SlideShare a Scribd company logo
1 of 29
E-mail Ethics: Rules and Best Practices for Attorney Use of E-mail and the Internet Professor Jonathan I. Ezor Director Institute for Business, Law & Technology Touro Law Center When Spam Isn’t Spam November 27, 2007 [email_address]
Computers and Technology Embedded in Legal Practice ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
All Professionals Face Issues Depending On Technology ,[object Object],[object Object],[object Object],[object Object]
Legal Practice Raises Additional Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Internet Technology Enables Mobile Workforce ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile Workers Open Doors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Portable Devices Add to Concerns ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
 
Attorneys: Confidentiality is Not a Privilege ,[object Object],[object Object],[object Object],[object Object]
 
 
 
Attorney Advertising: E-mail, Web Sites a Concern ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unauthorized Practice: Where In The World is The Client? ,[object Object],[object Object],[object Object],[object Object]
Verifiability of Sources: Can the Internet Be Trusted? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Double Trouble of Internet: Reliability and Currency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Litigation Technology: High Stakes, Frequent Mistakes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
NORTHERN DISTRICT OF CALIFORNIA https://ecf.cand.uscourts.gov/cand/faq/tips/redacting.htm
 
 
Electronic Discovery: Giving and Receiving ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Malicious Hacking: ,[object Object],[object Object],[object Object],“ The Case of the Law Firm Porn Server”
With Digital Records, Backups Required by Ethics and Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Strict Controls Needed for Firm Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
For More Information Please Contact: Professor Jonathan I. Ezor Director, Institute for Business, Law and Technology (IBLT) Touro Law Center 225 Eastview Dr., Central Islip, NY 11722 Tel: 631-761-7119  Fax: 516-977-3001 e.  [email_address]

More Related Content

What's hot

Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
Darren McManus
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
badak sumbu
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
I P Abir
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
aisha747
 

What's hot (19)

Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Computer ethics and crime
Computer ethics and crimeComputer ethics and crime
Computer ethics and crime
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Sec and ethics presentation
Sec and ethics presentationSec and ethics presentation
Sec and ethics presentation
 
Technology Safety Practices
Technology Safety PracticesTechnology Safety Practices
Technology Safety Practices
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
ethical legal issues
ethical legal issuesethical legal issues
ethical legal issues
 
Security and ethical challenges in mis
Security and ethical challenges in misSecurity and ethical challenges in mis
Security and ethical challenges in mis
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Review questions
Review questionsReview questions
Review questions
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 
Ethics in it
Ethics in itEthics in it
Ethics in it
 
Lab 1a computer forensic specialist
Lab 1a computer forensic specialistLab 1a computer forensic specialist
Lab 1a computer forensic specialist
 
The standard for email communications
The standard for email communicationsThe standard for email communications
The standard for email communications
 
Managing It Security
Managing It SecurityManaging It Security
Managing It Security
 

Viewers also liked (10)

10 commandments to reduce e-mail use
10 commandments to reduce e-mail use10 commandments to reduce e-mail use
10 commandments to reduce e-mail use
 
How to use e mail for beginners
How to use e mail for beginnersHow to use e mail for beginners
How to use e mail for beginners
 
How to use e mail
How to use e mailHow to use e mail
How to use e mail
 
Apps your kids are using
Apps your kids are usingApps your kids are using
Apps your kids are using
 
How to send email
How to send email  How to send email
How to send email
 
E mail systems
E mail systemsE mail systems
E mail systems
 
e-mail tips
e-mail tipse-mail tips
e-mail tips
 
E Mail Ethics and Etiquettes
E Mail Ethics and EtiquettesE Mail Ethics and Etiquettes
E Mail Ethics and Etiquettes
 
Effective emailing ppt
Effective emailing pptEffective emailing ppt
Effective emailing ppt
 
Pollution.Ppt
Pollution.PptPollution.Ppt
Pollution.Ppt
 

Similar to 11 27 07 Ezor Attorney E Mail Ethics Presentation

FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
Matthew Magner
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
MISY
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdf
jyothimuppasani1
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
Brian Rowe
 

Similar to 11 27 07 Ezor Attorney E Mail Ethics Presentation (20)

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
Introduction to Virtual Law Practice
Introduction to Virtual Law PracticeIntroduction to Virtual Law Practice
Introduction to Virtual Law Practice
 
