Skip to Content

My Law School

Past Legal IT Seminars

The School of Law Information Technology Department, along with the Technology Law Students Association (TLSA) and the University of South Carolina School of Law’s Student Bar Association (SBA) have joined together to present a regularly scheduled seminar series on Thursday mornings on how technology affects the law. The series features guest lecturers who are prominent experts in various legal technology fields. The free seminars are held in the Judge Karen J. Williams Courtroom in the School of Law, and are open to both law students and members of the legal community.

Here is a list of past seminars.

Fall 2017

The Fall 2017 Legal IT Seminar Series will focus on Cybersecurity and how lawyers need to address cybersecurity issues in their daily practice.  

“Ransomware and Law Firms: Pay Me Now or Pay Me Later”

August 31 — Tom Scott, Executive Director, SC Cyber

Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. In recent years, personal use of computers and the internet has exploded and, along with this massive growth, cybercriminals have emerged to feed off this burgeoning market, targeting innocent users with a wide range of malware. The vast majority of these threats are aimed at directly or indirectly making money from the victims. Today, ransomware has emerged as one of the most troublesome malware categories of our time. Law firms are not exempt from these threats. Learn some of the strategies needed to safeguard your firm and your clients from the perils of Ransomware in this highly engaging presentation from SC Cyber.

Learn more about Tom Scott.

Approved for 1 hour CLE credit (177314)

“Identity Theft”

September 28 — John Gardner, Co-Founder, Accurate Data Partners, LLC

The purpose of the CLE will be to inform attorneys of the basics of Identity Theft, what it is, how it affects those victimized by it (law firms have fallen victim to Identity Theft), a quick overview of the laws that are driven by it, and where all this is heading.

Attorneys are under special requirements to maintain a high level of client security and personal responsibility for the technology in use in their practices. Failure to understand these requirements, including Identity Theft, can result in ethics violations, malpractice claims and financial ruin for the firm. This is an important seminar for all attorneys, whether large firm or small firm, to attend.

Learn more about John Gardner.

Approved for 1 hour Ethics CLE credit (177356)

“Rethinking Trust and Verification: Uses for Blockchains in the Practice of Law”

October 12 — Jack Pringle, Partner, Technology Lawyer and Information Privacy Professional at Adams and Reese LLP

All transactions, whether the transfer of funds, the sale of real and personal property, or otherwise, rely on trust and verification. And transactions traditionally require a bank, an escrow agent, or other trusted third party to ensure that trust and verification.

But what if a technology system could replace the third-party’s role so that any two people could contract directly with one another? Blockchains (also called distributed ledger systems) may soon offer validation in a number of areas where lawyers practice, including financial transactions, proof and chain of title, and authentication of many types. Understanding the technology, or at least its potential, is important for those attorneys who take part in the process of authentication and verification.

Learn more about Jack Pringle.

Approved for 1 hour CLE credit (177503)

“Breach Response: Be Prepared or Face the Consequences”

October 26 — Karen Painter Randall — Partner, Chair — Cyber Security & Data Privacy Group, Connell Foley LLP

One can hardly turn on the news these days without hearing about the latest victim of a cyber-attack. The legal profession is not immune from the threat of a costly cyber breach. Cybersecurity is one of the biggest risks that law firms face today. Law firms are attractive targets because they hold valuable client information such as PII, PHI, and proprietary information including corporate mergers, patent and trade secrets, litigation strategy, and more. In fact, corporate clients are now conditioning retention on the strength of a firm’s data security plan and protection tools. The 2016 ABA Legal Technology Survey Reported that 30.7% of all law firms and 62.8% of firms over 500 lawyers had clients requesting details of its security protocols. The FBI repeatedly has issued warnings and held meetings with nearly all of the largest law firms in the United States about the risk of a data breach and theft of confidential and proprietary client information by countries such as China, Russia, North Korea and many others. Despite these warnings we continue to see some of the largest law firms in the United States get tangled up in major cybersecurity breaches. Whether or not you are prepared to manage a security breach will determine the final outcome. Thus, this program will focus on the importance of being prepared to respond to a data breach quickly to mitigate legal, ethical, regulatory and reputational loss.

Learn more about Karen Painter Randall.

