Applicable Model Rules Rule 1.1 Competence Rule 1.3 Diligence Rule 1.6 Confidentiality of Information Rule 5.1 Responsibilities of a Partner or

Size: px
Start display at page:

Download "Applicable Model Rules Rule 1.1 Competence Rule 1.3 Diligence Rule 1.6 Confidentiality of Information Rule 5.1 Responsibilities of a Partner or"

Transcription

1

2 Applicable Model Rules Rule 1.1 Competence Rule 1.3 Diligence Rule 1.6 Confidentiality of Information Rule 5.1 Responsibilities of a Partner or Supervisory Lawyer Rule 5.2 Responsibilities of a Subordinate Lawyer Rule 5.3 Responsibilities Regarding Nonlawyer Assistant Rule 7.1 Communication/Advertising Applicable Standards The Rules require a minimum standard of conduct; efforts to avoid malpractice or business failure may require greater efforts

3 Malpractice traps that can be avoided using technology Missed deadlines Poor communication/unresponsiveness Conflict of interest Substantive legal errors Fee disputes Inadequate documentation of work

4

5 Ethics Opinions NYSBA Opinion 749; NYSBA Opinion 782 ABA Formal Opinion Florida Opinion 06-2 MD Ethics Docket No Alabama Formal Opinion DC Opinion 341 And many more At issue: Sending attorney s responsibility Can you look and must you notify?

6

7 Encryption: ABA Formal Opinion Disclaimers Discussion lists/ Q and A Forums Recorded, searchable conversations With other lawyers be aware that even closed lists are not completely private With people seeking legal help be careful, follow state ethics rules when responding to online message boards to the general public

8 Turn off auto-complete In Outlook: Tools Options Options Advanced Options

9 Using spam filters? Don t forget to whitelist the court! Don t fall prey to spear phishing, whaling, and scams What about your clients: What address did your client provide? Is there a work policy that would cause privilege waiver? ABA Formal Opinion

10 Duties to prospective clients: Is your address on your website with no disclaimer? ABA Formal Opinion Are you inadvertently creating: a conflict of interest? a perceived attorney-client relationship? the assumption of attorney-client privilege? Consider click-through disclaimer in plain language

11

12 Using LinkedIn, Facebook, Twitter and other public online social networks? Do you intend to use them to generate business? Reread applicable rules regarding: Communication Solicitation Advertising

13 Ok or Ethics violation? Case finally over. Unanimous verdict! Celebrating tonight. Another great victory in court today! My client is delighted. Who wants to be next? Won a million dollar verdict. Tell your friends and check out my website. Won another personal injury case. Call me for a free consultation. Just published an article on wage and hour breaks. Let me know if you would like a copy.

14

15

16

17

18

19

20

21

22

23

24

25 Mask your IP Train Your Attorneys Scan attachments by default Keep software patched, especially Acrobat and Flash Don t give end users admin rights/don t login as admin Encrypt Your Files/hard drive Use web forms don t expose your address Use internal mail system through practice management or project management tools

26

27 Deletion does not remove the document Levels of protection Password To open To edit, copy, extract Sharing PDF Portable Document Format Encryption

28 Information hidden or covered in a computer document can almost always be recovered. Unless you do it the right way: Adobe Acrobat x Professional Redaction Tool Appligent Redax Redact-it Desktop Print, black magic marker, scan to PDF

29 Information hidden or covered in a computer document can almost always be recovered Unless you do it the right way

30 Greater freedom of movement = greater risk of loss or theft Laptop computers, PDAs, cell phones, portable drives must be secured Protection is available Passwords Encryption LoJack for Laptops Apps like Lookout Be wary of public PCs

31 Don t expose hard drive contents Wiping deletes data Darik s Boot and Nuke Don t forget mobile devices

32 Backup is fundamental What are the essential elements? What about online back-up of computer data? Is it ethical? Is it secure? How do I select a vendor?

33

34

35 Offline options Security (encryption, physical) Business continuity (export, redundancy) Service level agreement Data migration Corporate maturity (freemium?) Privacy Policy/ Terms of Use

36

37 Thanks! Catherine Sanders Reach, Director Chicago Bar Association Law Practice Management & Technology Phone: Follow

Linkedout and MisTweeted: Ethical Uses of Social Networking in Marketing Your Law Practice

Linkedout and MisTweeted: Ethical Uses of Social Networking in Marketing Your Law Practice Linkedout and MisTweeted: Ethical Uses of Social Networking in Marketing Your Law Practice Micah U. Buchdahl, Esq. HTMLawyers, Inc. PBI Real Estate Institute December 2015 1 SNS Statistics - 2015 SN accounts

More information

The Ethical Obligations of an Attorney When Using Technology

The Ethical Obligations of an Attorney When Using Technology The Ethical Obligations of an Attorney When Using Technology A Cell Phone Does Not Create an Invisible Cone of Silence and Other Adventures on the New Frontier David I. Bloom Partner (202) 263 3204 dbloom@mayerbrown.com

More information

THE ETHICS OF SOCIAL MEDIA

THE ETHICS OF SOCIAL MEDIA THE ETHICS OF SOCIAL MEDIA Successfully Navigating the Digital Terrain presented by NAVIGATING THE SOCIAL MEDIA TERRAIN Continually evolving Great opportunities Risks! WHY SHOULD WE CARE? Can t we just

More information

The Ethos of Lawyers in a Networked World: Privacy, Privilege and Evolving Parameters

The Ethos of Lawyers in a Networked World: Privacy, Privilege and Evolving Parameters The Ethos of Lawyers in a Networked World: Privacy, Privilege and Evolving Parameters Tanya L. Forsheit, Esq., CIPP/US Partner, InfoLawGroup LLP tforsheit@infolawgroup.com Lawyer Use of Technology Recent

More information

SOCIAL MEDIA AND LAW FIRM MARKETING: A REVIEW OF ETHICS GUIDANCE OPINIONS

SOCIAL MEDIA AND LAW FIRM MARKETING: A REVIEW OF ETHICS GUIDANCE OPINIONS SOCIAL MEDIA AND LAW FIRM MARKETING: A REVIEW OF ETHICS GUIDANCE OPINIONS Presented by the American Bar Association Law Practice Division and Center for Professional Development American Bar Association

More information

SOCIAL MEDIA. Featured Expert: Todd C. Scott Vice President of Risk Management. Law Office Technology Series. Minnesota State Bar Association

SOCIAL MEDIA. Featured Expert: Todd C. Scott Vice President of Risk Management. Law Office Technology Series. Minnesota State Bar Association Law Office Technology Series SOCIAL MEDIA Featured Expert: Todd C. Scott Vice President of Risk Management Minnesota State Bar Association www.mnbar.org Social Media If you are an attorney in practice

More information

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners

Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners Discussion of Electronic Discovery at Rule 26(f) Conferences: A Guide for Practitioners INTRODUCTION Virtually all modern discovery involves electronically stored information (ESI). The production and

More information

Tips For Organizing Your Data

Tips For Organizing Your Data Tips For Organizing Your Data NSBS Annual General Meeting June 20, 2008 Luncheon Presentation Deborah E. Gillis, Q.C. Risk and Practice Management Advisor Lawyers Insurance Association of Nova Scotia New

More information

Tips, Tricks and Pointers on. Email, Productivity and Using

Tips, Tricks and Pointers on. Email, Productivity and Using Tips, Tricks and Pointers on Reducing Paper, Managing Email, Productivity and Using Social Networking Debbie Foster Affinity Consulting Group dfoster@affinityconsulting.com What to do with all that paper?

More information

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World

Every Cloud Has A Silver Lining. Protecting Privilege Data In A Hosted World Every Cloud Has A Silver Lining Protecting Privilege Data In A Hosted World May 7, 2014 Introduction Lindsay Stevens Director of Software Development Liquid Litigation Management, Inc. lstevens@llminc.com

More information

ETHICS for Lawyers and Law Firms Using Cloud Technology

ETHICS for Lawyers and Law Firms Using Cloud Technology ETHICS for Lawyers and Law Firms Using Cloud Technology Donna Kirk Seyle ~ Legal Tech Advisor: Law Practice Strategy 108 MONTESANO ST SANTA CRUZ, CA 95062 (831) 332-2243 Donna Seyle is an attorney, author,

More information

South Carolina Bar Resources Inventory as of 6/13/2016

South Carolina Bar Resources Inventory as of 6/13/2016 South Carolina Bar Resources Inventory as of 6/13/2016 ABA Subject Area Practical Subject Area Book Title Book ID Billing and Finance billing and finance Alternative Fees for Business Lawyers and their

More information

Technology in a Law Office

Technology in a Law Office Technology in a Law Office UTK College of Law Fall 2014 Thomas A. Kulaga Knox Patents: Kulaga Law Office, PLLC www.knoxpatents.com 1 I, Tom Kulaga, am a patent attorney with a solo practice. I started

More information

Safe-Guarding Client Information Basic Data Security Training for Lawyers

Safe-Guarding Client Information Basic Data Security Training for Lawyers Safe-Guarding Client Information Basic Data Security Training for Lawyers Sponsored by the Law Practice Management Committee of The New York State Bar Association John R. McCarron Jr, Esq. Partner, Montes

More information

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS

Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS Case 2:14-cv-02159-KHV-JPO Document 12 Filed 07/10/14 Page 1 of 10 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF KANSAS KYLE ALEXANDER, and DYLAN SYMINGTON, on behalf of themselves and all those

More information

Outline of Session 12/2/2013. Social Media & Government Legal and Ethical Issues. Part 1 - Legal Issues More Questions than Answers?

Outline of Session 12/2/2013. Social Media & Government Legal and Ethical Issues. Part 1 - Legal Issues More Questions than Answers? Social Media & Government Legal and Ethical Issues Indiana Legal & Ethics Conference December 4, 2013 Presented by: Julie A. Tappendorf Ancel Glink, Chicago Outline of Session Part 1 Legal Issues with

More information

BYOD: BRING YOUR OWN DEVICE

BYOD: BRING YOUR OWN DEVICE BYOD: BRING YOUR OWN DEVICE PART 5 OF THE LAW PRACTICE MANAGEMENT SERIES Sarah Banola Cooper, White & Cooper LLP James Y. Wu Law Office of James Y. Wu Bring Your Own Device (BYOD)Trend Increased use of

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

Hanging Out a Shingle: Technology Every Solo Needs. Presented by: Nicholas B. Proy

Hanging Out a Shingle: Technology Every Solo Needs. Presented by: Nicholas B. Proy Hanging Out a Shingle: Technology Every Solo Needs Presented by: Nicholas B. Proy Biography Solo attorney Network administrator for 12+ years Practice law in Maryland, Pennsylvania and Washington, D.C.

More information

E-Discovery Tip Sheet

E-Discovery Tip Sheet E-Discovery Tip Sheet Redaction Exposed When we talk about reserving material from document production, we generally think about two main strategies: 1. withholding documents under a claim of privilege,

More information

Legal Services Corporation Baselines: Technologies That Should Be in Place in a Legal Aid Office Today (Revised 2015)

Legal Services Corporation Baselines: Technologies That Should Be in Place in a Legal Aid Office Today (Revised 2015) Legal Services Corporation Baselines: Technologies That Should Be in Place in a Legal Aid Office Today (Revised 2015) At the NLADA Technology Section meeting during the 2013 Equal Justice Conference, a

More information

GENERAL TRAINING ACCOUNTS

GENERAL TRAINING ACCOUNTS GENERAL What is Box at Fresno State? Box at Fresno State is a simple, reliable, and secure online file storage and sharing service. Box provides secure access to files at work, off campus and from most

More information

Encrypted Email Users Guide. Revised 6/8/2015

Encrypted Email Users Guide. Revised 6/8/2015 Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading

More information

Secure Mail Message Retrieval Instructions

Secure Mail Message Retrieval Instructions 2015 Secure Mail Message Retrieval Instructions IT Security University Medical Center 1/26/2015 Table of Contents INTRODUCTION... 3 REGISTRATION MESSAGES... 3 RETRIEVING THE SECURE EMAIL... 4 SECURE MESSAGE...

More information

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions

It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions It s 2 o clock: Who Has Your Data? Josh Krueger Chief Technology Officer Integrity Technology Solutions Your home is your business and your farm is your network. But who has access to it? Can you protect

More information

THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2012-186

THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2012-186 THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2012-186 ISSUE: DIGEST: AUTHORITIES INTERPRETED: Under what circumstances would an attorney

More information

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release)

LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) CHARLES LUCE S LAWYERING IN THE CLOUD CRIB NOTES 2012 Charles F. Luce, Jr. coloradolegalethics.com/ (alpha release) A. Cloud Computing Defined: n. A loosely defined term for any system providing access

More information

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

Beginners Security Basics Presentation. Presented by Tom Crittenden RASCALs 2015

Beginners Security Basics Presentation. Presented by Tom Crittenden RASCALs 2015 Beginners Security Basics Presentation Presented by Tom Crittenden RASCALs 2015 What we ll Discuss This will be mostly about you your practices and things you can do (or not do). Safe (at least safer)

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

How to Register for the Heart Walk

How to Register for the Heart Walk 1. Click Register and Join Heart Walk How to Register for the Heart Walk 2. Step 1: Start a Team, Join a Team, Join as Individual Click Start a Team if you want be a team captain and recruit walkers to

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Your Content refers to the information that you wish to transfer using our Services.

Your Content refers to the information that you wish to transfer using our Services. Philips Secure Data Transfer Terms of Service th Revised: May 10, 2012 Thank you for using Philips Secure Data Transfer. These terms of service (the Terms ) govern your access to and use of Philips Secure

More information

Fine Tuning Desktop Security Presented by J Abernethy & Josh Quinn

Fine Tuning Desktop Security Presented by J Abernethy & Josh Quinn Fine Tuning Desktop Security Presented by J Abernethy & Josh Quinn Presenter: J Abernethy Practice Manager of Legal Applications mindshift, a Ricoh Company Presenter: Josh Quinn Manager, Desktop & Application

More information

Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel?

Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel? Going Mobile: Are Your Company s Electronic Communications Policies Ready to Travel? By Kathleen M. Porter Computers have dotted office desks for decades, and the Internet and e-mail have been common workplace

More information

Ethics & Social Media With A Hint Of Privacy Law

Ethics & Social Media With A Hint Of Privacy Law Ethics & Social Media With A Hint Of Privacy Law Ethics Program Debra Bogo-Ernst, Mayer Brown Michael Lackey, Mayer Brown Speakers dernst@mayerbrown.com T +1 312 701 7403 F +1 312 706 8474 mlackey@mayerbrown.com

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

Research Support Council (RSC) - What Data is Sensitive and How

Research Support Council (RSC) - What Data is Sensitive and How Research Support Council (RSC) - What Data is Sensitive and How Do We Keep it Private? John L. Baines, AD IT Policy & Compliance Tuesday, May 14, 2013 9:00 am 9:30 am Witherspoon Student Center John_Baines@ncsu.edu

More information

Job Streaming User Guide

Job Streaming User Guide Job Streaming User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 08 2006 TOPS JS AA 3.2.1 The names of actual

More information

THE TOP LEGAL TECHNOLOGIES

THE TOP LEGAL TECHNOLOGIES THE TOP LEGAL TECHNOLOGIES Ellen Freedman, CLM Law Practice Management Coordinator Pennsylvania Bar Association THE TOP LEGAL TECHNOLOGIES Table of Contents 1. Speaker biography 2. PowerPoint presentation

More information

An Introduction to the Technology and Ethics of Cloud Computing. Jack Newton Co founder and President Themis Solutions Inc. (Clio)

An Introduction to the Technology and Ethics of Cloud Computing. Jack Newton Co founder and President Themis Solutions Inc. (Clio) An Introduction to the Technology and Ethics of Cloud Computing Jack Newton Co founder and President Themis Solutions Inc. (Clio) what is software-as-a-service? traditional computing model The Internet

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

AWEBDESK LIVE CHAT SOFTWARE

AWEBDESK LIVE CHAT SOFTWARE AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.2 January 2014 Page 1 TABLE OF CONTENTS Introduction.......... 4 Sign In as Admin...5 Admin Dashboard Overview.

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Corporate Presentation 2016

Corporate Presentation 2016 Corporate Presentation 2016 2 AGENDA About SPAMINA Cool Vendor 2016 The Security Challenge 3 Concerns over data protection and confidentiality Why Spamina? SPAMINA Platform 4 Parla Secure Cloud Email ParlaMI

More information

NEW JERSEY OFFICE OF ATTORNEY ETHICS ESI & ETHICS OCTOBER 6, 2015 RONALD J. HEDGES

NEW JERSEY OFFICE OF ATTORNEY ETHICS ESI & ETHICS OCTOBER 6, 2015 RONALD J. HEDGES NEW JERSEY OFFICE OF ATTORNEY ETHICS ESI & ETHICS OCTOBER 6, 2015 RONALD J. HEDGES 1 A SHORT INTRODUCTION TO ESI & ediscovery 2 MATERIALS R.J. Hedges, Electronic Discovery: Trends & Developments Under

More information

EMPLOYEE SELF-SERVICE DIRECT DEPOSIT PROCEDURES

EMPLOYEE SELF-SERVICE DIRECT DEPOSIT PROCEDURES EMPLOYEE SELF-SERVICE DIRECT DEPOSIT PROCEDURES STEP 1: To access Employee Self Service, login to Lawson by entering your District User ID and Password. STEP 2: Click on the down arrow next to Employee

More information

Outlook Web App. in Office 365. The Outlook Window. Signing In. (Outlook Exchange Faculty & Staff) Getting Started

Outlook Web App. in Office 365. The Outlook Window. Signing In. (Outlook Exchange Faculty & Staff) Getting Started Outlook Web App in Office 365 (Outlook Exchange Faculty & Staff) Getting Started The Outlook Window Navigation Bar Settings Navigation Pane View Pane Reading Pane Navigation Bar switch between Outlook,

More information

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources

Boston Public Schools. Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and. Technology Resources Boston Public Schools Guidelines for Implementation of Acceptable Use Policy for Digital Information, Communication, and Scope of Policy Technology Resources ACCEPTABLE USE POLICY AND GUIDELINES Boston

More information

escan Comparison (Enterprise, Corporate, SMB, SOHO)

escan Comparison (Enterprise, Corporate, SMB, SOHO) Comparison (,, SMB, SOHO) Version ES-ECSS-221013 Feature Proactive Security Real-Time AV Scanning Winsock Layer Protection Advanced Proactive Detection Anti-Spyware, Anti-KeyLogger, Anti-Rootkit Real-Time

More information

Document Automation in the Cloud Virtual Lawyering on Steroids

Document Automation in the Cloud Virtual Lawyering on Steroids Group Legal Services Association Solo, Small Firm, and General Practice Section 2014 Annual Conference May 1-3, 2014, Las Vegas, Nevada Document Automation in the Cloud Virtual Lawyering on Steroids Friday,

More information

Information Technology Acceptable Use Policies

Information Technology Acceptable Use Policies White Paper: Information Technology Acceptable Use Policies A practical guide for protecting IT assets from the largest single IT Security threat inappropriate use of IT services, including desktops, email,

More information

PDF-IT is the ONE for DIGITAL SIGNATURE

PDF-IT is the ONE for DIGITAL SIGNATURE PDF-IT is the ONE for DIGITAL SIGNATURE Apply digital signature and/or signature image on certificate page with ONE step Digitally/electronically sign full-sized and condensed with ONE step Create PDF

More information

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff

CYBER-SAFETY BASICS. A computer security tutorial for UC Davis students, faculty and staff CYBER-SAFETY BASICS A computer security tutorial for UC Davis students, faculty and staff INTRODUCTION This tutorial provides some basic information and practical suggestions for protecting your personal

More information

Avoiding Legal Malpractice Law Suits

Avoiding Legal Malpractice Law Suits Avoiding Legal Malpractice Law Suits Daniel L. Abrams Law Office of Daniel L. Abrams, PLLC 2 Penn Plaza, Suite 1500 New York, NY 10121 Dan@LawyerQuality.com 1 Daniel L. Abrams concentrates his practice

More information

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF

INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF INFORMATION SERVICES SOCIAL MEDIA GUIDE FOR STAFF go.qub.ac.uk/socialmedia WHY ARE SOCIAL MEDIA TOOLS IMPORTANT TO QUEEN S UNIVERSITY? The term social media is used to describe a range of communication

More information

Exchange-based email. Types of email. Why use Exchange for email?

Exchange-based email. Types of email. Why use Exchange for email? Exchange-based email Types of email POP3 Exchange Lotus Notes Squirrel mail Pine They are all pretty basic and limited except Exchange email. Lotus Notes has lots of functionality, but it s a big pain

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Privacy Policy. This privacy policy describes how RiskJockey will use the information collected when you visit the RiskJockey website.

Privacy Policy. This privacy policy describes how RiskJockey will use the information collected when you visit the RiskJockey website. Privacy Policy This privacy policy describes how RiskJockey will use the information collected when you visit the RiskJockey website. This privacy policy does not apply to websites, applications or mobile

More information

Information Technology Acceptable Use Policy

Information Technology Acceptable Use Policy Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Electronic Docket Filings Michigan Public Service Commission Department of Licensing and Regulatory Affairs

Electronic Docket Filings Michigan Public Service Commission Department of Licensing and Regulatory Affairs Electronic Docket Filings Michigan Public Service Commission Department of Licensing and Regulatory Affairs How to Electronically File Documents in Cases Before the Michigan Public Service Commission (E-Dockets

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

Plesk 11 Manual. Fasthosts Customer Support

Plesk 11 Manual. Fasthosts Customer Support Fasthosts Customer Support Plesk 11 Manual This guide covers everything you need to know in order to get started with the Parallels Plesk 11 control panel. Contents Introduction... 3 Before you begin...

More information

Email Migration Manual (For Outlook Express 6)

Email Migration Manual (For Outlook Express 6) Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change

More information

Information Security Policy

Information Security Policy Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems

More information

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR

Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Matrix Technical Support Mailer - 72 Procedure for Image Upload through Email Server in SATATYA DVR,NVR & HVR Dear Friends, This mailer will help you configure Email Notification in SATATYA Web Client

More information

Presented by Luke Downing

Presented by Luke Downing Presented by Luke Downing What is the Cloud? Market research 5 key benefits Considerations/Risks ABA rules Questions to asks Q&A Incorporated in 2002 Founded by Luke Downing & Matt Bakey Located in Norfolk,

More information

User s Manual For Chambers

User s Manual For Chambers Table of Contents Introduction and Overview... 3 The Mobile Marketplace... 3 What is an App?... 3 How Does MyChamberApp work?... 3 How To Download MyChamberApp... 4 Getting Started... 5 MCA Agreement...

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Best Practice Guidelines for Legal Information Web Site Providers

Best Practice Guidelines for Legal Information Web Site Providers [The Best Practices Guidelines for Legal Information Web Site Providers were adopted by the ABA House of Delegates in February 2003 at the ABA Midyear Meeting in Seattle, Washington] Best Practice Guidelines

More information

Personal Cloud. Support Guide for Mobile Apple Devices

Personal Cloud. Support Guide for Mobile Apple Devices Personal Cloud Support Guide for Mobile Apple Devices Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 2 Downloading files

More information

Legal Issues in Medical Office Use of Social Media. James F. Doherty, Jr. Pecore & Doherty, LLC Columbia, Maryland

Legal Issues in Medical Office Use of Social Media. James F. Doherty, Jr. Pecore & Doherty, LLC Columbia, Maryland Legal Issues in Medical Office Use of Social Media James F. Doherty, Jr. Pecore & Doherty, LLC Columbia, Maryland Legal Issues in Social Media for Physician Practices HIPAA/State Confidentiality laws State

More information

A Lawyer s Guide to Managing E-Lawyering Risks

A Lawyer s Guide to Managing E-Lawyering Risks A Lawyer s Guide to Managing E-Lawyering Risks from Chubb It s Chubb. Or it s Chance. 2006 Chubb & Son, a division of Federal Insurance Company A LAWYER S GUIDE TO MANAGING E-LAWYERING RISKS Prepared by

More information

Computer Security at Columbia College. Barak Zahavy April 2010

Computer Security at Columbia College. Barak Zahavy April 2010 Computer Security at Columbia College Barak Zahavy April 2010 Outline 2 Computer Security: What and Why Identity Theft Costs Prevention Further considerations Approach Broad range of awareness Cover a

More information

NETWORK SECURITY GUIDELINES

NETWORK SECURITY GUIDELINES NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus

More information

You can attach email accounts to this domain name (eg. sales@acme.com.au or mary@acme.com.au) which also increases your corporate branding.

You can attach email accounts to this domain name (eg. sales@acme.com.au or mary@acme.com.au) which also increases your corporate branding. EMAIL SET UP 1 Your website is placed on the Internet using a domain name (eg. www.acme.com.au). This is your virtual address and it allows people to find your website amongst the millions of websites

More information

E-DISCOVERY BASICS AND ETHICS CHAD MAIN, PERCIPIENT JIM DOPPKE, ROBINSON LAW GROUP ETHICAL ISSUES IN E-DISCOVERY Rule 1.1 Competence Not just knowing about computers or metadata Being able to implement

More information

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Ethical Issues in Contract Drafting/Negotiation

Ethical Issues in Contract Drafting/Negotiation Ethical Issues in Contract Drafting/Negotiation Eric Goldman Santa Clara University School of Law egoldman@gmail.com http://www.ericgoldman.org August 2007 Agenda Conflicts Negotiations Backdating Drafting

More information

Computer Forensics. Securing and Analysing Digital Information

Computer Forensics. Securing and Analysing Digital Information Computer Forensics Securing and Analysing Digital Information Aims What is a computer? Where is the evidence? Why is digital forensics important? Seizing evidence Encryption Hidden files and folders Live

More information

If you have used Outlook Web Access then you will find Zarafa Webaccess very familiar.

If you have used Outlook Web Access then you will find Zarafa Webaccess very familiar. Zarafa Setup Guide The Zarafa server on Igaware allows you to share e-mail, calendars, contacts and tasks via Outlook, on your PDA/Blackberry/Mobile phone or through our Webaccess. The Zarafa Webaccess

More information

HIPAA Compliance Evaluation Report

HIPAA Compliance Evaluation Report Jun29,2016 HIPAA Compliance Evaluation Report Custom HIPAA Risk Evaluation provided for: OF Date of Report 10/13/2014 Findings Each section of the pie chart represents the HIPAA compliance risk determinations

More information

Handling Credit Card Responsibly. SEAS Information Security Office

Handling Credit Card Responsibly. SEAS Information Security Office Handling Credit Card Responsibly SEAS Information Security Office 1 University Credit Cards Harvard University credit cards include: Purchasing Cards Corporate Cards 2 Credit Card Holder s Responsibilities

More information

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare

More information

Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More

Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More Presenting a live 90-minute webinar with interactive Q&A Overcoming Ethical Challenges for Multi-Firm Lawyers and Their Firms: Fiduciary Duty, Conflict, Fee-Splitting and More TUESDAY, SEPTEMBER 16, 2014

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS

COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS COURT OF QUEEN S BENCH OF MANITOBA PRACTICE DIRECTION GUIDELINES REGARDING DISCOVERY OF ELECTRONIC DOCUMENTS Introduction While electronic documents are included in the definition of document contained

More information

TECHNOLOGY ACCEPTABLE USE POLICY

TECHNOLOGY ACCEPTABLE USE POLICY Policy Statement TECHNOLOGY ACCEPTABLE USE POLICY Reason for Policy/Purpose The purpose of this policy is to provide guidelines to the acceptable and ethical behavior that guides use of information and

More information