2010, 2015

Maryland’s Traffic Laws

October 20th, 2015|DUI / Traffic|

When a traffic accident occurs, the question becomes: who is at fault. In this article Emdenlaw discusses three of Maryland's traffic laws that are frequently implicated in car accidents. Learn More.

2909, 2015

A La Carte Legal Representation

September 29th, 2015|Uncategorized|

As you may know, a lawyer's actions are guided by the ethics rules called Rules of Professional Conduct (RPCs). The Model RPCs are written by the American Bar Association (ABA), a national volunteer organization with nearly 400,000 members, including judges, lawyers, and law students. Learn More

2509, 2015

The Automobile Exception

September 25th, 2015|Criminal Defense|

Another situation that comes up frequently is police conducting a search of a vehicle. If you are pulled over for speeding or running a stop sign, can the police search your car to look for incriminating evidence against you? Learn More.

2409, 2015

Business Partner Login Access Disputes

September 24th, 2015|Uncategorized|

While disputes between business partners are quite common, a new set of legal problems has arisen with the increased pressure on businesses to have an online presence (from informational websites to making commercial websites with products available online). Learn More.

2209, 2015

How Accessible Is the Data on Your Phone?

September 22nd, 2015|Uncategorized|

Most people have their phones protected by passcodes, and the easiest way to access your phone is to know this passcode. If the police demand that you provide them with the passcode, do you have to give it to them? Learn More.

1709, 2015

Online Spoofing

September 17th, 2015|Criminal Defense|

Online "spoofing" is an act of masquerading as someone else in order to trick, alarm, or annoy another; to do so is often a crime. Cybercriminals can spoof many aspects of our electronic communications, and arguably the easiest one to spoof is an email address. Learn More.

1109, 2015

What You Tweet May Be Used Against You!

September 11th, 2015|Criminal Defense|

Recently, the courts have struggled with articulating a clear standard for authenticating evidence from social media. This is because social media content, more so than other types of evidence, can be easily fabricated. Learn More.

909, 2015

Stored Communications Act: the Good, the Bad, and the Ugly

September 9th, 2015|Criminal Defense|

We would like to be able to control who has access to our photos, posts, status updates, tweets, emails, and other data we send and share electronically. While the privacy settings in our social media accounts may give us a sense of security, how robust are the laws protecting our online privacy? Learn More.

2808, 2015

Searches and Seizures: The Basics

August 28th, 2015|Criminal Defense|

The 4th Amendment to the US Constitution protects all of us from unreasonable searches and seizures. Guarding you from things like the police breaking down your door in the middle of the night, wire-tapping your phone, searching your car, or looking through your cell phone. Learn More.

If You Want to Consult With Me About Your Case, Please Schedule a Consultation

General Questions
Fill Out The Following Form

    Go to Top