Skip to Content

School of Law


Legal IT Seminar Series

The School of Law Information Technology Department, along with the Technology Law Students Association (TLSA) and the University of South Carolina School of Law's Student Bar Association (SBA) have joined together to present a regularly scheduled seminar series on Thursday mornings from 8:00 to 9:00 AM on how technology affects the law. The series features guest lecturers who are prominent experts in various legal technology fields. These free seminars are held in the Judge Karen J. Williams Courtroom in the School of Law, and are open to law students, to members of the legal community, and to the general public!

Fall 2017

The Fall 2017 Legal IT Seminar Series will focus on Cybersecurity and how lawyers need to address cybersecurity issues in their daily practice.

 

“Cybersecurity, It’s not always Cyber”

November 16 —  Lieutenant Britt Dove, Supervisor, Computer Crime Unit, South Carolina Law Enforcement Division (SLED)

Many times when we hear the word cybersecurity, we wonder where to start; firewalls, strong passwords, malicious actors, ransomware, and encryption.  As we attempt to protect our networks from the complex and changing technologies, we can easily overlook the physical aspect.

According to research by the National White Collar Crime Center (NW3C), after reviewing 1,800 instances of reported data breach from 2005 to 2016, 71.1% were not a result of hacking, but more attributed to personnel and organizational issues.  “Unintentional Insider” leading the way with 33.5%. 

This seminar will talk about cybersecurity and law enforcement, how the human element affects cybersecurity, no tech hacking, and what can be done to protect yourself.

Approved for 1 hour CLE credit (178041)

 

Past Legal IT Seminars from this Semester

“Ransomware and Law Firms: Pay Me Now or Pay Me Later”

August 31 — Tom Scott, Executive Director, SC Cyber

Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. In recent years, personal use of computers and the internet has exploded and, along with this massive growth, cybercriminals have emerged to feed off this burgeoning market, targeting innocent users with a wide range of malware. The vast majority of these threats are aimed at directly or indirectly making money from the victims. Today, ransomware has emerged as one of the most troublesome malware categories of our time. Law firms are not exempt from these threats. Learn some of the strategies needed to safeguard your firm and your clients from the perils of Ransomware in this highly engaging presentation from SC Cyber.

Learn more about Tom Scott.

Approved for 1 hour CLE credit (177314)

“Identity Theft”

September 28 — John Gardner, Co-Founder, Accurate Data Partners, LLC

The purpose of the CLE will be to inform attorneys of the basics of Identity Theft, what it is, how it affects those victimized by it (law firms have fallen victim to Identity Theft), a quick overview of the laws that are driven by it, and where all this is heading.

Attorneys are under special requirements to maintain a high level of client security and personal responsibility for the technology in use in their practices. Failure to understand these requirements, including Identity Theft, can result in ethics violations, malpractice claims and financial ruin for the firm. This is an important seminar for all attorneys, whether large firm or small firm, to attend.

Learn more about John Gardner.

Approved for 1 hour Ethics CLE credit (177356)

“Rethinking Trust and Verification: Uses for Blockchains in the Practice of Law”:

October 12 — Jack Pringle, Partner, Technology Lawyer and Information Privacy Professional at Adams and Reese LLP

All transactions, whether the transfer of funds, the sale of real and personal property, or otherwise, rely on trust and verification. And transactions traditionally require a bank, an escrow agent, or other trusted third party to ensure that trust and verification.

But what if a technology system could replace the third-party’s role so that any two people could contract directly with one another? Blockchains (also called distributed ledger systems) may soon offer validation in a number of areas where lawyers practice, including financial transactions, proof and chain of title, and authentication of many types. Understanding the technology, or at least its potential, is important for those attorneys who take part in the process of authentication and verification.

Learn more about Jack Pringle.

Approved for 1 hour CLE credit (177503)

“Breach Response: Be Prepared or Face the Consequences”

October 26 — Karen Painter Randall — Partner, Chair — Cyber Security & Data Privacy Group, Connell Foley LLP

One can hardly turn on the news these days without hearing about the latest victim of a cyber-attack. The legal profession is not immune from the threat of a costly cyber breach. Cybersecurity is one of the biggest risks that law firms face today. Law firms are attractive targets because they hold valuable client information such as PII, PHI, and proprietary information including corporate mergers, patent and trade secrets, litigation strategy, and more. In fact, corporate clients are now conditioning retention on the strength of a firm’s data security plan and protection tools. The 2016 ABA Legal Technology Survey Reported that 30.7% of all law firms and 62.8% of firms over 500 lawyers had clients requesting details of its security protocols. The FBI repeatedly has issued warnings and held meetings with nearly all of the largest law firms in the United States about the risk of a data breach and theft of confidential and proprietary client information by countries such as China, Russia, North Korea and many others. Despite these warnings we continue to see some of the largest law firms in the United States get tangled up in major cybersecurity breaches. Whether or not you are prepared to manage a security breach will determine the final outcome. Thus, this program will focus on the importance of being prepared to respond to a data breach quickly to mitigate legal, ethical, regulatory and reputational loss.

Learn more about Karen Painter Randall.

Approved for 1 hour Ethics CLE credit (177668)

Cybersecurity at Warp Speed for the Legal Profession

November 9 — Sharon D. Nelson, Esq., President and John Simek, Vice President, Sensei Enterprises, Inc.

Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating and remediating data breaches is hideously expensive, not to mention the necessity of complying with state data breach notification laws. But there are a host of free and budget friendly tips. Our presenters will cover:

  • Cybersecurity standards for small businesses
  • How to prevent data breaches using a combination of technology, policies and training
  • Secure computing when you’re on the road
  • Two factor authentication
  • Intrusion detection systems
  • Encryption
  • The new rules for strong passwords and password management
  • What you must do after a data breach and the components of an Incident Response Plan
  • Defending against — and recovering from — ransomware

Learn more about Sharon Nelson and John Simek.

Approved for 1 hour Ethics CLE credit (178040)

 

Past Legal IT Seminars Archive

Learn about past seminars.