A look at three recent cases exploring the admissibility of text messages, in corroboration with other evidence, during trial.
The Sixth Circuit held that evidence of stealing electronic parts and schematics was prejudicial and "of a fundamentally different character" in trade-secret case.
Authentication can be done through testimony from someone with personal knowledge of where it was found or from a witness with knowledge of the underlying transaction.
By Veronica Smith Lewis
You can only achieve long-term success in your career if you can pursue that career while fulfilling your personal and family life goals.
By Tonya Moffat Ramsey
Being a successful lawyer is a lifelong process with many paths, and each presents various trade-offs.
By Coyt Randal "Randy" Johnston
I made my peace with the practice of law by providing representation to those people who were not well served by their lawyers.
Sound Advice »
Professor Steve Landsman discusses the evidentiary issues arising from People v. Collins—including problems that can come from an uncritical look at statistics. (7:55 min)
Veteran ethics professor Stephan Landsman discusses authentication and the seven-step process to establish it for evidentiary purposes. (12:40 min)
The teleconference, taking place at 12:30 p.m. Eastern time on May 29 will present an overview of what practitioners (and judges) need to know about social media in 2013.
Take advantage of the array of activities we have planned for the conference taking place in Chicago, Illinois, from April 24–26.
Trial Evidence Leadership
|Cochairs||Web Editors||Newsletter Editors|
New Orleans, LA
New Orleans, LA