Skip to Content

My Law School

Past Legaltech Seminars

The School of Law Information Technology Department, along with the Technology Law Students Association (TLSA) and the University of South Carolina School of Law’s Student Bar Association (SBA) have joined together to present a regularly scheduled seminar series on Thursday mornings on how technology affects the law. The series features guest lecturers who are prominent experts in various legal technology fields. The free seminars are held in the Judge Karen J. Williams Courtroom in the School of Law, and are open to both law students and members of the legal community.

Here is a list of past seminars.

The Fall 2018 Legaltech Seminar Series focused on Artifical Intelligence.  

The Malpractice of Hunches: Data Analytics, AI, and Legal Ethics

September 6, 2018 — Ed Walters, CEO of Fastcase

Clients ask lawyers the most important questions facing their families and trust lawyers with bet-the-company questions. But lawyers answer these questions, for the most part, based on limited experience (at best) or hunches (at worst). Businesses analyze data for every part of their business, from marketing and supply chain to personnel and sales — every part except law. As clients seek to make more data-driven decisions, what obligation do law firms have to collect and refine data about opposing parties, judges, outcomes, and costs? Are we preparing another generation of law students to duck these questions, or answer them with hunches? Fastcase CEO Ed Walters will examine the frontiers of AI and data analytics, as well as the obligations of lawyers under the Model Rules of Professional Responsibility to employ and supervise artificial intelligence and data analytics tools at the frontiers of legal tech.

1 hour Ethics CLE credit (186576)

Make Sure the Tool Isn’t You: Managing Attention in the Information Age

September 27, 2018 — Jack Pringle, Adams and Reese, LLP

Computer networks and devices are now so accessible they rarely leave our hands. And for perhaps the first time in human history, the tools we use to help us be productive lawyers have also been designed specifically to capture our attention for decidedly unproductive purposes.

In fact, the “variable rewards” and “dopamine-driven feedback loops” engineered into smartphones, devices, applications, and social media platforms pose a constant and significant obstacle to stayed focused on important projects during the work day. According to a 2017 study by Asurion, Americans check their phone on average once every 12 minutes, and 31 percent of Americans feel regular anxiety when separated from their phone.

Excessive Internet browsing and smartphone use have been linked to increased anxiety and depression, and can result in increased isolation and less social interaction. And since work is increasingly done outside the office, including at home, our devices rarely leave our hands. When every spare second is occupied by buzzes, beeps, and notifications, there is scarce opportunity for the brain and body to rest and recharge.

This presentation will posit that attention is the most valuable commodity possessed by those in the legal profession (or in any profession), and that all of us are going to need all the attention we can muster to navigate the “Second Machine Age” (tip of the cap to Professors McAfee and Brynjolfsson). In addition, the potential pitfalls of constant “connection” will be explored, with an eye towards understanding when screen time becomes unhealthy and unproductive.

Accordingly, the presentation will also consider the nature of the distractions we face, explore ways to navigate them and get needed space from technology tools when appropriate, and discuss how to pay attention to the important stuff (in part by taking advantage of what computers do best while at the same time avoiding letting them take advantage of us).

1 hour Ethics & 1 hour Substance Abuse/Mental Health CLE credit (186600)

Learn more about Mr. Pringle 

“Legal Implications of Artificial Intelligence” 

October 24, 2018 — Bryant Walker Smith, Assistant Professor of Law, University of South Carolina School of Law

Artificial intelligence has a range of meanings and elicits a range of reactions. Lawyers of the future will work on, with, and against artificial intelligence. This talk will offer a technical overview of AI, introduce key legal issues, and highlight specific regulatory case studies.

Learn more about Professor Walker Smith

1 hour CLE credit (187980) 

“The Evolution of Artificial Intelligence: How It Affects Your Legal Practice Today and Will in the Next Five Years” 

October 25, 2018 — Patrick Cleary, Bowman and Brooke LLP

Artificial intelligence is not a binary concept.  There will not be a single point where human lawyers are replaced by a sentient artificially intelligent application.  But artificial intelligence concepts are entering the legal services profession.  This presentation will provide a short history of AI, a description of what AI actually involves, the levels of AI, the benefits and challenges of AI, where AI concepts are already being used in the legal profession, and predictions on where AI will change our profession going forward. 