Approved for 1 hour Ethics CLE credit (177668)

“Cybersecurity at Warp Speed for the Legal Profession”

November 9 — Sharon D. Nelson, Esq., President and John Simek, Vice President, Sensei Enterprises, Inc.

Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating and remediating data breaches is hideously expensive, not to mention the necessity of complying with state data breach notification laws. But there are a host of free and budget friendly tips. Our presenters will cover:

  • Cybersecurity standards for small businesses
  • How to prevent data breaches using a combination of technology, policies and training
  • Secure computing when you’re on the road
  • Two factor authentication
  • Intrusion detection systems
  • Encryption
  • The new rules for strong passwords and password management
  • What you must do after a data breach and the components of an Incident Response Plan
  • Defending against — and recovering from — ransomware

Learn more about Sharon Nelson and John Simek.

Approved for 1 hour Ethics CLE credit (178040)

“Cybersecurity, It’s not always Cyber”

November 16 —  Lieutenant Britt Dove, Supervisor, Computer Crime Unit, South Carolina Law Enforcement Division (SLED)

Many times when we hear the word cybersecurity, we wonder where to start; firewalls, strong passwords, malicious actors, ransomware, and encryption.  As we attempt to protect our networks from the complex and changing technologies, we can easily overlook the physical aspect.

According to research by the National White Collar Crime Center (NW3C), after reviewing 1,800 instances of reported data breach from 2005 to 2016, 71.1% were not a result of hacking, but more attributed to personnel and organizational issues.  “Unintentional Insider” leading the way with 33.5%. 

This seminar will talk about cybersecurity and law enforcement, how the human element affects cybersecurity, no tech hacking, and what can be done to protect yourself.

Approved for 1 hour CLE credit (178041)

Spring 2017

Technology Every Ethical Lawyer Must Understand

January 5, 2017
Faculty: Dr. Gregory B. Adams, School of Law, University of South Carolina
Lawyers must be competent and must protect their clients’ confidential information. These ethical duties are two of the bedrocks of the Rules of Professional Conduct. Competence includes knowledge about the technology lawyers use in the course of representing, counseling, and communicating with and for their clients. Although these duties are rules of reason, what is reasonable is informed by legal requirements, such as privacy laws, as well as practices commonly recommended by experts and law enforcement. It is not reasonable to be a luddite merely because many lawyers are luddites.
This program will outline what lawyers must, at a minimum, know about computers, tablets, smartphones, email, cloud computing, and the internets. Attendees will receive an extensive list of technology resources for lawyers and law firms.
Dr. Adams has taught at the law school for 38 years, specializing in legal ethics, judicial ethics, law practice technology, as well as commercial and business law. He holds LL.M. and J.S.D. degrees from Columbia University School of Law and a J.D. and B.S. from LSU. He served for nearly two decades as a member of the South Carolina Bar Professional Responsibility Committee and presented its Report to the House of Delegates on the Adoption of the A.B.A. Ethics 2000 revisions to the Rules of Professional Conduct. He is a member of the A.B.A. Law Practice Division’s Committee on Ethics and Professionalism and its Law Practice Futures Initiative.
Dr. Adams has provided ethical guidance and expertise to hundreds of lawyers and law firms throughout this and other states, including most of the major law firms in South Carolina. He has been recognized by the South Carolina Supreme Court, the Court of Appeals, and Federal Courts as an expert on lawyers’ ethics and on business. Three South Carolina Attorneys General, the South Carolina Secretary of State, the United States Attorney for the District of South Carolina, and the U.S. Securities and Exchange Commission have relied upon his expertise to guide and assist them in significant criminal investigations and prosecutions. He has spoken on lawyers’ ethics at hundreds of Continuing Legal Education programs.

