Font size:

A Practical How-to Guide for Turning ESI into Evidence and Getting it Admitted

With all of the changes surrounding social media and email, it's critical to get up to speed on the latest rules, procedures and case law. This full-day, cutting-edge course will walk you through state processes, procedures and the latest case law while equipping you with handy how-to's, sample screen shots, real world examples and shortcuts along the way. Expert attorney faculty, who know the ins and outs of these groundbreaking new forms of evidence, will provide practical tech advice that you can actually understand and start using right away. From email to Facebook, Twitter and Snapchat, to YouTube, Pinterest and video surveillance, this comprehensive ESI guide will give you invaluable insight into proven ways for identifying, preserving, producing, admitting and blocking ESI. Register today!

  • Recognize key social media, email and text evidence and traverse obstacles to ensure relevancy, authenticity and that the best evidence rule is satisfied.
  • Examine the latest rules, case law and procedures regarding the admission of email evidence.
  • Identify common spoliation pitfalls, sanctions and defensible legal hold hurdles.
  • Find out critical mistakes attorneys make when collecting Facebook and LinkedIn evidence.
  • Gain an in-depth understanding of metadata, how to scrub it, remove it from documents and produce responsive, non-privileged ESI with appropriate metadata and OCR.
  • Skillfully obtain ESI from smartphones, third parties, flash drives and external hard drives.
  • Learn how to effectively work with social media companies to obtain deleted information.
  • Apply business record and excited utterance hearsay exceptions to email, text messages and more.
  • Learn proven methods for testing ESI, including comparison, hash tags, encryption and metadata.

  1. Top Admission Mistakes Made with ESI
    9:00 - 9:45, Thomas James Barnes
    1. Preparation, Coordination and Submission
    2. Weighing the Duty to Mitigate with the Duty to Hold Evidence for Trial
    3. Duty to Produce and Preserve
    4. Spoliation Pitfalls
    5. Sanctions and Proportionality
    6. Protective Orders, Production and Privilege Logs
    7. Defensible Legal Holds
    8. Citing Online Content Properly
    9. Privileged ESI That is Discoverable (Exceptions)
    10. Clawback Agreements
    11. Making Email Evidence Usable in the Courtroom
  2. What to Look for, Where to Find it and What to do With it: Email, Social Media, Texts and Video
    9:45 - 10:30, Keith Morris
    1. Types of Data, Production Specifications and Formats - in Detail
    2. Obtaining Evidence: Smartphones, PCs and Tablets, Third Parties, Flash Drives and External Hard Drives, Cloud Storage
    3. Using Apps on Your Client's Smartphone to Collect Evidence
    4. Predictive Coding Do's and Don'ts
    5. Metadata Explained
      1. Defining Different Types and Formats
      2. Metadata Landmines to Avoid
      3. "Scrubbing" Metadata to Remove it from Documents
      4. Producing Responsive, Non-Privileged ESI With Appropriate Metadata and OCR
    6. Working with and Subpoenaing Social Media Companies
    7. Facebook's Archive Feature
    8. Using Friending/Following to Obtain Info
    9. What can be Done if the Account's Been Closed?
    10. Obtaining Deleted Data
    11. Processing, Review and Production Pitfalls
  3. Applying Hearsay Exceptions and Overcoming Relevancy Issues
    10:45 - 12:00, David V. Wilson II
    1. Is Computer-Generated and Cell Phone Information Hearsay?
    2. Adhering to the Hearsay Rule
    3. Applying Hearsay Exceptions to Email, Text and Social Media
    4. Relevancy Hurdles
    5. How to Avoid Privilege Pitfalls
  4. Establishing Authenticity & Satisfying the Best Evidence Rule: The Unsurmountable Challenge
    1:00 - 1:45, Thomas James Barnes
    1. Proactively Ensuring Authenticity of ESI
    2. Has the ESI Changed? What Evidence is Needed to Prove it Hasn't?
    3. How to Prove Electronic Documents Have Not Been Modified
    4. Have the Systems Been Altered? How to Prove Reliability
    5. Identifying Who Made the Post and Linking to the Purported Author
    6. Is the Evidence What the Proponent Claims?
    7. Does the ESI have Distinctive Characteristics?
    8. Examination of Circumstantial Evidence
    9. State Interpretation of Federal Rule 901
    10. Prima Facie Demonstration
    11. Proven Methods for Testing ESI (Comparison, Control, Hash Tags, Encryption and Metadata)
    12. Self-Authentication Methods
    13. Real-Life Examples and Recent Case Law
  5. Using Expert Witnesses to Get Your Evidence in (and Keep Theirs Out)
    1:45 - 2:30, Susan Meek
  6. Real-World Examples, Handy How-to's and Sample Screen Shots
    2:45 - 3:30, Susan Meek
    1. Preservation, Spoliation and Authentication Obstacles
    2. Facebook, Twitter, LinkedIn and Tumblr
    3. Emails (Work-Related and Personal)
    4. Video Surveillance (Private and Public)
    5. Computerized Versions of Contracts and Other Documents
    6. Text Messages and Voicemail
    7. Chats and Instant Messages
    8. YouTube and Vine
    9. Instagram, Pinterest and Snapchat
  7. Legal Ethics and ESI
    3:30 - 4:30, David V. Wilson II
    1. Duties Owed to Clients, Opposing Counsel and the Courts
    2. ESI Issues to Address in the Courtroom
    3. Privilege Waivers
    4. Searching Social Networking Sites
    5. Personal Privacy Concerns Arising from Modern Database Searches
    6. Ethical Duties When Mining Metadata

The course you have selected has limited or no upcoming scheduled training dates!

Please browse similar courses or request more information for assistance.'s training support team will respond within one business day with relevant offerings.