SlideShare a Scribd company logo
Rules of Professional Conduct
and Cybersecurity
• Hi, I’m Barron Henley
• Married 27 years - 3 daughters
• Partner with
• Document assembly & MS Word expert
• Law office over-hauler
• Gourmet cook
What has changed in the last 15 years?
Lawyers must with incredible amounts of
electronic data
It is unavoidable
We are obligated to protect it
Relevant Ethics Rules
11
• In 2013, ABA added technology changes
to model rules
• As of today, 28 states have adopted them
A lawyer shall provide competent
representation to a client. Competent
representation requires the legal
knowledge, skill, thoroughness and
preparation reasonably necessary for the
representation.
Rule 1.1 - Competence
To maintain the requisite knowledge and
skill, a lawyer should keep abreast of
changes in the law and its practice,
including the benefits and risks associated
with relevant technology, engage in
continuing study and education and
comply with all continuing legal education
requirements to which the lawyer is
subject.
Rule 1.1 Comment 8
(a) A lawyer shall not reveal information
relating to the representation of a client,
including information protected by the
attorney-client privilege under applicable
law, unless the client gives informed
consent, the disclosure is impliedly
authorized in order to carry out the
representation, or the disclosure is
permitted by division (b) or required by
division (d) of this rule.
Rule 1.6(a)
(c) A lawyer shall make reasonable
efforts to prevent the inadvertent or
unauthorized disclosure of or unauthorized
access to information related to the
representation of a client.
Rule 1.6(c)
[18] Division (c) requires a lawyer to act
competently to safeguard information
relating to the representation of a client
against unauthorized access by third
parties and against inadvertent or
unauthorized disclosure by the lawyer or
other persons who are participating in the
representation of the client or who are
subject to the lawyer’s supervision.
Rule 1.6 Comment 18
[18 cont.] The unauthorized access to, or
the inadvertent or unauthorized disclosure
of, information relating to the
representation of a client does not
constitute a violation of division (c) if the
lawyer has made reasonable efforts to
prevent the access or disclosure.
Rule 1.6 Comment 18
[18 cont.] Factors to be considered in
determining the reasonableness of the
lawyer’s efforts include, but are not limited
to, the sensitivity of the information, the
likelihood of disclosure if additional
safeguards are not employed, the cost of
employing additional safeguards, the
difficulty of implementing the safeguards,
and the extent to which the safeguards
adversely affect the lawyer’s ability to
represent clients ….
Rule 1.6 Comment 18
[18 cont.] A client may require the lawyer
to implement special security measures
not required by this Rule or may give
informed consent to forgo security
measures that would otherwise be required
by this Rule. …
Rule 1.6 Comment 18
[19] When transmitting a communication
that includes information relating to the
representation of a client, the lawyer must
take reasonable precautions to prevent the
information from coming into the hands of
unintended recipients.
Rule 1.6 Comment 19
[19 cont.] This duty, however, does not
require that the lawyer use special security
measures if the method of communication
affords a reasonable expectation of
privacy.
Rule 1.6 Comment 19
[19 cont.] Special circumstances, however,
may warrant special precautions. Factors to
be considered in determining the
reasonableness of the lawyer’s expectation of
confidentiality include the sensitivity of the
information and the extent to which the
privacy of the communication is protected by
law or by a confidentiality agreement. A client
may require the lawyer to implement special
security measures not required by this Rule
or may give informed consent to the use of a
means of communication that would
otherwise be prohibited by this Rule. …
Rule 1.6 Comment 19
(a) [RESERVED]
(b) [RESERVED]
Rule 5.1
(c) A lawyer shall be responsible for another lawyer’s
violation of the Ohio Rules of Professional Conduct if
either of the following applies:
(1) the lawyer orders or, with knowledge of the
specific conduct, ratifies the conduct involved; or
(2) the lawyer is a partner or has comparable
managerial authority in the law firm in which the other
lawyer practices, or has direct supervisory authority
over the other lawyer, and knows of the conduct at a
time when its consequences can be avoided or
mitigated but fails to take reasonable remedial action.
Rule 5.1
With respect to a nonlawyer employed by,
retained by, or associated with a lawyer, all of
the following apply:
(a) a lawyer who individually or together
with other lawyers possesses comparable
managerial authority in a law firm, shall make
reasonable efforts to ensure that the firm or
government agency has in effect measures
giving reasonable assurance that the
person's conduct is compatible with the
professional obligations of the lawyer;
Rule 5.3
(b) a lawyer having direct supervisory
authority over the nonlawyer shall make
reasonable efforts to ensure that the
person's conduct is compatible with the
professional obligations of the lawyer; and
Rule 5.3(b)
(c) a lawyer shall be responsible for conduct of
such a person that would be a violation of the Ohio
Rules of Professional Conduct if engaged in by a
lawyer if either of the following applies:
(1) the lawyer orders or, with knowledge of
the relevant facts and the specific conduct,
ratifies the conduct involved;
(2) the lawyer is a partner in the law firm in
which the person is employed or has direct
supervisory authority over the person and
knows of the conduct at a time when its
consequences can be avoided or mitigated but
fails to take reasonable remedial action.
Rule 5.3(c)
Key Takeaways
29
You know that confidential electronic data is lost
every day – somewhere
QUESTION: Does doing nothing to prevent your
client’s data from being disclosed constitute:
1. “Reasonable efforts”
2. “Acting competently” or
3. “Reasonable precautions”?
• Confidentiality isn’t on a scale of 1 to 10
– data is either confidential or it isn’t
• Lawyers are not
qualified to judge:
– sensitivity of client data
– likelihood of disclosure
• If lawyers find it too expensive or difficult
to protect client data, then they shouldn’t
be in possession of it
Do you think email
provides a
reasonable
expectation of
privacy?
Well it doesn’t –
regardless of what
the case law says
You might want to ask your clients
beforehand how they feel about email
Pleading Ignorance Won’t Work
• You need to understand the risks &
benefits of relevant technology
• Example:
– Do you have the right software?
– Are the instructions written down?
– Does the person doing it know how?
Reasonable Steps
• Adobe Acrobat DC
– Acrobat DC Pro - $449
– Acrobat DC Standard - $299
• Acrobat DC Pro Equivalents:
– Nuance Power PDF Advanced - $150
– Foxit PhantomPDF Business - $140
– Nitro Pro - $160
Acrobat Alternatives
If you’re a supervising lawyer, you must
ensure that:
– All subordinate lawyers are following protocol
(Rule 5.1)
– All non lawyers associated with you are
following protocol (Rule 5.3)
Reasonable Steps
Clients often don’t understand how to
protect their own data
Reasonable Steps
Tech Competency Training:
– How to remove metadata from a Word file
– How to redact something on a PDF
– How to run a redline
– How to e-file
– How to Bates number documents
– How to edit complex documents
– How to conduct electronic legal research
– How to look up information on internal
systems
Reasonable Steps
About Accellis
Technology Group
Specialized IT Services Company providing
• Managed IT Services
• Cybersecurity & Risk Management
• Software Consulting
• Application Development & Integration
Target market: small to mid-sized firms (5-250 users)
Target verticals: legal, financial and non-profits
20 Employees in Ohio office
www.accellis.com