 1 hour CLE credit (187176)

“Deus ex machina: Utilizing Technology-Assisted Review in Tandem with Relativity® to Resolve the Dilemma of Overwhelming Data Sets” 

November 8, 2018 — Michelle Fogel, Senior Practice Support Coordinator,  McNair Law Firm, P.A.

During theatrical presentations in ancient Greece, a “theos ek mekhanes” or “god from the machina” would lower over the stage at a pivotal moment in the plot. This stage mechanism would contain an actor playing a god, who would hover over the actors and offer a resolution to whatever conflict the play’s characters were facing. In Euripides’ Medea, for example, the Sun-God Helios descended and allowed Medea to escape punishment for killing her two young sons.

The Latin translation — deus ex machina — is used in modern times (particularly in literature and film) to describe an unlikely or artificial concept, character, or device that is introduced to resolve a plot dilemma. The unsolvable problem is miraculously solved; the antagonist is effortlessly defeated. The deus ex machina exists and responds within a storyline in a way that can almost be described as “divine intervention.”

Luckily for those of us who work in the legal industry (and who must respond to discovery requests that dictate the collection of data from numerous and voluminous sources), we have our own versions of this “god from the machine” — our own form of “divine intervention.” We have advanced technological tools that allow us to resolve the oftentimes-overwhelming task of delving through thousands or millions of documents to find a sub-set of relevant items for production. Artificial intelligence — or the replication of human intelligence by technology — is the force behind many of these tools. In the case of e-Discovery, artificial intelligence drives the tools we use for technology-assisted review, or TAR.

This presentation will offer an overview of the history of artificial intelligence as it exists within e-Discovery, with a particular focus on the latest trends in technology-assisted review tools. We will also examine the role metadata plays after artificial intelligence has been applied to a data population — specifically how a review team can easily identify the nuances of a document’s information using metadata and the review tool Relativity®.

This presentation will, lastly, include a brief give-and-take session where attendees may express their thoughts to these questions: does the use of artificial intelligence in e-Discovery detract from the data (or the discovery) itself … does using it make humans less logical or less creative? Or does this modern-day “god” offer a reasonable and uncontrived solution — working symbiotically with humans to resolve our data dilemma? If the latter is so, how do we defend against loss of creativity/logical thought and keep from becoming overly-dependent on these machines that provide seemingly-miraculous solutions?

1 hour CLE credit (187177)

“Creativity and Artificial Intelligence”

November 15, 2018 — Brandon J. Huffman, Founder, Odin Law and Media

Creativity is distinctly human. The ability to imagine, design and realize new works and innovative technologies from nothing is something that other beings have not mastered. This fundamental assumption of human existence is changing. Artificial intelligence (AI) and machine learning are now making it possible for non-human entities to create works of art. From fine art and music to precise feats of engineering, computers are now authors and inventors. Copyright law is intended to protect exclusive rights in specific expression. When individuals create, copyright ownership is clear. The individual's rights are clear. The waters are muddied, but still navigable when a corporate entity or employer is involved or where a group of individuals collectively create. But how does the law deal with AI creations? Who owns it? What rights do they own? What if AI infringes on another's rights? Who is liable? This presentation will explore these and other themes surrounding the impact of AI on intellectual property. 

1 hour CLE credit (188362) 

The Spring 2018 Legaltech Seminar Series focused on Law Firm Office Technology and how lawyers need to address ever-changing issues in their daily practice.  

“Lawyers’ Duties of Technological Competence”

January 11, 2018 — Dr. Gregory B. Adams, Associate Professor of Law, University of South Carolina School of Law

Ninety-five percent of cyber breaches result from human error: ignorance and carelessness. Threats come from everywhere. Law firms frequently fail to protect confidential information that is created, stored, and transmitted electronically.

