SlideShare a Scribd company logo
Chris Homer
chomer@gngf.com | @ChrisHomer24
Data Security & Technology
DATA & SECURITY
Jabez LeBret
jabez@gngf.com
@gngfound
SOCIAL MEDIA
COMPETENCE
Jabez LeBret
jabez@gngf.com
@gngfound
@gngfound
•
CHRIS HOMER
Chris “Tres” Homer
Senior Campaign Engineer
JABEZ LEBRETJABEZ LEBRET
@gngfound
•
CHRIS HOMER
Chris “Tres” Homer
Senior Campaign Engineer
JABEZ LEBRETJABEZ LEBRET
North Carolina State Bar Council adopted the view that a lawyer’s
obligation to provide competent and diligent representation
(see, e.g., Mass. R. Prof. C. 1.1 and 1.3) requires a lawyer to
“advise the client of the legal ramifications of existing postings,
future postings, and third party comments.
Advice should be given before and after the law suit is filed.”
See 2014 N.C. Ethics Op. 5, #1.
2005
Online = Website
2016
Online = Presence
2005 2016
THE FUTURE IS MOBILE
*IDC Research Report 2013
have their phone on or
near them for all but up to
2 hours of their waking
day.
79
% reach for their
smartphone immediately
after waking up
62
% say they can't recall the
last time their smartphone
wasn't next to them.
25
%
Among smartphone owners age 18-
44
Data Security and Technology
DATA & SECURITY
Jabez LeBret
jabez@gngf.com
@gngfound
The Ethical Problem
• Being “computer illiterate” or not being a “computer
person” is no longer an excuse.
• We’re carrying a computer in our pocket.
• Everyday a basic service moves to online only.
New Model Rule 1.1
Addition of “Technology”
- When you need to be secure
- What needs to be secure
- Tools to use
- Things to Avoid
Technology Becomes Ethics
The ABA’s Five Questions for Data Security
What is the sensitivity of the information?
What is the likelihood of disclosure if additional safeguards are not
taken?
Is the cost of employing additional safeguards extraordinary?
How difficult will it be to implement safeguards?
To what extent will the safeguards adversely affect the lawyer’s
ability to represent the client?
Technology
1. What is the sensitivity of the information?
Some information is considered more sensitive than others. SSN,
DOB, or pertinent details to the case should be considered more
sensitive. Other facts, like someone’s Twitter handle or university
attended, are less sensitive because they are easily attained by an
average person and usually carry little weight in most cases.
2. What is the likelihood of disclosure if additional safeguards are
not taken?
This particular question is encouraging lawyers to ask how likely
people are to steal confidential information. A great example is the
Casey Anthony case. At first, the case was regional. Once the
national news began featuring the trial, the likes of Nancy Grace
started getting fired up, and this case became highly visible. A
highly visible case becomes a much greater target for data
security breaches.
3. Is the cost of employing additional safeguards extraordinary?
A very difficult question to answer. At what point have you crossed
the line into “too expensive”? A couple of ways to approach this
question would be to determine the potential damages to your
client if said information became public, or to look at the average
industry cost of standard security protocols (above basic, below
enterprise). In most cases, keeping information private is not that
expensive, and damages are often due to human error as
opposed to a poor investment into a weak tool—but not always.
4. How difficult will it be to implement safeguards?
Want to send your client fully encrypted emails with files that
can’t be shared with anyone? That is going to be complicated.
Need to save documents on a secured cloud server? Easy.
Having a security process is not a fun task to implement, but it
doesn’t have to be difficult and should be considered your first
step in data security.
5. To what extent will the safeguards adversely affect the
lawyer’s ability to represent the client?
Some data protection protocols can be cumbersome at best.
Expecting a client to operate on a clean laptop with secured wifi
access and a user key for encrypting messages could mean you
rarely hear from your clients. If your security measures are so
strict that you—or your clients—find it prohibitive to function
through the legal matter, you may want to dial back the
restrictions—just not until you answer the first four questions.
@gngfound
PASSWORDS
Wifi
Wifi
Wifi
@gngfound
SOCIAL NETWORKS
Hashtag # - Anchors and Tags Messages
Privacy Settings
Profile Page
Login Screen
Index or Indexing
Terminology
@gngfound
FACEBOOK DEMOGRAPHIC CHANGES
• Kids leaving Facebook
• Fastest growing demographic
is adults ages 35-55
• Behavior is drastically changing
@gngfound
SNAPCHAT FASTEST GROWING
• Under age of 35
• Semi-Private
• Discovery Issues
@gngfound
SNAPCHAT FASTEST GROWING
• Under age of 35
• Semi-Private
• Discovery Issues
@gngfound
SNAPCHAT FASTEST GROWING
• Snaps
• Stories
• Filters
• Groups
2013
Facebook Tried To Buy Snapchat For $3B In Cash.
cc: escapedtowisconsin - https://www.flickr.com/photos/69805768@N00
@gngfound
Instagram
@gngfound
@gngfound
@gngfound
Users do not need to
approve a tag to be
tagged in another users
photo.
@gngfound
@gngfound
Pinterest
Chris Homer
chomer@gngf.com | @ChrisHomer24
Data Security & Technology
DATA & SECURITY
Jabez LeBret
jabez@gngf.com
@gngfound
SOCIAL MEDIA
COMPETENCE
Jabez LeBret
jabez@gngf.com
@gngfound

