SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Rules of Professional Conduct
and Cybersecurity
• Hi, I’m Barron Henley
• Married 27 years - 3 daughters
• Partner with
• Document assembly & MS Word expert
• Law office over-hauler
• Gourmet cook
What has changed in the last 15 years?
Lawyers must with incredible amounts of
electronic data
It is unavoidable
We are obligated to protect it
Relevant Ethics Rules
11
• In 2013, ABA added technology changes
to model rules
• As of today, 28 states have adopted them
A lawyer shall provide competent
representation to a client. Competent
representation requires the legal
knowledge, skill, thoroughness and
preparation reasonably necessary for the
representation.
Rule 1.1 - Competence
To maintain the requisite knowledge and
skill, a lawyer should keep abreast of
changes in the law and its practice,
including the benefits and risks associated
with relevant technology, engage in
continuing study and education and
comply with all continuing legal education
requirements to which the lawyer is
subject.
Rule 1.1 Comment 8
(a) A lawyer shall not reveal information
relating to the representation of a client,
including information protected by the
attorney-client privilege under applicable
law, unless the client gives informed
consent, the disclosure is impliedly
authorized in order to carry out the
representation, or the disclosure is
permitted by division (b) or required by
division (d) of this rule.
Rule 1.6(a)
(c) A lawyer shall make reasonable
efforts to prevent the inadvertent or
unauthorized disclosure of or unauthorized
access to information related to the
representation of a client.
Rule 1.6(c)
[18] Division (c) requires a lawyer to act
competently to safeguard information
relating to the representation of a client
against unauthorized access by third
parties and against inadvertent or
unauthorized disclosure by the lawyer or
other persons who are participating in the
representation of the client or who are
subject to the lawyer’s supervision.
Rule 1.6 Comment 18
[18 cont.] The unauthorized access to, or
the inadvertent or unauthorized disclosure
of, information relating to the
representation of a client does not
constitute a violation of division (c) if the
lawyer has made reasonable efforts to
prevent the access or disclosure.
Rule 1.6 Comment 18
[18 cont.] Factors to be considered in
determining the reasonableness of the
lawyer’s efforts include, but are not limited
to, the sensitivity of the information, the
likelihood of disclosure if additional
safeguards are not employed, the cost of
employing additional safeguards, the
difficulty of implementing the safeguards,
and the extent to which the safeguards
adversely affect the lawyer’s ability to
represent clients ….
Rule 1.6 Comment 18
[18 cont.] A client may require the lawyer
to implement special security measures
not required by this Rule or may give
informed consent to forgo security
measures that would otherwise be required
by this Rule. …
Rule 1.6 Comment 18
[19] When transmitting a communication
that includes information relating to the
representation of a client, the lawyer must
take reasonable precautions to prevent the
information from coming into the hands of
unintended recipients.
Rule 1.6 Comment 19
[19 cont.] This duty, however, does not
require that the lawyer use special security
measures if the method of communication
affords a reasonable expectation of
privacy.
Rule 1.6 Comment 19
[19 cont.] Special circumstances, however,
may warrant special precautions. Factors to
be considered in determining the
reasonableness of the lawyer’s expectation of
confidentiality include the sensitivity of the
information and the extent to which the
privacy of the communication is protected by
law or by a confidentiality agreement. A client
may require the lawyer to implement special
security measures not required by this Rule
or may give informed consent to the use of a
means of communication that would
otherwise be prohibited by this Rule. …