Lawyers have ethical duties of competence and confidentiality; similar fiduciary duties are owed clients by lawyers and law firms. This seminar will identify and illustrate these ethical and fiduciary duties as they apply to computers, tablets, smart phones, email, the internet, and the cloud. Dr. Adams will provide practical tips and techniques to avoid ethical and fiduciary breaches and the loss of professional reputation and clients as well as how to minimize the danger of catastrophic liability.

Learn more about Professor Adams.

Approved for 1-hour Ethics CLE credit (181277)

“Technology for a Paperless Small Law Firm”

January 25, 2018 — Thomas Pendarvis, Esq., Pendarvis Law Offices, P.C.

There’s a lot more to going “paperless” than simply buying a scanner and some software. A wide variety of technology alternatives are available for lawyers and law firms. Similarly, a multitude of methodologies are available to a small law firm to incorporate those technical tools into a “paperless” operation of the firm’s practice.  Thomas Pendarvis will share some of the tips and tricks that he has employed since 2004 in operating his “paperless” law firm, as well as discussing developing trends in the legal technology field.   

Approved for 1-hour CLE credit (182228)

“Law Firm Compliance with HIPAA”

February 22, 2018 — Emily Suski, Assistant Professor of Law, University of South Carolina School of Law and Craig Stanley, Director of Legal Affairs, University of South Carolina School of Medicine

Please note a room change for this event: This seminar will take place in Room 289.

HIPAA covers more than just health care providers. Lawyers and law firms can be business associates under HIPAA because they receive and maintain protected health information. When they do, they must comply with HIPAA’s requirements regardless of whether they have signed business associate agreements. This seminar will discuss business associate status and what it requires of lawyers and law firms under HIPAA. Specifically, it will discuss HIPAA’s privacy, security, and breach requirements for law firms and lawyers and the relationship between those requirements and lawyers’ ethical obligations regarding confidentiality of client information.

Learn more about Professor Suski.

Approved for 1-hour Ethics CLE credit (181358)

“Cloud Computing Practice Management for Lawyers”

March 8, 2018 — William Booth, Esq.

Starting around 2008, an attorney seeking to purchase and implement a practice management system for keeping track of cases or matters had a choice along two divergent paths.  Does the attorney choose a traditional packaged application and install on local computers or does the attorney purchase the system from a vendor who owns the software and runs it on computers in its data center?  Without IT support staff or budgets to manage expensive on-premises solutions, the cloud is a welcome alternative. 

Attorney William Booth, a former chairperson of the South Carolina Bar’s Law Office Technology Committee, will discuss the various cloud based practice management options for attorneys, as well as helpful resources that allow attorneys make the proper, insightful cloud practice management choices for themselves and their clients.

Learn more about Mr. Booth.

Approved for 1-hour CLE credit (183099) 

“Pro Bono Software”

March 22, 2018 — Justice John Cannon Few, Supreme Court of South Carolina

The Justice Index rated South Carolina worst in the country at providing poverty stricken people with access to attorneys. Less than 1,000 of South Carolina's approximately 9,000 active attorneys provide pro bono legal services. Meanwhile, many of South Carolina's attorneys are actively seeking opportunities to gain more experience — either to develop new skills or to expand their practice areas. In an attempt to integrate these two demands, Justice John Cannon Few has pioneered the development of a new legal software that uses state of the art technology to match attorneys with those in need. This seminar will unveil this new software to our legal community in South Carolina.

Approved for 1-hour CLE credit (181242)

“Knowledge Management”

April 5, 2018 — Dave Maxfield, Esq.

It’s a difficult world for law firms these days. Client demands, increased competition, and the distractions of technology can put pressure on any business. Law firms that try to respond with “traditional” firm management techniques are perhaps more susceptible than any other business to falling victim to the chaos. But theres a better way — Join Dave Maxfield, co-author of The Lean Law Firm, as he shows you how to apply the Lean techniques pioneered by super-efficient and profitable companies like Toyota in your own law firm. This seminar will introduce you to Lean concepts, and get you started on your own Lean transformation journey. 

Approved for 1-hour CLE credit (184033) 

The Fall 2017 Legaltech Seminar Series will focus on Cybersecurity and how lawyers need to address cybersecurity issues in their daily practice.  