Legal Services Clients Need from Tech-Savvy Lawyers

January 19, 2017
Faculty: Jacqueline “Jax” M. Pavlicek, Esq. CIPP/US, Callison Tighe & Robinson
Lawyers who understand technology and laws governing its use offer important competencies to clients, not only in general, but in providing specialized counseling and advice as well as representation in litigation involving these issues. Lawyers frequently represent clients facing legal problems in these areas, and to fulfill their ethical duties, lawyers must provide competent representation or decline the matter. Young lawyers can develop their tech expertise and legal knowledge into valuable credentials that are attractive to employers and clients alike and use these abilities to attract clients and develop new kinds of services that are not already offered by their law firm or prospective firm. One of the most important issues for clients is protection of privacy rights related to digital information, which is stored in the cloud and transmitted electronically via the Internet. Similarly, lawyers have the ethical duty of confidentiality.
Jacqueline Pavlicek will discuss her experience in doing exactly that, offering insights into ways to develop expertise and skills and to attract clients by offering needed legal services that are not widely available, and to do it in ethically permissible ways.
Jacqueline “Jax” Pavlicek joined Callison Tighe as an associate in May 2014, after serving as a staff attorney for the South Carolina Court of Appeals. Since joining the firm she has concentrated on litigation and appellate work, including involvement in the case that paved the way for making same-sex marriage legal in South Carolina.
Pavlicek holds a CIPP/US designation from the International Association of Privacy Professionals (IAPP). She earned that credential after completing lengthy training and passing a comprehensive exam covering privacy and data protection laws and best practices. She provides clients in the private sector with counsel and representation in privacy matters, including helping clients respond in the event of data breaches. She can help businesses or organizations draft policies that comply with privacy laws.
Additionally, Pavlicek serves as a Young Privacy Professional Leader in the IAPP’s Columbia based KnowledgeNet chapter.

Legal Issues in Virtual Reality for Developers, Consumers and Entrepreneurs

February 2, 2017
Faculty: Brandon Huffman Esq. — Hutchison, PLLC 
This program will cover the history and state of virtual reality and augmented reality as well as legal concerns of developers and consumers including intellectual property, privacy, speech, impersonation, jurisdiction, risk of injury and potential applications for lawyers.

Tools to Help Victims of Nonconsensual Pornography

February 16, 2017
Faculty: Adam G. Massey, Esq., Associate, C. A. Goldberg, PLLC
This CLE will focus on the intersection of technology and personal privacy through the lens of nonconsensual porn — better known as “revenge porn”. Now criminalized in 34 states and the District of Columbia, nonconsensual pornography has harmed thousands of victims. The program will offer insights for practitioners, scholars and law students into state of the law, how it impacts victims, and the way forward in combating this crime.
The program will highlight best practices developed to address this topic, particularly the varied toolkit available to mitigate the harm of nonconsensual pornography, protect victims and de-anonymize offenders. In particular we will discuss how to respond in states, such as South Carolina, that lack criminal nonconsensual pornography laws.

Digital Forensics 101

March 2, 2017
Faculty: Dean Fowler, M.Ed. — Digital Forensics Examiner (ACE, CCLO, CCPA) — Liberty Associates
In today’s world, digital devices are generating massive amounts of data. This large amount of data must be properly handled and analyzed in a specific manner to ensure the integrity of the data. The science of Digital Forensics is very complex and can be overwhelming if the basics are not understood. The course will provide an overview of digital forensic terminology, concepts, and case examples that will be helpful for attorneys to handle their cases more effectively.

By the end of the course, attorneys will have basic information needed to understand the process of computer forensics, cell phone forensics, the main areas of focus in digital forensics, and the proper methods for seizure and search of electronic evidence.

Tips and Tools for Cloud Based Family Law Software

March 16, 2017
Faculty: Sean Keefer, Esq.
The CLE addresses tips and techniques related to the following;
The proper preparation of Financial Declarations, including information on engaging clients productively in the process.
How to best use the South Carolina Child Support Guidelines when preparing child support cases.
Thoughts on unique child support cases and strategies on applying the South Carolina Guidelines to the same.
Matters related to calculating Net Available Income for support cases.
Issues related to organizing and analyzing property division.
Online security and the use of Cloud based software in the legal setting.
Ethical considerations to all of the above.
The session is designed to be interactive and uses as a tool for demonstrating the above.

Lean Law Firm Management

March 23, 2017
Faculty: Dave Maxfield, Esq.
Dave Maxfield shows you how medium and small law firms can use techniques developed for manufacturing (Toyota Production System, Lean Management, Theory of Constraints) to run a profitable law office based on speed and flexibility.

Dave Maxfield is a practicing attorney with over twenty years’ experience in small and solo firms, specializing in consumer protection law in Columbia, South Carolina. He is a three-time ABA TechShow speaker on mind-mapping and paperless technology. Dave has also taught mind-mapping and Information Visualization techniques to lawyers as a consultant, as a lecturer at national and regional ABA and AAJ conferences, and to law students at Harvard, the University of Colorado, William & Mary, and UCLA.

