Keeping client confidences secure in the digital age is not always easy, but it certainly is necessary. It seems like there’s always some new technology tool or gadget that lawyers are told they “have to” learn. This program covers how to ethically use today’s technology and what emerging tools are important for lawyers to consider.
Facebook, Twitter, LinkedIn, Instagram, Pinterest, Tumblr, Snapchat… so many ways to promote your practice and connect with potential clients, so little time! In fact, managing all of these profiles and platforms can be downright overwhelming. In this session we will discuss tips, tricks, tools, and platforms that help you stay on top of the big three – LinkedIn, Twitter and Facebook.
Building an efficient law practice means digging deep and figuring out what works and what doesn’t. Stacey Burke has audited law firms of varying practice areas across the country. In this webinar she will give her top tips for running an efficient law practice by using appropriate technology and other best practices.
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 3
• Data protection by design
• Securing personal data
• Reporting data breaches
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 4
• How to perform a data protection impact assessment (DPIA)
• The role of the data protection officer (DPO)
• Transferring personal data outside the EU
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
Webinar Overview - A look at duplicates testing and the inherent value of fuzzy data matching.
Identifying fuzzy duplicates has never been easier. Arbutus Analyzer’s versatile functionality enables even new users to detect possible duplicate payments, vendors sharing similar addresses among themselves or with your organization’s employees, and counter parties who may be on government watch lists. Our webinar includes nine different scenarios with detailed descriptions of the tests and their results.
You'll learn about:
• Identifying possible risks
• How to deploy Analyzer commands and functions
Key Presenter:
Michael Kano, ACDA, Data Analytics Consultant, Arbutus Analytics
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
Implementing and Auditing GDPR Series (1 of 10)
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 1 of 10
• Bands of penalties and range of awards for breaches
• Lawfulness of processing and consent
• The six data protection principles
Facebook, Twitter, LinkedIn, Instagram, Pinterest, Tumblr, Snapchat… so many ways to promote your practice and connect with potential clients, so little time! In fact, managing all of these profiles and platforms can be downright overwhelming. In this session we will discuss tips, tricks, tools, and platforms that help you stay on top of the big three – LinkedIn, Twitter and Facebook.
Building an efficient law practice means digging deep and figuring out what works and what doesn’t. Stacey Burke has audited law firms of varying practice areas across the country. In this webinar she will give her top tips for running an efficient law practice by using appropriate technology and other best practices.
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 3
• Data protection by design
• Securing personal data
• Reporting data breaches
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 4
• How to perform a data protection impact assessment (DPIA)
• The role of the data protection officer (DPO)
• Transferring personal data outside the EU
When is a Duplicate not a Duplicate? Detecting Errors and FraudJim Kaplan CIA CFE
Webinar Overview - A look at duplicates testing and the inherent value of fuzzy data matching.
Identifying fuzzy duplicates has never been easier. Arbutus Analyzer’s versatile functionality enables even new users to detect possible duplicate payments, vendors sharing similar addresses among themselves or with your organization’s employees, and counter parties who may be on government watch lists. Our webinar includes nine different scenarios with detailed descriptions of the tests and their results.
You'll learn about:
• Identifying possible risks
• How to deploy Analyzer commands and functions
Key Presenter:
Michael Kano, ACDA, Data Analytics Consultant, Arbutus Analytics
Implementing and Auditing General Data Protection Regulation Jim Kaplan CIA CFE
Implementing and Auditing GDPR Series (1 of 10)
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 1 of 10
• Bands of penalties and range of awards for breaches
• Lawfulness of processing and consent
• The six data protection principles
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 8
• The security of personal data.
• An organizational risk management framework.
• Legal requirements for a DPIA.
• How to conduct a DPIA with a DPIA tool.
From time-to-time internal auditors are faced with situations which call for them to make an ethical decision. In addition, they may, in the middle of auditing, come across circumstances which themselves appear to be violations of a corporate
code-of-conduct.
Several laws now specifically state that internal auditors, in terms of the act, will be bound by the IIA Code of Ethics.
This webinar explores the IIA Code of Ethics as it applies to everyday situations the auditor may encounter.
The module is designed to provide the participants with an in-depth knowledge of:
Ethics theory
The IIA Code of Ethics
Applicable areas within Internal Audit
Reporting of material facts
Corporate Codes of Conduct
Auditing Corporate Ethics
Webinar contents will include:
Classes of Ethics
The role of business
Employee ethics
Honesty, Objectivity and diligence
Conflicts of Interest
Reporting of Material Facts
Corporate Codes of Conduct
Corporate Social Responsibility
While the use of Data Analytics produces excellent results, they’re commonly applied in a tactical way for specific functional areas within an organization. This tactical approach often falls short of realizing the full potential of Data Analytics. Going beyond initial results, a more systematic approach to Data Analytics can help drive organizational learning (human and machine) from the various remediation processes.
In this Webinar, we’ll discuss 3 areas of Analytics Automation: (1) Producing the findings, (2) Managing the findings, and (3) Learning from the findings.
Key takeaways:
· The value of Analytics Automation
· Understanding the various technologies (i.e. RPA, AI, etc.)
· Practical ideas for deploying and managing Analytics Automation
· Using a more structured approach to remediation exceptions
· Benefits of Root Cause Analysis
· Using Analytics Automation to get a broader, more complete view of your organization over time
In 2015 FINRA increased sanctions dramatically, with a 200% increase in restitution ordered over the course of the year, with issues ranging from administrative or technical issues to failing to meet reporting obligations.