“Ransomware and Law Firms: Pay Me Now or Pay Me Later”

August 31 — Tom Scott, Executive Director, SC Cyber

Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. In recent years, personal use of computers and the internet has exploded and, along with this massive growth, cybercriminals have emerged to feed off this burgeoning market, targeting innocent users with a wide range of malware. The vast majority of these threats are aimed at directly or indirectly making money from the victims. Today, ransomware has emerged as one of the most troublesome malware categories of our time. Law firms are not exempt from these threats. Learn some of the strategies needed to safeguard your firm and your clients from the perils of Ransomware in this highly engaging presentation from SC Cyber.

Learn more about Tom Scott.

Approved for 1 hour CLE credit (177314)

“Identity Theft”

September 28 — John Gardner, Co-Founder, Accurate Data Partners, LLC

The purpose of the CLE will be to inform attorneys of the basics of Identity Theft, what it is, how it affects those victimized by it (law firms have fallen victim to Identity Theft), a quick overview of the laws that are driven by it, and where all this is heading.

Attorneys are under special requirements to maintain a high level of client security and personal responsibility for the technology in use in their practices. Failure to understand these requirements, including Identity Theft, can result in ethics violations, malpractice claims and financial ruin for the firm. This is an important seminar for all attorneys, whether large firm or small firm, to attend.

Learn more about John Gardner.

Approved for 1 hour Ethics CLE credit (177356)

“Rethinking Trust and Verification: Uses for Blockchains in the Practice of Law”

October 12 — Jack Pringle, Partner, Technology Lawyer and Information Privacy Professional at Adams and Reese LLP

All transactions, whether the transfer of funds, the sale of real and personal property, or otherwise, rely on trust and verification. And transactions traditionally require a bank, an escrow agent, or other trusted third party to ensure that trust and verification.

But what if a technology system could replace the third-party’s role so that any two people could contract directly with one another? Blockchains (also called distributed ledger systems) may soon offer validation in a number of areas where lawyers practice, including financial transactions, proof and chain of title, and authentication of many types. Understanding the technology, or at least its potential, is important for those attorneys who take part in the process of authentication and verification.

Learn more about Jack Pringle.

Approved for 1 hour CLE credit (177503)

“Breach Response: Be Prepared or Face the Consequences”

October 26 — Karen Painter Randall — Partner, Chair — Cyber Security & Data Privacy Group, Connell Foley LLP

One can hardly turn on the news these days without hearing about the latest victim of a cyber-attack. The legal profession is not immune from the threat of a costly cyber breach. Cybersecurity is one of the biggest risks that law firms face today. Law firms are attractive targets because they hold valuable client information such as PII, PHI, and proprietary information including corporate mergers, patent and trade secrets, litigation strategy, and more. In fact, corporate clients are now conditioning retention on the strength of a firm’s data security plan and protection tools. The 2016 ABA Legal Technology Survey Reported that 30.7% of all law firms and 62.8% of firms over 500 lawyers had clients requesting details of its security protocols. The FBI repeatedly has issued warnings and held meetings with nearly all of the largest law firms in the United States about the risk of a data breach and theft of confidential and proprietary client information by countries such as China, Russia, North Korea and many others. Despite these warnings we continue to see some of the largest law firms in the United States get tangled up in major cybersecurity breaches. Whether or not you are prepared to manage a security breach will determine the final outcome. Thus, this program will focus on the importance of being prepared to respond to a data breach quickly to mitigate legal, ethical, regulatory and reputational loss.

Learn more about Karen Painter Randall.

Approved for 1 hour Ethics CLE credit (177668)

“Cybersecurity at Warp Speed for the Legal Profession”

November 9 — Sharon D. Nelson, Esq., President and John Simek, Vice President, Sensei Enterprises, Inc.

Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating and remediating data breaches is hideously expensive, not to mention the necessity of complying with state data breach notification laws. But there are a host of free and budget friendly tips. Our presenters will cover:

  • Cybersecurity standards for small businesses
  • How to prevent data breaches using a combination of technology, policies and training
  • Secure computing when you’re on the road
  • Two factor authentication
  • Intrusion detection systems
  • Encryption
  • The new rules for strong passwords and password management
  • What you must do after a data breach and the components of an Incident Response Plan
  • Defending against — and recovering from — ransomware

Learn more about Sharon Nelson and John Simek.

