SlideShare una empresa de Scribd logo
1 de 70
Presented by Cynthia Sharp
• Professional CLE Speaker
• Attorney Business Coach
Event Sponsor:
Featuring
Cynthia Sharp
The Sharper Lawyer
TECHNICAL REVOLUTION/
ETHICAL EVOLUTION
ETHICAL EVOLUTION
2
March 17, 2014
@thesharperlawyer
Preliminary Thoughts
•I would be really happy if we could cover the following:
•I decided to attend “Social Media” because:
3 @thesharperlawyer
Wake Up To Social Media!
4 @thesharperlawyer
5 @thesharperlawyer
Attorneys Using Social Media
15%
43%
56%
Quadrupled in
2 years!
6 @thesharperlawyer
Attorneys Using Social Media
7 @thesharperlawyer
Legal Tech Survey Report
Attorneys Obtaining Clients
Through Social Media
8 @thesharperlawyer
Legal Tech Survey Report
The Cultureist
9
• 2,405,518,376 Worldwide Internet Users
• 78.6% North Americans on Internet
• Over 1 billion Social Network Users
@thesharperlawyer
10
Facebook Friends
Cynthia Sharp
Bruce Steiner Ron Fatoullah
@thesharperlawyer
11
Facebook Friends
Cynthia Sharp
Bruce Steiner Ron Fatoullah
@thesharperlawyer
Facts About
•100% of Fortune 500 Companies Have Executives on
Linkedin
•238 Million Members
•Every Second - 2 New Member Joins
12 @thesharperlawyer
13
1.6 billion
search queries
500 million
tweets
@thesharperlawyer
Social Media
Practical Applications
14
• Marketing
• Practice Area
• Develop Internal Social Media Policy
• Compliance Procedures
• Criminal Defense
• Civil Litigation
• Litigation/Research Tool
@thesharperlawyer
Social Media
•New Case Law
•Interesting Ethical Issues
15 @thesharperlawyer
Digital Immigrant or
Digital Native?
16 @thesharperlawyer
Social Media as a
Marketing Tool
17
STRATEGY
BRAND
PROFILE
EXECUTION
@thesharperlawyer
Information About Legal Services
•Protected Form of Commercial Speech
•Subject to Rules 7.1 - 7.5
18 @thesharperlawyer
Information About
Legal Services
• Rule 7.1 - Communication Concerning a Lawyer's
ServicesRule 7.2 - AdvertisingRule 7.3 - Direct
Contact with Prospective ClientsRule 7.4 - Com
munication of Fields of Practice and
SpecializationRule 7.5 - Firm Names and
Letterheads
19 @thesharperlawyer
20 @thesharperlawyer
American Bar Association
Formal Opinion 10-457
21 @thesharperlawyer
Free Commercial Speech or
Regulated Attorney Advertising
22 @thesharperlawyer
23 @thesharperlawyer
blawgsearch.justia.com
24 @thesharperlawyer
25 @thesharperlawyer
26 @thesharperlawyer
•Endorsement Feature
•“Specialties” Field
•“Answers” Section
27 @thesharperlawyer
28 @thesharperlawyer
Use Common Sense!
29 @thesharperlawyer
30 @thesharperlawyer
31 @thesharperlawyer
32 @thesharperlawyer
33 @thesharperlawyer
 Jennifer Ellis @JLE_JD  Mar 4   
My answer to What are the legal restrictions in
compiling a database mined of public social
network profiles? http://qr.ae/t3OpR 
www.lextweet.com
34 @thesharperlawyer
Research Tool
Write down 3 ways that you
use the internet to research
35 @thesharperlawyer
www.jdsupra.com
36 @thesharperlawyer
Citation Forms Developed
Rittman, S. (Spring 2008). Don’t Use the “R” Word. Retrieved
on January 25, 2011 from www.mo-legal-ethics.org
www.mo-legal-ethics.org
37 @thesharperlawyer
legalonramp.com
38 @thesharperlawyer
Litigation Tool
39 @thesharperlawyer
Mining Information
•Vetting Jurors
•Pretexting (“Friending”)
40 @thesharperlawyer
41 @thesharperlawyer
Internet Research by
Jurors
42 @thesharperlawyer
Discovery
•Warn clients not to discuss their case online
•Standard Applied: Reasonably calculated to lead to
discovery of admissible evidence
•Notice to produce
43 @thesharperlawyer
Technical Revolution -
Ethical Evolution
Ethical Evolution
44 @thesharperlawyer
Confidentiality Notice
This electronic transmission and any attached documents or
other writings are confidential and are for the sole use of the
intended recipient(s) identified above. This message may
contain information that is privileged, confidential or
otherwise protected from disclosure under applicable law. If
the receiver of this information is not the intended recipient,
or the employee, or agent responsible for delivering the
information to the intended recipient, you are hereby notified
that any use, reading, dissemination, distribution, copying or
storage of this information is strictly prohibited. If you have
received this information in error, please notify the sender by
return email and delete the electronic transmission, including
all attachments from your system.
This electronic transmission and any attached documents or
other writings are confidential and are for the sole use of the
intended recipient(s) identified above. This message may
contain information that is privileged, confidential or
otherwise protected from disclosure under applicable law. If
the receiver of this information is not the intended recipient,
or the employee, or agent responsible for delivering the
information to the intended recipient, you are hereby notified
that any use, reading, dissemination, distribution, copying or45 @thesharperlawyer
Ethical Evolution
•Terminology
•Competence
•Confidentiality
•Communication
•Duties to Prospective Clients
