The Fall 2017 Legal IT Seminar Series will focus on Cybersecurity and how lawyers need to address cybersecurity issues in their daily practice.
September 28 — John Gardner, Co-Founder, Accurate Data Partners, LLC
The purpose of the CLE will be to inform attorneys of the basics of Identity Theft, what it is, how it affects those victimized by it (law firms have fallen victim to Identity Theft), a quick overview of the laws that are driven by it, and where all this is heading.
Attorneys are under special requirements to maintain a high level of client security and personal responsibility for the technology in use in their practices. Failure to understand these requirements, including Identity Theft, can result in ethics violations, malpractice claims and financial ruin for the firm. This is an important seminar for all attorneys, whether large firm or small firm, to attend.
Approved for 1 hour Ethics CLE credit (177356)
John P. Gardner Jr., J.D., CITRMS is an attorney and one of the nation’s leading consultants on identity theft and data accuracy. He has consulted with various state and local governmental entities across the country, industry groups, and attorneys on identity theft, privacy and data protection legislation. He has helped to implement identity theft protection programs which today protect hundreds of thousands of Americans from data corruption and identity theft. Gardner is coauthor of If You are Me, Then Who am I? The Personal and Business Reality of Identity Theft a publication which quoted and used by the California Office of Privacy Protection and is on the Navy CIO’s Recommended Reading List.
Gardner is a founding Partner of Accurate Data Partners, LLC and a Certified Identity Theft Risk Management Specialist. Previously, Mr. Gardner served four terms in the South Carolina General Assembly and four years as a Commissioner for the South Carolina Department of Highways and Public Transportation where he Chaired the Highway Patrol Committee.
“Rethinking Trust and Verification: Uses for Blockchains in the Practice of Law”:
October 12 — Jack Pringle, Partner, Technology Lawyer and Information Privacy Professional at Adams and Reese LLP
All transactions, whether the transfer of funds, the sale of real and personal property, or otherwise, rely on trust and verification. And transactions traditionally require a bank, an escrow agent, or other trusted third party to ensure that trust and verification.
But what if a technology system could replace the third-party’s role so that any two
people could contract directly with one another? Blockchains (also called distributed
ledger systems) may soon offer validation in a number of areas where lawyers practice,
including financial transactions, proof and chain of title, and authentication of
many types. Understanding the technology, or at least its potential, is important
for those attorneys who take part in the process of authentication and verification.
Approved for 1 hour CLE credit (177503)
“Breach Response: Be Prepared or Face the Consequences”
October 26 — Karen Painter Randall — Partner, Chair — Cyber Security & Data Privacy Group, Connell Foley LLP
One can hardly turn on the news these days without hearing about the latest victim of a cyber-attack. The legal profession is not immune from the threat of a costly cyber breach. Cybersecurity is one of the biggest risks that law firms face today. Law firms are attractive targets because they hold valuable client information such as PII, PHI, and proprietary information including corporate mergers, patent and trade secrets, litigation strategy, and more. In fact, corporate clients are now conditioning retention on the strength of a firm’s data security plan and protection tools. The 2016 ABA Legal Technology Survey Reported that 30.7% of all law firms and 62.8% of firms over 500 lawyers had clients requesting details of its security protocols. The FBI repeatedly has issued warnings and held meetings with nearly all of the largest law firms in the United States about the risk of a data breach and theft of confidential and proprietary client information by countries such as China, Russia, North Korea and many others. Despite these warnings we continue to see some of the largest law firms in the United States get tangled up in major cybersecurity breaches. Whether or not you are prepared to manage a security breach will determine the final outcome. Thus, this program will focus on the importance of being prepared to respond to a data breach quickly to mitigate legal, ethical, regulatory and reputational loss.
Approved for 1 hour Ethics CLE credit (177668)
“Cybersecurity at Warp Speed for the Legal Profession”
November 9 — Sharon D. Nelson, Esq., President and John Simek, Vice President, Sensei Enterprises, Inc.
Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating and remediating data breaches is hideously expensive, not to mention the necessity of complying with state data breach notification laws. But there are a host of free and budget friendly tips. Our presenters will cover:
- Cybersecurity standards for small businesses
- How to prevent data breaches using a combination of technology, policies and training
- Secure computing when you’re on the road
- Two factor authentication
- Intrusion detection systems
- The new rules for strong passwords and password management
- What you must do after a data breach and the components of an Incident Response Plan
- Defending against — and recovering from — ransomware
November 16 — To Be Announced
Past Legal IT Seminars from this Semester
“Ransomware and Law Firms: Pay Me Now or Pay Me Later”
August 31 — Tom Scott, Executive Director, SC Cyber
Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. In recent years, personal use of computers and the internet has exploded and, along with this massive growth, cybercriminals have emerged to feed off this burgeoning market, targeting innocent users with a wide range of malware. The vast majority of these threats are aimed at directly or indirectly making money from the victims. Today, ransomware has emerged as one of the most troublesome malware categories of our time. Law firms are not exempt from these threats. Learn some of the strategies needed to safeguard your firm and your clients from the perils of Ransomware in this highly engaging presentation from SC Cyber.
Approved for 1 hour CLE credit (177314)
Past Legal IT Seminars Archive
Learn about past seminars.