Approved for 1 hour Ethics CLE credit (178040)

“Cybersecurity, It’s not always Cyber”

November 16 —  Lieutenant Britt Dove, Supervisor, Computer Crime Unit, South Carolina Law Enforcement Division (SLED)

Many times when we hear the word cybersecurity, we wonder where to start; firewalls, strong passwords, malicious actors, ransomware, and encryption.  As we attempt to protect our networks from the complex and changing technologies, we can easily overlook the physical aspect.

According to research by the National White Collar Crime Center (NW3C), after reviewing 1,800 instances of reported data breach from 2005 to 2016, 71.1% were not a result of hacking, but more attributed to personnel and organizational issues.  “Unintentional Insider” leading the way with 33.5%. 

This seminar will talk about cybersecurity and law enforcement, how the human element affects cybersecurity, no tech hacking, and what can be done to protect yourself.

Approved for 1 hour CLE credit (178041)

Technology Every Ethical Lawyer Must Understand

January 5, 2017
Faculty: Dr. Gregory B. Adams, School of Law, University of South Carolina
Lawyers must be competent and must protect their clients’ confidential information. These ethical duties are two of the bedrocks of the Rules of Professional Conduct. Competence includes knowledge about the technology lawyers use in the course of representing, counseling, and communicating with and for their clients. Although these duties are rules of reason, what is reasonable is informed by legal requirements, such as privacy laws, as well as practices commonly recommended by experts and law enforcement. It is not reasonable to be a luddite merely because many lawyers are luddites.
This program will outline what lawyers must, at a minimum, know about computers, tablets, smartphones, email, cloud computing, and the internets. Attendees will receive an extensive list of technology resources for lawyers and law firms.
Dr. Adams has taught at the law school for 38 years, specializing in legal ethics, judicial ethics, law practice technology, as well as commercial and business law. He holds LL.M. and J.S.D. degrees from Columbia University School of Law and a J.D. and B.S. from LSU. He served for nearly two decades as a member of the South Carolina Bar Professional Responsibility Committee and presented its Report to the House of Delegates on the Adoption of the A.B.A. Ethics 2000 revisions to the Rules of Professional Conduct. He is a member of the A.B.A. Law Practice Division’s Committee on Ethics and Professionalism and its Law Practice Futures Initiative.
Dr. Adams has provided ethical guidance and expertise to hundreds of lawyers and law firms throughout this and other states, including most of the major law firms in South Carolina. He has been recognized by the South Carolina Supreme Court, the Court of Appeals, and Federal Courts as an expert on lawyers’ ethics and on business. Three South Carolina Attorneys General, the South Carolina Secretary of State, the United States Attorney for the District of South Carolina, and the U.S. Securities and Exchange Commission have relied upon his expertise to guide and assist them in significant criminal investigations and prosecutions. He has spoken on lawyers’ ethics at hundreds of Continuing Legal Education programs.

Legal Services Clients Need from Tech-Savvy Lawyers

January 19, 2017
Faculty: Jacqueline “Jax” M. Pavlicek, Esq. CIPP/US, Callison Tighe & Robinson
Lawyers who understand technology and laws governing its use offer important competencies to clients, not only in general, but in providing specialized counseling and advice as well as representation in litigation involving these issues. Lawyers frequently represent clients facing legal problems in these areas, and to fulfill their ethical duties, lawyers must provide competent representation or decline the matter. Young lawyers can develop their tech expertise and legal knowledge into valuable credentials that are attractive to employers and clients alike and use these abilities to attract clients and develop new kinds of services that are not already offered by their law firm or prospective firm. One of the most important issues for clients is protection of privacy rights related to digital information, which is stored in the cloud and transmitted electronically via the Internet. Similarly, lawyers have the ethical duty of confidentiality.
Jacqueline Pavlicek will discuss her experience in doing exactly that, offering insights into ways to develop expertise and skills and to attract clients by offering needed legal services that are not widely available, and to do it in ethically permissible ways.
Jacqueline “Jax” Pavlicek joined Callison Tighe as an associate in May 2014, after serving as a staff attorney for the South Carolina Court of Appeals. Since joining the firm she has concentrated on litigation and appellate work, including involvement in the case that paved the way for making same-sex marriage legal in South Carolina.
Pavlicek holds a CIPP/US designation from the International Association of Privacy Professionals (IAPP). She earned that credential after completing lengthy training and passing a comprehensive exam covering privacy and data protection laws and best practices. She provides clients in the private sector with counsel and representation in privacy matters, including helping clients respond in the event of data breaches. She can help businesses or organizations draft policies that comply with privacy laws.
Additionally, Pavlicek serves as a Young Privacy Professional Leader in the IAPP’s Columbia based KnowledgeNet chapter.