Fall 2016

E-Discovery: Some Technical Things Lawyers Need to Know

September 8, 2016
Faculty: Sarah Montgomery, Attorney with the Executive Office of the U.S. Department of Justice & Adjunct Professor, University of South Carolina School of Law
Attendees will learn the basics about metadata, as well as metrics and technical terms that will help them navigate in E-Discovery or other matters where computer files and technology impact their area of practice

Identity Theft

September 22, 2016
Faculty: Marti Phillips, Director, Identity Theft Unit | Deputy Administrator
Have you ever received a data breach notice? Do you know how valuable your personal information is? During 2015, at least 626,300 South Carolina residents had their information compromised by data breaches. And according to the Bureau of Justice Statistics, an estimated 17.6 million people, or about 7 percent of U.S. residents age 16 or older, were victims of at least one incident of identity theft in 2014. This presentation will provide an introduction and overview of identity theft trends in South Carolina as well remedies for victims.

Protecting Health Information: HIPAA and Beyond

October 20, 2016
Faculty: Alexander M White, Deputy Chief Privacy Officer for the State of South Carolina
Since the passage of the Health Insurance Portability and Accountability Act (HIPAA) in 1996, health information privacy has become one of the more defined areas of privacy law in the United States. However, that does not mean the field is standing still: both the law and the technology are constantly evolving. In this session, we will discuss the important concepts that make up HIPAA and subsequent laws; how newly-implemented audits are changing healthcare regulation; and how the trendy devices collecting the most health information, wearables, fit in to existing regulatory frameworks.

Police Body-Cams: Practical, Policy, and Legal Implications

October 27, 2016
Faculty: Seth Stoughton, Assistant Professor of Law
Body-worn camera systems are quickly becoming an essential piece of policing equipment at agencies across the country. In this seminar, Professor Seth Stoughton will identify the potential advantages that police body-cams offer to law enforcement and to police/community relations. He will discuss the practical, policy, and legal implications that must be kept in mind as lawyers, police executives, policymakers, and communities adopt and evaluate this promising new technology.

Practice Management — Why It Is “Sanity Software” for Lawyers

November 3, 2016
Faculty: Steve Best, Partner for the Affinity Consulting Group and chair of the 2016 ABA Techshow
It’s impossible to manage any law practice if you don’t have a good handle on the status of every matter. The Model Rules require that a lawyer act with reasonable diligence and promptness when representing a client and knowing how to harness the power of practice management is key. Our presenter will cover both cloud-based and traditional software offerings for practice management and highlight the differences & similarities so you can make an informed decision on what system will work best for you and your practice.

Defense and Offense on the Internet: The Terminology of ‘Attacks’

November 17, 2016
Faculty: Marcos Vieyra, Chief Information Security Officer for the State of South Carolina
What is defense and offense in the context of the Internet? Do offensive activities always constitute an attack? Could some defensive actions, such as “hunting” within one’s own organizational boundaries, constitute an attack by a defender? Is accurate attribution of an attack within reach of average organizations, and if not, where does that leave us?
As an attorney, how would you advise a client with regard to these questions, either from an offensive-capability perspective or from a what-to-do-as-a-defender perspective? How might you help a client develop effective information security policy and governance given this state of affairs? Join us for a brief overview of these topics, and a defense-oriented approach to life on the Internet.

Spring 2016

Technodabble: The Use of Technology in ‘Undisclosed’

January 7, 2016
The Undisclosed Podcast picked up where the Serial Podcast left off: investigating the 1999 murder of Hae Min Lee and the question of whether Adnan Syed was wrongfully convicted of that crime. Associate Dean Colin Miller is one of the creators, producers, and hosts of the Podcast. He will discuss his use of technology in his development and recording of the podcast.