•Receipt of Erroneously Sent
Document
•Supervision of NonLawyer
Assistants
•Advertising
46 @thesharperlawyer
Terminology
MRPC 1.0 Terminology
(o) Writing or Written
Comment 9 to MRPC 1.0
{Screening}
47 @thesharperlawyer
“To maintain the requisite knowledge and skill, a
lawyer should keep abreast of changes in the law
and its practice, including the benefits and risks
associated with relevant technology, engage in
continuing study and education and comply with
all continuing legal education requirements to
which the lawyer is subject.”
- Comment 6 to MRPC 1.1 (as amended)
Competence
48 @thesharperlawyer
Redaction Issues
Long gone are the days when the attorney duty of confidentiality imposed by Model Rule 1.6
was satisfied by maintaining a fireproof steel locked filing cabinet behind a secured office door.
The technological revolution has taken us beyond the world of desktop computers with a
dedicated server to the stratosphere of cloud computing and the genius of smartphones and
electronic tablets.The portability of our “second brain” results in additional ethical responsibilities
that must not be ignored. Lawyers’ obligations have radically changed in light of the methods by
which confidential client and personal information is now carried and stored.
49 @thesharperlawyer
Data Disaster
50 @thesharperlawyer
Duty of Confidentiality
MRPC 1.6
51 @thesharperlawyer
Communication
“... A lawyer should promptly respond to or
acknowledge client communications.”
- Comment [4] of MRPC 1.4 (as
amended)
52 @thesharperlawyer
Duties to Prospective Clients
“...[a] person becomes a prospective client by
consulting with a lawyer about a client-lawyer
relationship with respect to a matter”.
- Comment 2 to MRPC 1.18 (as
amended)
53 @thesharperlawyer
Does a Communication
Constitute a Consultation?
•Did the lawyer encourage or solicit inquiries about a
proposed representation?
•Did the person encounter any warnings or cautionary
statements that were intended to limit, condition, waive or
disclaim the lawyer’s obligations? Were those warnings or
cautionary statements clear and reasonably understandable?
Did the lawyer act or communicate in a manner that was
contrary to the warnings or cautionary statements?
54 @thesharperlawyer
Receipt of Erroneously
Sent Documents
Lawyer receiving electronically stored information that
he or she knows or reasonably should know was sent
inadvertently must  promptly notify the sender of the
mistake (Model Rule 4.4(b)) 
Duty to notify extends to metadata.
(Comment 2)
55 @thesharperlawyer
Recommended
Metadata Scrubbers
Metadata Assistant:
http://www.payneconsulting.com/products/metadataretail/
iScrub: http://esqinc.com/section/products/2/iscrub.html
Workshare Protect: http://www.workshare.com/products/wsprotect/
Metadact: http://www.litera.com/Products/Metadact%AE.aspx
56 @thesharperlawyer
Do You Secure PDF Files Before
You Transmit?
Suggested Office Policy:
“When there is no
legitimate reason to
transmit an editable
document, we will always
send SECURE PDFs.”
“When there is no
legitimate reason to
transmit an editable
document, we will always
send SECURE PDFs.”
57 @thesharperlawyer
You Cannot Delegate
Ethical Responsibilities
Model Rule 5.3 requires attorneys who outsource
work to non-attorneys to “make reasonable efforts
to ensure that the non-lawyers’ services are provided
in a manner that is compatible with the lawyer’s
professional obligations”.
58 @thesharperlawyer
Attorney Advertising Rules
Lawyers may pay Internet-based lead generators for
generating client leads, as long as the lead generator does
not “recommend” the lawyer.   (MRPC 7.2, Comment 5)
Only a “target communication initiated by the lawyer”
directed to a “specific person” that “offers to provide”
legal services is a solicitation. Communications to the
general public, including Internet banners, are not
solicitations. (MRPC 7.3)
59 @thesharperlawyer
“A lawyer shall act with reasonable diligence and
promptness in representing a client.”
Comment 2 - “A lawyer's work load must be
controlled so that each matter can be handled
competently.”
Rule 1.3
60
Diligence
@thesharperlawyer
www.evernote.com
61 @thesharperlawyer
www.pomodorotechnique.com
62 @thesharperlawyer
Law Firm Social Media
Policy
63 @thesharperlawyer
Online or In Line
•Keep client confidences
•Avoid appearance of establishing client-
attorney relationship
•Be polite
•Don’t fight
•Don’t bad mouth law firm, colleagues or
judges.
64 @thesharperlawyer
Moving Forward
•Did you learn anything new today?
•Did you gain any insight into yourself or someone else?
•Do you plan to change any of your behaviors as a result
of today’s session?
@thesharperlawyer
Evaluations
66 @thesharperlawyer
@thesharperlawyer
Connect with Cindy
like us follow us follow us share with us
The Sharper Lawyer
connect with us
@thesharperlawyer
The Sharper Lawyer
now offers
a complimentary
half hour coaching session.
Email Cindy for more details!
cindy@thesharperlawyer.com
@thesharperlawyer
Thank You
The Sharper Lawyer
www.thesharperlawyer.com

