SlideShare una empresa de Scribd logo
1 de 62
Descargar para leer sin conexión
How To Ethically Use Technology
in Your Practice
#LawyersUsingTech
2
3
4
About our presenter
Presenter
‣  Practice Management Advisor for
Oklahoma Bar Association
‣  Blogs at Jim Calloway’s Law Practice
Tips
http://www.lawpracticetipsblog.com
‣  Practice Management Advice
columnist in Law Practice Magazine
‣  Digital Edge podcast
http://legaltalknetwork.com/
podcasts/digital-edge/
5
The Wall Street Journal says
“Every business is a
technology business.”
6
http://bit.ly/2jiQeIz!
I wrote about this in ABA’s Law
Practice Magazine
Despite many lawyer’s antipathy toward
technology tools, you have no choice but to
use today’s business tools.
8
9
10
Delivery of legal
services today
is undergoing
many changes!
11
The Benefits and Risks of
Relevant Technology
12
Poll Question #1
Has your state amended the Rules of Professional Conduct
to add the comment on the risks and benefits of relevant technology?
1.  Yes
2.  No
3.  I should know that, but I don’t.
4.  I could care less.
13
Protecting Confidential
Information
ABA Model Rule 1.6(c) A lawyer shall make reasonable
efforts to prevent the inadvertent or unauthorized
disclosure of, or unauthorized access to, information
relating to the representation of a client.
14
http://bit.ly/ABARule1_6 !
(Added in 2012. Adopted by about
50% of states.)
Security in the Cloud
15
What “The Cloud” Really Is!
!16
Cloud Computing!
"Cloud computing is a fancy way of
saying stuff's not on your computer. It's on
a company's server, or many servers,
possibly all over the world. Your computer
becomes just a way of getting to your
stuff. Your computer is an interface, but
not where the magic happens.!
"Byte Rights" by Quinn Norton,!
Maximum PC, Sept. 2010!
17
“Ethics up in the Clouds” 81 Oklahoma Bar Journal 2407
(11/6/2010) by OBA Ethics Counsel Travis Pickens!
Cloud Computing!
“Cloud computing does introduce a heightened risk, at
least in theory, in the sense that it outsources all, or
nearly all, of a lawyer’s data to an off-site location....!
“But rock-solid certainty is not required. Significantly,
in the few ethics opinions that have addressed it, the
consensus appears to be that the law firm is not
required to guarantee that the system will be
invulnerable to unauthorized access.!
18
Big Picture Requirements
•  Stay up to date
•  Actually read the Terms of Service (TOS)
•  Know what you don’t know
•  Lawyer should periodically review vendor’s security
measures
•  Special circumstances warrant special precautions
19
My Personal Thoughts
•  Your security risk is any connection to the Internet.
•  Paid business-grade cloud vendors have security
experts and engineers on staff, which only the very
largest law firms can have.
•  So using a properly-vetted vendor to secure
confidential information can be viewed as
“outsourcing” security to those more qualified and
responsive.20
Cloud Ethics Opinions Around the U.S.
http://bit.ly/2kJwkcW
21
Practice Management Software in
The Cloud
There are many benefits to using these
tools- for the lawyer and for the client. The
majority of small firm PM tools are hosted
in the cloud.
22
Digital Client Files (aka Paperless) are
now the standard for efficient
operations.
23
The Benefits of Digital Client Files
•  Ease of access to files and documents remotely. Saves time,
which saves clients money.
•  Savings on document storage costs.
•  Reduced postage and paper expense by sharing documents
with clients digitally.
•  Protection of client files in the case of a disaster such as flood
or fire.
•  7/24 access to every document in every open client file from
any location
Minnesota Lawyers Mutual, The Basics of Client Files and
Paperless Systems Opening, Closing, Documentation and
Ticklers A Malpractice Insurance Company’s Perspective (Rev.
2015) http://bit.ly/MutualPaperless !
Safe	client	files	
	“come	Hell	or	high	water”	
25	
What	if	this	was	your	office	
loca<on?
Social media is fun, but posting
online about clients is dangerous
26
Think before you post
27
28
Social media is fun, but posting
online about clients is dangerous
•  Don’t trust any privacy or security settings. Your
friends can share any post with the entire world.
•  If you want to share, get client’s permission (in
writing)
•  In the Internet Age, even disguising client’s name or
details can still give clues to be researched by others