More Related Content

What's hot

10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics7wounders
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
Dan Michaluk
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
Keelan Stewart
 
Cyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & CoveragesCyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & Coverages
Bajaj Allianz General Insurance Company Limited
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Financial Poise
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Financial Poise
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
duffeeandeitzen
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
Fintan Swanton
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
Charles Mok
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
Bradley Arant Boult Cummings LLP
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentationashishjoshi
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Jim Brashear
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Ben Allen
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
canadianlawyer
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)Mark Milburn
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
Mathew Chacko
 

What's hot (20)

10. law invest & ethics
10. law invest & ethics10. law invest & ethics
10. law invest & ethics
 
Cyber class action claims at an inflection point
Cyber class action claims at an inflection pointCyber class action claims at an inflection point
Cyber class action claims at an inflection point
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
How to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
 
Ethics for lawyers in the cloud
Ethics for lawyers in the cloudEthics for lawyers in the cloud
Ethics for lawyers in the cloud
 
Cybersecurity Law and Risk Management
Cybersecurity Law and Risk ManagementCybersecurity Law and Risk Management
Cybersecurity Law and Risk Management
 
Cyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & CoveragesCyber Insurance Policy - Understanding the Premiums & Coverages
Cyber Insurance Policy - Understanding the Premiums & Coverages
 
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
Best Practices Regarding Technology (Series: Legal Ethics - Best Practices)
 
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...
 