More Related Content

What's hot

Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
Evan Francen
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
OWASP Foundation
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
Shawn Tuma
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
Hovhannes Aghajanyan
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
Murray Security Services
 
Social engineering
Social engineering Social engineering
Social engineering
Abdelhamid Limami
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Rob Ragan
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
abercius24
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
primeteacher32
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Richard Common
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
JamRivera1
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
Marin Ivezic
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentationpooja_doshi
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
William Gregorian
 

What's hot (20)

Social engineering
Social engineering Social engineering
Social engineering
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineering Social engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"Social Engineering: "The Cyber-Con"
Social Engineering: "The Cyber-Con"
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Social Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionageSocial Engineering - Human aspects of industrial and economic espionage
Social Engineering - Human aspects of industrial and economic espionage
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 

Similar to Social media competence and ethics Oklahoma

Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
LexisNexis
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
Jim Brashear
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
Shawn Tuma
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Shawn Tuma
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
Financial Poise
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Clio - Cloud-Based Legal Technology
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
Ulf Mattsson
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
jonneiditz
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Shawn Tuma
 
E commerce
E commerce E commerce
E commerce
DrSelvamohanaK
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
larrylieb
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
Financial Poise
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Logikcull.com
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
Shawn Tuma
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
pdewitte
 

Similar to Social media competence and ethics Oklahoma (20)

Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
SecureWorld Expo Dallas - Cybersecurity Law: What Business and IT Leaders Nee...
 
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
Real World Cybersecurity Tips You Can Use to Protect Your Clients, Your Firm,...
 
Data Breach Response: Before and After the Breach
Data Breach Response: Before and After the BreachData Breach Response: Before and After the Breach
Data Breach Response: Before and After the Breach
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019What i learned at the infosecurity isaca north america expo and conference 2019
What i learned at the infosecurity isaca north america expo and conference 2019
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...Transitory Electronic Communication: Recordless Messaging in the Context of a...
Transitory Electronic Communication: Recordless Messaging in the Context of a...
 
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data LossLeadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
Leadership: Legal Counsel's Role in Guiding Through Cybersecurity and Data Loss
 
E commerce
E commerce E commerce
E commerce
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011An Attorney’S Guide To Managing Social Media Based Evidence 03142011
An Attorney’S Guide To Managing Social Media Based Evidence 03142011
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
Protecting Against Petya: Ransomware and the Future of Law Firm Cybersecurity
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
Puna 2015
Puna 2015Puna 2015
Puna 2015
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 

More from Jon Sutten

Alabama Lawyer U: Marketing 101 CLE Program
Alabama Lawyer U: Marketing 101 CLE ProgramAlabama Lawyer U: Marketing 101 CLE Program
Alabama Lawyer U: Marketing 101 CLE Program
Jon Sutten
 
Social media and online ethics updated
Social media and online ethics updated Social media and online ethics updated
Social media and online ethics updated
Jon Sutten
 
Common mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketingCommon mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketing
Jon Sutten
 
Social media ethics, judicial holds - data security for law firms
Social media ethics, judicial holds - data security for law firmsSocial media ethics, judicial holds - data security for law firms
Social media ethics, judicial holds - data security for law firms
Jon Sutten
 
Social media and online ethics
Social media and online ethics Social media and online ethics
Social media and online ethics
Jon Sutten
 
Common mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketingCommon mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketing
Jon Sutten
 
