Everyone in the office relies on your IT infrastructure to handle the daily tasks that keep your law firm running. You know that everything—literally everything you do– depends on the security, accessibility and reliability of your IT infrastructure.
But if you’re like far too many law firm decision makers, you might have targeted IT as a potential cost-cutting area, and you may be under-managing your system. You may assume that you
Hacks and security breaches can affect any person, any data management system, and any law firm—no matter how large or small. We’ve seen and discussed evidence of this before on the blog, and we’ve stressed an important idea again and again: hackers can be clever and motivated, and no data management system is ever 100 percent safe from bad actors and their hijinks.
But while we tighten our protocols and test
People, by nature, are optimistic creatures, and when business owners– specifically law firms– hear news of a major hack or cyber breach that has the potential to harm thousands of people or disrupt vital infrastructures, we hold onto a cherished belief: that somehow the experience will teach us all something new about cybersecurity, something that will protect us from the next threat.
About a year ago this month, the Equifax credit rating agency announced that its systems had been breached, and the personal data of about 148 million users had potentially been compromised. In the first days and weeks following the attack, the company claimed minimal responsibility for the breach and refrained from acknowledging any suggestions that the intrusion could have been prevented with a stronger
In late November, Marriott officially announced a data breach that may have compromised the personal information of anywhere between 300 and 500 million people. All guests who stayed at one of Marriot’s Starwood-branded hotels during the past four years will likely be affected, and the legal fallout for the company is just beginning.
Though reports indicate that Marriot took the appropriate steps in alerting affected individuals and
If a privileged document is not properly labeled and then inadvertently disclosed to an opposing party during litigation, the result can be a waiver of privilege and serious complications. Consider the case of Rico v. Mitsubishi Motors (2007) 42 Cal.4th 807, which involved a dispute over internal notes that defense counsel created during a deposition strategy session with an expert. He printed a copy of the notes and stored them in his briefcase. When
Can border patrol agents seize or conduct searches of personal electronic devices at U.S. entry points? And what does this mean for attorneys who need to carry their devices with them as they travel in and out of the country? On January 5, 2018, the Customs and Border Patrol Agency released an update to its policy on this subject, the first update since 2009. According to
Cybersecurity and Small Law Firms: Making Data Protection a Top Priority
While most news reports covering cybersecurity breaches tend to focus on large public companies with household names, small firms—even tiny startups—are every bit as vulnerable to the same forms of digital fraud. In most cases, non-public firms are also subject to the same scrutiny by potential investors, careful clients, and the SEC.
If
The need for law firms to be technologically capable is increasing as the world becomes more high-tech. This has caused technology costs at law firms all across the nation to balloon, and there are no signs that this trend is slowing. This means that even small law firms and solo practitioners are going to need a tech solution, especially when it comes to cybersecurity.
News organizations
Have you heard of Hawa v. Coatesville Area School District? This court case involves a claim of racial discrimination by members of a school district against another employee. The case is ongoing, but the judge just handed down a decision that can teach many companies and law firms a valuable lesson about ESI (electronically stored information).
In this case, the school district made a motion to shift costs
How eager is the legal industry when it comes to adopting new technologies? Some may have the impression that things are slow going where the law is concerned. However, particular court rulings have done a lot to push technology forward in the legal sector.
In the court case Zubulake v. UBS Warburg, Judge Shira Scheindlin may not have intended to revolutionize e-discovery. When considering the subject in this 2003
Has your firm ever taken on a medical malpractice case? Maybe you’ve dealt with an auto injury case or an insurance claim. If so, then you have probably had to store protected health information (PHI) on your servers before.
This can make your law firm subject to the regulations laid out in the Health Insurance Portability and Accountability Act (HIPAA) and Omnibus Rule and the Health Information Technology for Economic and Clinical Health Act (HITECH).
E-Discovery tools are becoming ever more important to the courtroom, and there’s no turning back. Judges are beginning to expect every lawyer that steps into their courtroom to have some sort of competency when it comes to e-discovery. Some judges are even calling on law schools to make e-discovery core curriculum. So, how does the practicing lawyer keep up with this ever-changing, yet essential tool?
There is a lot of new legal technology out there promising to utilize the latest innovations to make your firm work smarter and not harder. But before you dive right in to the ocean of technological marvels, there are many questions you need to be asking yourself. Principle among those questions is, how will this tech work at my law firm?