Legal Issues in Virtual Reality for Developers, Consumers and Entrepreneurs

February 2, 2017
Faculty: Brandon Huffman Esq. — Hutchison, PLLC 
This program will cover the history and state of virtual reality and augmented reality as well as legal concerns of developers and consumers including intellectual property, privacy, speech, impersonation, jurisdiction, risk of injury and potential applications for lawyers.

Tools to Help Victims of Nonconsensual Pornography

February 16, 2017
Faculty: Adam G. Massey, Esq., Associate, C. A. Goldberg, PLLC
This CLE will focus on the intersection of technology and personal privacy through the lens of nonconsensual porn — better known as “revenge porn”. Now criminalized in 34 states and the District of Columbia, nonconsensual pornography has harmed thousands of victims. The program will offer insights for practitioners, scholars and law students into state of the law, how it impacts victims, and the way forward in combating this crime.
The program will highlight best practices developed to address this topic, particularly the varied toolkit available to mitigate the harm of nonconsensual pornography, protect victims and de-anonymize offenders. In particular we will discuss how to respond in states, such as South Carolina, that lack criminal nonconsensual pornography laws.

Digital Forensics 101

March 2, 2017
Faculty: Dean Fowler, M.Ed. — Digital Forensics Examiner (ACE, CCLO, CCPA) — Liberty Associates
In today’s world, digital devices are generating massive amounts of data. This large amount of data must be properly handled and analyzed in a specific manner to ensure the integrity of the data. The science of Digital Forensics is very complex and can be overwhelming if the basics are not understood. The course will provide an overview of digital forensic terminology, concepts, and case examples that will be helpful for attorneys to handle their cases more effectively.

By the end of the course, attorneys will have basic information needed to understand the process of computer forensics, cell phone forensics, the main areas of focus in digital forensics, and the proper methods for seizure and search of electronic evidence.

Tips and Tools for Cloud Based Family Law Software

March 16, 2017
Faculty: Sean Keefer, Esq.
The CLE addresses tips and techniques related to the following;
The proper preparation of Financial Declarations, including information on engaging clients productively in the process.
How to best use the South Carolina Child Support Guidelines when preparing child support cases.
Thoughts on unique child support cases and strategies on applying the South Carolina Guidelines to the same.
Matters related to calculating Net Available Income for support cases.
Issues related to organizing and analyzing property division.
Online security and the use of Cloud based software in the legal setting.
Ethical considerations to all of the above.
The session is designed to be interactive and uses as a tool for demonstrating the above.

Lean Law Firm Management

March 23, 2017
Faculty: Dave Maxfield, Esq.
Dave Maxfield shows you how medium and small law firms can use techniques developed for manufacturing (Toyota Production System, Lean Management, Theory of Constraints) to run a profitable law office based on speed and flexibility.

Dave Maxfield is a practicing attorney with over twenty years’ experience in small and solo firms, specializing in consumer protection law in Columbia, South Carolina. He is a three-time ABA TechShow speaker on mind-mapping and paperless technology. Dave has also taught mind-mapping and Information Visualization techniques to lawyers as a consultant, as a lecturer at national and regional ABA and AAJ conferences, and to law students at Harvard, the University of Colorado, William & Mary, and UCLA.

