An Attorney’s duty of Technical Competence

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Ethical Issues in Data Security Breach Cases Presented by Robert J. Scott Scott & Scott, LLP
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
TECHNOLOGY & ETHICS Association of Corporate Counsel ©
Developing a Records & Information Retention & Disposition Program:
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
INTERNET and CODE OF CONDUCT
Legal Ethics and Social Networks Prof. David W. Opderbeck Seton Hall University Law School © 2011 David W. Opderbeck Licensed Under Creative Commons Attribution.
April 23, Massachusetts’ New Data Security Regulations: Ten Steps To Compliance Amy Crafts
Investigating & Preserving Evidence in Data Security Incidents Robert J. Scott Scott & Scott, LLP
HIPAA PRIVACY AND SECURITY AWARENESS.
Ethical Issues in E-discovery Across the Globe Jonathan Sachs, Esq. Robert Jones, EMEA.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Computer Forensics Principles and Practices
Data Mining Opinions Rita Assetto E-Discovery Fall 2009.
MAINTAINING PRIVACY & DATA SECURITY IN THE VIRTUAL PRACTICE OF LAW.
ETHICS, POLICY & SECURITY ISSUES
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
AVOIDING LEGAL MALPRACTICE AND ETHICS CLAIMS Marc L. Bogutz Louis J. Isaacsohn Wilson Elser Moskowitz Edelman & Dicker LLP Two Commerce Square 2001 Market.
A Road Map to Research at Jefferson: HIPAA Privacy and Security Rules for Researchers Presented By: Privacy Officer/Office of Legal Counsel October 2015.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
IT Summit November 4th, 2009 Presented by: IT Internal Audit Team Leroy Amos Sue Ann Lipinski Suzanne Lopez Janice Shelton.
Chapter 1: Information Security Fundamentals Security+ Guide to Network Security Fundamentals Second Edition.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
EDiscovery Also known as “ESI” Discovery of “Electronically Stored Information” Same discovery, new form of storage.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Security – 2015’s Biggest Threat to Client Confidentiality A Panel Discussion Joseph Abrenio, VP of Cyber Advisory Services & General Counsel Delta Risk.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
James G. Connell, III CJA Panel Training Program May 13, 2016.
PA 230 Unit 1, Lecture 2: Jeopardy PA 230 Jeopardy Class Rules Confidentiality E-Courthouse Paperless Tech in Law Firm Q $100 Q $200 Q $300 Q $400 Q.
When the law firm is the client Handling legal holds, document collections and productions of your own firm’s documents.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Law Firm Data Security: What In-house Counsel Need to Know
Ethics & Technology Sari w. montgomery Robinson Law group, llc
Protecting PHI & PII 12/30/2017 6:45 AM
Surveillance around the world
East Carolina University
Data Minimization Framework
Information Security.
Internet Ethics Complications of the Digital Age and Web Sites to Help You Untangle Them Title misleading Really, talk about electronic data production,
Understanding HIPAA Dr. Jennifer Lu.
CIPA Visit to ASPA 5 October 2016
The Ethics of Technology
Chapter Three Ethics and Professional Responsibility
LATIHAN MID SEMINAR AUDIT hiday.
Privacy and Security in the Employment Relationship
Mentor Orientation Richard Linn Inn American Inn of Court
Year 10 ICT ECDL/ICDL IT Security.
Breaches and State Bars: Legal Ethics in Cybersecurity and Data Breaches Seth M. Wolf Associate General Counsel University Hospitals Health System Scott.
Obtaining Electronic Evidence For Use in Litigation
Chapter 3: IRS and FTC Data Security Rules
Chapter 1: Information Security Fundamentals
Disability Services Agencies Briefing On HIPAA
Current Privacy Issues That May Affect Your Credit Union
eDiscovery 101: Navigating the Changes to the FRCP
General Data Protection Regulation
County HIPAA Review All Rights Reserved 2002.
Cybersecurity compliance for attorneys
Bonnie Weiss McLeod Cooley LLP
Legal Ethics of Information Governance Presented by Sean Monahan
Chapter 1: Information Security Fundamentals
HIPAA Overview.
BTEC level 3 Learning Aim D.
Protect data in core business applications
Information Security in Your Office
Anatomy of a Common Cyber Attack
Practical & Ethical Guidelines for Texting with Clients
School of Medicine Orientation Information Security Training
Presentation transcript:

An Attorney’s duty of Technical Competence Bill Ramsey Neal & Harwell

ABA Model Rule 1.1 August 2012 Amendments Comment [6] of Model Rule 1.1 was changed to Comment [8] and amended to add the phrase beginning with including: To maintain the requisite knowledge and skill, a lawyer should keep abreast of 93 changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject.