Understanding the Technological Needs of Your Law Firm
Why does your law firm need that
So, you have rolled out new technology at your firm that will improve the way you deliver legal services to your clients. That’s great, but are you utilizing that technology to its greatest effect? Are other members of your practice finding your latest tech solution cumbersome or enlightening? Do you even know how to find out these crucial details?
For technology to provide the success offered by its
When was the last time you worked on a case involving information gathered from social media or text messages? Chances are, not that long ago. As communications mediums change, so, too, do the types of evidence that we present in court. However, it is getting harder to keep up with these new forms of communication and the nuances they entail.
As mobile communications started to include shorter, text-based messages, a
E-discovery is often seen as a revolutionary tool that has changed the way evidence is found, preserved and presented in court. Such a powerful tool has been acknowledged by the court system and has influenced changes to the Federal Rules of Civil Procedure, so the courtroom can take advantage of these advances. So, why do judges feel that attorneys don’t understand e-discovery?
Recently, a study claimed that
The world of technology and innovation has often been described as the Wild West, and with the way the media reports on companies that generate the right kind of “buzz”, it’s no surprise. Pundits and media outlets provide considerable publicity to new technology companies’ claims that their products are going to revolutionize industries, but how much follow-through is there in those claims? Tech companies rise and fall almost on a daily basis in today’s
Technology can provide ways to navigate the most complicated situations that arise in life. This is especially true in the legal field where laws, regulations, and codes can mean the difference between a failure and success. So, it’s no wonder that lawyers are turning to technology to solve an even more complex legal problem—travel.
Your technological tools can come in handy when you are working on the
It’s been almost a year since most of the legal community first heard of Harleysville Insurance Company v. Holding Funeral Home, Inc., et al.,2017 WL 4368617 (W.D. Va. 2017). The effects of this case changed the way the legal world looked at file sharing and e-discovery. However, if you didn’t follow the case long enough, you may have drawn some conclusions that don’t match up with legal ethics.
In Harleysville v.
If you run a law firm, then there is a little secret that you are in on that many people don’t quite understand. A law firm is a business! To keep the practice open, you have to make revenue, and that means satisfying clients, making new clients, and getting the most value out of the work you do. With that in mind, law firms often find themselves affected by business trends. That’s the name
So, you want to bring more technology into your law firm. Great! But doing so is a lot more complicated than simply buying into a platform or software package. There are certain necessary factors that every law firm needs if it is going to go high-tech. Here are three of those factors from the IT professionals at Exactify.IT.
The 3 Factors Involved in Making Your Law Firm High-Tech
Do you know what ransomware is? If not, then you and your law firm could be highly vulnerable when it comes to cybersecurity. Ransomware cuts you, the user, off from data stored on your computer. For a lawyer, this can be devastating, especially if you are about to go to court. Thankfully, there are ways to protect yourself from this new breed of cybercrime.
Last year, a new type of cyberattack became
Our legal system is very large and very complex. In fact, it’s so large that it often takes months or years in order to get things done. For this reason, the promise of technology to increase efficiency and speed in the courts has been lauded by those on the outside looking in. However, what about the professionals working in the legal world? Do they look on technology as favorably as everyone else?
Cybersecurity is an ever-increasing worry for law firms all over the nation. As courts have increasingly come to rely on technology, lawyers have had to increase their technical savvy. However, not all law firms have evolved with the changing times, and that can leave your clients’ data vulnerable when such a firm is a recipient of documents provided through discovery. What’s an attorney to do? File for a protective order…
How many hours do you work that you can actually bill? Do you manage to put in seven or eight billable hours a day, or maybe only three or four? There are so many tasks for the modern lawyer to manage at her firm, especially if the firm is small. If you aren’t able to maximize your billable hours, it could leave your practice with a serious cashflow problem. Luckily, the times are changing,
Secure Sockets Layer, also known as SSL, has become an essential security tool for the modern-day Internet user, yet there are still many websites online that don’t use it. However, that may soon be changing. Google has made an announcement that could change the way most websites are secured. This could be especially important for any modern law firm that has a web presence.
SSL is a security
Do you use a laptop in court? In today’s technological courtroom, the answer to that question is probably yes, so you need that computer to function properly and cause minimal disturbances. If it suddenly starts overheating, smoking or melting, your case could be jeopardized. This is why it’s important for law firms to know about this latest recall from HP, otherwise your laptop battery could blow.