E-Discovery: Some Technical Things Lawyers Need to Know

September 8, 2016
Faculty: Sarah Montgomery, Attorney with the Executive Office of the U.S. Department of Justice & Adjunct Professor, University of South Carolina School of Law
Attendees will learn the basics about metadata, as well as metrics and technical terms that will help them navigate in E-Discovery or other matters where computer files and technology impact their area of practice

Identity Theft

September 22, 2016
Faculty: Marti Phillips, Director, Identity Theft Unit | Deputy Administrator
Have you ever received a data breach notice? Do you know how valuable your personal information is? During 2015, at least 626,300 South Carolina residents had their information compromised by data breaches. And according to the Bureau of Justice Statistics, an estimated 17.6 million people, or about 7 percent of U.S. residents age 16 or older, were victims of at least one incident of identity theft in 2014. This presentation will provide an introduction and overview of identity theft trends in South Carolina as well remedies for victims.

Protecting Health Information: HIPAA and Beyond

October 20, 2016
Faculty: Alexander M White, Deputy Chief Privacy Officer for the State of South Carolina
Since the passage of the Health Insurance Portability and Accountability Act (HIPAA) in 1996, health information privacy has become one of the more defined areas of privacy law in the United States. However, that does not mean the field is standing still: both the law and the technology are constantly evolving. In this session, we will discuss the important concepts that make up HIPAA and subsequent laws; how newly-implemented audits are changing healthcare regulation; and how the trendy devices collecting the most health information, wearables, fit in to existing regulatory frameworks.

Police Body-Cams: Practical, Policy, and Legal Implications

October 27, 2016
Faculty: Seth Stoughton, Assistant Professor of Law
Body-worn camera systems are quickly becoming an essential piece of policing equipment at agencies across the country. In this seminar, Professor Seth Stoughton will identify the potential advantages that police body-cams offer to law enforcement and to police/community relations. He will discuss the practical, policy, and legal implications that must be kept in mind as lawyers, police executives, policymakers, and communities adopt and evaluate this promising new technology.

Practice Management — Why It Is “Sanity Software” for Lawyers

November 3, 2016
Faculty: Steve Best, Partner for the Affinity Consulting Group and chair of the 2016 ABA Techshow
It’s impossible to manage any law practice if you don’t have a good handle on the status of every matter. The Model Rules require that a lawyer act with reasonable diligence and promptness when representing a client and knowing how to harness the power of practice management is key. Our presenter will cover both cloud-based and traditional software offerings for practice management and highlight the differences & similarities so you can make an informed decision on what system will work best for you and your practice.

Defense and Offense on the Internet: The Terminology of ‘Attacks’

November 17, 2016
Faculty: Marcos Vieyra, Chief Information Security Officer for the State of South Carolina
What is defense and offense in the context of the Internet? Do offensive activities always constitute an attack? Could some defensive actions, such as “hunting” within one’s own organizational boundaries, constitute an attack by a defender? Is accurate attribution of an attack within reach of average organizations, and if not, where does that leave us?
As an attorney, how would you advise a client with regard to these questions, either from an offensive-capability perspective or from a what-to-do-as-a-defender perspective? How might you help a client develop effective information security policy and governance given this state of affairs? Join us for a brief overview of these topics, and a defense-oriented approach to life on the Internet.

Technodabble: The Use of Technology in ‘Undisclosed’

January 7, 2016
The Undisclosed Podcast picked up where the Serial Podcast left off: investigating the 1999 murder of Hae Min Lee and the question of whether Adnan Syed was wrongfully convicted of that crime. Associate Dean Colin Miller is one of the creators, producers, and hosts of the Podcast. He will discuss his use of technology in his development and recording of the podcast.

Police Body-Cams: Practical, Policy, and Legal Implications

January 21, 2016
Body-worn camera systems are quickly becoming an essential piece of policing equipment at agencies across the country. In this seminar, Professor Seth Stoughton will identify the potential advantages that police body-cams offer to law enforcement and to police/community relations. He will discuss the practical, policy, and legal implications that must be kept in mind as lawyers, police executives, policymakers, and communities adopt and evaluate this promising new technology.
View the video of this seminar


February 4, 2016
Michael Scherck, Supervisory Special Agent for the FBI Cybercrimes Unit for South Carolina will give an unclassified threat brief with focus on how current law affects FBI investigations. The presentation will be an excellent lead in to the South Carolina Law Review’s Symposium “Cyber Attacks and Civil Liability” which will be held later in the day on February 4 and all day February 5.

