

Law School
The Law School of America
The Law School of America podcast is designed for listeners who what to expand and enhance their understanding of the American legal system. It provides you with legal principles in small digestible bites to make learning easy. If you're willing to put in the time, The Law School of America podcasts can take you from novice to knowledgeable in a reasonable amount of time.
Episodes
Mentioned books

Aug 8, 2024 • 23min
Contract Law Chapter 7: Performance and Breach
Summary of Chapter 5: Performance and Breach.
Chapter 5 provides a comprehensive analysis of performance and breach in contract law, detailing the conditions under which contractual obligations are considered fulfilled and the various forms of breach that can occur. Understanding these concepts is crucial for navigating contractual relationships and resolving disputes.
Performance
Performance refers to the fulfillment of contractual obligations as agreed upon by the parties. Performance can be categorized into:
Complete Performance:
Definition: Complete performance occurs when all terms of the contract are fully satisfied without deviations.
Example: A contractor completes building a house exactly according to the specifications in the contract.
Implications: Complete performance discharges the performing party’s obligations and entitles them to full payment.
Substantial Performance:
Definition: Substantial performance occurs when a party fulfills enough of their contractual obligations to warrant payment, despite minor deviations.
Example: A contractor builds a house but uses a slightly different type of flooring than specified. The overall purpose of the contract is achieved.
Implications: The contractor is entitled to payment, minus any damages for the minor deviation.
Divisibility of Contracts:
Definition: A divisible contract is one where performance can be divided into separate parts, each with its own performance obligations and payments.
Example: A contract for the delivery of goods in installments, where payment is made for each installment upon delivery.
Implications: Divisible contracts allow for partial enforcement and compensation for each completed part of the contract.
Breach of Contract
A breach of contract occurs when one party fails to perform their contractual obligations without a valid legal excuse. Breaches can be classified as:
Material Breach:
Definition: A material breach is a significant failure to perform that permits the other party to terminate the contract and seek damages.
Example: A contractor fails to complete the project, leaving the structure incomplete.
Implications: The non-breaching party can terminate the contract and sue for damages.
Minor Breach:
Definition: A minor breach is a slight deviation from the terms that does not significantly impact the contract’s overall purpose.
Example: A contractor uses a different brand of paint than specified, but the overall quality and appearance are not affected.
Implications: The non-breaching party can seek damages but must still perform their obligations.
Anticipatory Repudiation:
Definition: Anticipatory repudiation occurs when one party indicates they will not perform their contractual obligations before the performance is due.
Example: A supplier informs a buyer in advance that they will not be able to deliver goods on the agreed date.
Implications: The non-breaching party can treat the contract as breached and seek remedies immediately.
Remedies for Breach
When a breach occurs, various remedies are available to address the harm caused. These remedies can be categorized into legal and equitable remedies.
Legal Remedies (Damages):
Compensatory Damages: Aim to put the non-breaching party in the position they would have been in if the contract had been performed.
Example: Recovering the additional cost of purchasing goods from another supplier if the original supplier breaches the contract.
Consequential Damages: Cover indirect and foreseeable losses caused by the breach.
Example: Claiming lost profits due to a supplier’s failure to deliver raw materials on time.
Punitive Damages: Intended to punish the breaching party for particularly egregious behavior and deter future misconduct.

