An overview of the way the law profession's rules of professional responsibility/conduct apply to the use of social media platforms and tools, including advertising, searching, and use of social media information in investigation, discovery, and at trial.
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
Carrie Kerskie explains how to assess your organization for potential risks of data breaches and how to put a data breach and privacy plan in place to help you better protect your organization.
To watch the webinar recording, visit http://i-sight.com/webinar-protecting-your-organization-against-data-breaches-and-identity-theft/
Benjamin Wright, Texas attorney and Senior Instructor at the SANS Institute, shares tips for gathering social media evidence in an investigation. Check out the webinar recording: http://i-sight.com/gathering-social-media-evidence/
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
An updated version of my previous presentation, providing some social media basics, an overview of intellectual property issues in the use of social media for marketing, and ethics/professional responsibility concerns for attorneys utilizing social media to market themselves
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Walter Neary
These are slides from a 75-minute presentation sponsored by the Association of Washington Cities and the cities of Everett and Lakewood. You can hear the webinar recording through a link at http://www.awcnet.org/portal/studionew.asp?Mode=b1&WebID=1&UID=&MenuActionTypeID=81&MenuActionParm=31&OriginPage=/portal/studionew.asp&EDate=&ChannelLinkID=8716
The YouTube video that is referenced in the segment is at http://www.youtube.com/watch?v=AcW1OebCf-w
These slides were prepared by Ramsey Ramerman, assistant city attorney, Everett, and Walter Neary, city councilman in Lakewood, Washington. The slides were designed by the folks at http://cornerstoneleadershiponline.com/
The March conference referenced toward the end is OpenGovWest: http://opengovwest.wordpress.com/
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
Carrie Kerskie explains how to assess your organization for potential risks of data breaches and how to put a data breach and privacy plan in place to help you better protect your organization.
To watch the webinar recording, visit http://i-sight.com/webinar-protecting-your-organization-against-data-breaches-and-identity-theft/
Benjamin Wright, Texas attorney and Senior Instructor at the SANS Institute, shares tips for gathering social media evidence in an investigation. Check out the webinar recording: http://i-sight.com/gathering-social-media-evidence/
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
The majority of our lives and assets are managed online, from online banking to blogs and many other social media outlets. In today's world, it makes sense to incorporate your digital assets into your estate plan.
Attorney Howard H. Collens presents the newest updates for the Fiduciary Access to Digital Assets Act.
Social Media Marketing 03 24 2010 Updated 04 08 10Matthew Asbell
An updated version of my previous presentation, providing some social media basics, an overview of intellectual property issues in the use of social media for marketing, and ethics/professional responsibility concerns for attorneys utilizing social media to market themselves
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Walter Neary
These are slides from a 75-minute presentation sponsored by the Association of Washington Cities and the cities of Everett and Lakewood. You can hear the webinar recording through a link at http://www.awcnet.org/portal/studionew.asp?Mode=b1&WebID=1&UID=&MenuActionTypeID=81&MenuActionParm=31&OriginPage=/portal/studionew.asp&EDate=&ChannelLinkID=8716
The YouTube video that is referenced in the segment is at http://www.youtube.com/watch?v=AcW1OebCf-w
These slides were prepared by Ramsey Ramerman, assistant city attorney, Everett, and Walter Neary, city councilman in Lakewood, Washington. The slides were designed by the folks at http://cornerstoneleadershiponline.com/
The March conference referenced toward the end is OpenGovWest: http://opengovwest.wordpress.com/
Online privacy concerns (and what we can do about it)Phil Cryer
User's online privacy is constantly in a state of flux. Witness Google's consolidation of their privacy polices, ever changing Facebook rules or how commerce determines how sites handle user data, and then note the lack of any opt-out for the user when these changes occur. Online entities make these changes not for the benefit of the user, but for the benefit of the shareholders, obviously, but if they can do this now, they can do it later. Simply put, a privacy policy today can change tomorrow; and user's privacy can be thrown by the wayside. Knowing this should signal an alarm for everyone to understand HOW their data is being stored and used online. We'll look at recent developments that have caused concern among privacy advocates, poke fun at some of the silly ways these new measures are sold to the populace and then cover what can be done to increase users' privacy online utilizing common sense and open source software. (Presented at the St. Louis Linux User's Group, June 20, 2013)
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Big Data is a phenomenon that has been made possible by the IT and the social media revolutions - where content is created or generated by users and their interaction, at the same time with the exponential increase of the data storage capacity, according to the Moore’s law. It has been a long-time dream of social scientists to investigate an issue of importance for large groups of people where n - the number of the investigated subjects - is not determined by some statistical complex formula, but rather by mentioning n=all. This would allow for better results, with wider applicability in the attempts to understand the society, its trends, ideas and how they propagate, as well as the capacity of taking more efficient decisions that concern purchase, education, health and politics. But what are the costs? Our paper aims at looking at means and ways through which Big Data is being generated, to provide examples of Big Data ownership and consequences derived from this, and to illustrate the use of Big Data for improving the life of the society’s members. We define the Big Data, how it is generated, processed and the degrees of responsibility in maneuvering such precious resource. At the same time, our focus is on the backside of accumulating large amounts of personal information. We evaluate how and if major companies are handling Big Data properly - from disclosing information about gathering such data, processing it and using it to their own profit, with the informed consent of the subjects. In our research we discuss potential implications from the perspective of redefining what personal and private still means when individual data becomes a commodity.