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the RiskPrivacy and Technology in Your Practice: Why it Matters & Where is the Risk
Privacy and Technology in Your Practice: Why it Matters & Where is the Risk
 
Conducting a self-audit of data protection compliance
Conducting a self-audit of data protection complianceConducting a self-audit of data protection compliance
Conducting a self-audit of data protection compliance
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Personal Data Privacy and Information Security
Personal Data Privacy and Information SecurityPersonal Data Privacy and Information Security
Personal Data Privacy and Information Security
 
Data Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident SimulationData Breach Response: Realtime Cyber Incident Simulation
Data Breach Response: Realtime Cyber Incident Simulation
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
Navigating Privacy Laws When Developing And Deploying Location Tracking Appli...
 
Privacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For LawyersPrivacy, Privilege And Confidentiality For Lawyers
Privacy, Privilege And Confidentiality For Lawyers
 
IS4799 Final Project (1)
IS4799 Final Project (1)IS4799 Final Project (1)
IS4799 Final Project (1)
 
Personal data protection bill
Personal data protection bill Personal data protection bill
Personal data protection bill
 

Similar to Rules of Professional Conduct and Cybersecurity presented by Accellis Technology Group with Affinity Partner Barron K. Henley

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
saurnou
 
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
Gary Allen
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
Clio - Cloud-Based Legal Technology
 
Legal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to MalpracticeLegal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to Malpractice
Downey Law Group LLC
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
Clio - Cloud-Based Legal Technology
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
Robert Ambrogi
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical Issues
Richard Austin
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
Francoise Gilbert
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
Owako Rodah
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
Nehal Madhani
 
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
Financial Poise
 
Michigan Alsp 2009(3)
Michigan Alsp 2009(3)Michigan Alsp 2009(3)
Michigan Alsp 2009(3)
Diversified Legal Staffing, LLC
 
Friends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh MyFriends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh My
Mark Kolber
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
Fintan Swanton
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethicscharwendel
 
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationFTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
Brent Hillyer
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
IISPEastMids
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)
Richard Austin
 
Social Media and Professional Ethics
Social Media and Professional EthicsSocial Media and Professional Ethics
Social Media and Professional Ethics
ssalkin
 
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Financial Poise
 

Similar to Rules of Professional Conduct and Cybersecurity presented by Accellis Technology Group with Affinity Partner Barron K. Henley (20)

Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
The Story of a Lean Law Firm: Escaping the Overhead Swamp, Surviving Disrupti...
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
Legal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to MalpracticeLegal Ethics: Top Mistakes That Lead to Malpractice
Legal Ethics: Top Mistakes That Lead to Malpractice
 
Informed consent and cloud computing
Informed consent and cloud computingInformed consent and cloud computing
Informed consent and cloud computing
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical Issues
 
Trust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory FrameworkTrust in the Cloud: Legal and Regulatory Framework
Trust in the Cloud: Legal and Regulatory Framework
 
The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law The Summary Guide to Compliance with the Kenya Data Protection Law
The Summary Guide to Compliance with the Kenya Data Protection Law
 
Don't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerationsDon't be a robot: You can't automate your ethical considerations
Don't be a robot: You can't automate your ethical considerations
 
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
How to Avoid Malpractice & Disciplinary Actions - General Do's and Don'ts (Se...
 
Michigan Alsp 2009(3)
Michigan Alsp 2009(3)Michigan Alsp 2009(3)
Michigan Alsp 2009(3)
 
Friends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh MyFriends and Tweets and Profiles, Oh My
Friends and Tweets and Profiles, Oh My
 
GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!GDPR - Fail to Prepare, Prepare to Fail!
GDPR - Fail to Prepare, Prepare to Fail!
 
Chapter 2 legal ethics
Chapter 2  legal ethicsChapter 2  legal ethics
Chapter 2 legal ethics
 
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance PresentationFTC overview on glba final rule on safeguards 2010 Compliance Presentation
FTC overview on glba final rule on safeguards 2010 Compliance Presentation
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)
 
Social Media and Professional Ethics
Social Media and Professional EthicsSocial Media and Professional Ethics
Social Media and Professional Ethics
 
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
Hot Off the Presses: Recent Cases & Decisions (Series: Legal Ethics - Best Pr...
 

