Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client's information as well. Fortunately, easy-to-use options are available today for encryption.
Social media sites such as Facebook, Twitter and LinkedIn have become part of every lawyer’s daily life, and they can be helpful tools for expanding your professional presence and marketing your practice, as well as valuable investigative tools. But the same ethical rules that govern lawyers’ conduct also apply to their use of social media, and that can raise some concerns for lawyers in their use of these tools.
This webinar will focus on the ethical use of LinkedIn as a ma
Lawyers have an ethical duty to be competent and to keep their client data confidential. Clients too want to keep their confidential data protected. All too often, information security is not prioritized by law firms. It costs money to protect data and businesses frequently resist budgeting for security, even though an ounce of prevention is far less expensive than a pound of cure. Investigating a
The adage that all publicity is good is not always true. The press is filled with stories about how lawyers end up in hot water by filing improperly-redacted documents, disclosing confidential information to family and friends, and allowing technological ignorance to prejudice clients.
Attendees will learn about the ethical pitfalls of the mobile, cloud and everyday law office computing. In this program, attendees will learn about cloud options and address how to safely store documents, data and programs in the cloud and on mobile devices.
Learn what programs and features you should & must use in cloud storage options like Dropbox, Box & OneDrive.
In an age where lawyers frequently conduct business across wireless networks using smartphones and laptops, how can attorneys safeguard client data and confidential information? This second edition of Locked Down explains the wide variety of information security risks facing law firms and how lawyers can best protect their data from these threats--with any budget. Written in clear, non-technical language that any lawyer can understand, this book will help you:
Lawyers looking for evidence need to start thinking about looking "virtually." With increasing amounts of "paperless" information being added to the Internet every minute of every day, there is an increasing chance lawyers could find potentially relevant evidence there. Evidence to prove or refute a point in contention, get the upper hand in a settlement conference, or decide w
Microsoft Word includes powerful tools to create the highly formatted documents attorneys must create. Microsoft Word combines font and paragraph formatting into something called Styles. Styles are applied to all text whether you want them or not; and there is no way to turn off the feature.
You no longer have to purchase software and servers for your office. Today, you can rent software or server access via the Internet and thereby avoid any up-front costs. This process is often referred to as "moving to the cloud."
Of course, your client data would also be stored on the rented or hosted servers. In this seminar, we'll explain the associated pros, cons, risks...
The practice of law is based on relationships – with clients, potential clients and referral sources. Personal networking is the best way to create and sustain those relationships. Unfortunately, many lawyers will do anything to avoid networking. The key to successful networking is to find the networking method that matches your personality – the one that makes you feel the most...