How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out)
A Practical How-to Guide for Turning ESI into Evidence and Getting it Admitted
With all of the changes surrounding social media and email, it's critical to get up to speed on the latest rules, procedures and case law. This full-day, cutting-edge course will walk you through state processes, procedures and the latest case law while equipping you with handy how-to's, sample screen shots, real world examples and shortcuts along the way. Expert attorney faculty, who know the ins and outs of these groundbreaking new forms of evidence, will provide practical tech advice that you can actually understand and start using right away. From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI. Register today!
- Recognize key social media, email and text evidence and traverse obstacles to ensure relevancy, authenticity and that the best evidence rule is satisfied.
- Examine the latest rules, case law and procedures regarding the admission of email evidence.
- Identify common spoliation pitfalls, sanctions and defensible legal hold hurdles.
- Find out critical mistakes attorneys make when collecting Facebook and LinkedIn evidence.
- Gain an in-depth understanding of metadata, how to scrub it, remove it from documents and produce responsive, non-privileged ESI with appropriate metadata and OCR.
- Skillfully obtain ESI from smartphones, third parties, flash drives and external hard drives.
- Learn how to effectively work with social media companies to obtain deleted information.
- Apply business record and excited utterance hearsay exceptions to email, text messages and more.
- Learn proven methods for testing ESI, including comparison, hash tags, encryption and metadata.
- What to Look for, Where to Find it and What to do With it: Email, Social Media, Texts and Video
9:00 - 10:30, Cassie E. Preston
- Types of Data, Production Specifications and Formats - In Detail
- Obtaining Evidence: Smartphones, PCs and Tablets, Third Parties, Flash Drives and External Hard Drives, Cloud Storage
- Using Apps on Your Client's Smartphone to Collect Evidence
- Predictive Coding Do's and Don'ts
- Metadata Explained
- Defining Different Types and Formats
- Metadata Landmines to Avoid
- "Scrubbing" Metadata to Remove it from Documents
- Producing Responsive, Non-Privileged ESI with Appropriate Metadata and OCR
- Working with and Subpoenaing Social Media Companies
- Facebook's Archive Feature
- Using Friending/Following to Obtain Info
- What Can be Done if the Account's Been Closed?
- Obtaining Deleted Data
- Processing, Review and Production Pitfalls
- Applying Hearsay Exceptions and Overcoming Relevancy Issues
10:45 - 12:00, Cassie E. Preston
- Is Computer-Generated and Cell Phone Information Hearsay?
- Adhering to the Hearsay Rule
- Applying Hearsay Exceptions to Email, Text and Social Media
- Relevancy Hurdles
- How to Avoid Privilege Pitfalls
- Establishing Authenticity and Satisfying the Best Evidence Rule: The Unsurmountable Challenge
1:00 - 2:15, Brittany Buckley Salup
- Using Expert Witnesses
- Proactively Ensuring Authenticity of ESI
- Has the ESI Changed? What Evidence is Needed to Prove it Hasn't?
- How to Prove Electric Documents Have Not Been Modified
- Have the Systems Been Altered? How to Prove Reliability
- Identifying Who Made the Post and Linking to the Purported Author
- Is the Evidence What the Proponent Claims?
- Does the ESI Have Distinctive Characteristics?
- Examination of Circumstantial Evidence
- State Interpretation of Federal Rule 901
- Prima Facie Demonstration
- Proven Methods for Testing ESI (Comparison, Control, Hash Tags, Encryption and Metadata)
- Self-Authentication Methods
- Real-Life Examples and Recent Case Law
- Real-World Examples, Handy How-to's and Sample Screen Shots
2:30 - 3:30, Brittany Buckley Salup
- Preservation, Spoliation and Authentication Obstacles
- Facebook, Twitter, LinkedIn and Tumblr
- Emails (Work-Related and Personal)
- Video Surveillance (Private and Public)
- Computerized Versions of Contracts and Other Documents
- Texts Messages and Voicemail
- Chats and Instant Messages
- YouTube and Vine
- Instagram, Pinterest and Snapchat
- Legal Ethics and ESI
3:30 - 4:30, Jedd S. Malish
- Duties Owed to Clients, Opposing Counsel and the Courts
- ESI Issues to Address in the Courtroom
- Privilege Waivers
- Searching Social Networking Sites
- Personal Privacy Concerns Arising from Modern Database Searches
- Ethical Duties When Mining Metadata
From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI. (see
full course description)