More from Accellis Technology Group

Webinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 AppsWebinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 Apps
Accellis Technology Group
 
Webinar Wednesday: Cloud Collaboration
Webinar Wednesday: Cloud CollaborationWebinar Wednesday: Cloud Collaboration
Webinar Wednesday: Cloud Collaboration
Accellis Technology Group
 
Webinar Wednesday: Locking Up the Cloud
Webinar Wednesday: Locking Up the CloudWebinar Wednesday: Locking Up the Cloud
Webinar Wednesday: Locking Up the Cloud
Accellis Technology Group
 
Webinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It WrongWebinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It Wrong
Accellis Technology Group
 
Cyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology GroupCyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology Group
Accellis Technology Group
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
Accellis Technology Group
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Accellis Technology Group
 
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Accellis Technology Group
 
Art of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology GroupArt of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology Group
Accellis Technology Group
 

More from Accellis Technology Group (9)

Webinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 AppsWebinar Wednesday: SharePoint and Lesser Known O365 Apps
Webinar Wednesday: SharePoint and Lesser Known O365 Apps
 
Webinar Wednesday: Cloud Collaboration
Webinar Wednesday: Cloud CollaborationWebinar Wednesday: Cloud Collaboration
Webinar Wednesday: Cloud Collaboration
 
Webinar Wednesday: Locking Up the Cloud
Webinar Wednesday: Locking Up the CloudWebinar Wednesday: Locking Up the Cloud
Webinar Wednesday: Locking Up the Cloud
 
Webinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It WrongWebinar Wednesday: Cloud technology: You're Doing It Wrong
Webinar Wednesday: Cloud technology: You're Doing It Wrong
 
Cyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology GroupCyber Grab Bag Q&A presented by Accellis Technology Group
Cyber Grab Bag Q&A presented by Accellis Technology Group
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 
Recent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology GroupRecent Legal Cyber Attacks Presented by Accellis Technology Group
Recent Legal Cyber Attacks Presented by Accellis Technology Group
 
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
Small but Not Forgotten: Cybersecurity for the Small Firm Presented by Accell...
 
Art of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology GroupArt of Social Engineering Presented by Accellis Technology Group
Art of Social Engineering Presented by Accellis Technology Group
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Rules of Professional Conduct and Cybersecurity presented by Accellis Technology Group with Affinity Partner Barron K. Henley