Your professional reputation online matters. This presentation explains who is using the internet and social media in the United States, opportunities for lawyers to connect online, the harm that may result from not claiming your firm's social media profile and what to do when faced with negative criticism.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
Mobile Privacy and Security - Study by MobidiggerHubert Moik
In a world where Google, Facebook, Twitter and other top web sites share and save user
information, it is increasingly hard to protect individual privacy in new media—on the Internet and
mobile phones. At the same time, information about privacy protection is very hard to find.
Further, the majority of people who use the Internet are generally not properly informed about
new media privacy issues. To help users protect themselves, this presentation explores Internet
and mobile privacy problems and solutions through reviews of case studies. It is designed to
educate users of new media in both key issues and solutions.
Sex, Drugs & Disease: Designing for difficult topicsJonathan Abbett
Not every product can have cheeky, casual content — especially in healthcare, when patients and families may be overwhelmed with cancer diagnoses, recovering from abuse, or afraid of stigma and discrimination. At ACT.md, our design team encountered this in a dramatic way: Massachusetts law requires that a patient's authorization for sharing health data include specific call-outs for (really) sensitive conditions, and our application's authorization agreement—shown front-and-center during user enrollment—had to comply. This show-and-tell talk will share the best practices and assumptions behind our patient authorization design, plus our experiences testing it with patients and families.
Social Media: Implications for Intellectual Property Lawblaine_5
With the rise of social media comes the rise of user-generated content that infringes the intellectual property rights of others. Learn about areas of concern such as defamation, patent, copyright, trademark and trade secret, how to establish effective social media policies for clients that prevent infringement, and how to educate your client to control and monitor use of their IP in social media.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Resources and Links related to the SHRM Annual Conference Session - From Transactions to Engagement: Harnessing Social Tools to Transform HR presented by Steve Boese, Monday, June 17, 2013
A presentation addressing the legal implications of social media.. These issues include privacy, copyright, trademark, and trade secrets issues for employers, employees and ISPs, as well as the SPAM Act and FTC rules. ALL RIGHTS RESERVED. Contact me at dsaper [at]saperlaw.com if you'd like to use the presentation or if you have any questions.
Erasing you Digital Footprint - Using Michigan's Fiduciary Access to Digital ...gallowayandcollens
Could someone else, acting on your behalf, gain access to your digital assets? What if the person was deceased? Would you want them to be able to? Access to Digital Assets would be challenging, if not impossible, without a Fiduciary Access to Digital Assets law. Now that Michigan has enacted this Act, how will it effect your estate planning?
Big Data is a phenomenon that has been made possible by the IT and the social media revolutions - where content is created or generated by users and their interaction, at the same time with the exponential increase of the data storage capacity, according to the Moore’s law. It has been a long-time dream of social scientists to investigate an issue of importance for large groups of people where n - the number of the investigated subjects - is not determined by some statistical complex formula, but rather by mentioning n=all. This would allow for better results, with wider applicability in the attempts to understand the society, its trends, ideas and how they propagate, as well as the capacity of taking more efficient decisions that concern purchase, education, health and politics. But what are the costs? Our paper aims at looking at means and ways through which Big Data is being generated, to provide examples of Big Data ownership and consequences derived from this, and to illustrate the use of Big Data for improving the life of the society’s members. We define the Big Data, how it is generated, processed and the degrees of responsibility in maneuvering such precious resource. At the same time, our focus is on the backside of accumulating large amounts of personal information. We evaluate how and if major companies are handling Big Data properly - from disclosing information about gathering such data, processing it and using it to their own profit, with the informed consent of the subjects. In our research we discuss potential implications from the perspective of redefining what personal and private still means when individual data becomes a commodity.
Your professional reputation online matters. This presentation explains who is using the internet and social media in the United States, opportunities for lawyers to connect online, the harm that may result from not claiming your firm's social media profile and what to do when faced with negative criticism.
Social Distortion: Privacy, Consent, and Social Networksdariphagen
Brian Holland, visiting associate professor at the Dickinson School of Law at Penn State University, talks about Voluntary disclosure of personal information to private institutions. At the Conference on Privacy in Social Network Sites: www.privacyinsocialnetworksites.nl
Presentation by Sara Meaney, co-owner of Comet Branding, a PR+Social Media agency, and Kelly Twigger, owner of ESI Attorneys on the legal implications of social media given at BizTech 2010 in Milwaukee, Wisconsin on April 30, 2010.
Mobile Privacy and Security - Study by MobidiggerHubert Moik
In a world where Google, Facebook, Twitter and other top web sites share and save user
information, it is increasingly hard to protect individual privacy in new media—on the Internet and
mobile phones. At the same time, information about privacy protection is very hard to find.
Further, the majority of people who use the Internet are generally not properly informed about
new media privacy issues. To help users protect themselves, this presentation explores Internet
and mobile privacy problems and solutions through reviews of case studies. It is designed to
educate users of new media in both key issues and solutions.
Sex, Drugs & Disease: Designing for difficult topicsJonathan Abbett
Not every product can have cheeky, casual content — especially in healthcare, when patients and families may be overwhelmed with cancer diagnoses, recovering from abuse, or afraid of stigma and discrimination. At ACT.md, our design team encountered this in a dramatic way: Massachusetts law requires that a patient's authorization for sharing health data include specific call-outs for (really) sensitive conditions, and our application's authorization agreement—shown front-and-center during user enrollment—had to comply. This show-and-tell talk will share the best practices and assumptions behind our patient authorization design, plus our experiences testing it with patients and families.