Lean Law Office Management

February 18, 2016
Dave Maxfield is a practicing attorney with over twenty years’ experience in small and solo firms, specializing in consumer protection law in Columbia, South Carolina. He is a three-time ABA TechShow speaker on mind-mapping and paperless technology. Dave has also taught mind-mapping and Information Visualization techniques to lawyers as a consultant, as a lecturer at national and regional ABA and AAJ conferences, and to law students at Harvard, the University of Colorado, William & Mary, and UCLA. Dave’s presentation will focus on taking a manufacturing systems based approach to small law firm office management, including how to be much more efficient in processes and in the use of technology.

Identity Theft and Data Security Breaches

March 3, 2016
Martha (“Marti”) Phillips, Esq. — Deputy Administrator and Director of the Identity Theft Unit at the South Carolina Department of Consumer Affairs. This presentation will provide a brief overview of the South Carolina Financial Identity Fraud and Identity Theft Protection Act (FIFITPA) with a focus on state data security breach notification laws and recent legislation regarding Personal Identifying Information (PII). The Act provides both protections for consumers in the areas of security freezes, credit reports, records disposal and also places requirements on businesses and public bodies with regard to the collection, maintenance, and disposal of consumers’ personal information.

The Virtual Law Office and Leveraging Technology

March 17, 2016
Anthony Bellino, Litigation Technology Help Desk Manager, Deloitte (Contractor) Litigation Technology Service Center (LTSC) Department of Justice/EOUSA. Anthony Bellino, a licensed attorney and project management specialist with Deloitte will discuss a practical approach for those seeking to improve efficiency, gain flexibility and provide a more streamlined client experience through the use of technology in the practice of law. Mr. Bellino will provide insight to technology that can help “virtualize” the practice of law and enhance client interaction. He will speak to apps and tools available, and demo some virtual case software.

Emerging Issues in European Privacy Law

March 31, 2016
Alexander M White, Deputy Chief Privacy Officer for the U.S. State of South Carolina. Developments in international law are especially impactful when it comes to personal information. Organizations transfer this data, or pieces of it, across borders regularly, potentially submitting their operations to the laws and regulations of those jurisdictions. No jurisdiction is more influential in modern privacy law than the European Union, where big changes have occurred and look to continue. In this session, we will discuss recent developments in US-EU privacy interactions and examine a sweeping new EU law that could affect organizations around the world.

Proportionality in Civil E-Discovery

September 17, 2015
Sarah Montgomery, an attorney with the Executive Office of the U.S. DOJ and an adjunct professor teaching Civil E-Discovery at the School of Law will discuss proportionality in civil e-discovery in light of the upcoming amendments to the Federal Rules of Civil Procedure. The seminar will cover what lawyers (in-house and outside counsel) and judges need to know from a technical standpoint when making proportionality determinations in civil discovery.

Cloud Computing and the Virtual Law Office

October 1, 2015
Anthony Bellino, a licensed attorney and project management specialist with Deloitte will discuss Cloud Computing, the Virtual Law Office, and how attorneys are leveraging technology in the 21st Century. The seminar will cover a discussion of cloud computing and how attorneys are using technology to virtualize the practice of law.
View the video of this seminar

A Legal Perspective on Transportation Network Companies and Other Developments in Driving

October 15, 2015
This interactive seminar with Bryant Walker Smith will survey legal issues raised by Transportation Network Companies such as Uber and Lyft in the context of broader developments in motor vehicle design and operation (including increasing automation and connectivity).
View the video of this seminar

Billing 101

November 12, 2015
Have you ever wondered, what’s the deal with billing? Come hear an attorney discuss the basics of billing, including what activities are billed, a lawyer’s time increments, and why it’s important to have a method to stay organized. Then see a demonstration of one billing program used in firms, Clio, by Certified Clio Consultant Doug Edmunds.
View the video of this seminar