Aug 7, 2024 • 25min
Property Law Chapter 6: Land Use Controls and Regulation
Summary of Chapter 6: Land Use Controls and Regulation.
Land use controls and regulations are vital tools used by governments and private parties to manage how land is developed, maintained, and used. These regulations ensure the harmonious coexistence of various land uses, promote public welfare, and protect environmental and community interests. This chapter covers key aspects of land use controls, including zoning laws, eminent domain, environmental regulations, and private land use agreements.
Zoning Laws and Ordinances.
Purpose: Zoning laws are established to separate different land uses, such as residential, commercial, and industrial areas, to promote organized and sustainable urban development.
Types of Zoning: Includes residential, commercial, industrial, agricultural, mixed-use, and special-purpose zoning, each with specific rules and regulations.
Legal Challenges: Issues such as nonconforming uses, variances, spot zoning, and exclusionary zoning often arise, requiring legal scrutiny and resolution.
Eminent Domain and Takings.
Eminent Domain: The government's power to take private property for public use, with just compensation to the owner, for projects like infrastructure, parks, or utilities.
Takings: Occurs when government regulations limit property use so significantly that they constitute a "taking" under the Fifth Amendment, requiring compensation.
Legal Cases: Key legal cases, such as Village of Euclid v. Ambler Realty Co. and Lucas v. South Carolina Coastal Council, have shaped the interpretation and application of eminent domain and regulatory takings.
Environmental Regulations.
Federal and State Laws: Environmental regulations, including the Clean Air Act and Clean Water Act, are designed to protect natural resources and public health by controlling pollution and managing land use impacts.
Environmental Impact Assessments: These assessments evaluate potential environmental effects of proposed projects and are essential for informed decision-making.
Legal Challenges: Compliance with environmental regulations often leads to legal disputes between property owners, developers, and regulatory agencies.
Private Land Use Controls.
Easements: Legal rights that allow specific use of another's land, such as access or utility placement, which can be appurtenant, in gross, prescriptive, or express.
Covenants and Equitable Servitudes: Private agreements that impose restrictions or obligations on land use to maintain community standards and property values.
Legal Considerations: Disputes can arise over the interpretation and enforcement of these private controls, with courts considering factors like intent, notice, and changed circumstances.
Conclusion.
Land use controls and regulations are critical for achieving balanced, sustainable development that respects both private property rights and public interests. By understanding zoning laws, eminent domain, environmental regulations, and private land use controls, individuals and communities can navigate complex land use challenges effectively.

Aug 6, 2024 • 35min
Criminal Law Chapter 6: Specific Crimes
Summary of Chapter 6: Specific Crimes
Chapter 6 delves into specific crimes that encompass a wide range of unlawful activities affecting individuals, businesses, and society at large. The chapter is structured into five main sections: Theft Offenses, Fraud and White-Collar Crimes, Sexual Offenses, Drug Offenses, and Public Order Crimes. Each section explores the elements, examples, legal defenses, and case law related to these crimes, providing a detailed understanding of their complexities and implications.
1. Theft Offenses: Larceny, Embezzlement, False Pretenses
Theft offenses involve the unlawful taking or use of someone else's property with the intent to permanently deprive the owner of its use. This section focuses on three primary types of theft offenses:
Larceny: Defined as the unlawful taking and carrying away of someone else's personal property with the intent to permanently deprive the owner of its use. Key elements include unlawful taking, carrying away (asportation), personal property, and intent to permanently deprive. Common defenses include a claim of right, lack of intent, and mistake.
Embezzlement: Involves the unlawful taking of property by someone who was initially in lawful possession of it. This crime often occurs in employment or fiduciary contexts where trust is abused. Key elements include lawful possession, conversion, and intent to defraud. Legal defenses may include lack of intent, consent, and duress.
False Pretenses: Obtaining property by intentionally misrepresenting a fact, leading the victim to transfer ownership. The crime focuses on obtaining title through deception. Elements include false representation, intent to defraud, reliance, and transfer of ownership. Defenses may include truth, no intent to defraud, and lack of reliance.
2. Fraud and White-Collar Crimes
Fraud and white-collar crimes are non-violent offenses committed primarily for financial gain. These crimes typically involve deceit, manipulation, and breaches of trust, often occurring in business or professional settings.
Fraud: Encompasses various illegal acts characterized by deceit, concealment, or violation of trust for personal gain. Common types include wire fraud, mail fraud, insurance fraud, and securities fraud. Elements involve a false statement, knowledge of falsity, intent to deceive, and reliance. Legal defenses include lack of intent, truthfulness, and no reliance.
White-Collar Crimes: Refer to non-violent offenses committed by individuals in business or professional settings. Common crimes include embezzlement, bribery, money laundering, and tax evasion. These crimes often involve deceptive practices, abuse of power, and complex schemes. Legal defenses may include lack of intent, mistake, and entrapment.
3. Sexual Offenses
Sexual offenses encompass a range of unlawful acts that violate an individual's sexual autonomy. These crimes are prosecuted aggressively due to their severe physical and emotional impact on victims.
Rape and Sexual Assault: Involve non-consensual sexual acts, characterized by force, threat, or incapacity. Key elements include non-consensual acts, force or threat, and incapacity. Legal defenses may involve consent, mistaken belief, and alibi.
Statutory Rape: Involves sexual activity with a person below the age of consent, regardless of willingness. Key elements include the victim's age and sexual activity. Legal defenses may include mistake of age and marriage.
Sexual Harassment: Involves unwelcome sexual advances or conduct creating a hostile environment. Types include quid pro quo and hostile work environment harassment. Legal defenses may involve consent and lack of hostility.
4. Drug Offenses
Drug offenses involve illegal activities related to controlled substances and are often treated seriously due to their social and public health implications.

