Excellence. Integrity. Success.

Federal Practice & Procedure

Federal Rules of Civil Procedure
The Federal Rules of Civil Procedure, or Fed. R. Civ. P., are the official rules governing how civil lawsuits may progress in federal United States district courts.  These rules govern topics including: pleadings, discovery, motions, defenses, counterclaims, etc..

Federal Rules of Appellate Procedure
The Federal Rules of Appellate Procedure, or Fed. R. App. P., are the official rules governing how appeals progress before the United States Courts of Appeals.

Federal Rules of Evidence
The Federal Rules of Evidence are the rules governing what evidence may be used in both civil and criminal trials, and the procedures controlling how that evidence must be introduced and how it may be used.

Jury Instructions
Jury instructions are legal rules for jurors to follow when deciding the outcome of a case.  These instructions vary among judicial circuits and districts.  Circuits having model jury instructions are linked below:

Public Access to Court Electronic Records (PACER)
The Public Access to Court Electronic Records service, or PACER, is an electronic public access service that allows users to obtain case and docket information online from federal, district, and bankruptcy courts.  It provides access to most documents filed in legal proceedings before the federal courts, albeit for a fee.

Delaware Default  Standard for Discovery. Including Discovery of ESI
The Delaware Default Standard for Discovery, including discovery of ESI, governs the preservation of discoverable information, initial discovery procedures, and electronic discovery procedures, among other things.  In the context of patent disputes, there are also specific procedures relating to initial infringement and invalidity contentions.

Delaware Default Standard for Access to Source Code
The Delaware Default Standard for Access to Source Code is a default standard for obtaining source code during discovery in patent litigation.  The standard requires that access to source code be made available for inspection, and password protected to ensure secrecy of sensitive information.