Police Body-Cams: Practical, Policy, and Legal Implications

January 21, 2016
Body-worn camera systems are quickly becoming an essential piece of policing equipment at agencies across the country. In this seminar, Professor Seth Stoughton will identify the potential advantages that police body-cams offer to law enforcement and to police/community relations. He will discuss the practical, policy, and legal implications that must be kept in mind as lawyers, police executives, policymakers, and communities adopt and evaluate this promising new technology.
View the video of this seminar


February 4, 2016
Michael Scherck, Supervisory Special Agent for the FBI Cybercrimes Unit for South Carolina will give an unclassified threat brief with focus on how current law affects FBI investigations. The presentation will be an excellent lead in to the South Carolina Law Review’s Symposium “Cyber Attacks and Civil Liability” which will be held later in the day on February 4 and all day February 5.

Lean Law Office Management

February 18, 2016
Dave Maxfield is a practicing attorney with over twenty years’ experience in small and solo firms, specializing in consumer protection law in Columbia, South Carolina. He is a three-time ABA TechShow speaker on mind-mapping and paperless technology. Dave has also taught mind-mapping and Information Visualization techniques to lawyers as a consultant, as a lecturer at national and regional ABA and AAJ conferences, and to law students at Harvard, the University of Colorado, William & Mary, and UCLA. Dave’s presentation will focus on taking a manufacturing systems based approach to small law firm office management, including how to be much more efficient in processes and in the use of technology.

Identity Theft and Data Security Breaches

March 3, 2016
Martha (“Marti”) Phillips, Esq. — Deputy Administrator and Director of the Identity Theft Unit at the South Carolina Department of Consumer Affairs. This presentation will provide a brief overview of the South Carolina Financial Identity Fraud and Identity Theft Protection Act (FIFITPA) with a focus on state data security breach notification laws and recent legislation regarding Personal Identifying Information (PII). The Act provides both protections for consumers in the areas of security freezes, credit reports, records disposal and also places requirements on businesses and public bodies with regard to the collection, maintenance, and disposal of consumers’ personal information.

The Virtual Law Office and Leveraging Technology

March 17, 2016
Anthony Bellino, Litigation Technology Help Desk Manager, Deloitte (Contractor) Litigation Technology Service Center (LTSC) Department of Justice/EOUSA. Anthony Bellino, a licensed attorney and project management specialist with Deloitte will discuss a practical approach for those seeking to improve efficiency, gain flexibility and provide a more streamlined client experience through the use of technology in the practice of law. Mr. Bellino will provide insight to technology that can help “virtualize” the practice of law and enhance client interaction. He will speak to apps and tools available, and demo some virtual case software.

Emerging Issues in European Privacy Law

March 31, 2016
Alexander M White, Deputy Chief Privacy Officer for the U.S. State of South Carolina. Developments in international law are especially impactful when it comes to personal information. Organizations transfer this data, or pieces of it, across borders regularly, potentially submitting their operations to the laws and regulations of those jurisdictions. No jurisdiction is more influential in modern privacy law than the European Union, where big changes have occurred and look to continue. In this session, we will discuss recent developments in US-EU privacy interactions and examine a sweeping new EU law that could affect organizations around the world.

Fall 2015

Proportionality in Civil E-Discovery

September 17, 2015
Sarah Montgomery, an attorney with the Executive Office of the U.S. DOJ and an adjunct professor teaching Civil E-Discovery at the School of Law will discuss proportionality in civil e-discovery in light of the upcoming amendments to the Federal Rules of Civil Procedure. The seminar will cover what lawyers (in-house and outside counsel) and judges need to know from a technical standpoint when making proportionality determinations in civil discovery.

Cloud Computing and the Virtual Law Office

October 1, 2015
Anthony Bellino, a licensed attorney and project management specialist with Deloitte will discuss Cloud Computing, the Virtual Law Office, and how attorneys are leveraging technology in the 21st Century. The seminar will cover a discussion of cloud computing and how attorneys are using technology to virtualize the practice of law.
View the video of this seminar

A Legal Perspective on Transportation Network Companies and Other Developments in Driving

October 15, 2015
This interactive seminar with Bryant Walker Smith will survey legal issues raised by Transportation Network Companies such as Uber and Lyft in the context of broader developments in motor vehicle design and operation (including increasing automation and connectivity).
View the video of this seminar

Billing 101

November 12, 2015
Have you ever wondered, what’s the deal with billing? Come hear an attorney discuss the basics of billing, including what activities are billed, a lawyer’s time increments, and why it’s important to have a method to stay organized. Then see a demonstration of one billing program used in firms, Clio, by Certified Clio Consultant Doug Edmunds.
View the video of this seminar