A recall is generally of
While searching the dark web—where anonymously hosted websites run a veritable online black market—cybersecurity firm RepKnight made a startling discovery. It found 1.16 million law firm email addresses, and some 80 percent of those addresses came with passwords. How did this happen, and where did those addresses come from? Experts may not be sure, but they do have cybersecurity recommendations that could help.
How Does Your Law Firm’s Cybersecurity Measure Up?
The white paper released by
From May to July 2017, Equifax was hacked. This data breach exploited a flaw in one of the company’s website applications and may have exposed the personal information of 145.5 million customers. This was thought to be a worst-case scenario for any of the three national credit bureaus, but according to new documents, the Equifax hack may have been even worse than anyone realized.
When Equifax finally revealed the
Only weeks after releasing its all-new state-of-the-art iPhone X, Apple is in the news once more, and this time, it’s not because of the company’s innovations. A report from tech magazine Ars Technica has revealed a startling practice. Has Apple been slowing older iPhone models, and if so, will there be consequences?
The holiday season is over, but the cyber dangers of the season will continue for a few more months. That’s because tax season is now on the horizon, and those who didn’t take steps to protect their identity over the holidays could be in a world of trouble.
For the every day consumer, identity theft is a big concern. It can lead to financial hardship or even ruin. But the
Have you ever heard of the Stored Communications Act (SCA)? Also known as the Electronic Communications Privacy Act, this federal law governs how the government and law enforcement agencies interact with your private electronic data. Signed into law by President Reagan in 1986, the SCA lays the ground rules for when a service provider can release your information to law enforcement. Now, some cracks in
It finally happened, Apple’s latest smartphone—the iPhone X—has stormed retailers, and in many ways, it’s a hit. The phone’s unique design allows more screen to fit into a smaller area, the strongest processor in an Apple mobile device makes it run smooth, and a facial recognition system has replaced the fingerprint scanner that can be found on previous models. However, some of these features are being met with a lot of skepticism, and a
In May 2017, the American Bar Association issued a formal opinion on attorneys’ duty to ensure the security and confidentiality of attorney-client communications. ABA formal opinions are not binding, but are considered highly persuasive authority and given a lot of deference by state bar associations in defining and interpreting their own ethical rules.
The opinion interprets Rule 1.6(c) of the Model Rules of Professional
In May 2017, the American Bar Association issued a formal opinion on attorneys’ duty to ensure the security and confidentiality of attorney-client communications. ABA formal opinions are not binding, but are considered highly persuasive authority and given a lot of deference by state bar associations in defining and interpreting their own ethical rules.
The opinion interprets Rule 1.6(c) of the Model Rules of Professional
Per TechCrunch:
We understand that Saudi Arabia’s Communications and Information Technology Commission, acting on behalf of the Ministry Of Culture and Information, informed Snap that Al Jazeera’s Discover Publisher Channel was in violation of Article 9 of the Saudi law of Printed Material and Publication, and Article 6 of the Saudi Anti-Cyber
Facebook’s recent cooperation with the Vietnamese government is highlighted as part of a larger discussion in the New York Times around the relationship between large tech companies that control increasing amounts of user data and governments that seek access to that data:
While Facebook said its policies in Vietnam have not changed, and it has a consistent process for governments to report illegal content, the Vietnamese government was specific. The social network,
The Department of Homeland Security has issued a directive banning at least six federal agencies from using Kapersky:
Acting Homeland Security Secretary Elaine Duke has issued a directive given at least six federal agencies a timeline to get rid of the software from government networks.
The move comes amid parallel investigations by Congress, and the FBI under Special Prosecutor Robert Mueller into Russian interference in the 2016 presidential election and potential ties between Donald Trump’s
Wired published a scathing indictment of Equifax’s cybersecurity practices and its response to the massive breach that was apparently a result of those practices:
CAPPING A WEEK of incompetence, failures, and general shady behavior in responding to its massive data breach, Equifax has confirmed that attackers entered its system in mid-May through a web-application vulnerability that had a patch available in March. In other words, the credit-reporting giant had more than two
Subscribe to our bi-weekly newsletter for all the latest news and views from the intersection of law, technology, and legal practice.
Let’s find out!
COPYRIGHT © 2017, EXACTIFY.IT LLC. ALL RIGHTS RESERVED.
Stock images are copyright © 2015, WOCInTechChat.com.