
Meng Li
Attorney, Software Engineer, Forensic Investigator, Pilot
California
CA
"Communicative, knowledgeable, efficient"
About
Cyber world has been experiencing its fastest evolution from ever. In the era of Web 3 people do not simply read or post contents, but also own contents with unique identifications. Intellectual properties have become not only possessed by large corporations or seasoned… read more content creators, but anyone who has flash ideas and creations that are valuable. I am here to probide you with ideas that not only helps with protection of values, but also the innovation of them to a further dimention.
Beside above, I am also available for general consultations of other fields I know with decent proficiency of case research.
upcounsel
experience
Practice Areas
Client Reviews
"Meng is great! He gave me clear answers for edge cases of the contract."
"Meng was very communicative and detailed on the project and got back very promptly!"
"I needed a contract to be drafted within 24hrs and Meng pulled it off. Meng was very responsive and knowledgeable. Looking forward to more projects going forward."
"Answered questions, knowledgeable, non-rushed, factual and thoroughly. Price reasonable. Will request advice in the future."
"An excellent, smart lawyer with tremendous knowledge. gave me sound advice as to handle my particular situation. I would definitely hire him again . Thank you."
"Meng has made decent consultations regarding strategies of defending against a complicated suit. As a result, we have minimized not only our settlements, but also the fees for potential litigation. Very cost effective. Recommended!"
Work History
Taft Law School
Adjunct Professor
May 2022 - Present
Adjunct professor at Taft Law School. Currently teaching Community Property
Amuleta Computer Security Inc.
Private Investigator/Security Analyst
Jul 2015 - Present
Worked as:
- Cyber security investigator with the scope of conducting cyber investigation of criminal/civil suits in cooperation with other parties, digital forensic work with professional and specific software with techniques to extract data from storage devices
- Analysis of maliciously programmed codes and scripts within enterprise computer systems