Social Media: Implications for Intellectual Property Lawblaine_5
With the rise of social media comes the rise of user-generated content that infringes the intellectual property rights of others. Learn about areas of concern such as defamation, patent, copyright, trademark and trade secret, how to establish effective social media policies for clients that prevent infringement, and how to educate your client to control and monitor use of their IP in social media.
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
Recent updates to Michigan's Fiduciary Access to Digital Assets. We use email, social media, and online banking every day. it is important to properly plan for those digital assets in the event of incapacity and after death.
Resources and Links related to the SHRM Annual Conference Session - From Transactions to Engagement: Harnessing Social Tools to Transform HR presented by Steve Boese, Monday, June 17, 2013
Mundelein, IL, resident Greg Oldham serves as the president of GK Homes and as a lighting representative for LED Industries. As an LED rep, he bids on and develops lighting projects throughout Illinois, Iowa, and Wisconsin. Outside of his professional activities in and around Mundelein, IL, Greg Oldham has worked in support of several charitable organizations, including the Salvation Army.
Le digital change les modèles économiquesErwan Hernot
A l'ère numérique, on vante le "test and learn" et les méthodes agiles. Pourquoi ? Parce qu'on passe d'une économie linéaire à une économie de plateforme. Et ça change tout.
LA MARQUE POSITIVE : Comment faire de la RSE un booster de vos marques ?Utopies
LES 9 P DE LA MARQUE POSITIVE® SELON UTOPIES (2015)
1. POSITIONNEMENT - Ce qu’on évalue : l’utilité, le rôle et l’engagement sociétal sont inscrits explicitement dans le positionnement et la mission de la marque, de manière spécifique et non-générique au secteur..
2. PRODUITS (ET PRIX) - Ce qu’on évalue : la traduction de cette mission dans l’offre de produits et services, idéalement à un prix qui la rend accessible au plus grand nombre, sans surcoût par rapport à l’offre conventionnelle..
3. PERTINENCE - Ce qu’on évalue : les sujets sur lesquels la marque s’engage sont pertinents au regard des enjeux de son secteur d’activité (matérialité) et en résonance avec des problématiques sociétales plus générales de son époque.
4. PREVENTION - Ce qu’on évalue : pour que la marque puisse prendre les devants sur quelques sujets « phares », l’entreprise « assure ses arrières » par une démarche traitant, au moins de manière à prévenir les risques et à assurer la conformité réglementaire, les enjeux majeurs du développement durable pour son activité.
5. PERENNITE - Ce qu’on évalue : l’engagement de la marque s’inscrit dans la durée, mais aussi en continuité avec son histoire et ce qui a fondé son succès ou sa différence.
6. PROACTIVITE - Ce qu’on évalue : l’engagement de la marque est proactif pour apporter une contribution originale et innovante sur un sujet qui était parfois un « angle mort » voire un « tabou » du marché jusqu’à ce que la marque ne s’en empare.
7. PREFERENCE - Ce qu’on évalue : la marque informe, valorise et même implique les consommateurs dans ses engagements, pour mériter leur choix et leur fidélité.
8. PARTIES PRENANTES - Ce qu’on évalue : la marque s’inscrit de manière visible et volontariste dans un écosystème qui nourrit les liens avec/entre les producteurs, les consommateurs, la société civile en général...
9. PROCESSUS (ET PERSONNES) - Ce qu’on évalue : la mission et l’engagement sont traduits dans le système de management des équipes marketing (formation/sensibilisation, indicateurs, objectifs, incentives, etc.)
If we’re pushing ourselves, innovating, and trying new things, we'll inevitably make some mistakes on our path to a brighter future. Knowing this, how can we make sure that when we do make mistakes that they are moving us in the right direction? In this talk, I'll share some strategies for making "better" mistakes along with specific examples of tactics and techniques we use at Spotify to help us learn better and faster.
In this webinar on SourceCon, SmashFly's Danny Halloran and OpenView's Meghan Maher talk email hacks and nurture tips in order to turn your sourced candidates into applicants.
Measuring team performance at spotify slideshareDanielle Jabin
How do we actually know if our teams are doing well? Is gut instinct enough? Furthermore, in a rapidly growing organization such as Spotify, how can we ensure some sort of consistency in our baseline level of Agile knowledge across the technology, product, and design organization?
In this presentation, I’ve shared techniques we have developed and use at Spotify to benchmark health and performance for our teams and some tactics we use to bring them closer to—and beyond!—being the best teams they can be.
How to Master the Art of Responding to ReviewsGlassdoor
Lamar Daniels, Head of Employment Brand at GoDaddy
Aaron Szenyes, Program Manager at GoDaddy
Molly McKinstry, Sales Manager, Enterprise Account Management at Glassdoor
Worcester County Bar Association Presents The LinkedIn LawyerDavid Barrett
The WCBA Law Office Technology Section presents "The LinkedIn Lawyer"
Thursday, April 8, 2010
4:00pm - 6:30pm
Worcester District Registry of Deeds Commonwealth Room
90 Front Street
Worcester, MA
David will demonstrate how the use of social media tools like Linkedin, Facebook, Twitter and legal blawging may enhance your legal practice. Topics will include: Generating legal referrals with social media, social media and legal ethics and social media for the busy professional.