and disclose confidences.
29
No lawyer can afford to be ignorant about
how social media operates
•  Business clients need social media policies and advice. Great
business opportunity for lawyers.
•  Family law contested proceedings now routinely include admission
of social media evidence.
•  Soon social media evidence will be a common part of many types of
trials
30
Email - Love it or hate it
99% of us use email every day.
31
Poll Question #2
Do you use email encryption in your law practice?
1.  Yes
2.  No
3.  I don’t have the tools
4.  I have the tools but don’t do this.
32
Surely after last year, you
appreciate that unencrypted
email is not secure.
33
Why Encryption?
Unencrypted e-mails (including attachments)
go across the Internet as plain text- complete
lack of confidentiality or security.
34
If you are using Gmail for client
communications (and you haven't done this),
sign up for a more secure business account at
https://gsuite.google.com/pricing.html. Now
they are calling it GSuite. The cost is $5-$10
per month. Lots of features.
35
No more free Gmail for business communications!
Encryption of Email
Read this opinion on email confidentiality !
http://bit.ly/TXOpinion648!
37
Do it yourself Encryption:
Password protect a Word document or PDF
file and give the recipient the password over
the telephone.
38
Encryption
39
Interesting read on encryption -
http://bit.ly/2kPkkWQ!
(Note: Tor Browser is for experts only.)!
Citrix ShareFile
•  Send large attachments as a link in your email;
•  Handy Outlook plug-in tool
•  Require a sign in and get notifications;
•  Offers a data room package;
•  Access files securely from any internet enabled
device.
•  www.sharefile.com
40
Client portals within practice
management software
•  Great client service and secure method of
communication.
•  Operates within the tool you are using all day
anyway.
41
Poll Question #3
Do you use a client portal to share information
with clients in your law practice?
1.  Yes
2.  No
3.  I don’t have the tools
4.  I have the tools but don’t do this.
42
Passwords
43
Worst Passwords of 2014
According to SplashData
44
123321
666666
7777777
1q2w3e4r
654321
555555
3rjs1la7qe
google
1q2w3e4r5t
123qwe
zxcvbnm
1q2w3e
45
You simply must use a password manager
My Mother’s Maiden Name is
XK37B_PWRD!, What’s Yours?
For additional security, use
Two-Factor Authentication
•  Something you know
(Password or PIN)
•  Something you have
(Phone, keychain dongle)
•  Something you are
(Fingerprint, retina scan)
47
48
Free Wi-Fi is too expensive!
¡  Breaches	normally	aren’t	hacking	into	your	firm’s	
data	from	outside.	Most	breaches	are:	
§  Someone	clicking	an	email	attachment	
§  Visiting	a	website	with	drive-by	malware	
§  Attaching	a	compromised	device	
§  Being	taken	in	by	a	phone	call	from	Microsoft	
				or	“the	IT	Department”
•  At	least	twice	per	year	
•  Brief	training	for	all	new	hires	
•  Have	recent	examples	of	new	exploits	
•  Some	vendors	have	testing	services	that	
let	you	phish	your	own	employees!
¡  If	you	have	not	planned	well	in	advance,	you	are	probably	
stuck	paying	the	ransom	and	the	funding	criminals.	
¡  To	recover	quickly,	you	likely	need	a	mirror	image	of	the	
workstation	plus	a	current	data	backup.	Then	reload	the	
software	and	settings	on	computer	before	restoring	the	
data.	
¡  Complete	backup	is	expensive	in	the	cloud	(e.g.	all	of	the	
OS)	and	data	will	only	be	current	to	last	backup.
¡  Implement	your	Incident	Response	Plan	(which	means	
you	need	to	have	one.)	
¡  What	steps	&	who	needs	to	be	contacted	
¡  Include	contact	info	for	digital	forensics	technologists	
¡  Get	legal	advice	on	your	notification	duties	
¡  Notify	insurance	carrier	
¡  Great	opportunity	for	lawyers	to	help	clients	prepare	
IRP’s.
http://bit.ly/2jZferF
Plan for more automation
in the immediate future.
57
http://bit.ly/2kjMhTy!
Automated document assembly
should be an automation priority.
Your Document Czar
ü  Create templates for others
to use!
ü  Continuous training
opportunities!
ü  Standardize document
creation and storage!
ü  Implement automated
document assembly !
ü  Work with management on
fees & billing implications of
automating document
creation!
59
Released in January 2016
60
61
Visit my blog and subscribe !
www.lawpracticetipsblog.com!
Presenter contact info
www.lawpracticetipsblog.com!
MyCase
www.MyCase.com
support@mycase.com
800-571-8062
Contact Us
62