ABA Model Rule 1.6 August 2012 Amendments New paragraph (c): “A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of, or unauthorized access to, information relating to the representation of a client.” Comments [18 and 19], include factors to be considered in determining the reasonableness of a lawyer’s efforts to prevent disclosure or access. Comment [19] has the following new language: “Whether a lawyer may be required to take additional steps in order to comply with other law, such as state and federal laws that govern data privacy [E.g. HIPAA, etc], is beyond the scope of these rules.” [There is similar language in Comment 18] Factors to watch for: Avoiding a lawyer’s sending an email to the wrong person Avoiding someone’s “hacking” into a law firm’s network Staff’s posting client information on the internet Not every disclosure is a violation, but reasonable precautions are required

States’ Adoption of Changes August 2012 Amendments 25 States have Adopted so far (10 more since last year) Most of the remaining States are studying California imposes the duty, but has not adopted ABA Rules New Hampshire recognizes the duty Tennessee -- 2015-F-159 - Storing client information in the cloud Florida has approved mandatory CLE classes for lawyers 3 hours every 3 years

Practically, What Does “Technical Competence” Mean Technical Computer Skills Computer System Security Cloud computing Digital Forensics/eDiscovery Social Media Keeping up-to-date on technology trends and Anticipating the future

Technical Computer Skills It does not mean that you are the best with word processing It does mean that you know how to use (and not abuse email) It does not mean that you can operate e-discovery or trial presentation software itself It does mean that you know what e-discovery or trial presentation software can do

Technical Computer Skills Cont. Civil Litigators eDiscovery Digital Forensics Legal Research Transactional Lawyers Spreadsheets Document Versioning All Lawyers Security & Privacy

Computer System Security 1 in 4 firms with over 100 attorneys have experienced a breach Increased Targeting of Professional Services (Law Firms, CPAs, Etc) 2012 - 10 percent of firms experienced a breach 2014 - 15 percent of firms experienced a breach

Computer System Security Cont. Antivirus/Firewall is not enough Technical and Policy based controls are necessary Threats are advanced Third party patch management (adobe, java, etc) Encryption of portable devices and media minimal effort large ROI Mobile device management Asset information How can you protect what you don’t know is out there?

Computer System Security Cont. Password Fundamentals Don’t mix personal and professional passwords. Take advantage of the secure password generation utility. Use unique passwords for each account. For extra security integrate dual factor authentication with your password manager(we utilize DuoSecurity). Password managers encrypt all stored passwords with your master key. Use a secure master key (>12 characters)

Computer System Security Cont. Password Fundamentals Utilizing the password save feature in Internet Explorer and Google Chrome exposes your passwords in plaintext.    Prevents one password from accessing all of your accounts. Check to see if your email was part of a widespread breach - https://haveibeenpwned.com/

Computer System Security Cont

Computer System Security Cont

The “Cloud” The internet has changed the practice of law in many ways, including how data is stored and accessed. “Cloud computing” can be an economical and efficient way to store and use data. However, a lawyer who uses cloud computing must be aware of its effect on the lawyer’s professional responsibilities. The NHBA Ethics Committee adopts the consensus among states that a lawyer may use cloud computing consistent with his or her ethical obligations, as long as the lawyer takes reasonable steps to ensure that sensitive client information remains confidential. New Hampshire Advisory Op. 2012-13/4

The “Cloud” Standardize firm wide on a platform and protection of data Know what types of data can be put into a public cloud Not all providers are equal Where is my data stored? Data ownership Indexing of content How to protect confidential information Use of encryption Prevent sharing

eDiscovery 100x growth of data between 2016-2020 Portable Devices Impact of Internet of Things Portable Devices 6.4 billion internet connected devices by end of 2016 5.5 million every day Up from 5 billion last year Soon, “things” will place more information on the internet than people will

Digital Forensics Mobile Devices Collections can be complicated Parsing of data not keeping up with applications Social Media Constant changes Preservation Issues People overshare valuable data Internet of Things (IoT) Sensory data, Geo-tagging, voluminous data Targeted Collections

Social Media Have at least basic familiarity Source of evidence Witnesses Clients Opposing parties Experts Juror? Ethical Issues abound Contact with Represented Persons Client reviews Connecting with Judges

The Future… In the next 10 years or less, there will be dramatic changes in technology that will change the practice of law. You need to be ready. Some clients will require outside counsel to pass technology “exams” “Legal Tech Audit” ( former Kia General Counsel, Casy Flaherty) Clients do and will audit your firm’s information security Shrinking computer size Internet of Things Autonomous Cars Electronic financial transactions Alternatives to email Fantasy SCOTUS Holograms and Virtual Reality IBM Watson and/or Artificial Intelligence may replace some attorneys