$10.00 for WCBA Members
$40.00 for Non-Member
Seating is limited so please register in advance by contacting the WCBA office at 508-752-1311. Door registration will be accepted.
For questions please contact the Worcester County Bar Association, 19 Norwich Street, Worcester, MA 01608.
Turnson Point Risks and Reputation Management presentationKerry Rego
Judith Delaney of TurnsonPoint Consulting spoke at Kerry Rego Consulting hosted event "Risks and Reputation Management: Using Social Media to Protect Your Brand" on March 13, 2012. She covered legals risks for individuals and businesses when using the internet and social media. Posted with Turnson Point permission. Visit http://www.turnsonpoint.com or http://kerryregoconsulting.com/2011/12/22/risks-reputation-management-using-social-media-to-protect-your-brand/
Presented by Michael Kaiser as the ethics segment of the National Business Institute's Continuing Legal Education (CLE) seminar "Strategies for Legal Research on the Web."
The CLE was held December 20, 2011, at the Westin Hotel in Seattle, Washington.
Mr. Kaiser, founder of the Kaiser Legal Group, is a consultant and mediator. He also regularly speaks at the law school level and at Continuing Legal Education (CLE) seminars for attorneys. He earned his Bachelor of Arts degree in Political Science from the University of Washington and his Juris Doctor from Seattle University. You may contact Mr. Kaiser at 206-660-2858 or Michael.Kaiser@Kaiser-LegalGroup.org.
Social Lawyers (slide deck to accompany hypotheticals)Nicole Hyland
This is an alternative version of my Social Lawyers slide deck. It is formatted to accompany a series of social media and legal ethics hypotheticals, which can be found here: http://www.jdsupra.com/legalnews/hypotheticals-legal-ethics-and-social-57583/
2024-02-16 Building Soul Force- Changing to Stay Stable in Challenging Times.pdfJack Pringle
The legal system and the broader economy face a bewildering array of challenges. And when new computer technologies, growing caseloads, and budget constraints force changes in the way we do our jobs, some of the tools that have served us well in the past may fall a little short.
As a result, managing change when the “new” becomes “the normal” can be overwhelming. Unfortunately, too many of us react to the distresses of our professional and personal challenges by isolating ourselves and turning to unhealthy and dangerous actions and habits.
This presentation offers a little bit of perspective on some of the reasons the jobs we do often make us more susceptible to isolation and destructive behaviors, argues that a healthy mind is a crucial tool for anyone navigating change and uncertainty, and offers some practical strategies for surviving- and hopefully thriving- in an uncertain world.
This presentation will also address some of the cognitive biases (reasoning flaws) that may affect not only legal decision-making processes, but health and well-being choices. By learning to be aware of cognitive bias and the way it may influence our thoughts and actions, we can improve our decision making process- and hopefully our choices.
Consider Your Own Black Box: Evaluating Human Intelligence Alongside Artifici...Jack Pringle
Artificial intelligence (AI) systems are playing significant roles in decision-making processes that affect our lives. However, decisions made in a “black-box” fashion (such as algorithms hidden from view or evaluation), rarely inspire confidence or build trust. Moreover, opaque decision-making may run afoul of legal frameworks (for example the Fair Credit Reporting Act) that require support for certain decisions.
Because of the significance of the decisions that AI makes, the decision-making AI should be explainable and trustworthy.
Scientists from the National Institute of Standards and Technology (NIST) have proposed four fundamental principles for explainable AI:
• Explanation. Systems deliver evidence or reasons for all their outputs.
• Meaningful. Systems provide explanations that are meaningful or understandable to individual users.
• Explanation Accuracy. The explanation correctly reflects the system’s process for generating the output.
• Knowledge Limits. The system only operates under conditions for which it was designed or when the system reaches a sufficient confidence in its output. (If a system has insufficient confidence in its decision, it should not supply a decision to the user.)
This NIST draft also asks whether human decision-making can satisfy these principles. NIST concludes that human decision-making can only do so (if at all) in a limited way, due to how our brains consciously and unconsciously process information. Comparing AI system decision making with the human decision process can help us evaluate the relative risks and benefits of using AI systems, and learn more about the upside and pitfalls of our own human decision-making systems.
This presentation will address some of the cognitive biases (reasoning flaws) that may affect not only legal decision-making processes, but health and well-being choices. By learning to be aware of cognitive bias and the way it may influence our thoughts and actions, we can improve our decision process- and hopefully our choices.
People, Processes, AND Technology: Use All Three to Avoid Missing a Filing De...Jack Pringle
Once you realize that computers
and computer software are not
the problem (or a potential scapegoat), you can focus on the people (knowledgeable and aware of the risks) who perform the processes to ensure deadlines
are met.
Effects of Recent U.S. Supreme Court Decisions on Arbitrations and Class Acti...Jack Pringle
An article I wrote some time ago about the interplay between arbitrability, class actions, state law, and the Federal Arbitration Act (FAA). Some of these issues are still being litigated (and arbitrated) today.
Grace and Gratitude: Arthur Morehead and Living WellJack Pringle
These are the slides from a presentation I gave in a SC Bar CLE entitled "What Matters Most: Crafting a Well-Lived Life" on February 13, 2019 https://www.scbar.org/shop-cle/livecourse/what-matters-most-crafting-a-well-lived-life/
"We Have Met the Enemy and He Is Us": The Role of the Human Factor in Protect...Jack Pringle
These are the slides I presented at the 2019 South Carolina Bar Convention and addressing the role of human error, inattention, impatience, and greed in data security incidents. These actions an inaction which often lead to the loss of sensitive information, client funds, and access to networks and files.