Rule 1.6 Comment 19
(a) [RESERVED]
(b) [RESERVED]
Rule 5.1
(c) A lawyer shall be responsible for another lawyer’s
violation of the Ohio Rules of Professional Conduct if
either of the following applies:
(1) the lawyer orders or, with knowledge of the
specific conduct, ratifies the conduct involved; or
(2) the lawyer is a partner or has comparable
managerial authority in the law firm in which the other
lawyer practices, or has direct supervisory authority
over the other lawyer, and knows of the conduct at a
time when its consequences can be avoided or
mitigated but fails to take reasonable remedial action.
Rule 5.1
With respect to a nonlawyer employed by,
retained by, or associated with a lawyer, all of
the following apply:
(a) a lawyer who individually or together
with other lawyers possesses comparable
managerial authority in a law firm, shall make
reasonable efforts to ensure that the firm or
government agency has in effect measures
giving reasonable assurance that the
person's conduct is compatible with the
professional obligations of the lawyer;
Rule 5.3
(b) a lawyer having direct supervisory
authority over the nonlawyer shall make
reasonable efforts to ensure that the
person's conduct is compatible with the
professional obligations of the lawyer; and
Rule 5.3(b)
(c) a lawyer shall be responsible for conduct of
such a person that would be a violation of the Ohio
Rules of Professional Conduct if engaged in by a
lawyer if either of the following applies:
(1) the lawyer orders or, with knowledge of
the relevant facts and the specific conduct,
ratifies the conduct involved;
(2) the lawyer is a partner in the law firm in
which the person is employed or has direct
supervisory authority over the person and
knows of the conduct at a time when its
consequences can be avoided or mitigated but
fails to take reasonable remedial action.
Rule 5.3(c)
Key Takeaways
29
You know that confidential electronic data is lost
every day – somewhere
QUESTION: Does doing nothing to prevent your
client’s data from being disclosed constitute:
1. “Reasonable efforts”
2. “Acting competently” or
3. “Reasonable precautions”?
• Confidentiality isn’t on a scale of 1 to 10
– data is either confidential or it isn’t
• Lawyers are not
qualified to judge:
– sensitivity of client data
– likelihood of disclosure
• If lawyers find it too expensive or difficult
to protect client data, then they shouldn’t
be in possession of it
Do you think email
provides a
reasonable
expectation of
privacy?
Well it doesn’t –
regardless of what
the case law says
You might want to ask your clients
beforehand how they feel about email
Pleading Ignorance Won’t Work
• You need to understand the risks &
benefits of relevant technology
• Example:
– Do you have the right software?
– Are the instructions written down?
– Does the person doing it know how?
Reasonable Steps
• Adobe Acrobat DC
– Acrobat DC Pro - $449
– Acrobat DC Standard - $299
• Acrobat DC Pro Equivalents:
– Nuance Power PDF Advanced - $150
– Foxit PhantomPDF Business - $140
– Nitro Pro - $160
Acrobat Alternatives
If you’re a supervising lawyer, you must
ensure that:
– All subordinate lawyers are following protocol
(Rule 5.1)
– All non lawyers associated with you are
following protocol (Rule 5.3)
Reasonable Steps
Clients often don’t understand how to
protect their own data
Reasonable Steps
Tech Competency Training:
– How to remove metadata from a Word file
– How to redact something on a PDF
– How to run a redline
– How to e-file
– How to Bates number documents
– How to edit complex documents
– How to conduct electronic legal research
– How to look up information on internal
systems
Reasonable Steps
About Accellis
Technology Group
Specialized IT Services Company providing
• Managed IT Services
• Cybersecurity & Risk Management
• Software Consulting
• Application Development & Integration
Target market: small to mid-sized firms (5-250 users)
Target verticals: legal, financial and non-profits
20 Employees in Ohio office
www.accellis.com

