Skip to main content

Not Found
Text-Based CLE

Faculty:
Mark Rosch |  Carole Levitt
Duration:
1:00
Short Description:
Lawyers looking for evidence need to start thinking about looking "virtually." With increasing amounts of "paperless" information being added to the Internet every minute of every day, there is an increasing chance lawyers could find potentially relevant evidence there. Evidence to prove or refute a point in contention, get the upper hand in a settlement conference, or decide w

Not Found
Books

Author:
Judy K. Davis, Esq |  Carole Levitt
Publication Date:
May 26, 2020
Short Description:
Internet Legal Research on a Budget directs lawyers to useful and reliable free (and low-cost) resources and explains how to use them effectively. This edition has updated information about resources discussed in the first edition, new resources, and expanded chapters on Casemaker and Fastcase.

Not Found
Books

The Cybersleuth's Guide to the Internet

Conducting Effective Internet Investigative and Background Research

Author:
Mark Rosch |  Carole Levitt
Short Description:
Short Description

Not Found
On Demand

Faculty:
Michael Maschke, EnCE, CEH, ACE, CISSP
Duration:
1 Hour 1 Minutes
Format:
Audio and Video
Short Description:
Electronic evidence plays a critical role in most cases. Frequently, relevant evidence is now found in the cloud and not on a local computer, server, or external hard drive. Businesses and consumers are using cloud services more than ever. Microsoft 365 has taken over the business world. Third-party messaging apps such as Instagram, TikTok, and WhatsApp continue to flourish. The cloud is now ...

Not Found
On Demand

Faculty:
Christian Pezalla, Esq.
Duration:
1:00
Format:
Audio and Video

Not Found
On Demand

Faculty:
Nicholas Taylor
Duration:
1 Hour 2 Minutes
Format:
Audio and Video
Short Description:
Imagine that you could find and have admitted as evidence virtually any public historical web content, and without having to rely on discovery from the opposing party. Imagine that you could thereby establish when specific information was first published, updated, or available online - e.g., patent disclosures, marks and copyrighted materials, terms of service, advertised claims regarding products

Not Found
On Demand

Faculty:
Danielle DavisRoe
Duration:
1 Hour
Format:
Audio and Video
Short Description:
Stop using your inbox as a task list. Ditch the carefully arranged stacks of files and paper lists. Learn how to create a digital task list that you can access from anywhere. See real world examples of how lawyers stay organized and focus on each day’s priorities in action in popular task list applications such as Microsoft To Do, Microsoft Planner, and Trello.

Not Found
On Demand

Faculty:
Steven L. Taylor
Duration:
1 Hour 13 Minutes
Format:
Audio and Video
Short Description:
Adopted in 2010, Criminal Rule 16(K) mandates that the parties disclose their expert-witness reports at least 21 days before trial.  If the 21-day rule is violated, the remedy at trial is exclusion to the extent there was non-compliance, a mandatory remedy reinforced and emphasized by the Ohio Supreme Court when it addressed the rule in State v. Boaston, 160 Ohio St.3d 46, 2020-Ohio-1061.

Not Found
On Demand

Faculty:
Philip Bogdanoff, Esq.
Duration:
2 Hours 1 Minutes
Format:
Audio and Video
Short Description:
Where the Crawdads Sing is a novel that has sold over 15 million copies and has been created into a best-selling movie.  In this murder mystery Catherine "Kya" Clark is accused of murdering Chase Andrews after their relationship ended.   We will examine the trial by reviewing clips of this movie and discussing the trial tactics by the prosecutor and defense.  

Not Found
On Demand

Faculty:
Sharon D. Nelson, Esq. |  John W. Simek
Duration:
1 Hour 1 Minutes
Format:
Audio and Video
Short Description:
One of the most overlooked aspects of security is training for employees. Employees are unwittingly involved in more than 80% of successful attacks. It has never been more critical for organizations to implement effective risk mitigation strategies, enhance security posture and protect information assets – which is hard to do without educating your employees. This is very important training

Please wait ...

Back to Top