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
These are the written materials accompanying a presentation I made at the SC Bar Convention on January 17, 2019 and addressing the role of human error, inattention, impatience, and greed in data security incidents, all of which often lead to the loss of sensitive information, client funds, and access to networks and files.
Resources for Lawyers to Help Create SpaceJack Pringle
The legal profession faces a bewildering array of challenges. And when new computer technologies, evolving client expectations, and competition force changes on the profession and the way we do business, some of the tools that have served us well in the past may fall a little short. As a result, managing change when the “new” becomes “the normal” can be overwhelming. Unfortunately, too many attorneys react to the distresses of the law practice by isolating themselves and turning to unhealthy and dangerous actions and habits.
These materials are a compendium of short pieces and resources that have helped me create some practical strategies for surviving- and hopefully thriving- in an uncertain world.
When Thinking Like a Lawyer Gets You Stuck: Practical Tools for Creating Spac...Jack Pringle
The legal profession faces a bewildering array of challenges. And when new computer technologies, evolving client expectations, and competition force changes on the profession and the way we do business, some of the tools that have served us well in the past may fall a little short.
As a result, managing change when the “new” becomes “the normal” can be overwhelming. Unfortunately, too many attorneys react to the distresses of the law practice by isolating themselves and turning to unhealthy and dangerous actions and habits.
This presentation offers a little bit of perspective on some of the reasons attorneys often are more susceptible to isolation and destructive behaviors, argues that a healthy mind is a crucial tool for all attorneys, and offers some practical strategies for surviving- and hopefully thriving- in an uncertain world.
Yes, We're Talking About Process: Blockchains and How Lawyers Might Use ThemJack Pringle
All transactions, whether the transfer of funds, the sale of real and personal property, or otherwise, rely on trust and verification. And transactions traditionally require a bank, an escrow agent, or other trusted third party to ensure that trust and verification. But what if a technology system could replace the third-party’s role so that any two people could contract directly with one another? Blockchains (also called distributed ledger systems) may soon offer validation in a number of areas where lawyers practice, including financial transactions, proof and chain of title, and authentication of many types. Understanding the technology, or at least its potential, is important for those attorneys who take part in the process of authentication and verification.
Courage, Curiosity, and Connection: Practical Tools for Keeping Your Head Whi...Jack Pringle
The legal profession faces a bewildering array of challenges. And when new computer technologies, evolving client expectations, and competition force changes on the profession and the way we do business, some of the tools that have served us well in the past may fall a little short. As a result, managing change when the “new” becomes “the normal” can be overwhelming. Unfortunately, too many attorneys react to the distresses of the law practice by isolating themselves and turning to unhealthy and dangerous actions and habits. This presentation offers a little bit of perspective on some of the reasons attorneys often are more susceptible to isolation and destructive behaviors, argues that a healthy mind is a crucial tool for all attorneys, and offers some practical strategies for surviving- and hopefully thriving- in an uncertain world.
Practical Tools for Keeping Your Head While Navigating a Changing World (Latest Iteration on an Ongoing Theme). Some ideas for attorneys, about how to manage change and uncertainty by adopting habits and routines (mindfulness, meditation, exercise, getting quiet) to build and maintain attention and focus.
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
WINDING UP of COMPANY, Modes of DissolutionKHURRAMWALI
Winding up, also known as liquidation, refers to the legal and financial process of dissolving a company. It involves ceasing operations, selling assets, settling debts, and ultimately removing the company from the official business registry.
Here's a breakdown of the key aspects of winding up:
Reasons for Winding Up:
Insolvency: This is the most common reason, where the company cannot pay its debts. Creditors may initiate a compulsory winding up to recover their dues.
Voluntary Closure: The owners may decide to close the company due to reasons like reaching business goals, facing losses, or merging with another company.
Deadlock: If shareholders or directors cannot agree on how to run the company, a court may order a winding up.
Types of Winding Up:
Voluntary Winding Up: This is initiated by the company's shareholders through a resolution passed by a majority vote. There are two main types:
Members' Voluntary Winding Up: The company is solvent (has enough assets to pay off its debts) and shareholders will receive any remaining assets after debts are settled.
Creditors' Voluntary Winding Up: The company is insolvent and creditors will be prioritized in receiving payment from the sale of assets.
Compulsory Winding Up: This is initiated by a court order, typically at the request of creditors, government agencies, or even by the company itself if it's insolvent.
Process of Winding Up:
Appointment of Liquidator: A qualified professional is appointed to oversee the winding-up process. They are responsible for selling assets, paying off debts, and distributing any remaining funds.
Cease Trading: The company stops its regular business operations.
Notification of Creditors: Creditors are informed about the winding up and invited to submit their claims.
Sale of Assets: The company's assets are sold to generate cash to pay off creditors.
Payment of Debts: Creditors are paid according to a set order of priority, with secured creditors receiving payment before unsecured creditors.
Distribution to Shareholders: If there are any remaining funds after all debts are settled, they are distributed to shareholders according to their ownership stake.
Dissolution: Once all claims are settled and distributions made, the company is officially dissolved and removed from the business register.
Impact of Winding Up:
Employees: Employees will likely lose their jobs during the winding-up process.
Creditors: Creditors may not recover their debts in full, especially if the company is insolvent.
Shareholders: Shareholders may not receive any payout if the company's debts exceed its assets.
Winding up is a complex legal and financial process that can have significant consequences for all parties involved. It's important to seek professional legal and financial advice when considering winding up a company.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
PRECEDENT AS A SOURCE OF LAW (SAIF JAVED).pptxOmGod1
Precedent, or stare decisis, is a cornerstone of common law systems where past judicial decisions guide future cases, ensuring consistency and predictability in the legal system. Binding precedents from higher courts must be followed by lower courts, while persuasive precedents may influence but are not obligatory. This principle promotes fairness and efficiency, allowing for the evolution of the law as higher courts can overrule outdated decisions. Despite criticisms of rigidity and complexity, precedent ensures similar cases are treated alike, balancing stability with flexibility in judicial decision-making.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
1. Using Social Media Ethically
Maintaining Professional
Responsibility in the Age of TMI
2. Why?
• According to the 2012 ABA Legal Technology
Survey Report, 95% of lawyers said they are on
LinkedIn.
• “It should now be a matter of professional
competence for attorneys to take the time to
investigate social networking sites.” Griffin v.
State, 192 Md.App. 518 (2010), reversed by
Griffin v. State, 419 Md. 343 (2011).
3. Definition?
“Social networks are internet-based communities that individuals
use to communicate with each other and view and exchange
information, including photographs, digital recordings and files.
Users create a profile page with personal information that other
users may access online. Users may establish the level of privacy
they wish to employ and may limit those who view their profile
page to “friends” – those who have specifically sent a
computerized request to view their profile page which the user has
accepted. Examples of currently popular social networks include
Facebook, Twitter, MySpace and LinkedIn.”
Association of the Bar of the City of New York Committee on
Professional Ethics, Formal Opinion 2010-2, “Obtaining Evidence
from Social Networking Sites.”
4. Why Does The Use of Social Media Implicate
the Ethics Rules?
• The ethics rules govern (among other things) how
attorneys
– Publish and communicate information (with
and to their clients, prospective clients, persons
with an interest in their cases, and the public);
– Protect information
• Social media enables instantaneous, ubiquitous
publication and communication of information on
many platforms
5.
6. 8 Word Social Media Policy
Don’t Lie, don’t cheat, don’t
steal, don’t reveal
http://www.forbes.com/sites/davidcoursey/2012/02/27/this-8-word-social-media-
policy-could-save-your-job/
7. The Bias of a New Tool
(Social Media Platforms)
• External Memory
• More Connections (Weak Ties)
• Communication and Publishing
8. As You Take Advantage of its Benefits,
Weigh the Ethics Risks
• Existing rules (Communication, Confidentiality)
• More Publication/Communication Means More
Oversight Responsibility
• Dynamic and Not Static (Same)
• Interactive (Nobody Posted to Your Martindale-
Hubbell Listing)
• Information Shared There is Discoverable
9. Communication (Rule 1.4)
• Does your client fully understand the implications
of sharing case information via social media?
• Security and monitoring concerns (unsecured
interface, employer monitoring)
10. Consider:
We strongly encourage you to refrain from participating in social media
(Facebook, Twitter, Tumblr, Flickr, Skype, and the like) during the course
of representation. Information found on social media websites is not
private, can be discoverable, and if used as evidence may be potentially
damaging to your interests. Understand that information shared with
others be it verbally; in writing via email, text message or letter; or even
posted online could result in a waiver of the attorney client privilege were
that information to relate in any way to the legal matter that we are
handling for you. In addition, you should not delete or remove information
from any social media website as that could be considered destruction of
evidence, spoliation of evidence, or obstruction of justice.
We also advise you to refrain from communicating with us on any device
provided by your employer or any computer, smart phone, or other device
that is shared with someone else. In addition when communicating with
us, do not use your work email address or a shared email account. You
should only use a private email account that is password protected and
only accessed from your personal smart phone or computer. We reserve
the right to withdraw as counsel if the above advice is not followed.
11. Confidentiality of Information
(Rule 1.6): Oversharing is Easy, Unlimited,
and Permanent
• Don’t Publish Information Protected by the Attorney-
Client Privilege
• The “Public Record” Standard is a Good One
12. Publication Could Constitute Legal
Advice/Establish an Attorney-Client
Relationship
• Lots of platforms for you to provide and receive
information.
• Be specific with respect to your licensing
• Be general with respect to the law
• Don’t give specific advice to an individual
(AVVO)
13. Communications Concerning a Lawyer’s
Services (Rule 7.1) Advertising (Rule 7.2),
Solicitation (Rule 7.3)
• What Hasn’t Changed: Be Truthful, Accurate, and Not
Misleading
– No Unjustified Expectation of Results
– No Comparisons Without Factual Justification
– No Nicknames With Implications
– Appropriate Disclaimers
• In the Matter of Dannitte Mays Dickey (S.C. Supreme Court
2012): “Respondent relied on company representatives who
were lawyers and non-attorney web designers who assured
him that the advertisements would comply with respondent's
ethical requirements. Respondent did not review the
applicable provisions of the South Carolina Rules of
Professional Conduct prior to posting the internet profiles.”