Más contenido relacionado

La actualidad más candente

Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksAman Gupta
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingAlex Pinto
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations Damir Delija
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...dbpublications
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 

La actualidad más candente (8)

Ethical Hacking And Hacking Attacks
Ethical Hacking And Hacking AttacksEthical Hacking And Hacking Attacks
Ethical Hacking And Hacking Attacks
 
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: SharingSANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 

Destacado

iScrub Presentation
iScrub PresentationiScrub Presentation
iScrub PresentationShawnHoke
 
Kyangunyi villa
Kyangunyi villaKyangunyi villa
Kyangunyi villamemusimak
 
วิทยาศาสตร์
วิทยาศาสตร์วิทยาศาสตร์
วิทยาศาสตร์ikwanz
 
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionKelvin Emmanuel Ng
 
Digital scavenger hunt
Digital scavenger huntDigital scavenger hunt
Digital scavenger huntjazzyboo19
 
Kinder parade festijn 2012
Kinder parade festijn 2012Kinder parade festijn 2012
Kinder parade festijn 2012Doe-Kids
 
Taiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengTaiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengMakala (D)
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνYolanda Komianou
 
Cours photo contemporaine 2012bis
Cours photo contemporaine 2012bisCours photo contemporaine 2012bis
Cours photo contemporaine 2012bisdiedrich2
 
Bab 1 sejarah & kita
Bab 1 sejarah & kitaBab 1 sejarah & kita
Bab 1 sejarah & kitaNur Atizza
 
Imagination with paper 'Filigree'
Imagination with paper 'Filigree'Imagination with paper 'Filigree'
Imagination with paper 'Filigree'Makala (D)
 
Presentatie reinier engels[1]
Presentatie reinier engels[1]Presentatie reinier engels[1]
Presentatie reinier engels[1]reiniervolgers
 
Presentacion personal
Presentacion personalPresentacion personal
Presentacion personalUrendy
 
Best kitchen knives
Best kitchen knivesBest kitchen knives
Best kitchen knivesbestkit3
 

Destacado (20)

iScrub Presentation
iScrub PresentationiScrub Presentation
iScrub Presentation
 
Kyangunyi villa
Kyangunyi villaKyangunyi villa
Kyangunyi villa
 
Honor Choir 2s
Honor Choir 2sHonor Choir 2s
Honor Choir 2s
 
วิทยาศาสตร์
วิทยาศาสตร์วิทยาศาสตร์
วิทยาศาสตร์
 
Mas in kaart
Mas in kaartMas in kaart
Mas in kaart
 
Visas italia
Visas italiaVisas italia
Visas italia
 
Researchss
ResearchssResearchss
Researchss
 
POPPER Asia - A Brief Introduction
POPPER Asia - A Brief IntroductionPOPPER Asia - A Brief Introduction
POPPER Asia - A Brief Introduction
 
Digital scavenger hunt
Digital scavenger huntDigital scavenger hunt
Digital scavenger hunt
 
Kinder parade festijn 2012
Kinder parade festijn 2012Kinder parade festijn 2012
Kinder parade festijn 2012
 
Taiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron ChengTaiwanese illustrator Hsiao- Ron Cheng
Taiwanese illustrator Hsiao- Ron Cheng
 
ομιλια για χρηση ουσιων
ομιλια για χρηση ουσιωνομιλια για χρηση ουσιων
ομιλια για χρηση ουσιων
 