Weitere ähnliche Inhalte

Was ist angesagt?

10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection pointDan Michaluk
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementKeelan Stewart
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Financial Poise
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Riskduffeeandeitzen
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceFintan Swanton
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information SecurityCharles Mok
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Ben Allen
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyerscanadianlawyer
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)Mark Milburn
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill Mathew Chacko
 

Was ist angesagt? (20)

10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Ethics for lawyers in the cloud
Ethics for lawyers in the cloudEthics for lawyers in the cloud
Ethics for lawyers in the cloud
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Cyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & CoveragesCyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & Coverages
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 

Ähnlich wie Rules of Professional Conduct and Cybersecurity presented by Accellis Technology Group with Affinity Partner Barron K. Henley

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...Gary Allen
 
Legal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to MalpracticeLegal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to MalpracticeDowney Law Group LLC
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeRobert Ambrogi
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical IssuesRichard Austin
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkFrancoise Gilbert
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law Owako Rodah
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsNehal Madhani
 
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...Financial Poise
 
Friends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh MyFriends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh MyMark Kolber
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!Fintan Swanton
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethicscharwendel
 
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationFTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationBrent Hillyer
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)Richard Austin
 
Social Media and Professional Ethics
Social Media and Professional EthicsSocial Media and Professional Ethics
Social Media and Professional Ethicsssalkin
 
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...Financial Poise
 

Ähnlich wie Rules of Professional Conduct and Cybersecurity presented by Accellis Technology Group with Affinity Partner Barron K. Henley (20)

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
Legal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to MalpracticeLegal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to Malpractice
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical Issues
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
 
Michigan Alsp 2009(3)
Michigan Alsp 2009(3)Michigan Alsp 2009(3)
Michigan Alsp 2009(3)
 
Friends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh MyFriends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh My
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethics
 
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationFTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)
 
Social Media and Professional Ethics
Social Media and Professional EthicsSocial Media and Professional Ethics
Social Media and Professional Ethics
 
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
 

Mehr von Accellis Technology Group

Webinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 AppsWebinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 AppsAccellis Technology Group
 
Webinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It WrongWebinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It WrongAccellis Technology Group
 
Cyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology GroupCyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology GroupAccellis Technology Group
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...Accellis Technology Group
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupAccellis Technology Group
 
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Accellis Technology Group
 
Art of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology GroupArt of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology GroupAccellis Technology Group
 

Mehr von Accellis Technology Group (9)

Webinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 AppsWebinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 Apps
 
Webinar Wednesday: Cloud Collaboration
Webinar Wednesday: Cloud CollaborationWebinar Wednesday: Cloud Collaboration
Webinar Wednesday: Cloud Collaboration
 
Webinar Wednesday: Locking Up the Cloud
Webinar Wednesday: Locking Up the CloudWebinar Wednesday: Locking Up the Cloud
Webinar Wednesday: Locking Up the Cloud
 
Webinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It WrongWebinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It Wrong
 
Cyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology GroupCyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology Group
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
 
Art of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology GroupArt of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology Group
 

Kürzlich hochgeladen

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Rules of Professional Conduct and Cybersecurity presented by Accellis Technology Group with Affinity Partner Barron K. Henley