Cincinnati Lunch CLE Common Ethics Mistakes Law Firms Make When Marketing O...
Cincinnati Lunch CLE   Common Ethics Mistakes Law Firms Make When Marketing O...Cincinnati Lunch CLE   Common Ethics Mistakes Law Firms Make When Marketing O...
Cincinnati Lunch CLE Common Ethics Mistakes Law Firms Make When Marketing O...
Jon Sutten
 
Spokane social media 101
Spokane   social media 101Spokane   social media 101
Spokane social media 101
Jon Sutten
 
Spokane common ethics mistake law firms make when marketing online - tres
Spokane   common ethics mistake law firms make when marketing online - tresSpokane   common ethics mistake law firms make when marketing online - tres
Spokane common ethics mistake law firms make when marketing online - tres
Jon Sutten
 
Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...
Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...
Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...
Jon Sutten
 
How to advise clients and manage judicial holds and discovery with social med...
How to advise clients and manage judicial holds and discovery with social med...How to advise clients and manage judicial holds and discovery with social med...
How to advise clients and manage judicial holds and discovery with social med...
Jon Sutten
 
Common ethics mistake law firms make when marketing online Lincoln 2016
Common ethics mistake law firms make when marketing online   Lincoln 2016Common ethics mistake law firms make when marketing online   Lincoln 2016
Common ethics mistake law firms make when marketing online Lincoln 2016
Jon Sutten
 
Common ethics mistake law firms make when marketing online mark copy
Common ethics mistake law firms make when marketing online   mark copyCommon ethics mistake law firms make when marketing online   mark copy
Common ethics mistake law firms make when marketing online mark copy
Jon Sutten
 
Toronto 2016 ethics update copy
Toronto 2016 ethics update copyToronto 2016 ethics update copy
Toronto 2016 ethics update copy
Jon Sutten
 
Social media and online ethics
Social media and online ethics Social media and online ethics
Social media and online ethics
Jon Sutten
 
The ethics of being online for lawyers
The ethics of being online for lawyersThe ethics of being online for lawyers
The ethics of being online for lawyers
Jon Sutten
 

More from Jon Sutten (16)

Alabama Lawyer U: Marketing 101 CLE Program
Alabama Lawyer U: Marketing 101 CLE ProgramAlabama Lawyer U: Marketing 101 CLE Program
Alabama Lawyer U: Marketing 101 CLE Program
 
Social media and online ethics updated
Social media and online ethics updated Social media and online ethics updated
Social media and online ethics updated
 
Common mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketingCommon mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketing
 
Social media ethics, judicial holds - data security for law firms
Social media ethics, judicial holds - data security for law firmsSocial media ethics, judicial holds - data security for law firms
Social media ethics, judicial holds - data security for law firms
 
Social media and online ethics
Social media and online ethics Social media and online ethics
Social media and online ethics
 
Common mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketingCommon mistakes and ethics of law firm marketing
Common mistakes and ethics of law firm marketing
 
Cincinnati Lunch CLE Common Ethics Mistakes Law Firms Make When Marketing O...
Cincinnati Lunch CLE   Common Ethics Mistakes Law Firms Make When Marketing O...Cincinnati Lunch CLE   Common Ethics Mistakes Law Firms Make When Marketing O...
Cincinnati Lunch CLE Common Ethics Mistakes Law Firms Make When Marketing O...
 
Spokane social media 101
Spokane   social media 101Spokane   social media 101
Spokane social media 101
 
Spokane common ethics mistake law firms make when marketing online - tres
Spokane   common ethics mistake law firms make when marketing online - tresSpokane   common ethics mistake law firms make when marketing online - tres
Spokane common ethics mistake law firms make when marketing online - tres
 
Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...
Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...
Knoxville TN-Common ethics mistake law firms make when marketing online - 11-...
 
How to advise clients and manage judicial holds and discovery with social med...
How to advise clients and manage judicial holds and discovery with social med...How to advise clients and manage judicial holds and discovery with social med...
How to advise clients and manage judicial holds and discovery with social med...
 