Más contenido relacionado

La actualidad más candente

The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Mediajlipsey
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Jim Kaplan CIA CFE
 
Driving More Value With Automated Analytics
Driving More Value With Automated AnalyticsDriving More Value With Automated Analytics
Driving More Value With Automated AnalyticsJim Kaplan CIA CFE
 
FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015Smarsh
 
3 ways to respond to a records request
3 ways to respond to a records request3 ways to respond to a records request
3 ways to respond to a records requestSmarsh
 
Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Jim Kaplan CIA CFE
 
Case study presentation
Case study presentationCase study presentation
Case study presentationenglettk
 
Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013Rob Robinson
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborTurner and Associates, Inc.
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal AuditorJim Kaplan CIA CFE
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
Tisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White PaperTisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White PaperKatie Weir
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program Jim Kaplan CIA CFE
 
Social Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSocial Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSmarsh
 

La actualidad más candente (20)

The Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social MediaThe Practicing Lawyers Guide To Social Media
The Practicing Lawyers Guide To Social Media
 
Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10) Implementing and Auditing GDPR Series (8 of 10)
Implementing and Auditing GDPR Series (8 of 10)
 
Ethics for internal auditors
Ethics for internal auditorsEthics for internal auditors
Ethics for internal auditors
 
Driving More Value With Automated Analytics
Driving More Value With Automated AnalyticsDriving More Value With Automated Analytics
Driving More Value With Automated Analytics
 
Todd Mctavish
Todd MctavishTodd Mctavish
Todd Mctavish
 
FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015FINRA's Record-Breaking Sanctions of 2015
FINRA's Record-Breaking Sanctions of 2015
 
3 ways to respond to a records request
3 ways to respond to a records request3 ways to respond to a records request
3 ways to respond to a records request
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
 
Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?Is Your Audit Department Highly Effective?
Is Your Audit Department Highly Effective?
 
Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013Weekly eDiscovery Top Story Digest - November 20, 2013
Weekly eDiscovery Top Story Digest - November 20, 2013
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 
Ethics and the Internal Auditor
Ethics and the Internal AuditorEthics and the Internal Auditor
Ethics and the Internal Auditor
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Tisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White PaperTisski Ltd Freedom of Information White Paper
Tisski Ltd Freedom of Information White Paper
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program How to use ai apps to unleash the power of your audit program
How to use ai apps to unleash the power of your audit program
 
Social Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee NegroniSocial Media for Lenders Webinar featuring Lee Negroni
Social Media for Lenders Webinar featuring Lee Negroni
 
#Legal social
#Legal social#Legal social
#Legal social
 

Destacado

CLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBACLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBAStephanie Kimbro Dolin
 
Self Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of LawSelf Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of LawRichard S. Granat
 
&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;
&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;
&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;mcarruthers
 
Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014Jennifer Ellis, JD, LLC
 
Social Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal IndustrySocial Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal Industry6S Marketing
 
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...Rakesh Manoharan
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethicscharwendel
 
Professionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth CurveProfessionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth CurveMichelle Smyth
 
The Roles of Social Media Channels
The Roles of Social Media ChannelsThe Roles of Social Media Channels
The Roles of Social Media ChannelsMichelle Smyth
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeNicole Black
 
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...LinkedIn
 

Destacado (19)

(Webinar Slides) What Can Law Practice Management Software Do For You?
(Webinar Slides) What Can Law Practice Management Software Do For You?(Webinar Slides) What Can Law Practice Management Software Do For You?
(Webinar Slides) What Can Law Practice Management Software Do For You?
 
(Webinar Slides) PDF basics for lawyers
(Webinar Slides) PDF basics for lawyers(Webinar Slides) PDF basics for lawyers
(Webinar Slides) PDF basics for lawyers
 
CLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBACLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBA
 
Self Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of LawSelf Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of Law
 
&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;
&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;
&quot;Proceeding with Caution: The Unauthorized Practice of Law&quot;
 
(Webinar Slides) Building a 21st Century Law Practice
(Webinar Slides) Building a 21st Century Law Practice(Webinar Slides) Building a 21st Century Law Practice
(Webinar Slides) Building a 21st Century Law Practice
 
(Webinar Slides) Build Your Practice Through Blogging
(Webinar Slides) Build Your Practice Through Blogging(Webinar Slides) Build Your Practice Through Blogging
(Webinar Slides) Build Your Practice Through Blogging
 
(Webinar Slides) The Addicted Lawyer: How We Got Here, How To Solve It
(Webinar Slides) The Addicted Lawyer: How We Got Here, How To Solve It(Webinar Slides) The Addicted Lawyer: How We Got Here, How To Solve It
(Webinar Slides) The Addicted Lawyer: How We Got Here, How To Solve It
 
Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014Social Media Marketing and Ethics for Lawyers in 2014
Social Media Marketing and Ethics for Lawyers in 2014
 
Social Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal IndustrySocial Media for Law Firms and the Legal Industry
Social Media for Law Firms and the Legal Industry
 
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...The Social Media: Advent, growth, revolution and how it impacted lives and bu...
The Social Media: Advent, growth, revolution and how it impacted lives and bu...
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethics
 
Professionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth CurveProfessionals: Climbing the Social Media Growth Curve
Professionals: Climbing the Social Media Growth Curve
 
The Roles of Social Media Channels
The Roles of Social Media ChannelsThe Roles of Social Media Channels
The Roles of Social Media Channels
 
Social Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social MediaSocial Media Law: The Legal Do's and Don'ts of Social Media
Social Media Law: The Legal Do's and Don'ts of Social Media
 
(Webinar Slides) Digital Marketing for Lawyers
 (Webinar Slides) Digital Marketing for Lawyers (Webinar Slides) Digital Marketing for Lawyers
(Webinar Slides) Digital Marketing for Lawyers
 
Top Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law PracticeTop Technology Tools To Streamline Your Law Practice
Top Technology Tools To Streamline Your Law Practice
 
Lawyers and Social Media in 2016
Lawyers and Social Media in 2016Lawyers and Social Media in 2016
Lawyers and Social Media in 2016
 
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...Priming the Economic Engine: How Social Media is Driving Growth for Small and...
Priming the Economic Engine: How Social Media is Driving Growth for Small and...
 

Similar a (Webinar Slides) How to Ethically Use Technology in Your Practice

Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Catapult
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...MicheleNati
 
Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareKareo
 
Blockchain for Impact Amy Neumann October 2019
Blockchain for Impact Amy Neumann October 2019Blockchain for Impact Amy Neumann October 2019
Blockchain for Impact Amy Neumann October 2019Resourceful Nonprofit
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyersNicole Black
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy ManagementTrustArc
 
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Bruno Segers
 

Similar a (Webinar Slides) How to Ethically Use Technology in Your Practice (20)

Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Digital Transformation Business Evolution
Digital Transformation Business Evolution Digital Transformation Business Evolution
Digital Transformation Business Evolution
 
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
UNICOM Conference on Digital Transformation - The Trust Framework Initiative ...
 
How to Build the Best Virtual Law Firm.pptx (2).pdf
 How to Build the Best Virtual Law Firm.pptx (2).pdf How to Build the Best Virtual Law Firm.pptx (2).pdf
How to Build the Best Virtual Law Firm.pptx (2).pdf
 
Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based Software
 
Blockchain for Impact Amy Neumann October 2019
Blockchain for Impact Amy Neumann October 2019Blockchain for Impact Amy Neumann October 2019
Blockchain for Impact Amy Neumann October 2019
 
nerfslides.pptx
nerfslides.pptxnerfslides.pptx
nerfslides.pptx
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Cloud and mobile computing for lawyers
Cloud and mobile computing for lawyersCloud and mobile computing for lawyers
Cloud and mobile computing for lawyers
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management2019 08-21 Automating Privacy Management
2019 08-21 Automating Privacy Management
 
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...
 

Más de MyCase Legal Case and Practice Management Software

Más de MyCase Legal Case and Practice Management Software (20)

MyCase Webinar: Safeguard Your Law Firm Against Future Disruption
MyCase Webinar: Safeguard Your Law Firm Against Future DisruptionMyCase Webinar: Safeguard Your Law Firm Against Future Disruption
MyCase Webinar: Safeguard Your Law Firm Against Future Disruption
 
5 Ways to Stay Productive Through COVID-19 (And Beyond)
5 Ways to Stay Productive Through COVID-19 (And Beyond)5 Ways to Stay Productive Through COVID-19 (And Beyond)
5 Ways to Stay Productive Through COVID-19 (And Beyond)
 
How 3 Established Law Firms Are Handling COVID-19
How 3 Established Law Firms Are Handling COVID-19How 3 Established Law Firms Are Handling COVID-19
How 3 Established Law Firms Are Handling COVID-19
 
MyCase Webinar: How to Run a Law Firm Remotely During COVID-19
MyCase Webinar: How to Run a Law Firm Remotely During COVID-19MyCase Webinar: How to Run a Law Firm Remotely During COVID-19
MyCase Webinar: How to Run a Law Firm Remotely During COVID-19
 
Take Control of Your Financial Performance
Take Control of Your Financial PerformanceTake Control of Your Financial Performance
Take Control of Your Financial Performance
 