  • 1. Rules of Professional Conduct and Cybersecurity
  • 2. • Hi, I’m Barron Henley • Married 27 years - 3 daughters • Partner with • Document assembly & MS Word expert • Law office over-hauler • Gourmet cook
  • 3. What has changed in the last 15 years?
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Lawyers must with incredible amounts of electronic data It is unavoidable We are obligated to protect it
  • 12. • In 2013, ABA added technology changes to model rules • As of today, 28 states have adopted them
  • 13. A lawyer shall provide competent representation to a client. Competent representation requires the legal knowledge, skill, thoroughness and preparation reasonably necessary for the representation. Rule 1.1 - Competence
  • 14. To maintain the requisite knowledge and skill, a lawyer should keep abreast of changes in the law and its practice, including the benefits and risks associated with relevant technology, engage in continuing study and education and comply with all continuing legal education requirements to which the lawyer is subject. Rule 1.1 Comment 8
  • 15. (a) A lawyer shall not reveal information relating to the representation of a client, including information protected by the attorney-client privilege under applicable law, unless the client gives informed consent, the disclosure is impliedly authorized in order to carry out the representation, or the disclosure is permitted by division (b) or required by division (d) of this rule. Rule 1.6(a)
  • 16. (c) A lawyer shall make reasonable efforts to prevent the inadvertent or unauthorized disclosure of or unauthorized access to information related to the representation of a client. Rule 1.6(c)
  • 17. [18] Division (c) requires a lawyer to act competently to safeguard information relating to the representation of a client against unauthorized access by third parties and against inadvertent or unauthorized disclosure by the lawyer or other persons who are participating in the representation of the client or who are subject to the lawyer’s supervision. Rule 1.6 Comment 18
  • 18. [18 cont.] The unauthorized access to, or the inadvertent or unauthorized disclosure of, information relating to the representation of a client does not constitute a violation of division (c) if the lawyer has made reasonable efforts to prevent the access or disclosure. Rule 1.6 Comment 18
  • 19. [18 cont.] Factors to be considered in determining the reasonableness of the lawyer’s efforts include, but are not limited to, the sensitivity of the information, the likelihood of disclosure if additional safeguards are not employed, the cost of employing additional safeguards, the difficulty of implementing the safeguards, and the extent to which the safeguards adversely affect the lawyer’s ability to represent clients …. Rule 1.6 Comment 18
  • 20. [18 cont.] A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to forgo security measures that would otherwise be required by this Rule. … Rule 1.6 Comment 18
  • 21. [19] When transmitting a communication that includes information relating to the representation of a client, the lawyer must take reasonable precautions to prevent the information from coming into the hands of unintended recipients. Rule 1.6 Comment 19
  • 22. [19 cont.] This duty, however, does not require that the lawyer use special security measures if the method of communication affords a reasonable expectation of privacy. Rule 1.6 Comment 19
  • 23. [19 cont.] Special circumstances, however, may warrant special precautions. Factors to be considered in determining the reasonableness of the lawyer’s expectation of confidentiality include the sensitivity of the information and the extent to which the privacy of the communication is protected by law or by a confidentiality agreement. A client may require the lawyer to implement special security measures not required by this Rule or may give informed consent to the use of a means of communication that would otherwise be prohibited by this Rule. … Rule 1.6 Comment 19
  • 25. (c) A lawyer shall be responsible for another lawyer’s violation of the Ohio Rules of Professional Conduct if either of the following applies: (1) the lawyer orders or, with knowledge of the specific conduct, ratifies the conduct involved; or (2) the lawyer is a partner or has comparable managerial authority in the law firm in which the other lawyer practices, or has direct supervisory authority over the other lawyer, and knows of the conduct at a time when its consequences can be avoided or mitigated but fails to take reasonable remedial action. Rule 5.1
  • 26. With respect to a nonlawyer employed by, retained by, or associated with a lawyer, all of the following apply: (a) a lawyer who individually or together with other lawyers possesses comparable managerial authority in a law firm, shall make reasonable efforts to ensure that the firm or government agency has in effect measures giving reasonable assurance that the person's conduct is compatible with the professional obligations of the lawyer; Rule 5.3
  • 27. (b) a lawyer having direct supervisory authority over the nonlawyer shall make reasonable efforts to ensure that the person's conduct is compatible with the professional obligations of the lawyer; and Rule 5.3(b)
  • 28. (c) a lawyer shall be responsible for conduct of such a person that would be a violation of the Ohio Rules of Professional Conduct if engaged in by a lawyer if either of the following applies: (1) the lawyer orders or, with knowledge of the relevant facts and the specific conduct, ratifies the conduct involved; (2) the lawyer is a partner in the law firm in which the person is employed or has direct supervisory authority over the person and knows of the conduct at a time when its consequences can be avoided or mitigated but fails to take reasonable remedial action. Rule 5.3(c)
  • 30. You know that confidential electronic data is lost every day – somewhere QUESTION: Does doing nothing to prevent your client’s data from being disclosed constitute: 1. “Reasonable efforts” 2. “Acting competently” or 3. “Reasonable precautions”?
  • 31. • Confidentiality isn’t on a scale of 1 to 10 – data is either confidential or it isn’t • Lawyers are not qualified to judge: – sensitivity of client data – likelihood of disclosure • If lawyers find it too expensive or difficult to protect client data, then they shouldn’t be in possession of it
  • 32. Do you think email provides a reasonable expectation of privacy? Well it doesn’t – regardless of what the case law says
  • 33. You might want to ask your clients beforehand how they feel about email
  • 35. • You need to understand the risks & benefits of relevant technology • Example: – Do you have the right software? – Are the instructions written down? – Does the person doing it know how? Reasonable Steps
  • 36. • Adobe Acrobat DC – Acrobat DC Pro - $449 – Acrobat DC Standard - $299 • Acrobat DC Pro Equivalents: – Nuance Power PDF Advanced - $150 – Foxit PhantomPDF Business - $140 – Nitro Pro - $160 Acrobat Alternatives
  • 37. If you’re a supervising lawyer, you must ensure that: – All subordinate lawyers are following protocol (Rule 5.1) – All non lawyers associated with you are following protocol (Rule 5.3) Reasonable Steps
  • 38. Clients often don’t understand how to protect their own data Reasonable Steps
  • 39. Tech Competency Training: – How to remove metadata from a Word file – How to redact something on a PDF – How to run a redline – How to e-file – How to Bates number documents – How to edit complex documents – How to conduct electronic legal research – How to look up information on internal systems Reasonable Steps
  • 40. About Accellis Technology Group Specialized IT Services Company providing • Managed IT Services • Cybersecurity & Risk Management • Software Consulting • Application Development & Integration Target market: small to mid-sized firms (5-250 users) Target verticals: legal, financial and non-profits 20 Employees in Ohio office www.accellis.com