This expert has been working in the digital technology industry for over 25 years. A Certified Forensic Consultant, Computer Examiner, and Digital Forensics Practitioner, he has conducted multiple computer forensics and e-discovery seminars for the New Jersey Bar Association and five different county bar associations. This expert is highly familiar with the Federal Rules of Civil Procedures and Federal Rules of Evidence regarding digital media, security and privacy laws, ...
This certified cyber security expert has over 25 years' experience in the global digital technology industry having spent the early years of her career as a software developer before working as a management consultant. She earned her post graduate diploma in e-commerce, economics, and technology at the University of London and a graduate diploma in law at University of Westminster. She has been a registered Information security auditor with International Register of ...
This expert in the fields of healthcare information technology, clinical documentation, and electronic discovery holds a Master’s of Jurisprudence in Health Law and Policy from the Loyola School of Law and a certificate in clinical informatics from the Johns Hopkins School of Medicine. She began her career as a medical staff assistant, later becoming the director of clinical information at Saint Therese Medical Center and the director of health information management ...
This expert is the principal and CEO of a management consulting group that assists healthcare organizations and communities with leveraging health information to improve operational efficiencies and clinical health outcomes. Currently she oversees the selection, implementation and use of electronic health records supporting more than 2000 providers in California. She and her team assist providers in improving performance, workflow and quality improvement efforts for ...
This expert has nearly 35 years of experience in the prevention of cyber crime and identity theft. Among the top consumer security and identity theft experts, he has worked with financial firms, governments, intellegence organizations, and Fortune 500 companies on identity theft education and prevention. He has acted as advisor to numerous security firms, including Check Point, Websense, Ntru Cryptosystems, Securify, and SiteLock, as well as several identity protection ...
This case involves an individual who held a residential property in a private subdivision. A natural barrier existed between his property and that of a neighbor, which consisted of a large stand of trees, primarily pine as well as a…
This medico legal case involves a woman who hired a law firm to represent her in a personal injury claim. The law firm employed a legal nurse consultant who also worked part-time as an instructor for a legal nurse consultant…
 This case involves a seventeen-year-old boy with Down syndrome who posed for a picture showing him and his artwork. The picture went viral on the Internet /network communications after a website generator featured the picture, labeling it a “Retarded Handicap Generator.” The website allowed users…
This case involves a high-school senior who did not like his school principal. The student decided to play a prank on the principal. The student used his grandmother’s computer to sign on to Myspace.com and created a parody profile of…
This pop culture and journalism case involves a musician who sued a website service. The celebrity was an internationally known musician, with multiple tours and television appearances. Three years prior to the musician filing suit, he had sexual intercourse with his…