In this presentation, Smarsh and law firm Sutherland Asbill and Brennan cover FINRA’s top enforcement issues, emerging trends, and ways to plan for the future.
There are a few ways to manage/archive/produce your digital public records, and 2 of them can cause your department to spend needless legal dollars and countless IT man-hours. Join Don DeLoach (Former CIO of City of Tallahassee) and Smarsh as they review the 3 methods, and show you which one drastically reduces the time, effort ,and costs associated with your State and Local Public Records Laws.
In this webinar, Smarsh and Don DeLoach cover:
- 3 ways to manage/archive/respond to digital public records
- Identify the pain points in current records processes
- What to look for in a records management and archiving solution
Today's fast-paced and evolving business environment requires internal audit to consider its capabilities and needs to ensure appropriate strategic planning. How can CAEs develop strategic plans that result in their stakeholders viewing the audit function as “highly effective”?
Our research has found an approach that builds on three dimensions of effectiveness that must be addressed to be highly effective:
• Meeting stakeholder expectations
• Operating core processes
• Conforming to internal audit standards and applicable regulatory requirements
Learning Objectives
In this session, participants will:
• Discuss the need for and importance of strategic planning within the internal audit function
• Explore the 3 dimensions that contribute to a highly effective internal audit function
• Populate a framework to understand how processes and expectations are aligned and where changes need to occur
• Develop an initial strategic vision based on an understanding of stakeholder expectations
Weekly eDiscovery Top Story Digest - November 20, 2013Rob Robinson
Compiled by @ComplexD from online public domain resources, provided for your review/use is this week’s update of key industry news, views, and events highlighting key electronic discovery related stories, developments, and announcements.
Available as an information source for eDiscovery and information management professionals since 2010, the Top Story Digest is published weekly on the ComplexDiscovery (.com) blog.
Follow ComplexDiscovery.com via social media on Twitter (@ComplexD), LinkedIn, Google+ and RSS.
To receive the Weekly eDiscovery News Update by email for eDiscovery news, corporate risk information and vendor clips, visit http://www.ComplexDiscovery.com.
Data breaches and security issues plague financial institutions constantly. They are important to safeguard against for the protection of confidential information housed at institutions and for the regulatory exams that expect detailed security plans in place. Douglas Jambor, Vice President and Director of Technology Consulting at Turner & Associates, provides insight into the topic of data breaches and penetration testing. He reviews these security topics, discusses how to implement a plan in the case of a security breach, and how to limit data breach risk exposures to your organization.
From time-to-time internal auditors are faced with situations which call for them to make an ethical decision. In addition, they may, in the middle of auditing, come across circumstances which themselves appear to be violations of a corporate
code-of-conduct.
Several laws now specifically state that internal auditors, in terms of the act, will be bound by the IIA Code of Ethics.
This webinar explores the IIA Code of Ethics as it applies to everyday situations the auditor may encounter.
The module is designed to provide the participants with an in-depth knowledge of:
Ethics theory
The IIA Code of Ethics
Applicable areas within Internal Audit
Reporting of material facts
Corporate Codes of Conduct
Auditing Corporate Ethics
Webinar contents will include:
Classes of Ethics
The role of business
Employee ethics
Honesty, Objectivity and diligence
Conflicts of Interest
Reporting of Material Facts
Corporate Codes of Conduct
Corporate Social Responsibility
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
Carrie Kerskie explains how to assess your organization for potential risks of data breaches and how to put a data breach and privacy plan in place to help you better protect your organization.
To watch the webinar recording, visit http://i-sight.com/webinar-protecting-your-organization-against-data-breaches-and-identity-theft/
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 14 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Tisski Ltd Freedom of Information White PaperKatie Weir
The public sector’s management of Freedom of Information (FOI) requests has come sharply into focus recently, with the new Information Commissioner threatening to vigorously pursue delays and poor treatment of FOI applications.
This white paper sets out to explore the challenges around maintaining compliance and what existing technology can deliver immediate improvements to FOI systems and processes.
It specifically looks at the power of Microsoft Dynamics 365 and will be useful to anyone operating in the public sector who wants to find a quick and effective means of ensuring compliance at a time of enhanced scrutiny.
How to use ai apps to unleash the power of your audit program Jim Kaplan CIA CFE
Artificial Intelligence (AI) is found in just about every industry today, and accounting and auditing are no exception. Auditors that aren’t already exploring the vast potential of AI-powered applications in their audit program will soon find these tools are the industry standard and will be left in the dust if they don’t adapt and adopt.
To learn how to easily use AI apps in audit today, join us as we welcome Deniz Appelbaum, Assistant Professor at Montclair State University, for this exclusive presentation. With deep experience in audit analytics, Big Data, blockchain, audit automation, and fraud detection, Appelbaum brings considerable practical experience with audit technology to the audit profession.
In this presentation, she will help guests:
● Gain a basic introductory understanding of AI in audit.
● Understand how AP applications can be used in the context of auditing.
● Learn how to use AI apps in an audit for specific, achievable, measurable results.
Social Media for Lenders Webinar featuring Lee NegroniSmarsh
Record keeping rules for mortgage lenders weren’t written with social media in mind. Complying with these rules for loan-related tweets, Facebook messages and LinkedIn communications suggests the proverbial square peg and round hole. Some regulatory agencies mention social media communications but lack rules for it, while others are silent on the subject.
