More and more attorneys and judges are using social media, either for its intended purpose of social networking (and, for the lesser intended purpose of marketing) or for its unintended purpose of investigative research.
There has been much discussion online amongst legal experts about what sorts of investigative activity is ethical for lawyers to engage in. Most Bar Associations however, have not yet addressed this topic. Two exceptions are the Philadelphia Bar and the New York State Bar.
In a series of four 90-minute webinars, Roger Dodd presents a completely integrated cross-examination system taught via learnable concrete principles. In each webinar Roger illustrates key principles and techniques of cross-examination to implement at trial and at depositions (in-person or online). His examples are based on dozens of real-life examples. Even if you don’t take the whole series...
Law and medicine were always the pair: well-respected professions, pathways to middle class (or better!) comfort, and laggards with technology. Whether you went to a doctor’s office or a lawyer’s office, paper ruled the day. But that’s changing. One of the last bastions of “paper is king” is the executed document – “wet” signatures serving as proof ...
Law and medicine were always the pair: well-respected professions, pathways to middle class (or better!) comfort, and laggards with technology. Whether you went to a doctor’s office or a lawyer’s office, paper ruled the day. But that’s changing. One of the last bastions of “paper is king” is the executed document – “wet” signatures serving as proof ...
Reusing old documents with find and replace has a high margin for error and is slower than better, alternative methods.
Discover how to leverage the best of your intellectual capital to increase speed, accuracy and efficiency. Improved drafting methods directly impact the bottom line and improve client satisfaction.
Most attorneys in private practice are employed by law firms with fewer than 20 lawyers and, in fact, half of all U.S lawyers in private practice are solos. When e-discovery came on the scene, these attorneys viewed it as the exclusive domain of large firms with large cases in Federal court. But with the increase in digital activity by people in all areas of their lives, e-discovery has become an
Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client's information as well. Fortunately, easy-to-use options are available today for encryption.
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...
Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating a