. Third in a series
Features
<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics
Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this section will focus on informal methods of acquisition.
Features
<b><i>Daubert</i></b> Motions Really Do Work
<b><I>Part Two of a Three-Part Article</I></b><p>The starting point for any successful challenge under Federal Rules of Evidence (FRE) 702 and <I>Daubert</I> is the form and content of the witness's disclosure under Federal Rules of Civil Procedure (FRCP) 26(a)(2). Here is all you have to know.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- AI Poisoning: A Self Help Cybersecurity OptionA novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results.Read More ›
- Life, Liberty, and the Pursuit of Customers: Developments on ‘Conquesting’ from the Ninth CircuitIn a recent decision, the U.S. Court of Appeals for the Ninth Circuit addressed the issue of whether purchasing market competitors’ search engine keyword terms, known as “conquesting,” constitutes trademark infringement.Read More ›
- DOJ Issues New Rule Regulating Handling of Bulk Sensitive Personal DataThe DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.Read More ›
- Adapting for Success: Strategic Insights for Law Firms in 2025 and BeyondThe legal industry is at an inflection point, grappling with challenges that range from rising client demands to technological disruption. There are five critical areas where firms can take a proactive, strategic approach, including actionable insights and recommendations for navigating 2025 and beyond.Read More ›
- Second Circuit Clarifies Video Privacy Protection ActThe Second Circuit’s decision is notable in that it signals a reversal of the recent trend of dismissals of VPPA claims in courts across the country and could trigger a significant increase in VPPA lawsuits. Although organizations have grappled with VPPA claims for several years, this decision is another red flag to organizations to take immediate steps and ensure compliance with privacy laws to mitigate the risks of VPPA claims.Read More ›