Products tagged with 'metadata'

View as Grid List
Sort by
Display per page

Cybersecurity for Small-to-Mid-Sized Law Firms

Includes an overview of cybersecurity trends (2019) and lessons learned from breaches and attacks, including the cost of data breaches, compliance, privacy, security, risks and tips.

Social Media, Email, Texts and Video Evidence in the Employment Law Case: What to Look For, Where to Find It and How to Get it Admitted

Learn how to obtain and admit social media and and other electronic data as evidence in an employment law case. Understand a wide range of discovery-related topics, including collecting evidence from apps, working with metadata in litigation, subpoenaing social media companies, using archive features, and more.

The Ethics of Social Media Research

Learn how to avoid potential ethical traps in researching social media profiles to uncover investigative/background information about parties, witnesses, experts, jurors, etc., and, in some cases, to use this information as evidence. This program reviews pertinent ethics opinions issued by the ABA and bar associations in many jurisdictions; discusses relevant caselaw; reviews detailed guidelines for social media research issued by the New York State Bar’s Commercial and Federal Litigation Section; and ties them into the ABA Model Rules of Professional Conduct. The program will also explore: Who's your "friend?" Could "friending" violate the deception or ex parte communication ethical rules? Is it ethical to research the social media profiles of parties and witnesses during discovery or trial? Is it ethical to research the social media profiles of potential jurors before trial or seated jurors during trial? Could advising clients to delete, deactivate, or adjust privacy settings on their social networking accounts lead to an ethical violation or spoliation charge against you? How to configure security/privacy settings in your own profile to avoid ethical breaches. The seminar is partially based on the speakers' 55-page Social Media chapter from their book, "The Cybersleuth's Guide to the Internet."