Common ethics mistake law firms make when marketing online Lincoln 2016
Common ethics mistake law firms make when marketing online   Lincoln 2016Common ethics mistake law firms make when marketing online   Lincoln 2016
Common ethics mistake law firms make when marketing online Lincoln 2016
 
Common ethics mistake law firms make when marketing online mark copy
Common ethics mistake law firms make when marketing online   mark copyCommon ethics mistake law firms make when marketing online   mark copy
Common ethics mistake law firms make when marketing online mark copy
 
Toronto 2016 ethics update copy
Toronto 2016 ethics update copyToronto 2016 ethics update copy
Toronto 2016 ethics update copy
 
Social media and online ethics
Social media and online ethics Social media and online ethics
Social media and online ethics
 
The ethics of being online for lawyers
The ethics of being online for lawyersThe ethics of being online for lawyers
The ethics of being online for lawyers
 

Recently uploaded

NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
anvithaav
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
ShivkumarIyer18
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
Dr. Oliver Massmann
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
Finlaw Consultancy Pvt Ltd
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Thomas (Tom) Jasper
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
Abdul-Hakim Shabazz
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
9ib5wiwt
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
anjalidixit21
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
Wendy Couture
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
niputusriwidiasih
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
MwaiMapemba
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
Trademark Quick
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
ssuser0576e4
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
9ib5wiwt
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
ssuser5750e1
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
9ib5wiwt
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
Daffodil International University
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
KHURRAMWALI
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
46adnanshahzad
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
9ib5wiwt
 

Recently uploaded (20)

NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxNATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptx
 
Bharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptxBharatiya Nagarik Suraksha Sanhita power.pptx
Bharatiya Nagarik Suraksha Sanhita power.pptx
 
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
VIETNAM - DIRECT POWER PURCHASE AGREEMENTS (DPPA) - Latest development - What...
 
Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...Responsibilities of the office bearers while registering multi-state cooperat...
Responsibilities of the office bearers while registering multi-state cooperat...
 
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense CounselMilitary Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
Military Commissions details LtCol Thomas Jasper as Detailed Defense Counsel
 
Rokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal OpinionRokita Releases Soccer Stadium Legal Opinion
Rokita Releases Soccer Stadium Legal Opinion
 
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
1比1制作(swansea毕业证书)英国斯旺西大学毕业证学位证书托业成绩单原版一模一样
 
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptxHighlights_of_Bhartiya_Nyaya_Sanhita.pptx
Highlights_of_Bhartiya_Nyaya_Sanhita.pptx
 
Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)Business and Corporate Case Update (2024)
Business and Corporate Case Update (2024)
 
new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.new victimology of indonesian law. Pptx.
new victimology of indonesian law. Pptx.
 
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW  AN OVERVIEW in Malawi.pptxEMPLOYMENT LAW  AN OVERVIEW in Malawi.pptx
EMPLOYMENT LAW AN OVERVIEW in Malawi.pptx
 
Secure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark TodaySecure Your Brand: File a Trademark Today
Secure Your Brand: File a Trademark Today
 
Debt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debtDebt Mapping Camp bebas riba to know how much our debt
Debt Mapping Camp bebas riba to know how much our debt
 
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
怎么购买(massey毕业证书)新西兰梅西大学毕业证学位证书注册证明信原版一模一样
 
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdfDonald_J_Trump_katigoritirio_stormi_daniels.pdf
Donald_J_Trump_katigoritirio_stormi_daniels.pdf
 
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
定制(nus毕业证书)新加坡国立大学毕业证学位证书实拍图原版一模一样
 
ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.ADR in criminal proceeding in Bangladesh with global perspective.
ADR in criminal proceeding in Bangladesh with global perspective.
 
WINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of DissolutionWINDING UP of COMPANY, Modes of Dissolution
WINDING UP of COMPANY, Modes of Dissolution
 
ALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdfALL EYES ON RAFAH BUT WHY Explain more.pdf
ALL EYES ON RAFAH BUT WHY Explain more.pdf
 
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
办理(waikato毕业证书)新西兰怀卡托大学毕业证双学位证书原版一模一样
 