Is social media an unsupervised digital opportunity to advertise and originate mortgages, or a regulatory compliance risk?
For lawyers looking for a more efficient way to run their businesses, acquiring a law practice management system is the first step. A holistic database featuring all of your relevant law firm data, accessible via the cloud, solves a lot of your problems.
PDF files are essentially “digital paper,” because they can perfectly replicate paper documents. PDFs are more useful than paper documents, but most lawyers don’t know about the most powerful features of PDFs, ones that can help them streamline their law practice and manage information faster, better, and cheaper.
Protecting personal data has been an important issue for many years. The EU GDPR extends the data rights of individuals, and requires organizations to develop clear policies and procedures to protect personal data, and adopt appropriate technical and organizational measures. UK organizations have had to comply with the Regulation since 25 May 2018, or potentially face fines of up to 4% of annual turnover or €20 million – whichever is greater.
Learning Outcomes:
This 10 webinar series is intended to elicit a clear understanding of the core elements of the GDPR, with the ability to gain a deeper understanding by asking the trainer questions during the training.
It covers how each aspect of the Regulation can be translated into implementation actions in your organization and the auditor’s role.
Webinar 8
• The security of personal data.
• An organizational risk management framework.
• Legal requirements for a DPIA.
• How to conduct a DPIA with a DPIA tool.
From time-to-time internal auditors are faced with situations which call for them to make an ethical decision. In addition, they may, in the middle of auditing, come across circumstances which themselves appear to be violations of a corporate
code-of-conduct.
Several laws now specifically state that internal auditors, in terms of the act, will be bound by the IIA Code of Ethics.
This webinar explores the IIA Code of Ethics as it applies to everyday situations the auditor may encounter.
The module is designed to provide the participants with an in-depth knowledge of:
Ethics theory
The IIA Code of Ethics
Applicable areas within Internal Audit
Reporting of material facts
Corporate Codes of Conduct
Auditing Corporate Ethics
Webinar contents will include:
Classes of Ethics
The role of business
Employee ethics
Honesty, Objectivity and diligence
Conflicts of Interest
Reporting of Material Facts
Corporate Codes of Conduct
Corporate Social Responsibility
While the use of Data Analytics produces excellent results, they’re commonly applied in a tactical way for specific functional areas within an organization. This tactical approach often falls short of realizing the full potential of Data Analytics. Going beyond initial results, a more systematic approach to Data Analytics can help drive organizational learning (human and machine) from the various remediation processes.
In this Webinar, we’ll discuss 3 areas of Analytics Automation: (1) Producing the findings, (2) Managing the findings, and (3) Learning from the findings.
Key takeaways:
· The value of Analytics Automation
· Understanding the various technologies (i.e. RPA, AI, etc.)
· Practical ideas for deploying and managing Analytics Automation
· Using a more structured approach to remediation exceptions
· Benefits of Root Cause Analysis
· Using Analytics Automation to get a broader, more complete view of your organization over time
In 2015 FINRA increased sanctions dramatically, with a 200% increase in restitution ordered over the course of the year, with issues ranging from administrative or technical issues to failing to meet reporting obligations.
In this presentation, Smarsh and law firm Sutherland Asbill and Brennan cover FINRA’s top enforcement issues, emerging trends, and ways to plan for the future.
There are a few ways to manage/archive/produce your digital public records, and 2 of them can cause your department to spend needless legal dollars and countless IT man-hours. Join Don DeLoach (Former CIO of City of Tallahassee) and Smarsh as they review the 3 methods, and show you which one drastically reduces the time, effort ,and costs associated with your State and Local Public Records Laws.
In this webinar, Smarsh and Don DeLoach cover:
- 3 ways to manage/archive/respond to digital public records
- Identify the pain points in current records processes
- What to look for in a records management and archiving solution
Today's fast-paced and evolving business environment requires internal audit to consider its capabilities and needs to ensure appropriate strategic planning. How can CAEs develop strategic plans that result in their stakeholders viewing the audit function as “highly effective”?
Our research has found an approach that builds on three dimensions of effectiveness that must be addressed to be highly effective:
• Meeting stakeholder expectations
• Operating core processes
• Conforming to internal audit standards and applicable regulatory requirements
Learning Objectives
In this session, participants will:
• Discuss the need for and importance of strategic planning within the internal audit function
• Explore the 3 dimensions that contribute to a highly effective internal audit function
• Populate a framework to understand how processes and expectations are aligned and where changes need to occur
• Develop an initial strategic vision based on an understanding of stakeholder expectations
Weekly eDiscovery Top Story Digest - November 20, 2013Rob Robinson
Compiled by @ComplexD from online public domain resources, provided for your review/use is this week’s update of key industry news, views, and events highlighting key electronic discovery related stories, developments, and announcements.
Available as an information source for eDiscovery and information management professionals since 2010, the Top Story Digest is published weekly on the ComplexDiscovery (.com) blog.
Follow ComplexDiscovery.com via social media on Twitter (@ComplexD), LinkedIn, Google+ and RSS.
To receive the Weekly eDiscovery News Update by email for eDiscovery news, corporate risk information and vendor clips, visit http://www.ComplexDiscovery.com.
Data breaches and security issues plague financial institutions constantly. They are important to safeguard against for the protection of confidential information housed at institutions and for the regulatory exams that expect detailed security plans in place. Douglas Jambor, Vice President and Director of Technology Consulting at Turner & Associates, provides insight into the topic of data breaches and penetration testing. He reviews these security topics, discusses how to implement a plan in the case of a security breach, and how to limit data breach risk exposures to your organization.
From time-to-time internal auditors are faced with situations which call for them to make an ethical decision. In addition, they may, in the middle of auditing, come across circumstances which themselves appear to be violations of a corporate
code-of-conduct.
Several laws now specifically state that internal auditors, in terms of the act, will be bound by the IIA Code of Ethics.
This webinar explores the IIA Code of Ethics as it applies to everyday situations the auditor may encounter.
The module is designed to provide the participants with an in-depth knowledge of:
Ethics theory
The IIA Code of Ethics
Applicable areas within Internal Audit
Reporting of material facts
Corporate Codes of Conduct
Auditing Corporate Ethics
Webinar contents will include:
Classes of Ethics
The role of business
Employee ethics
Honesty, Objectivity and diligence
Conflicts of Interest
Reporting of Material Facts
Corporate Codes of Conduct
Corporate Social Responsibility
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
Carrie Kerskie explains how to assess your organization for potential risks of data breaches and how to put a data breach and privacy plan in place to help you better protect your organization.
To watch the webinar recording, visit http://i-sight.com/webinar-protecting-your-organization-against-data-breaches-and-identity-theft/
Organizations are increasingly looking to their Internal Auditors to provide independent assurance about cyber risks and the organization's ability to defend against cyber attacks. With information technology becoming an inherent critical success factor for every business and the emerging cyber threat landscape, every internal auditor needs to equip themselves on IT audit essentials and cyber issues.
In part 14 of our Cyber Security Series you will learn about the current cyber risks and attack methods from Richard Cascarino, including:
Where are we now and Where are we going?
Current Cyberrisks
• Data Breach and Cloud Misconfigurations
• Insecure Application User Interface (API)
• The growing impact of AI and ML
• Malware Attack
• Single factor passwords
• Insider Threat
• Shadow IT Systems
• Crime, espionage and sabotage by rogue nation-states
• IoT
• CCPA and GDPR
• Cyber attacks on utilities and public infrastructure
• Shift in attack vectors
Tisski Ltd Freedom of Information White PaperKatie Weir
The public sector’s management of Freedom of Information (FOI) requests has come sharply into focus recently, with the new Information Commissioner threatening to vigorously pursue delays and poor treatment of FOI applications.
This white paper sets out to explore the challenges around maintaining compliance and what existing technology can deliver immediate improvements to FOI systems and processes.
It specifically looks at the power of Microsoft Dynamics 365 and will be useful to anyone operating in the public sector who wants to find a quick and effective means of ensuring compliance at a time of enhanced scrutiny.
How to use ai apps to unleash the power of your audit program Jim Kaplan CIA CFE
Artificial Intelligence (AI) is found in just about every industry today, and accounting and auditing are no exception. Auditors that aren’t already exploring the vast potential of AI-powered applications in their audit program will soon find these tools are the industry standard and will be left in the dust if they don’t adapt and adopt.
To learn how to easily use AI apps in audit today, join us as we welcome Deniz Appelbaum, Assistant Professor at Montclair State University, for this exclusive presentation. With deep experience in audit analytics, Big Data, blockchain, audit automation, and fraud detection, Appelbaum brings considerable practical experience with audit technology to the audit profession.
In this presentation, she will help guests:
● Gain a basic introductory understanding of AI in audit.
● Understand how AP applications can be used in the context of auditing.
● Learn how to use AI apps in an audit for specific, achievable, measurable results.
Social Media for Lenders Webinar featuring Lee NegroniSmarsh
Record keeping rules for mortgage lenders weren’t written with social media in mind. Complying with these rules for loan-related tweets, Facebook messages and LinkedIn communications suggests the proverbial square peg and round hole. Some regulatory agencies mention social media communications but lack rules for it, while others are silent on the subject.
Is social media an unsupervised digital opportunity to advertise and originate mortgages, or a regulatory compliance risk?
For lawyers looking for a more efficient way to run their businesses, acquiring a law practice management system is the first step. A holistic database featuring all of your relevant law firm data, accessible via the cloud, solves a lot of your problems.
PDF files are essentially “digital paper,” because they can perfectly replicate paper documents. PDFs are more useful than paper documents, but most lawyers don’t know about the most powerful features of PDFs, ones that can help them streamline their law practice and manage information faster, better, and cheaper.
This was a two-part CLE for the North Carolina Bar Association about how to set up and operate a virtual law practice. It covers both the tech and ethics issues as well as the practical how-tos.
Self Help Legal Software and Unauthorized Practice of LawRichard S. Granat
Presentation by Richard Granat and Marc Lauritsen to Legal Services Corporation annual conference on legal technology. Topic is how UPL rules apply to legal selfhelp software.
Technology has changed the practice of law dramatically in recent years and will continue to do so at a stunning pace. The hard reality is that law firms must become more efficient or their bottom line will suffer. Susan Cartier Liebel, lawyer and Founder & CEO of Solo Practice University will give you sage advice for being a successful 21st century lawyer.
Many lawyers who blog become “go-to” authorities in their practice areas. This leads to benefits including; new clients, speaking engagements, and job offers. So, how do you create a blog that you enjoy writing and that others find interesting? This blogging webinar will show you how to create a legal blog and start building your online audience.
Law is a demanding field, and attorneys demand even more of themselves. Attorneys often turn to substances to escape from daily problems and cope with their enormous workload. In this webinar, we will explore addiction in the legal profession. Why lawyers suffer at significantly greater rates than the general public and what the profession should be doing to address the problem.
An updated version of my seminar on social media for lawyers. The focus is on legal marketing and networking through social media. Here you will find slides on best practices as well as slides discussing ethical considerations for sites such as Facebook, LinkedIn, Google+ and Twitter.
Social Media Law: The Legal Do's and Don'ts of Social MediaShawn Tuma
This presentation provides an overview of social media law, that is, the legal issues involved in using social media. The presentation provides practical examples of how those issues come about in the business world and provides ways to minimize the risks associated with those issues, including the use of social media policies.
Digital marketing is the future of law firm marketing. It gives attorneys the ability to target prospective clients on social media and broadcast content to a large audience. However, digital marketing remains a challenge for small firm attorneys with limited time and money. Gina Rubel will help you understand the digital marketing realm and implement a strategy that works for your firm.
For some lawyers, especially litigators, social media is a tool that helps them provide better representation to their clients. Whether it’s mining social media for evidence or researching jurors online, social media is helping them to make their clients’ cases in court. Learn about Lawyers and Social Media in 2016 in this MyCase Legal Infographic.
Priming the Economic Engine: How Social Media is Driving Growth for Small and...LinkedIn
8 out of 10 small and medium businesses (SMBs) use social media, and 68% of them are using it to inform financial decisions — presenting a golden opportunity for finance marketers to deliver relevant, useful content. Find out how in this research study from LinkedIn and TNS.
Download the full whitepaper at http://lnkd.in/SMB-research
Trends in Law Practice Management – Calculating the RisksNicole Garton
Presented by the CBA’s Legal Profession Assistance Conference, the Canadian Lawyers Insurance Association and the National Law Practice Management and Technology Section live via webconference.
The advantages of cloud computing, virtual or online law practices and unbundling of legal services are getting a lot of press – convenience to clients, reduced overhead expenses, remote access, and enhanced access to justice are among the benefits touted. But there are also very real and practical risks, and ethical implications, for each new tool or practice implemented. As these trends infiltrate legal practice in North America, lawyers and law firm leaders need to exercise due diligence to assess the potential risks and benefits.
Our panelists, Nicole Garton-Jones and David Bilinsky will provide a practical overview of these trends in law practice management. In doing so, they’ll provide you with tools to reduce the risk and identify the questions you need to ask yourself, as well as potential third party service providers, your insurers and your law society, when conducting your own risk-benefit analysis.
Register here: http://www.cba.org/pd/details_en.aspx?id=na_onfeb212
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
Everyone throws around the word compliance but how do you actually achieve that? In this free, 60-minute webinar Sam Chenkin from Tech Impact discusses achievable goals for the nonprofit community to keep their data safe with the Microsoft Cloud. We explore account security like two-factor authentication, data security like encryption, and how to make sure only compliant devices can access your data.
While many legal professionals have seen powerful benefits of the transition to a hybrid/remote practice, there’s always room to improve. And for those who are still operating only out of a physical office space, it can be a daunting leap to make.
Join industry experts to discover how to run a successful virtual law firm. In this webinar, you’ll learn about the:
- Benefits of building a virtual law firm
- Ethical and regulatory requirements to follow
- Technologies to help you work efficiently and elevate the client experience (along with resources to guide you)
Addressing the Data Security Risks of Cloud-Based SoftwareKareo
Kareo’s Security Team, Jesse Salmon (Information Security Manager) and Tim Nabhani (Security Architect), will go over some of the biggest risks and misconceptions in data security as it relates to the cloud. They will also share some key security measures to look for when evaluating a cloud-based solution.
How is blockchain affecting nonprofits, NGOs, social enterprise, and other organizations creating positive impact -- right now? This presentation gives examples and use cases, as well as resources and tools you can use to stay updated on trends in blockchain and other emerging technology.
Presented at Better World Day 2019 in Cleveland, OH by Amy Neumann, founder and executive director of the 501(c)3 nonprofit, Free Tech for Nonprofits.
Master Data in the Cloud: 5 Security FundamentalsSarah Fane
Your master data is essential to the smooth operation of your business. But it is also valuable to others. Master data is vulnerable to both internal and external attacks. As the future of business and data is increasingly cloud-based, we explore five fundamentals to ensure the security of your data.
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
The California Consumer Privacy Act (CCPA) takes effect on January 1, 2020, mandating that data about consumers be protected against a breach. If your IBM i system contains data for consumers from the state of California, the time to prepare is now.
In this webinar featuring well-known IBM i encryption expert Patrick Townsend, we share information that will help you prepare for CCPA compliance, including:
• Consumer rights granted by CCPA
• Hardening systems to prevent a breach
• Obscuring data to prevent exposure
• How Syncsort can help
CCPA is almost here. View this webinar on-demand and get started down the path to compliance!
The national Scot-Secure Summit is the largest annual Cyber Security Conference in Scotland: the event brings together senior IT leaders and Information Security personnel, providing a unique forum for knowledge exchange, discussion and high-level networking.
The conference programme is focussed on promoting best-practice cyber security; looking at the current trends, the key threats - and offering practical advice on improving resilience and implementing effective security measures.
Your firm needs to be committed to protecting information assets, including personal data and client documents. As a trusted advisor to our clients, the expectation is that we are aware of threats and are guarding their data. Data privacy and information security are fundamental components of doing business today, no matter how large your firm is.
In this paper we will look at three specific ways of protecting our clients:
1. Protection through our ability to research and improve intellectual capital
2. Protection through policies, procedures and processes
3. Protection by securing client data
Whether you're using spreadsheets or the first generation privacy technology tools available - privacy management can still be a time-consuming and manual process for the privacy team and the broader business. Automation and intelligence are the key to streamlining this process but where to start?
In this webinar we've assembled some of the best privacy and security professionals to share their tips to cut out the time-consuming work so that you can focus on strategic input. CONSIDER: Just imagine what you could accomplish and influence if even 25% of your time was freed from manual processes.
This webinar will provide insights into:
-How to determine what activities to automate
-Key considerations for assessing tools and vendors
-Making the business case to increase the efficiencies and effectiveness of the privacy office
Launch of the #OYOD idea at the 2014 Computers, Privacy and Data Protection C...Bruno Segers
Launch of the Real Deal and the #OYOD (Own Your Own Data) idea during the Computers, Privacy and Data Protection Conference (CPDP) in January 2014 in Brussels
Similar to (Webinar Slides) How to Ethically Use Technology in Your Practice (20)
As the COVID-19 pandemic continues to surge in various parts of the country, you’re no doubt facing uncertainties surrounding how and when to reopen your law firm. You’re also likely wondering about the future of your law firm and its book of business. One way to abate those concerns is to prioritize preparing your firm for whatever may come. Whether it’s a pandemic or economic downturn, pre-emptive protocols and a strong technology foundation will help you maintain business continuity in the event of future disruption. Is your firm ready? If not, there’s no better time to ensure that you’re protected.
In ever-evolving and stressful circumstances, legal professionals who have transitioned to a remote working environment are finding themselves at odds with new distractions, time management hurdles, and burnout. To help attorneys combat the emerging challenges associated with working away from the office for the first time, Founder of Real Life Practice Nora Bergman offers expert advice on how to remain focused and on task as individuals with regard to your mental health.
As the COVID-19 epidemic hits its projected peak in many parts of the United States, law firms face significant changes in the way they operate financially and operationally. In our recent webinar panel, attorneys Todd Spodek, Al Provinziano, and Mark Metzger shared their unique experiences of securing their businesses financially and operationally to withstand the economic uncertainties of the pandemic.
In times of unprecedented business disruption, it can be challenging to keep your firm’s day-to-day operations on track. However, clients need assurance their cases are still being handled, your staff needs to work in sync to remain productive, and your firm needs to keep its cash flow moving.
You can’t wing it when it comes to law firm financials. In order to run a successful law firm, you need to be numbers-oriented and vigilant in deriving insights from your performance. Your finances have to run on rails. To that end, visibility into your firm’s revenue, accounts receivable, and cash flow are your gateway to increased profitability.
You can’t wing it when it comes to law firm financials. In order to run a successful small law firm, you need to become a numbers guy, or gal. Your finances have to run on rails; you have to remain in control. To that end, visibility into your firm’s profitability, billing productivity and account receivables are your gateways to increased revenue.
Law firms spend a significant amount of time and money attracting new clients, but many struggle to manage them beyond the initial touchpoint. Implementing a strong lead and intake process can help your firm convert more referrals into paying clients, grow monthly revenue, and lower the cost to acquire clients.
Want to grow your firm? Historically, you could charge more per hour or hire an associate. But what if there was a third way? Technology facilitates access to high-quality legal expertise at a surprisingly reasonable cost. Using freelance and contract legal help, you can do more work, grow your firm, and help more clients.
Whether at the end of the day or the end of the month, hard-working lawyers often look back and wonder why their billable time just doesn’t seem to measure up to all the long hours they spend in the office. Discover ways to detect holes in your system, as well as how to develop patches for the recurring leaks you have known about and struggled with for years.
On-premise legal software can be traced back to major inefficiencies in the way modern law firms are managed - often subjecting attorneys to more technological and financial grief than inherent value. In this presentation, we walk you through the considerations of on-premise vs. cloud-based solutions for your law firm.
Law firms usually view technology as being grafted onto existing, offline office systems. But, reformatting your law practice based on the features of a law practice management system is a coherent and effective way to build a better law firm.
Law practice demands are tough, especially in the digital age. Clients want more for less, and thus running an efficient law practice is more important than ever. Automating tasks can help you save time, reduce mistakes, enhance client service, and improve your bottom line (and maybe even give you time to take a break).
Social Media can be a powerful marketing tool for your law firm. But without a macro strategy in place or an understanding of the ethical implications of posting online, you may find yourself losing money or even violating statutory prohibitions.
Perhaps you're generating interest and traffic from online marketing, but are having a hard time converting it into paying clients. In this webinar, we explore some of the most common issues preventing lawyers from turning traffic into clients.
Since its 26.2 billion dollar acquisition by Microsoft at the end of 2016, we've begun to see an awakening by skeptics and users alike as to the possibilities that lie within LinkedIn to stand up and stand out. Many attorneys are turning to the revamped platform to connect with clients, potential clients, influencers, and others important to the growth of their practice.
Practicing at the top of your law license means that you’re doing those creative things that lawyers get paid the most money for. It means you’re not getting paid to answer phone calls. You’re not getting paid to schedule appointments with clients. You’re not getting paid to get coffee for someone. You’re ARE getting paid to do the high level creative work that lawyers do: creating strategies, crafting briefs, and in some cases conducting legal research.
