Font size:

What to Look for, Where to Find it and What to do With it: Email, Facebook, Texts and Video

This full-day, comprehensive course will walk you through processes, procedures and the latest electronic evidence case law while equipping you with handy how-to's, sample screen shots, real world examples and shortcuts to obtain critical evidence. Expert attorney faculty, who know the ins and outs of these groundbreaking new forms of evidence, will provide practical tech advice that you can actually understand and start using right away. From email to Facebook and smartphone evidence, this comprehensive electronic evidence guide will give you invaluable insight and proven ways for identifying, preserving, producing, authenticating and admitting electronic evidence. Register today!

  • Examine the latest rules, case law and procedures regarding the admission of electronic evidence.
  • Discover how  to ensure relevancy and authenticity.
  • Explore effective ways to obtain critical evidence from tablets, flash drives and cloud storage.
  • Find out how to collect Facebook and LinkedIn evidence.
  • Gain an in-depth understanding of metadata, how to scrub it, remove it from documents and produce it.
  • Learn how to effectively work with social media companies to obtain deleted information.
  • Learn proven methods for testing electronic evidence, including comparison, hash tags, encryption and metadata.

  1. What to Look for
    9:00 - 9:45, Ray F. Middleman
    1. Different Types of Electronic Data
    2. Different Electronic Formats - in Detail
    3. Identifying Relevant Systems and Data
    4. Who are You Going to get the Data From?
    5. Privileged ESI That is Discoverable (Exceptions)
  2. Metadata Explained
    9:45 - 10:30, Ray F. Middleman
    1. Defining Different Types and Formats
    2. Metadata Landmines to Avoid
    3. "Scrubbing" Metadata to Remove it from Documents
  3. How to Preserve it
    10:45 - 11:30, Christopher T. Hildebrandt
    1. Preservation Made Simple
    2. Spoliation Pitfalls
    3. Sanctions and Proportionality
    4. Protective Orders, Production and Privilege Logs
    5. Defensible Legal Holds
    6. Case Law Update
  4. Where to Find it and How to Collect it
    11:30 - 12:30, Steven M. Barth
    1. Obtaining Evidence: Smartphones, PCs and Tablets, Third Parties, Flash Drives and External Hard Drives, Cloud Storage
    2. Using Apps on Your Client's Smartphone to Collect Evidence
    3. Predictive Coding Do's and Don'ts
    4. Working with and Subpoenaing Social Media Companies and Phone Carriers
    5. Facebook's Archive Feature
    6. Using Friending/Following to Obtain Info
    7. What can be Done if the Account's Been Closed?
    8. Obtaining Deleted Data
    9. Secrets to Finding Text Evidence
    10. Retrieving Hard to Get Email Evidence
  5. What to do with it: Processing, Review and Production
    1:30 - 2:15, Bradley J. Kitlowski
    1. Now I have the Data, Now What?
    2. Reviewing the Data
    3. Citing Online Content Properly
    4. Processing the Data
    5. Testing ESI, Including Comparison, Hash Tags, Encryption and Metadata
    6. Producing Responsive, Non-Privileged ESI with Appropriate Metadata and OCR
  6. How to Get it Authenticated and Admitted
    2:15 - 3:15, Julian E. Neiser
    1. Proactively Ensuring Authenticity
    2. Has the ESI Changed? What Evidence is Needed to Prove it Hasn't?
    3. How to Prove Electronic Documents Have Not Been Modified
    4. Have the Systems Been Altered? How to Prove Reliability
    5. Identifying Who Made the Post and Linking to the Purported Author
    6. Is the Evidence What the Proponent Claims?
    7. Does the ESI have Distinctive Characteristics?
    8. Examination of Circumstantial Evidence
    9. State Interpretation of Federal Rule 901
    10. Proven Methods for Testing ESI
    11. Self-Authentication Methods
    12. Real-Life Examples and Recent Case Law
  7. Legal Ethics and ESI
    3:30 - 4:30, Julian E. Neiser
    1. Duties Owed to Clients, Opposing Counsel and the Courts
    2. ESI Issues to Address in the Courtroom
    3. Privilege Waivers
    4. Searching Social Networking Sites
    5. Personal Privacy Concerns Arising from Modern Database Searches
    6. Ethical Duties When Mining Metadata

The course you have selected has limited or no upcoming scheduled training dates!

Please browse similar courses or request more information for assistance.'s training support team will respond within one business day with relevant offerings.