Social media competence and ethics Oklahoma

  • 1. Chris Homer chomer@gngf.com | @ChrisHomer24 Data Security & Technology DATA & SECURITY Jabez LeBret jabez@gngf.com @gngfound SOCIAL MEDIA COMPETENCE Jabez LeBret jabez@gngf.com @gngfound
  • 2. @gngfound • CHRIS HOMER Chris “Tres” Homer Senior Campaign Engineer JABEZ LEBRETJABEZ LEBRET
  • 3. @gngfound • CHRIS HOMER Chris “Tres” Homer Senior Campaign Engineer JABEZ LEBRETJABEZ LEBRET
  • 4. North Carolina State Bar Council adopted the view that a lawyer’s obligation to provide competent and diligent representation (see, e.g., Mass. R. Prof. C. 1.1 and 1.3) requires a lawyer to “advise the client of the legal ramifications of existing postings, future postings, and third party comments. Advice should be given before and after the law suit is filed.” See 2014 N.C. Ethics Op. 5, #1.
  • 7. THE FUTURE IS MOBILE *IDC Research Report 2013 have their phone on or near them for all but up to 2 hours of their waking day. 79 % reach for their smartphone immediately after waking up 62 % say they can't recall the last time their smartphone wasn't next to them. 25 % Among smartphone owners age 18- 44
  • 8. Data Security and Technology DATA & SECURITY Jabez LeBret jabez@gngf.com @gngfound
  • 9. The Ethical Problem • Being “computer illiterate” or not being a “computer person” is no longer an excuse. • We’re carrying a computer in our pocket. • Everyday a basic service moves to online only.
  • 10. New Model Rule 1.1 Addition of “Technology” - When you need to be secure - What needs to be secure - Tools to use - Things to Avoid Technology Becomes Ethics
  • 11. The ABA’s Five Questions for Data Security What is the sensitivity of the information? What is the likelihood of disclosure if additional safeguards are not taken? Is the cost of employing additional safeguards extraordinary? How difficult will it be to implement safeguards? To what extent will the safeguards adversely affect the lawyer’s ability to represent the client? Technology
  • 12. 1. What is the sensitivity of the information? Some information is considered more sensitive than others. SSN, DOB, or pertinent details to the case should be considered more sensitive. Other facts, like someone’s Twitter handle or university attended, are less sensitive because they are easily attained by an average person and usually carry little weight in most cases.
  • 13. 2. What is the likelihood of disclosure if additional safeguards are not taken? This particular question is encouraging lawyers to ask how likely people are to steal confidential information. A great example is the Casey Anthony case. At first, the case was regional. Once the national news began featuring the trial, the likes of Nancy Grace started getting fired up, and this case became highly visible. A highly visible case becomes a much greater target for data security breaches.
  • 14. 3. Is the cost of employing additional safeguards extraordinary? A very difficult question to answer. At what point have you crossed the line into “too expensive”? A couple of ways to approach this question would be to determine the potential damages to your client if said information became public, or to look at the average industry cost of standard security protocols (above basic, below enterprise). In most cases, keeping information private is not that expensive, and damages are often due to human error as opposed to a poor investment into a weak tool—but not always.
  • 15. 4. How difficult will it be to implement safeguards? Want to send your client fully encrypted emails with files that can’t be shared with anyone? That is going to be complicated. Need to save documents on a secured cloud server? Easy. Having a security process is not a fun task to implement, but it doesn’t have to be difficult and should be considered your first step in data security.
  • 16. 5. To what extent will the safeguards adversely affect the lawyer’s ability to represent the client? Some data protection protocols can be cumbersome at best. Expecting a client to operate on a clean laptop with secured wifi access and a user key for encrypting messages could mean you rarely hear from your clients. If your security measures are so strict that you—or your clients—find it prohibitive to function through the legal matter, you may want to dial back the restrictions—just not until you answer the first four questions.
  • 17.
  • 19. Wifi
  • 20. Wifi
  • 21. Wifi
  • 23. Hashtag # - Anchors and Tags Messages Privacy Settings Profile Page Login Screen Index or Indexing Terminology
  • 24. @gngfound FACEBOOK DEMOGRAPHIC CHANGES • Kids leaving Facebook • Fastest growing demographic is adults ages 35-55 • Behavior is drastically changing
  • 25.
  • 26.
  • 27.
  • 28. @gngfound SNAPCHAT FASTEST GROWING • Under age of 35 • Semi-Private • Discovery Issues
  • 29. @gngfound SNAPCHAT FASTEST GROWING • Under age of 35 • Semi-Private • Discovery Issues @gngfound SNAPCHAT FASTEST GROWING • Snaps • Stories • Filters • Groups
  • 30. 2013 Facebook Tried To Buy Snapchat For $3B In Cash. cc: escapedtowisconsin - https://www.flickr.com/photos/69805768@N00
  • 32.
  • 35. @gngfound Users do not need to approve a tag to be tagged in another users photo.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51. Chris Homer chomer@gngf.com | @ChrisHomer24 Data Security & Technology DATA & SECURITY Jabez LeBret jabez@gngf.com @gngfound SOCIAL MEDIA COMPETENCE Jabez LeBret jabez@gngf.com @gngfound

Editor's Notes

  1. Consumer Expectations Jones Day - very large firm online=website
  2. Consumer Expectations