James G. Connell, III CJA Panel Training Program May 13, 2016.

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

Whos Got Your Name? NLADA Annual Meeting November 8, 2007 Will Hornsby ABA Division for Legal Services
WHAT IS HIPAA? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) provides certain protections for any of your health information.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Revised: January, 2015 Mid-Atlantic Patient Safety Organization Patient Safety and Quality Improvement Act of 2005 Confidentiality Training.
1 WHAT CAN I DO ABOUT OPPOSING COUNSEL TALKING TO OUR EMPLOYEES? James H. Gilliam BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
© The McCoy Law Firm 2012 James McCoy The McCoy Law Firm Coit Rd., Ste. 560 Dallas, Texas (214)
Law 20 Conflicts of Interest. o Based on duties of o Loyalty o Confidentiality o Rules cover: o Concurrent representation of adverse clients o Representation.
Week Duty to keep quiet, not talk about cases By product of Fiduciary Duty 2. Right not to be forced to testify about communications --Statutory.
BELMONT UNIVERSITY AMERICAN INN OF COURT SEPTEMBER 9, 2014 PRESENTED BY KRISANN HODGES DEPUTY CHIEF DISCIPLINARY COUNSEL - LITIGATION BOARD OF PROFESSIONAL.
TECHNOLOGY & ETHICS Association of Corporate Counsel ©
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Interviewing & Investigation LAW-123 Introduction to Interviewing and Investigating.
Scott F. Johnson Maureen MacFarlane.  Attorneys have a myriad of ethical obligations  This presentation covers some of those obligations and considers.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
Two Hats, One Lawyer: Demystifying Privilege & Confidentiality Stuart I. Teicher, Esq.
© 2003 Rule 1.9. Duties to Former Clients (a) A lawyer who has formerly represented a client in a matter shall not thereafter represent another person.
HIPAA Health Insurance Portability & Accountability Act of 1996.
1 EFFECTIVE IN-HOUSE COMMUNICATIONS AND PRESERVING THE PRIVILEGES Presented By: John Eldridge Haynes and Boone, LLP (713) and Chris Chaffin BMC.
Outsourcing: The Ethical Issues Steven M. Richman November 2014.
Legal Ethics and Social Networks Prof. David W. Opderbeck Seton Hall University Law School © 2011 David W. Opderbeck Licensed Under Creative Commons Attribution.
Social Law Library MailSafe Encrypted Service Compliance Driven, Secure Service.
“Internet” and “Operator” (COPPA Statute) InternetOperator Collectively the myriad of computer and telecommunications facilities, including equipment.
PA 230 Unit 5 Midterm Review.
A User's Guide to Data Security and Control Copyright © 2010 Virya Technologies A Basic Guide to the Importance of Data Security and Control.
(Edited) WORKPLACE PRIVACY.
The Ethics of Internal Investigations SELECTED ABA MODEL RULES OF PROFESSIONAL CONDUCT AND COMMENTS By: Cecil E. Morris, Jr. Pendleton, Wilson, Hennessey.
HIPAA PRIVACY AND SECURITY AWARENESS.
Social Media in the Workplace MEGAN QUIRK, ATTORNEY AT LAW.
Wire Fraud. Prevention Avoid sending sensitive financial information via . Use encrypted . Educate clients about fraud. Contact the intended.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Avoiding Traps in Internal Investigations H. Lee Barfield II Bass, Berry and Sims PLC November 5, 2010.
1 Lecture 3: Conflict of Interest ( 利益衝突 ) Please refer to Chapter 5, “Ethics and the Conduct of Business” by John R. Boatright BBA 361 BBA 361 Business.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
Data Mining Opinions Rita Assetto E-Discovery Fall 2009.
The Model Rules of Professional Conduct and Electronic Tools: How Ethical Rules Must Adapt to Address Current and Forthcoming Technologies By Melissa Freeman.
NETWORK SECURITY. TextBook William Stallings, Cryptography and Network Security: Principles and Practice, ? Edition.
AVOIDING LEGAL MALPRACTICE AND ETHICS CLAIMS Marc L. Bogutz Louis J. Isaacsohn Wilson Elser Moskowitz Edelman & Dicker LLP Two Commerce Square 2001 Market.
Chapter Three Confidentiality In this chapter, you will learn about: Basic principles of confidentiality The attorney-client privilege and the difference.
Wholesale Market Rule Monitoring and Enforcement by the Public Utility Commission of Texas Danielle Jaussaud PUCT Wholesale Market Oversight March 23,
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
John Steele, Attorney at Law. 2 Confidentiality 3 Topics 1. Definitions 2. Comparison 3. ABA Approach 1. Rule; Exceptions; Other rules 4. California.
Trade Secrets Basics Victor H. Bouganim WCL, American University.
Carlsmith Ball LLP Cyber Issues For Lawyers Deborah Bjes October 22 nd, 2015.
Session 8 Confidentiality and disclosure. 1 Contents Part 1: Introduction Part 2: The duty of confidentiality Part 3: The duty of disclosure Part 4: Confidentiality.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Indiana’s Public Access Laws Heather Willis Neal Indiana Public Access Counselor Indiana Association of Cities and Towns Red Flag and Sunshine Workshop.
Understanding Wisconsin Supreme Court Rule 20:1.14.
Shirley Peng August 6, Things to think about… 1) Safety Plan 2) Evacuation Routes 3) Inventory 4) Shoes 5) Cases  CA/Retainer/Important docs uploaded.
1 Ethical Lawyering Spring 2006 Class 8. 2 Rest. 68 Except as otherwise provided in this Restatement, the attorney-client privilege may be invoked as.
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Law Firm Data Security: What In-house Counsel Need to Know
Ethics & Technology Sari w. montgomery Robinson Law group, llc
Recognizing the Client
An Attorney’s duty of Technical Competence
Online Training Course
CIPA Visit to ASPA 5 October 2016
The Ethics of Technology
What are the rules that apply? What are duties of the lawyer?
Fingerprinting and Criminal History Background Checks
is not secure is not secure..
What do you hope to learn from this session
Cybersecurity compliance for attorneys
Legal Ethics of Information Governance Presented by Sean Monahan
Protecting Student Data
School of Medicine Orientation Information Security Training
Presentation transcript:

James G. Connell, III CJA Panel Training Program May 13, 2016

Disclaimer All views are my own. I do not speak on behalf of the United States, the Department of Defense, the Military Commission Defense Organization, or anyone else. Nothing in the presentation is based on, confirms, or denies classified information. This presentation does not address intelligence collection. I have no connection with the products recommended in this presentation.

Why Hack You? Maryland Personal Information Protection Act, Maryland Code Annotated Comm. Law

ABA Model Rule 1.6 ABA Comment 18: “The unauthorized access to, or the inadvertent or unauthorized disclosure of, information relating to the representation of a client does not constitute a violation of paragraph (c) if the lawyer has made reasonable efforts to prevent the access or disclosure.” Factors include: 1.The sensitivity of the information; 2.The likelihood of disclosure if additional safeguards are not employed; 3.The cost of employing additional safeguards; 4.The difficulty of employing additional safeguards; and 5.The extent to which the safeguards adversely affect the lawyer’s ability to represent clients.

Texas Opinion No. 648 (2015) In general, considering the present state of technology and usage, a lawyer may communicate confidential information by . In some circumstances, however, a lawyer should consider whether the confidentiality of the information will be protected if communicated by and whether it is prudent to use encrypted or another form of communication. Examples of such circumstances are: communicating highly sensitive or confidential information via or unencrypted connections;... sending an if the lawyer knows that the recipient is accessing the on devices that are potentially accessible to third persons or are not protected by a password; or sending an if the lawyer is concerned that the NSA or other law enforcement agency may read the lawyer’s communication, with or without a warrant.

Encrypt telephone and text Signal For iOS and Android

Encrypt

Litigate your vulnerability

Questions? (703)