Chapter1
Chapter1Chapter1
Chapter1
 
Keynote on Future of Legal Services Delivery
Keynote on Future of Legal Services DeliveryKeynote on Future of Legal Services Delivery
Keynote on Future of Legal Services Delivery
 
CLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBACLE on Virtual Law Practice for the NCBA
CLE on Virtual Law Practice for the NCBA
 
File000166
File000166File000166
File000166
 
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINALFINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
FINAL Disclosures Art-Cyber Threats n Law Firms-Magner FINAL
 
One - Social & Ethical Issues
One - Social & Ethical IssuesOne - Social & Ethical Issues
One - Social & Ethical Issues
 
The Legal Aspects of Cyberspace
The Legal Aspects of CyberspaceThe Legal Aspects of Cyberspace
The Legal Aspects of Cyberspace
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
Cyber
CyberCyber
Cyber
 
The final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdfThe final section of the Digital Forensics journal article by Ga.pdf
The final section of the Digital Forensics journal article by Ga.pdf
 
Webinar: Gathering Social Media Evidence
Webinar: Gathering Social Media EvidenceWebinar: Gathering Social Media Evidence
Webinar: Gathering Social Media Evidence
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
When Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for LawyersWhen Worlds Collide: Ethics and Technology for Lawyers
When Worlds Collide: Ethics and Technology for Lawyers
 
Virtual Law Office - What It Is & How to Use It
Virtual Law Office - What It Is & How to Use ItVirtual Law Office - What It Is & How to Use It
Virtual Law Office - What It Is & How to Use It
 
Legal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptxLegal Privacy and Ethical Issues in Computer Security.pptx
Legal Privacy and Ethical Issues in Computer Security.pptx
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
 
Future of the Legal Profession
Future of the Legal ProfessionFuture of the Legal Profession
Future of the Legal Profession
 

More from Jonathan Ezor

More from Jonathan Ezor (13)

3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation3 14-14 ezor social media ethics rules presentation
3 14-14 ezor social media ethics rules presentation
 
Privacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law CenterPrivacy and Data Protection CLE Presentation for Touro Law Center
Privacy and Data Protection CLE Presentation for Touro Law Center
 
10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation10-30-13 Social Media and Confidentiality Presentation
10-30-13 Social Media and Confidentiality Presentation
 
10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges10-22-13 Presentation on Google Glass and Privacy Challenges
10-22-13 Presentation on Google Glass and Privacy Challenges
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
 
Legal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in LitigationLegal Ethics and Social Media: Use in Litigation
Legal Ethics and Social Media: Use in Litigation
 
Privacy Pitfalls in Transactions
Privacy Pitfalls in TransactionsPrivacy Pitfalls in Transactions
Privacy Pitfalls in Transactions
 
4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE4 30 12 Cardozo Social Media Ethics CLE
4 30 12 Cardozo Social Media Ethics CLE
 
Social Media And Legal Ethics
Social Media And Legal EthicsSocial Media And Legal Ethics
Social Media And Legal Ethics
 
11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation11 19 10 Ezor Revised Copyright Presentation
11 19 10 Ezor Revised Copyright Presentation
 
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk3 23 10 Aitp Li Ezor Presentation On Social Media Risk
3 23 10 Aitp Li Ezor Presentation On Social Media Risk
 
9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation9 23 09 140tc Security Presentation
9 23 09 140tc Security Presentation
 
Social Media Horror Stories for Law Students
Social Media Horror Stories for Law StudentsSocial Media Horror Stories for Law Students
Social Media Horror Stories for Law Students
 

11 27 07 Ezor Attorney E Mail Ethics Presentation

  • 1. E-mail Ethics: Rules and Best Practices for Attorney Use of E-mail and the Internet Professor Jonathan I. Ezor Director Institute for Business, Law & Technology Touro Law Center When Spam Isn’t Spam November 27, 2007 [email_address]
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.  
  • 9.  
  • 10.  
  • 11.  
  • 12.
  • 13.  
  • 14.  
  • 15.  
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. NORTHERN DISTRICT OF CALIFORNIA https://ecf.cand.uscourts.gov/cand/faq/tips/redacting.htm
  • 22.  
  • 23.  
  • 24.
  • 25.  
  • 26.
  • 27.
  • 28.
  • 29. For More Information Please Contact: Professor Jonathan I. Ezor Director, Institute for Business, Law and Technology (IBLT) Touro Law Center 225 Eastview Dr., Central Islip, NY 11722 Tel: 631-761-7119 Fax: 516-977-3001 e. [email_address]