Cours photo contemporaine 2012bis
Cours photo contemporaine 2012bisCours photo contemporaine 2012bis
Cours photo contemporaine 2012bis
 
Bab 1 sejarah & kita
Bab 1 sejarah & kitaBab 1 sejarah & kita
Bab 1 sejarah & kita
 
Livestock
LivestockLivestock
Livestock
 
Imagination with paper 'Filigree'
Imagination with paper 'Filigree'Imagination with paper 'Filigree'
Imagination with paper 'Filigree'
 
Wedding_slideshow
Wedding_slideshowWedding_slideshow
Wedding_slideshow
 
Presentatie reinier engels[1]
Presentatie reinier engels[1]Presentatie reinier engels[1]
Presentatie reinier engels[1]
 
Presentacion personal
Presentacion personalPresentacion personal
Presentacion personal
 
Best kitchen knives
Best kitchen knivesBest kitchen knives
Best kitchen knives
 

Similar a TECHNICAL REVOLUTION/ETHICAL EVOLUTION - PBI 2014

The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...Cynthia Sharp
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Ajs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comAjs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comStokesCope5
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docxasharshaikh8
 
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...eFax Corporate®
 
AJS 524 Effective Communication/tutorialrank.com
 AJS 524 Effective Communication/tutorialrank.com AJS 524 Effective Communication/tutorialrank.com
AJS 524 Effective Communication/tutorialrank.comjonhson250
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...William Tanenbaum
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordMia Eaker
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comrobertleew4
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxPallawiBulakh1
 
AJS 524 Enhance teaching - tutorialrank.com
AJS 524  Enhance teaching - tutorialrank.comAJS 524  Enhance teaching - tutorialrank.com
AJS 524 Enhance teaching - tutorialrank.comLeoTolstoy17
 
Ajs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comAjs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comHarrisGeorg5
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Logikcull.com
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
CloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago
 

Similar a TECHNICAL REVOLUTION/ETHICAL EVOLUTION - PBI 2014 (20)

The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
The Ethics of Law Practice and Legal Marketing in a Social Media Environment ...
 
(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice(Webinar Slides) How to Ethically Use Technology in Your Practice
(Webinar Slides) How to Ethically Use Technology in Your Practice
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Ajs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comAjs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.com
 
Cybersecurity 101 final
Cybersecurity 101 finalCybersecurity 101 final
Cybersecurity 101 final
 
3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx3.Seminar Report Ashar Shaikh Final.docx
3.Seminar Report Ashar Shaikh Final.docx
 
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
Healthcare CyberSecurity Update: Ensuring HIPAA Compliance with Cloud Service...
 
AJS 524 Effective Communication/tutorialrank.com
 AJS 524 Effective Communication/tutorialrank.com AJS 524 Effective Communication/tutorialrank.com
AJS 524 Effective Communication/tutorialrank.com
 
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...Data Security And Privacy Risks In Cloud Computing  William A Tanenbaum Sourc...
Data Security And Privacy Risks In Cloud Computing William A Tanenbaum Sourc...
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- Spafford
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.com
 
Research Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptxResearch Methodology UNIT 3.pptx
Research Methodology UNIT 3.pptx
 
AJS 524 Enhance teaching - tutorialrank.com
AJS 524  Enhance teaching - tutorialrank.comAJS 524  Enhance teaching - tutorialrank.com
AJS 524 Enhance teaching - tutorialrank.com
 
Ajs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comAjs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.com
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery Lawyer competency in the age of e-discovery
Lawyer competency in the age of e-discovery
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
CloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare IT
 

Más de Cynthia Sharp

STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014Cynthia Sharp
 
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014Cynthia Sharp
 
Technical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution KeynoteTechnical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution KeynoteCynthia Sharp
 
Strategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law PracticeStrategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law PracticeCynthia Sharp
 
Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)Cynthia Sharp
 
Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeCynthia Sharp
 

Más de Cynthia Sharp (6)

STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - PBI 2014
 
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
STRATEGIES FOR TAKING CHARGE OF YOUR LAW PRACTICE - ICLEF 2014
 
Technical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution KeynoteTechnical Revolution - Ethical Evolution Keynote
Technical Revolution - Ethical Evolution Keynote
 
Strategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law PracticeStrategies for Taking Charge of Your Law Practice
Strategies for Taking Charge of Your Law Practice
 
Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)Take Charge of Your Life - Personal & Professional (ICLEF)
Take Charge of Your Life - Personal & Professional (ICLEF)
 
Strategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law PracticeStrategies for Taking Charge of Your Life and Law Practice
Strategies for Taking Charge of Your Life and Law Practice
 

TECHNICAL REVOLUTION/ETHICAL EVOLUTION - PBI 2014