Aug 5, 2024 • 34min
Constitutional Law Chapter 6: Judicial Powers
Chapter 6: Judicial Powers
Chapter 6 explores the role and authority of the judicial branch of the United States government, emphasizing its critical function in interpreting the law, safeguarding the Constitution, and ensuring justice. The chapter delves into the jurisdiction of federal courts, the powers of the Supreme Court, and the principles of judicial independence and accountability.
Jurisdiction of Federal Courts
Federal courts in the United States have a specific jurisdiction that allows them to hear and decide cases involving federal law, disputes between states, and issues that cross state boundaries. The chapter outlines the structure of the federal judiciary, which includes three main levels:
District Courts:
Trial Courts: These are the primary trial courts of the federal system, handling both civil and criminal cases. They have original jurisdiction over cases involving federal statutes, constitutional rights, and other federal matters.
Scope: District courts determine the facts of a case, apply relevant laws, and issue judgments. There are 94 district courts across the United States, each serving a specific geographic area.
Courts of Appeals:
Appellate Courts: Also known as Circuit Courts, they review decisions made by District Courts. The Courts of Appeals focus on legal errors and procedural issues rather than re-evaluating factual evidence.
Structure: There are 13 appellate courts in the U.S., including 12 regional circuits and one Federal Circuit. These courts play a critical role in developing federal law and ensuring consistency across the judiciary.
Supreme Court:
Highest Court: The Supreme Court is the final arbiter of constitutional and federal legal issues. It has discretionary appellate jurisdiction, meaning it can choose which cases to hear.
Judicial Review: The Court's power of judicial review, established in Marbury v. Madison, allows it to declare laws and executive actions unconstitutional, reinforcing the supremacy of the Constitution.
Principles of Federal Jurisdiction
The jurisdiction of federal courts is governed by several principles:
Justiciability: Federal courts only hear actual cases or controversies, ensuring judicial power is exercised in the context of real disputes.
Standing: Parties must demonstrate a personal stake in the case's outcome, showing they have suffered or will suffer a concrete injury that the court can remedy.
Federal Question and Diversity Jurisdiction: Federal courts handle cases involving significant federal legal questions or disputes between citizens of different states, ensuring national legal standards are applied consistently.
Powers of the Supreme Court
The Supreme Court's powers are extensive and pivotal to shaping American law and society:
Judicial Review:
Constitutionality: The Supreme Court can assess the constitutionality of laws and executive actions, striking down those that violate constitutional principles.
Landmark Cases: Decisions such as Brown v. Board of Education, Roe v. Wade, and Obergefell v. Hodges illustrate the Court's role in advancing civil rights and shaping societal norms.
Interpretation of the Constitution:
Philosophies: Justices may follow interpretive philosophies like originalism or the "living Constitution" approach, influencing how they view the Constitution's application to contemporary issues.
Setting Precedents: The Court establishes legal precedents through its rulings, guiding lower courts and shaping future legal interpretations.
Appellate and Original Jurisdiction:
Certiorari Process: The Supreme Court selectively hears cases of national significance, resolving conflicting decisions among lower courts.
Original Jurisdiction: The Court hears limited cases, such as disputes between states or involving ambassadors, addressing matters of immediate national importance.