Scope creep: How Financial Management is Essential for Law Firm Profitability
Scope creep: How Financial Management is Essential for Law Firm ProfitabilityScope creep: How Financial Management is Essential for Law Firm Profitability
Scope creep: How Financial Management is Essential for Law Firm Profitability
 
Grow Your Caseload with Lead Tracking
Grow Your Caseload with Lead TrackingGrow Your Caseload with Lead Tracking
Grow Your Caseload with Lead Tracking
 
Everything You Wanted to Know About Outsourcing
Everything You Wanted to Know About OutsourcingEverything You Wanted to Know About Outsourcing
Everything You Wanted to Know About Outsourcing
 
Ensure You Capture All Billable Time
Ensure You Capture All Billable TimeEnsure You Capture All Billable Time
Ensure You Capture All Billable Time
 
6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software6 Effective Ways to Evaluate Your On-Premise Law Software
6 Effective Ways to Evaluate Your On-Premise Law Software
 
Rebuild Your Law Firm Processes with Practice Management Software
Rebuild Your Law Firm Processes with Practice Management SoftwareRebuild Your Law Firm Processes with Practice Management Software
Rebuild Your Law Firm Processes with Practice Management Software
 
Tips for Automating Your Practice
Tips for Automating Your PracticeTips for Automating Your Practice
Tips for Automating Your Practice
 
Ethics of Social Media Marketing
Ethics of Social Media MarketingEthics of Social Media Marketing
Ethics of Social Media Marketing
 
Turning More Traffic Into Fees
Turning More Traffic Into FeesTurning More Traffic Into Fees
Turning More Traffic Into Fees
 
LinkedIn, There's Something Different About You
LinkedIn, There's Something Different About YouLinkedIn, There's Something Different About You
LinkedIn, There's Something Different About You
 
Practicing at the Top of Your Law Game
Practicing at the Top of Your Law GamePracticing at the Top of Your Law Game
Practicing at the Top of Your Law Game
 
Fixed Fees - Ditching the Billable Hour
Fixed Fees - Ditching the Billable HourFixed Fees - Ditching the Billable Hour
Fixed Fees - Ditching the Billable Hour
 
When to Move Your Practice to the Cloud
When to Move Your Practice to the CloudWhen to Move Your Practice to the Cloud
When to Move Your Practice to the Cloud
 
(Webinar Slides) Build the Perfect Rainmaking Plan: Make 2018 YOUR Year!"
(Webinar Slides) Build the Perfect Rainmaking Plan: Make 2018 YOUR Year!" (Webinar Slides) Build the Perfect Rainmaking Plan: Make 2018 YOUR Year!"
(Webinar Slides) Build the Perfect Rainmaking Plan: Make 2018 YOUR Year!"
 
(Webinar slides) Simple Lessons to Improve Your Law Practice and Your Life
(Webinar slides) Simple Lessons to Improve Your Law Practice and Your Life(Webinar slides) Simple Lessons to Improve Your Law Practice and Your Life
(Webinar slides) Simple Lessons to Improve Your Law Practice and Your Life
 

Último

一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxRRR Chambers
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxnyabatejosphat1
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsAurora Consulting
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx2020000445musaib
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxPSSPRO12
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceanilsa9823
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdflaysamaeguardiano
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxRRR Chambers
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxRRR Chambers
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxMollyBrown86
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptzainabbkhaleeq123
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxRRR Chambers
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881mayurchatre90
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxca2or2tx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfKelechi48
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 

Último (20)

一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
CAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction FailsCAFC Chronicles: Costly Tales of Claim Construction Fails
CAFC Chronicles: Costly Tales of Claim Construction Fails
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptxpnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
pnp FIRST-RESPONDER-IN-CRIME-SCENEs.pptx
 
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Singar Nagar Lucknow best sexual service
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptxCOPYRIGHTS - PPT 01.12.2023 part- 2.pptx
COPYRIGHTS - PPT 01.12.2023 part- 2.pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxAudience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
Audience profile - SF.pptxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Chp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .pptChp 1- Contract and its kinds-business law .ppt
Chp 1- Contract and its kinds-business law .ppt
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
Negotiable Instruments Act 1881.UNDERSTAND THE LAW OF 1881
 
PowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptxPowerPoint - Legal Citation Form 1 - Case Law.pptx
PowerPoint - Legal Citation Form 1 - Case Law.pptx
 
Relationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdfRelationship Between International Law and Municipal Law MIR.pdf
Relationship Between International Law and Municipal Law MIR.pdf
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 

(Webinar Slides) How to Ethically Use Technology in Your Practice