14. Requirements for Your Social Media
• Once You Claim It, You Own It, and Have a Duty
to Manage it, Even if You Didn’t Post It
– Testimonials and Endorsements on LinkedIn
– South Carolina Bar Ethics Advisory Committee
Opinion 09-10
• Keep it Accurate and Up-to-Date
• Understand the difference between commercial
and political speech (Hunter v. Virginia State Bar)
• Because your “reach” is world-wide, identify the
jurisdictions where you are authorized to practice
16. Communication of Fields of Practice and
Specialization (Rule 7.4)
• “To avoid confusing or misleading the public and
to protect the objectives of the South Carolina
certified specialization program, any such
advertisement or statements shall be strictly
factual and shall not contain any form of the
words “certified,” “specialist,” “expert,” or
“authority” except as permitted by Rule 7.4(d).”
• LinkedIn “Skills and Expertise”
17. Application of the RPC to “Social Media
Information-Seeking”
• The Differences between “Public-Facing” Information and Private
Information are Significant when Gathering Social Media Evidence
• Some information deemed private includes:
– Facebook’s private messages, “wall” posts and comments (Crispin v.
Christian Audigier, 717 F.Supp.2d 965 (C.D. Cal. 2010);
– Webmail services (Id.); and
– Private YouTube videos. Viacom International Inc. v. YouTube Inc., 253
F.R.D. 265 (S.D.N.Y. 2008).
• Generally the pursuit of public information (about parties, jurors, or
witnesses) is not likely to trigger ethical concerns, while accessing
private information may be prohibited or limited by ethics rules and/or
various provisions of law
18. Visiting the Social Networking Site of a Party
Represented by Counsel
• Rule 4.2: “Communication with Person Represented by Counsel”
forbids communication with a person represented by counsel.
• Oregon State Bar Association Formal Opinion No. 2005-164 (August
2005), explains why visiting a website is not “communication.”
Reading a post on a website is no different than “reading a magazine
article . . . written by that adversary.” And reading “information posted
for general public consumption” is purely a one-way flow of
information from the adverse party to the lawyer (not the other way
around) with no interaction.
• Similarly, an opposing attorney’s access of a publically available social
media post created by a party is not considered “communication.” N.Y.
State 843 (2010) (lawyers may access public pages of social networking
websites maintained by any person, including represented parties).
19. Interacting with a person represented by counsel
to access a social media post
• Rule 4.2 may operate differently in the event
that an attorney sends a “friend request” to a
represented party on Facebook.
• Oregon State Bar Formal Opinion No. 2005-
164 also indicates that “written
communications via the Internet are directly
analogous to written communications via
traditional mail or messenger service . . . .”
20. Seeking to “Friend” a Witness
Not Represented by Counsel
• Rule 4.1, SCRPC prohibits a lawyer from making
“a false statement of material fact or law to a third
person,”
• Rule 8.4(c) prohibits a lawyer from engaging “in
conduct involving dishonesty, fraud, deceit or
misrepresentation.”
21. “Friending” a Witness Under
False Pretenses
• Requesting access to a user’s account (and her non-public
information) using a pretext may be a violation of Rule 4.1
and Rule 8.4(c). See New York City Bar Formal Opinion
2010-2 (“A lawyer may not attempt to gain access to a
social networking website under false pretenses, either
directly or through an agent.”).
• On the other hand, using truthful information to obtain
access to a website would not violate these rules.
22. “Friending” a Witness
Without Disclosing Your Motive
• The NY City Opinion cited above makes a distinction between
affirmative “deception” and failing to disclose the purpose for
the connection: “an attorney or her agent may use her real
name and profile to send a ‘friend request’ to obtain
information from an unrepresented person’s social networking
website without also disclosing the reasons for making the
request.”).
• Similarly, Oregon State Bar Formal Opinion No. 2013-189
concluded that a “lawyer may request access to non-public
information if the person is not represented by counsel in that
matter and no actual representation of disinterest is made by”
the lawyer.
23. “Friending” a Witness
Without Disclosing Your Motive
• The Philadelphia Bar Association took a different
approach, concluding that the omission of a
“highly material fact” (that the party seeking
access plans to seek and obtain information for use
in a lawsuit) would constitute deceptive conduct
and a violation of Rule 8.4 (c).
24. Information Security in Using Social Media
• Confidentiality (Rule 1.6) and Safekeeping Property
(Rule 1.15)
• Avoid Sharing Too Much personal information or
client information (“If you are not paying for it, you’re
the product”)
• Keep separate from your work email and network
• Use strong passwords and multi-factor authentication
• Use different passwords for your different platforms.
25. Juror Social Media Misconduct
• The Arkansas Supreme Court reversed a death sentence
because a juror Tweeted during deliberations.
• The Supreme Court of Tennessee remanded a case for a
hearing where a juror initiated a Facebook conversation
with a trial witness after the witness testified.
• 4th Circuit reversed the convictions of various S.C.
defendants because juror misconduct in researching an
element of the offense on Wikipedia deprived him of his
Sixth Amendment right to a fair trial.
26. Preventing Juror Social Media
Misconduct
• Instruct early, instruct often
• Consider the Proposed Model Jury
Instructions: The Use of Electronic
Technology to Conduct Research on or
Communicate about a Case:
– Research
– Communication
– The Internet as an Information Source
27. Briefly on Authentication of ESI
• [T]he inability to get evidence admitted
because of a failure to authenticate is almost
always a self-inflicted injury which can be
avoided by thoughtful advance preparation.