Aug 2, 2024 • 35min
Civil Procedure Chapter 6: Discovery Process (Part 2)
Chapter 6: Discovery Process
The discovery process is a critical phase of civil litigation, allowing parties to obtain information and evidence relevant to their claims and defenses. This chapter explores various discovery tools, including requests for production, subpoenas, interrogatories, requests for admission, and depositions, highlighting their purposes, legal frameworks, strategic uses, and best practices.
6.1 The Scope of Discovery
Scope and Principles:
Relevance: Discovery is broad and allows parties to obtain information relevant to any claim or defense, even if not admissible at trial.
Proportionality: Requests must be proportional to the needs of the case, considering factors like importance, amount in controversy, and resources.
Privilege: Certain information, like attorney-client communications, is protected from discovery.
Challenges and Strategies:
Balancing comprehensive discovery with efficiency.
Addressing objections and disputes over scope and privilege.
6.2 Discovery Planning and Conferences
Discovery Planning:
Discovery Plan: Outlines scope, methods, and schedule for discovery, ensuring a structured approach.
Initial Disclosures: Parties exchange basic information early, identifying witnesses and documents supporting claims or defenses.
Conferences:
Purpose: Facilitate cooperation, clarify issues, and resolve disputes, reducing litigation costs and delays.
Strategies: Collaborate with opposing counsel, tailor the discovery plan to the case, and leverage technology.
6.3 Depositions
Depositions Overview:
Definition: Oral questioning of witnesses under oath, recorded for trial use.
Purpose: Gather detailed information, assess credibility, preserve testimony, and impeach witnesses.
Process:
Notice and Scheduling: Provide notice and coordinate timing and location.
Conduct: Attorneys question witnesses, and court reporters record proceedings.
Use at Trial: Can be used to impeach, preserve testimony, or substitute for live testimony.
Challenges and Strategies:
Manage costs, avoid evasive answers, and leverage technology for video depositions.
6.4 Interrogatories and Requests for Admission
Interrogatories:
Definition: Written questions answered under oath, revealing facts and legal positions.
Purpose: Clarify issues, identify witnesses and evidence, and narrow disputes.
Requests for Admission:
Definition: Requests to admit or deny facts or document authenticity, reducing trial complexity.
Purpose: Establish undisputed facts and simplify proceedings.
Best Practices:
Draft clear and precise requests, align with case strategy, and provide timely responses.
6.5 Requests for Production and Subpoenas
Requests for Production:
Definition: Demands for documents, ESI, or tangible items relevant to the case.
Purpose: Obtain evidence, clarify issues, and assess case strengths and weaknesses.
Subpoenas:
Definition: Court orders requiring third parties to produce evidence or testify.
Types: Subpoena duces tecum (documents) and subpoena ad testificandum (testimony).
Strategies:
Identify key third parties, draft clear requests, and ensure compliance with legal requirements.

Aug 2, 2024 • 41min
Civil Procedure Chapter 6: Discovery Process (Part 3)
Chapter 6: Discovery Process
The discovery process is a critical phase of civil litigation, allowing parties to obtain information and evidence relevant to their claims and defenses. This chapter explores various discovery tools, including requests for production, subpoenas, interrogatories, requests for admission, and depositions, highlighting their purposes, legal frameworks, strategic uses, and best practices.
6.1 The Scope of Discovery
Scope and Principles:
Relevance: Discovery is broad and allows parties to obtain information relevant to any claim or defense, even if not admissible at trial.
Proportionality: Requests must be proportional to the needs of the case, considering factors like importance, amount in controversy, and resources.
Privilege: Certain information, like attorney-client communications, is protected from discovery.
Challenges and Strategies:
Balancing comprehensive discovery with efficiency.
Addressing objections and disputes over scope and privilege.
6.2 Discovery Planning and Conferences
Discovery Planning:
Discovery Plan: Outlines scope, methods, and schedule for discovery, ensuring a structured approach.
Initial Disclosures: Parties exchange basic information early, identifying witnesses and documents supporting claims or defenses.
Conferences:
Purpose: Facilitate cooperation, clarify issues, and resolve disputes, reducing litigation costs and delays.
Strategies: Collaborate with opposing counsel, tailor the discovery plan to the case, and leverage technology.
6.3 Depositions
Depositions Overview:
Definition: Oral questioning of witnesses under oath, recorded for trial use.
Purpose: Gather detailed information, assess credibility, preserve testimony, and impeach witnesses.
Process:
Notice and Scheduling: Provide notice and coordinate timing and location.
Conduct: Attorneys question witnesses, and court reporters record proceedings.
Use at Trial: Can be used to impeach, preserve testimony, or substitute for live testimony.
Challenges and Strategies:
Manage costs, avoid evasive answers, and leverage technology for video depositions.
6.4 Interrogatories and Requests for Admission
Interrogatories:
Definition: Written questions answered under oath, revealing facts and legal positions.
Purpose: Clarify issues, identify witnesses and evidence, and narrow disputes.
Requests for Admission:
Definition: Requests to admit or deny facts or document authenticity, reducing trial complexity.
Purpose: Establish undisputed facts and simplify proceedings.
Best Practices:
Draft clear and precise requests, align with case strategy, and provide timely responses.
6.5 Requests for Production and Subpoenas
Requests for Production:
Definition: Demands for documents, ESI, or tangible items relevant to the case.
Purpose: Obtain evidence, clarify issues, and assess case strengths and weaknesses.
Subpoenas:
Definition: Court orders requiring third parties to produce evidence or testify.
Types: Subpoena duces tecum (documents) and subpoena ad testificandum (testimony).
Strategies:
Identify key third parties, draft clear requests, and ensure compliance with legal requirements.

