Training Course
Syllabus:
Email, Smartphone and Social Media Evidence: A Practical How-To Guide
Learn Practical How-To's to Get Your Electronic Evidence Admitted (and Keep Theirs Out)
Do you know how to find, collect, preserve and authenticate email, social media and smartphone evidence? Chances are, the other side does and will use it to their advantage . . . unless you know how to stop them. This focused, full-day program will provide you with practical how-to's and answers to your foremost questions concerning social media, email, smartphone and other electronic evidence. Gain concrete instruction you can use right away - register today!
- Get up to speed with local court rules on electronic evidence.
- Gain practical, step-by-step guidance on collecting and preserving email, social media, text messages and more.
- Anticipate snares: know the boundaries of ESI discovery, spoliation dangers and admissibility oversights.
- Overcome key obstacles to requesting and subpoenaing the data you need.
- Find out how to effectively lay a foundation and authenticate social media, email and smartphone data with real-world examples.
- Uncover tips and techniques for keeping the opposing party's ESI out of evidence.
- Federal/State Laws and Local Court Rules Affecting Electronic Evidence
9:00 - 9:30, Matthew R. Eslick
- Social Media Evidence: Real-World How To's
9:30 - 10:45, Melissa A. Schilling
- Overview of Social Media Sites - How They are Used, What You Can Find
- How Long do Facebook, Twitter, etc. Store Personal Data?
- Spoliation - When is it Okay to Delete?
- Practical Discovery Techniques
- Locating Names and Aliases
- Viewing Private Profiles and Posts
- Missing or Deleted Information
- Subpoenaing Facebook (with Samples)
- How to Preserve What You Find
- Format to Enter into Evidence
- Laying a Foundation for Admissibility
- Blocking Social Media Evidence
- Text Messages and Smartphones: Applying Real-Life Strategies
11:00 - 12:00, Matthew R. Eslick
- Scope - What Needs to be Preserved?
- Discovery
- What to Collect With Texts to Ensure Usability in Court
- How to Collect Smartphone Evidence (Contacts, Call Logs, Geolocation, Banking, Photos, Videos and More)
- Sample Subpoena to Cell Phone Provider
- Laying the Foundation and Authenticating Texts (Real-World Examples)
- Overcoming Hearsay Issues
- How to Submit Texts as Evidence
- How to Block Discovery/Admission
- Digital Photos, Videos and Audio Files: Evidence Tips
1:00 - 2:00, Jay D. Grimes
- Where You Can Find Them
- Spoliation (Instagram, Vine, Snapchat and Other Photo- and Video-Sharing Apps)
- Duty to Preserve - Does it Extend to Non-Parties?
- Preservation How-to's
- How to Word Discovery Requests and Interrogatories
- Laying the Foundation for Admissibility (with Examples)
- Proving Evidence Hasn't Been Altered
- How to Block Evidence
- Email Evidence: Practical Discovery and Authentication Examples
2:00 - 3:15, R. Scott Johnson
- When is Duty to Preserve Triggered?
- Collecting Email: Do-it-Yourself Strategies
- How to Word Requests for Production (New Proportionality Factors)
- Sample Subpoenas
- Discoverability of Privileged ESI
- How to Preserve Evidence
- Metadata: Secrets it Reveals
- How to Authenticate and Admit Email Evidence
- Blocking Email Retrieval and Admission
- Ethics of Evidence
3:30 - 4:30, R. Scott Johnson
- Keeping Up with Technology
- Obtaining Evidence - Ethical Issues
- Confidentiality and Privilege
- Prejudicial or Dubious Evidence
- Ethics of Evidence Preparation
|