Lorraine v. Markel American Ins. Co., 241
F.R.D. 534, 542 (D.Md.2007).
• In re Vinhnee, 336 B.R. 437, 444 (9th Cir.
BAP 2005)
31. Cases Addressing “Circumstantial” Social Media
Authentication
• Griffin v. Maryland, 19 A.3d 415 (Md. 2011)
(photograph, personal information, and references
to the Defendant were inadequate to authenticate
MySpace pages)
• Tienda v. Texas, 358 S.W.3d 633 (Tex. Crim.
App. 2012) (photographs of Defendant including
distinctive characteristics and various references
sufficient to authenticate MySpace pages);
32. More Cases . . .
• Campbell v. Texas, No. 01-11-00834-CR, 2012
WL 3793431 (Tex. App. August 31, 2012);
• U.S. v. Vayner, 769 F.3d 125 (3rd. Cir. 2014)
(information about individual on “the Russian
equivalent of Facebook” did not suffice to
establish for purposes of Rule 901 that he was the
author of that page); and
• Parker v. State, 85 A.3d 682 (Del. 2014).
(Facebook posts authenticated on the basis of
certain circumstantial facts).
33. Questions?
Jack Pringle
Adams and Reese LLP
(803) 343-1270
jack.pringle@arlaw.com
@jjpringlesc
http://pringlepracticeblog.blogspot.com
1501 Main Street, 5th Floor
Columbia, SC 29201
www.adamsandreese.com
34. Citations/Resources
In the Matter of Dannitte Mays Dickey, Opinion No. 20790 (S.C. Supreme Court February 1, 2012)
http://www.sccourts.org/opinions/HTMLFiles/SC/27090.htm
The Association of the Bar of the City of New York Committee on Professional Ethics, Formal Opinion 2010-2, “Obtaining Evidence from Social Networking
Websites”
http://www.nycbar.org/pdf/report/uploads/20071997-FormalOpinion2010-2.pdf
N.Y. State Bar Association Committee on Professional Ethics Opinion #843 (2010)
http://www.nysba.org/CustomTemplates/Content.aspx?id=5162
Oregon State Bar Association Formal Opinion No. 2005-164, “Communicating with Represented Persons: Contact Through Web Sites and the Internet, (August
2005)
http://www.osbar.org/_docs/ethics/2005-164.pdf
Philadelphia Bar Association Professional Guidance Commission Opinion No. 2009-02 (Mar. 2009)
http://www.philadelphiabar.org/WebObjects/PBAReadOnly.woa/Contents/WebServerResources/CMSResources/Opinion_2009-2.pdf
South Carolina Bar Ethics Advisory Committee Opinion 09-10:
http://www.scbar.org/MemberResources/EthicsAdvisoryOpinions/OpinionView/ArticleId/107/Ethics-Advisory-Opinion-09-10.aspx
Social Media and the Attorney-Client Privilege Warning, Mark Bassingthwaighte, ALPS 411, June 17, 2013,
http://www.alps411.com/blog/managing-your-practice---musings-of-a-risk-manager/social-media-and-the-attorney-client-privilege-warning-v2
Hunter v. Virginia State Bar, Ex Rel. Third District Committee, Supreme Court of Virginia (2013)
http://www.courts.state.va.us/opinions/opnscvwp/1121472.pdf
35. Resources
Locked Down: Information Security for Lawyers, Sharon D. Nelson, David G. Ries, John W. Simek
http://www.amazon.com/Locked-Down-Information-Security-Lawyers/dp/1614383642
“ABA Survey Shows Growth in Lawyers’ Social Media Use,” Robert Ambrogi’s LawSites Blog, August 16, 2012
http://www.lawsitesblog.com/2012/08/aba-survey-shows-growth-in-lawyers-social-media-use.html
“Why the Goat Lawyer Had a ‘Superb’ AVVO Rating,” Sam Glover, Lawyerist Blog, December 10, 2013
http://lawyerist.com/goat-lawyer-great-avvo-rating/
American Bar Association, Formal Opinion 466, “Lawyer Reviewing Jurors’ Internet Presence,” April 24, 2014,
http://www.almd.uscourts.gov/docs/aba_formal_opinion_466.pdf
Arkansas Defendant Saved by the Tweet, Wall Street Journal Law Blog, December 8, 2011, available at
http://blogs.wsj.com/law/2011/12/08/arkansas-defendant-saved-by-the-tweet
Locked Down: Information Security for Lawyers, Sharon D. Nelson, David G. Ries, John W. Simek
http://www.amazon.com/Locked-Down-Information-Security-Lawyers/dp/1614383642
“ABA Survey Shows Growth in Lawyers’ Social Media Use,” Robert Ambrogi’s LawSites Blog, August 16, 2012
http://www.lawsitesblog.com/2012/08/aba-survey-shows-growth-in-lawyers-social-media-use.html
Proposed Model Jury Instructions -The Use of Electronic Technology to Conduct Research on or Communicate about a Case
http://federalevidence.com/downloads/blog/2010/Memorandum.On.Juror.Use.Of.Electronic.Communication.Technologies.pdf
Hon. Amy J. St. Eve and Michael A. Zuckerman, “Ensuring an Impartial Jury in the Age of Social Media,” Duke Law and Technology Review,
Volume 11, available at http://scholarship.law.duke.edu/cgi/viewcontent.cgi?article=1228&context=dltr