  • 1. Rules of Professional Conduct and Cybersecurity
  • 2. • Hi, I’m Barron Henley • Married 27 years - 3 daughters • Partner with • Document assembly & MS Word expert • Law office over-hauler • Gourmet cook
  • 3. What has changed in the last 15 years?
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Lawyers must with incredible amounts of electronic data It is unavoidable We are obligated to protect it
  • 12. • In 2013, ABA added technology changes to model rules • As of today, 28 states have adopted them
  • 13. A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. Rule 1.1 - Competence
  • 14. To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Rule 1.1 Comment 8
  • 15. (a) A lawyer shall not reveal information relating to the representation of a client, including information protected by the attorney-client privilege under applicable law, unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation, or the disclosure is permitted by division (b) or required by division (d) of this rule. Rule 1.6(a)
  • 16. (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of or unauthorized access to information related to the representation of a client. Rule 1.6(c)
  • 17. [18] Division (c) requires a lawyer to act competently to safeguard information relating to the representation of a client against unauthorized access by third parties and against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer’s supervision. Rule 1.6 Comment 18
  • 18. [18 cont.] The unauthorized access to, or the inadvertent or unauthorized disclosure of, information relating to the representation of a client does not constitute a violation of division (c) if the lawyer has made reasonable efforts to prevent the access or disclosure. Rule 1.6 Comment 18
  • 19. [18 cont.] Factors to be considered in determining the reasonableness of the lawyer’s efforts include, but are not limited to, the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer’s ability to represent clients …. Rule 1.6 Comment 18
  • 20. [18 cont.] A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to forgo security measures that would otherwise be required by this Rule. … Rule 1.6 Comment 18
  • 21. [19] When transmitting a communication that includes information relating to the representation of a client, the lawyer must take reasonable precautions to prevent the information from coming into the hands of unintended recipients. Rule 1.6 Comment 19
  • 22. [19 cont.] This duty, however, does not require that the lawyer use special security measures if the method of communication affords a reasonable expectation of privacy. Rule 1.6 Comment 19
  • 23. [19 cont.] Special circumstances, however, may warrant special precautions. Factors to be considered in determining the reasonableness of the lawyer’s expectation of confidentiality include the sensitivity of the information and the extent to which the privacy of the communication is protected by law or by a confidentiality agreement. A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to the use of a means of communication that would otherwise be prohibited by this Rule. … Rule 1.6 Comment 19
  • 25. (c) A lawyer shall be responsible for another lawyer’s violation of the Ohio Rules of Professional Conduct if either of the following applies: (1) the lawyer orders or, with knowledge of the specific conduct, ratifies the conduct involved; or (2) the lawyer is a partner or has comparable managerial authority in the law firm in which the other lawyer practices, or has direct supervisory authority over the other lawyer, and knows of the conduct at a time when its consequences can be avoided or mitigated but fails to take reasonable remedial action. Rule 5.1
  • 26. With respect to a nonlawyer employed by, retained by, or associated with a lawyer, all of the following apply: (a) a lawyer who individually or together with other lawyers possesses comparable managerial authority in a law firm, shall make reasonable efforts to ensure that the firm or government agency has in effect measures giving reasonable assurance that the person's conduct is compatible with the professional obligations of the lawyer; Rule 5.3
  • 27. (b) a lawyer having direct supervisory authority over the nonlawyer shall make reasonable efforts to ensure that the person's conduct is compatible with the professional obligations of the lawyer; and Rule 5.3(b)
  • 28. (c) a lawyer shall be responsible for conduct of such a person that would be a violation of the Ohio Rules of Professional Conduct if engaged in by a lawyer if either of the following applies: (1) the lawyer orders or, with knowledge of the relevant facts and the specific conduct, ratifies the conduct involved; (2) the lawyer is a partner in the law firm in which the person is employed or has direct supervisory authority over the person and knows of the conduct at a time when its consequences can be avoided or mitigated but fails to take reasonable remedial action. Rule 5.3(c)
  • 30. You know that confidential electronic data is lost every day – somewhere QUESTION: Does doing nothing to prevent your client’s data from being disclosed constitute: 1. “Reasonable efforts” 2. “Acting competently” or 3. “Reasonable precautions”?
  • 31. • Confidentiality isn’t on a scale of 1 to 10 – data is either confidential or it isn’t • Lawyers are not qualified to judge: – sensitivity of client data – likelihood of disclosure • If lawyers find it too expensive or difficult to protect client data, then they shouldn’t be in possession of it
  • 32. Do you think email provides a reasonable expectation of privacy? Well it doesn’t – regardless of what the case law says
  • 33. You might want to ask your clients beforehand how they feel about email
  • 35. • You need to understand the risks & benefits of relevant technology • Example: – Do you have the right software? – Are the instructions written down? – Does the person doing it know how? Reasonable Steps
  • 36. • Adobe Acrobat DC – Acrobat DC Pro - $449 – Acrobat DC Standard - $299 • Acrobat DC Pro Equivalents: – Nuance Power PDF Advanced - $150 – Foxit PhantomPDF Business - $140 – Nitro Pro - $160 Acrobat Alternatives
  • 37. If you’re a supervising lawyer, you must ensure that: – All subordinate lawyers are following protocol (Rule 5.1) – All non lawyers associated with you are following protocol (Rule 5.3) Reasonable Steps
  • 38. Clients often don’t understand how to protect their own data Reasonable Steps
  • 39. Tech Competency Training: – How to remove metadata from a Word file – How to redact something on a PDF – How to run a redline – How to e-file – How to Bates number documents – How to edit complex documents – How to conduct electronic legal research – How to look up information on internal systems Reasonable Steps
  • 40. About Accellis Technology Group Specialized IT Services Company providing • Managed IT Services • Cybersecurity & Risk Management • Software Consulting • Application Development & Integration Target market: small to mid-sized firms (5-250 users) Target verticals: legal, financial and non-profits 20 Employees in Ohio office www.accellis.com