Aug 2, 2024 • 35min
Civil Procedure Chapter 6: Discovery Process (Part 1)
Chapter 6: Discovery Process
The discovery process is a critical phase of civil litigation, allowing parties to obtain information and evidence relevant to their claims and defenses. This chapter explores various discovery tools, including requests for production, subpoenas, interrogatories, requests for admission, and depositions, highlighting their purposes, legal frameworks, strategic uses, and best practices.
6.1 The Scope of Discovery
Scope and Principles:
Relevance: Discovery is broad and allows parties to obtain information relevant to any claim or defense, even if not admissible at trial.
Proportionality: Requests must be proportional to the needs of the case, considering factors like importance, amount in controversy, and resources.
Privilege: Certain information, like attorney-client communications, is protected from discovery.
Challenges and Strategies:
Balancing comprehensive discovery with efficiency.
Addressing objections and disputes over scope and privilege.
6.2 Discovery Planning and Conferences
Discovery Planning:
Discovery Plan: Outlines scope, methods, and schedule for discovery, ensuring a structured approach.
Initial Disclosures: Parties exchange basic information early, identifying witnesses and documents supporting claims or defenses.
Conferences:
Purpose: Facilitate cooperation, clarify issues, and resolve disputes, reducing litigation costs and delays.
Strategies: Collaborate with opposing counsel, tailor the discovery plan to the case, and leverage technology.
6.3 Depositions
Depositions Overview:
Definition: Oral questioning of witnesses under oath, recorded for trial use.
Purpose: Gather detailed information, assess credibility, preserve testimony, and impeach witnesses.
Process:
Notice and Scheduling: Provide notice and coordinate timing and location.
Conduct: Attorneys question witnesses, and court reporters record proceedings.
Use at Trial: Can be used to impeach, preserve testimony, or substitute for live testimony.
Challenges and Strategies:
Manage costs, avoid evasive answers, and leverage technology for video depositions.
6.4 Interrogatories and Requests for Admission
Interrogatories:
Definition: Written questions answered under oath, revealing facts and legal positions.
Purpose: Clarify issues, identify witnesses and evidence, and narrow disputes.
Requests for Admission:
Definition: Requests to admit or deny facts or document authenticity, reducing trial complexity.
Purpose: Establish undisputed facts and simplify proceedings.
Best Practices:
Draft clear and precise requests, align with case strategy, and provide timely responses.
6.5 Requests for Production and Subpoenas
Requests for Production:
Definition: Demands for documents, ESI, or tangible items relevant to the case.
Purpose: Obtain evidence, clarify issues, and assess case strengths and weaknesses.
Subpoenas:
Definition: Court orders requiring third parties to produce evidence or testify.
Types: Subpoena duces tecum (documents) and subpoena ad testificandum (testimony).
Strategies:
Identify key third parties, draft clear requests, and ensure compliance with legal requirements.

