Qualified? Residential Building Businesses Require a Qualifying Officer

Residential builders who do not comply with licensing requirements face high stakes. Michigan courts have denied unlicensed builders the ability to collect on contracts with homeowners. Contractors can avoid this unfortunate situation through proper compliance with state licensing requirements.

Most contractors who perform residential construction projects in Michigan are aware that they must be a state-licensed residential builder. Mixed use projects, where both housing and commercial space exists in the same building, are easily overlooked. These projects, especially popular in downtown areas, also require a residential builder’s license.

Read More

Sutherland Presents “How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out)

Attorney Suzanne Sutherland will present, “How to Get Your Social Media, Email and Text Evidence Admitted (and Keep Theirs Out),” in collaboration with the National Business Institute on Friday, October 20, 2017, in Ann Arbor, Michigan.

Topics covered will include:

• Recognizing key social media, email and text evidence and traverse obstacles to ensure relevancy, authenticity and that the best evidence rule is satisfied
• Examining the latest rules, case law and procedures regarding the admission of email evidence
• Identifying common spoliation pitfalls, sanctions and defensible legal hold hurdles
• Finding out critical mistakes attorneys make when collecting Facebook and LinkedIn evidence
• Gaining an in-depth understanding of metadata, how to scrub it, remove it from documents and produce responsive, non-privileged ESI with appropriate metadata and OCR
• Skillfully obtaining ESI from smartphones, third parties, flash drives and external hard drives
• Learning how to effectively work with social media companies to obtain deleted information
• Applying business record and excited utterance hearsay exceptions to email, text messages and more
• Learning proven methods for testing ESI, including comparison, hash tags, encryption and metadata

Read More