Billing by the hour, though seemingly more profitable for law firms, presents a compounding conflict of interest between an attorney and their clients. For this reason, many lawyers celebrate the transition to a packaged flat-fee billing model — introducing predictability, incentive to make progress, and even a competitive advantage for their firms.
Whether you’ve been worn down by attrition or are making a conscientious effort to modernize your firm, get ready to wipe away any lingering reluctance in moving your practice to the cloud.
Rainmaking is simple, but it’s not easy. It takes deliberate actions on your part as an attorney to create the practice of your dreams. And it all starts with a plan. Build and execute your own rainmaking plan, tailored to your life and your career to make 2018 the best year ever!
Is it possible to improve your law practice and your life at the same time?Yes! You really can increase your productivity and improve your practice and your life. Every day, lawyers help to change their clients’ lives for the better. But all too often, you can lose sight of this reality and get caught up in your hectic daily routine.
Now, it’s time for you to change your life for the better.
Join MyCase and Nora Bergman, law firm business coach and author of “50 Lessons for Lawyers,” for a free legal webinar: “Simple Lessons to Improve Your Law Practice and Your Life.”
More from MyCase Legal Case and Practice Management Software (20)
RIGHTS OF VICTIM EDITED PRESENTATION(SAIF JAVED).pptxOmGod1
Victims of crime have a range of rights designed to ensure their protection, support, and participation in the justice system. These rights include the right to be treated with dignity and respect, the right to be informed about the progress of their case, and the right to be heard during legal proceedings. Victims are entitled to protection from intimidation and harm, access to support services such as counseling and medical care, and the right to restitution from the offender. Additionally, many jurisdictions provide victims with the right to participate in parole hearings and the right to privacy to protect their personal information from public disclosure. These rights aim to acknowledge the impact of crime on victims and to provide them with the necessary resources and involvement in the judicial process.
In 2020, the Ministry of Home Affairs established a committee led by Prof. (Dr.) Ranbir Singh, former Vice Chancellor of National Law University (NLU), Delhi. This committee was tasked with reviewing the three codes of criminal law. The primary objective of the committee was to propose comprehensive reforms to the country’s criminal laws in a manner that is both principled and effective.
The committee’s focus was on ensuring the safety and security of individuals, communities, and the nation as a whole. Throughout its deliberations, the committee aimed to uphold constitutional values such as justice, dignity, and the intrinsic value of each individual. Their goal was to recommend amendments to the criminal laws that align with these values and priorities.
Subsequently, in February, the committee successfully submitted its recommendations regarding amendments to the criminal law. These recommendations are intended to serve as a foundation for enhancing the current legal framework, promoting safety and security, and upholding the constitutional principles of justice, dignity, and the inherent worth of every individual.
ALL EYES ON RAFAH BUT WHY Explain more.pdf46adnanshahzad
All eyes on Rafah: But why?. The Rafah border crossing, a crucial point between Egypt and the Gaza Strip, often finds itself at the center of global attention. As we explore the significance of Rafah, we’ll uncover why all eyes are on Rafah and the complexities surrounding this pivotal region.
INTRODUCTION
What makes Rafah so significant that it captures global attention? The phrase ‘All eyes are on Rafah’ resonates not just with those in the region but with people worldwide who recognize its strategic, humanitarian, and political importance. In this guide, we will delve into the factors that make Rafah a focal point for international interest, examining its historical context, humanitarian challenges, and political dimensions.
Responsibilities of the office bearers while registering multi-state cooperat...Finlaw Consultancy Pvt Ltd
Introduction-
The process of register multi-state cooperative society in India is governed by the Multi-State Co-operative Societies Act, 2002. This process requires the office bearers to undertake several crucial responsibilities to ensure compliance with legal and regulatory frameworks. The key office bearers typically include the President, Secretary, and Treasurer, along with other elected members of the managing committee. Their responsibilities encompass administrative, legal, and financial duties essential for the successful registration and operation of the society.
A "File Trademark" is a legal term referring to the registration of a unique symbol, logo, or name used to identify and distinguish products or services. This process provides legal protection, granting exclusive rights to the trademark owner, and helps prevent unauthorized use by competitors.
Visit Now: https://www.tumblr.com/trademark-quick/751620857551634432/ensure-legal-protection-file-your-trademark-with?source=share
DNA Testing in Civil and Criminal Matters.pptxpatrons legal
Get insights into DNA testing and its application in civil and criminal matters. Find out how it contributes to fair and accurate legal proceedings. For more information: https://www.patronslegal.com/criminal-litigation.html
Introducing New Government Regulation on Toll Road.pdfAHRP Law Firm
For nearly two decades, Government Regulation Number 15 of 2005 on Toll Roads ("GR No. 15/2005") has served as the cornerstone of toll road legislation. However, with the emergence of various new developments and legal requirements, the Government has enacted Government Regulation Number 23 of 2024 on Toll Roads to replace GR No. 15/2005. This new regulation introduces several provisions impacting toll business entities and toll road users. Find out more out insights about this topic in our Legal Brief publication.
NATURE, ORIGIN AND DEVELOPMENT OF INTERNATIONAL LAW.pptxanvithaav
These slides helps the student of international law to understand what is the nature of international law? and how international law was originated and developed?.
The slides was well structured along with the highlighted points for better understanding .
5. About our presenter
Presenter
‣ Practice Management Advisor for
Oklahoma Bar Association
‣ Blogs at Jim Calloway’s Law Practice
Tips
http://www.lawpracticetipsblog.com
‣ Practice Management Advice
columnist in Law Practice Magazine
‣ Digital Edge podcast
http://legaltalknetwork.com/
podcasts/digital-edge/
5
6. The Wall Street Journal says
“Every business is a
technology business.”
6
13. Poll Question #1
Has your state amended the Rules of Professional Conduct
to add the comment on the risks and benefits of relevant technology?
1. Yes
2. No
3. I should know that, but I don’t.
4. I could care less.
13
14. Protecting Confidential
Information
ABA Model Rule 1.6(c) A lawyer shall make reasonable
efforts to prevent the inadvertent or unauthorized
disclosure of, or unauthorized access to, information
relating to the representation of a client.
14
http://bit.ly/ABARule1_6 !
(Added in 2012. Adopted by about
50% of states.)
17. Cloud Computing!
"Cloud computing is a fancy way of
saying stuff's not on your computer. It's on
a company's server, or many servers,
possibly all over the world. Your computer
becomes just a way of getting to your
stuff. Your computer is an interface, but
not where the magic happens.!
"Byte Rights" by Quinn Norton,!
Maximum PC, Sept. 2010!
17
18. “Ethics up in the Clouds” 81 Oklahoma Bar Journal 2407
(11/6/2010) by OBA Ethics Counsel Travis Pickens!
Cloud Computing!
“Cloud computing does introduce a heightened risk, at
least in theory, in the sense that it outsources all, or
nearly all, of a lawyer’s data to an off-site location....!
“But rock-solid certainty is not required. Significantly,
in the few ethics opinions that have addressed it, the
consensus appears to be that the law firm is not
required to guarantee that the system will be
invulnerable to unauthorized access.!
18
19. Big Picture Requirements
• Stay up to date
• Actually read the Terms of Service (TOS)
• Know what you don’t know
• Lawyer should periodically review vendor’s security
measures
• Special circumstances warrant special precautions
19
20. My Personal Thoughts
• Your security risk is any connection to the Internet.
• Paid business-grade cloud vendors have security
experts and engineers on staff, which only the very
largest law firms can have.
• So using a properly-vetted vendor to secure
confidential information can be viewed as
“outsourcing” security to those more qualified and
responsive.20
22. Practice Management Software in
The Cloud
There are many benefits to using these
tools- for the lawyer and for the client. The
majority of small firm PM tools are hosted
in the cloud.
22
23. Digital Client Files (aka Paperless) are
now the standard for efficient
operations.
23
24. The Benefits of Digital Client Files
• Ease of access to files and documents remotely. Saves time,
which saves clients money.
• Savings on document storage costs.
• Reduced postage and paper expense by sharing documents
with clients digitally.
• Protection of client files in the case of a disaster such as flood
or fire.
• 7/24 access to every document in every open client file from
any location
Minnesota Lawyers Mutual, The Basics of Client Files and
Paperless Systems Opening, Closing, Documentation and
Ticklers A Malpractice Insurance Company’s Perspective (Rev.
2015) http://bit.ly/MutualPaperless !
29. Social media is fun, but posting
online about clients is dangerous
• Don’t trust any privacy or security settings. Your
friends can share any post with the entire world.
• If you want to share, get client’s permission (in
writing)
• In the Internet Age, even disguising client’s name or
details can still give clues to be researched by others
and disclose confidences.
29
30. No lawyer can afford to be ignorant about
how social media operates
• Business clients need social media policies and advice. Great
business opportunity for lawyers.
• Family law contested proceedings now routinely include admission
of social media evidence.
• Soon social media evidence will be a common part of many types of
trials
30
31. Email - Love it or hate it
99% of us use email every day.
31
32. Poll Question #2
Do you use email encryption in your law practice?
1. Yes
2. No
3. I don’t have the tools
4. I have the tools but don’t do this.
32
33. Surely after last year, you
appreciate that unencrypted
email is not secure.
33
34. Why Encryption?
Unencrypted e-mails (including attachments)
go across the Internet as plain text- complete
lack of confidentiality or security.
34
35. If you are using Gmail for client
communications (and you haven't done this),
sign up for a more secure business account at
https://gsuite.google.com/pricing.html. Now
they are calling it GSuite. The cost is $5-$10
per month. Lots of features.
35
No more free Gmail for business communications!
40. Citrix ShareFile
• Send large attachments as a link in your email;
• Handy Outlook plug-in tool
• Require a sign in and get notifications;
• Offers a data room package;
• Access files securely from any internet enabled
device.
• www.sharefile.com
40
41. Client portals within practice
management software
• Great client service and secure method of
communication.
• Operates within the tool you are using all day
anyway.
41
42. Poll Question #3
Do you use a client portal to share information
with clients in your law practice?
1. Yes
2. No
3. I don’t have the tools
4. I have the tools but don’t do this.
42
47. For additional security, use
Two-Factor Authentication
• Something you know
(Password or PIN)
• Something you have
(Phone, keychain dongle)
• Something you are
(Fingerprint, retina scan)
47
59. Your Document Czar
ü Create templates for others
to use!
ü Continuous training
opportunities!
ü Standardize document
creation and storage!
ü Implement automated
document assembly !
ü Work with management on
fees & billing implications of
automating document
creation!
59