How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out) training seminars presented by NBI Inc. register now on FindaSeminar.com

findaseminar logo balls FindaSeminar.com
event search registration and marketing services since 2002
Advanced Search
 
 

How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out)  

 Email information about this seminar How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out) by NBI Inc. to yourself your manager or associates Email this event... View and register for other training seminars like How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out) by NBI Inc. on FindaSeminar.com Find similar training.. Find and register for other training seminars by NBI Inc. on FindaSeminar.com Other seminars from NBI Inc.

By:

training seminars by NBI Inc. NBI Inc.   

For:

This intermediate level legal program is designed for attorneys. Paralegals may also benefit.

Cost:   

see Registration info for seminar cost, group discount etc.

Seminar Summary:

From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI. (see full course description)

 

 Seminar / Training class dates & locations

 

No seminar dates for this event are currently scheduled.  Please use the seminars search box above or choose one of the following additional training search options to find similar training.

admitted+court+social+media+emails+text+messages+evidence training seminars workshops conferences online training

Providers course catalog

Find seminars by state

Find seminars by city

Request on site training

Use Advanced Search

NEW  Don't miss training you want to attend

Receive a personal Training Alert when training you want to attend comes to your area. Create a personal Training Alert now  it's Free and only takes a minute!


 

 

 

share this page 

print the agenda print agenda for the How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out) seminar

 

 

Training Course Syllabus:


How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out)

A Practical How-to Guide for Turning ESI into Evidence and Getting it Admitted

With all of the changes surrounding social media and email, it's critical to get up to speed on the latest rules, procedures and case law. This full-day, cutting-edge course will walk you through state processes, procedures and the latest case law while equipping you with handy how-to's, sample screen shots, real world examples and shortcuts along the way. Expert attorney faculty, who know the ins and outs of these groundbreaking new forms of evidence, will provide practical tech advice that you can actually understand and start using right away. From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI. Register today!

  • Recognize key social media, email and text evidence and traverse obstacles to ensure relevancy, authenticity and that the best evidence rule is satisfied.
  • Examine the latest rules, case law and procedures regarding the admission of email evidence.
  • Identify common spoliation pitfalls, sanctions and defensible legal hold hurdles.
  • Find out critical mistakes attorneys make when collecting Facebook and LinkedIn evidence.
  • Gain an in-depth understanding of metadata, how to scrub it, remove it from documents and produce responsive, non-privileged ESI with appropriate metadata and OCR.
  • Skillfully obtain ESI from smartphones, third parties, flash drives and external hard drives.
  • Learn how to effectively work with social media companies to obtain deleted information.
  • Apply business record and excited utterance hearsay exceptions to email, text messages and more.
  • Learn proven methods for testing ESI, including comparison, hash tags, encryption and metadata.


  1. What to Look for, Where to Find it and What to do With it: Email, Social Media, Texts and Video
    9:00 - 10:30, Cassie E. Preston
    1. Types of Data, Production Specifications and Formats - In Detail
    2. Obtaining Evidence: Smartphones, PCs and Tablets, Third Parties, Flash Drives and External Hard Drives, Cloud Storage
    3. Using Apps on Your Client's Smartphone to Collect Evidence
    4. Predictive Coding Do's and Don'ts
    5. Metadata Explained
      1. Defining Different Types and Formats
      2. Metadata Landmines to Avoid
      3. "Scrubbing" Metadata to Remove it from Documents
      4. Producing Responsive, Non-Privileged ESI with Appropriate Metadata and OCR
    6. Working with and Subpoenaing Social Media Companies
    7. Facebook's Archive Feature
    8. Using Friending/Following to Obtain Info
    9. What Can be Done if the Account's Been Closed?
    10. Obtaining Deleted Data
    11. Processing, Review and Production Pitfalls
  2. Applying Hearsay Exceptions and Overcoming Relevancy Issues
    10:45 - 12:00, Cassie E. Preston
    1. Is Computer-Generated and Cell Phone Information Hearsay?
    2. Adhering to the Hearsay Rule
    3. Applying Hearsay Exceptions to Email, Text and Social Media
    4. Relevancy Hurdles
    5. How to Avoid Privilege Pitfalls
  3. Establishing Authenticity and Satisfying the Best Evidence Rule: The Unsurmountable Challenge
    1:00 - 2:15, Brittany Buckley Salup
    1. Using Expert Witnesses
    2. Proactively Ensuring Authenticity of ESI
    3. Has the ESI Changed? What Evidence is Needed to Prove it Hasn't?
    4. How to Prove Electric Documents Have Not Been Modified
    5. Have the Systems Been Altered? How to Prove Reliability
    6. Identifying Who Made the Post and Linking to the Purported Author
    7. Is the Evidence What the Proponent Claims?
    8. Does the ESI Have Distinctive Characteristics?
    9. Examination of Circumstantial Evidence
    10. State Interpretation of Federal Rule 901
    11. Prima Facie Demonstration
    12. Proven Methods for Testing ESI (Comparison, Control, Hash Tags, Encryption and Metadata)
    13. Self-Authentication Methods
    14. Real-Life Examples and Recent Case Law
  4. Real-World Examples, Handy How-to's and Sample Screen Shots
    2:30 - 3:30, Brittany Buckley Salup
    1. Preservation, Spoliation and Authentication Obstacles
    2. Facebook, Twitter, LinkedIn and Tumblr
    3. Emails (Work-Related and Personal)
    4. Video Surveillance (Private and Public)
    5. Computerized Versions of Contracts and Other Documents
    6. Texts Messages and Voicemail
    7. Chats and Instant Messages
    8. YouTube and Vine
    9. Instagram, Pinterest and Snapchat
  5. Legal Ethics and ESI
    3:30 - 4:30, Jedd S. Malish
    1. Duties Owed to Clients, Opposing Counsel and the Courts
    2. ESI Issues to Address in the Courtroom
    3. Privilege Waivers
    4. Searching Social Networking Sites
    5. Personal Privacy Concerns Arising from Modern Database Searches
    6. Ethical Duties When Mining Metadata

Seminar Summary:

From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI. (see full course description)

print this agenda print agenda for the How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out) training seminar

 view dates and locations for this seminar

 

 

 

Custom Search