Aug 1, 2024 • 30min
Tort Law Chapter 6: Privacy Torts (Part 3)
Privacy Torts
Privacy torts are civil wrongs that protect an individual's right to privacy. These torts can arise from a variety of actions, such as intrusion upon seclusion, appropriation of name or likeness, public disclosure of private facts, and false light.
Intrusion upon Seclusion
Intrusion upon seclusion occurs when someone intentionally intrudes upon another person's solitude or seclusion. This can include physically entering someone's home without permission, spying on someone, or eavesdropping on a private conversation.
Appropriation of Name or Likeness
Appropriation of name or likeness occurs when someone uses another person's name, likeness, or other identifying characteristics without their consent. This can include using someone's name or image in an advertisement, on a product, or in a work of art.
Public Disclosure of Private Facts
Public disclosure of private facts occurs when someone discloses private information about another person to the public. This can include disclosing someone's medical history, financial information, or sexual orientation.
False Light
False light occurs when someone portrays another person in a false or misleading light. This can include publishing a false or misleading story about someone, or creating a composite image of someone that is not accurate.
Privacy torts can have a significant impact on the victim, causing emotional distress, humiliation, and even financial harm. Victims of privacy torts may be able to recover damages for their injuries, including compensatory damages, punitive damages, and injunctive relief.
In addition to the four privacy torts discussed above, there are a number of other legal doctrines that can protect an individual's privacy. These include the Fourth Amendment to the United States Constitution, which protects against unreasonable searches and seizures, and the Health Insurance Portability and Accountability Act (HIPAA), which protects the privacy of medical information.

Aug 1, 2024 • 30min
Tort Law Chapter 6: Privacy Torts (Part 1)
Privacy Torts
Privacy torts are civil wrongs that protect an individual's right to privacy. These torts can arise from a variety of actions, such as intrusion upon seclusion, appropriation of name or likeness, public disclosure of private facts, and false light.
Intrusion upon Seclusion
Intrusion upon seclusion occurs when someone intentionally intrudes upon another person's solitude or seclusion. This can include physically entering someone's home without permission, spying on someone, or eavesdropping on a private conversation.
Appropriation of Name or Likeness
Appropriation of name or likeness occurs when someone uses another person's name, likeness, or other identifying characteristics without their consent. This can include using someone's name or image in an advertisement, on a product, or in a work of art.
Public Disclosure of Private Facts
Public disclosure of private facts occurs when someone discloses private information about another person to the public. This can include disclosing someone's medical history, financial information, or sexual orientation.
False Light
False light occurs when someone portrays another person in a false or misleading light. This can include publishing a false or misleading story about someone, or creating a composite image of someone that is not accurate.
Privacy torts can have a significant impact on the victim, causing emotional distress, humiliation, and even financial harm. Victims of privacy torts may be able to recover damages for their injuries, including compensatory damages, punitive damages, and injunctive relief.
In addition to the four privacy torts discussed above, there are a number of other legal doctrines that can protect an individual's privacy. These include the Fourth Amendment to the United States Constitution, which protects against unreasonable searches and seizures, and the Health Insurance Portability and Accountability Act (HIPAA), which protects the privacy of medical information.

Aug 1, 2024 • 30min
Tort Law Chapter 6: Privacy Torts (Part 2)
Privacy Torts
Privacy torts are civil wrongs that protect an individual's right to privacy. These torts can arise from a variety of actions, such as intrusion upon seclusion, appropriation of name or likeness, public disclosure of private facts, and false light.
Intrusion upon Seclusion
Intrusion upon seclusion occurs when someone intentionally intrudes upon another person's solitude or seclusion. This can include physically entering someone's home without permission, spying on someone, or eavesdropping on a private conversation.
Appropriation of Name or Likeness
Appropriation of name or likeness occurs when someone uses another person's name, likeness, or other identifying characteristics without their consent. This can include using someone's name or image in an advertisement, on a product, or in a work of art.
Public Disclosure of Private Facts
Public disclosure of private facts occurs when someone discloses private information about another person to the public. This can include disclosing someone's medical history, financial information, or sexual orientation.
False Light
False light occurs when someone portrays another person in a false or misleading light. This can include publishing a false or misleading story about someone, or creating a composite image of someone that is not accurate.
Privacy torts can have a significant impact on the victim, causing emotional distress, humiliation, and even financial harm. Victims of privacy torts may be able to recover damages for their injuries, including compensatory damages, punitive damages, and injunctive relief.
In addition to the four privacy torts discussed above, there are a number of other legal doctrines that can protect an individual's privacy. These include the Fourth Amendment to the United States Constitution, which protects against unreasonable searches and seizures, and the Health Insurance Portability and Accountability Act (HIPAA), which protects the privacy of medical information.


