NYSTLI Online Store

 

 

CLE FOR REAL TRIAL LAWYERS, BY REAL TRIAL LAWYERS

The state’s BEST CLE PROVIDER is now even better! The credits you need, the quality you need, and the convenience you deserve. Choose from Live Seminars, CD, DVD, On-Demand 24/7, and our all new instantly downloadable audio files!

  • Search the NYSTLI Online Store here
  • Download a full listing of NYSTLI Courses here
  • Browse the store categories below (scroll all the way down) 

If you have any questions about finding the right course for you, contact our CLE staff at (212) 349-5890 or cle@nystla.org. We are here and happy to help!

 

 

 

 

 

Store Home       View Cart/Checkout       My Purchases       Search
Store Categories
» Auto (5)
» CPLR (2)
» Damages (6)
» Ethics (4)
» Evidence (1)
» General (20)
» Labor Law (2)
» Law Office (2)
» MISC (7)
» Municipal (1)
» Updates (19)
DATA/CYBER SECURITY FOR LAWYERS; SAFEGUARDING YOUR CLIENTS' INFORMATION AND PROTECTING YOUR FIRM



Details

Date: 05/09/2016

2 Law Practice Management CLE CREDITS

This seminar has been approved for transitional and non-transitional credits.

 

Coming to Long Island!

 

I.     IDENTIFYING THE THREAT                                                                                         

A.         Electronically stored data

             1.          Individual desktop, laptop or tablet computers

             2.          Smartphones

             3.          Onsite servers, offsite or “virtual” servers

             4.          The Cloud

B.         Hard copy, paper-based data, stored onsite or offsite

C.         Data held outside of the firm’s control

             1.          Partners’ & employees’ personal devices;  the "family computer"

             2.          Use of Wi-Fi networks; secure and unsecure

             3.          3rd-party vendors, including electronic discovery

 

II.         TYPES OF DATA HELD BY LAW FIRMS                                                         

A.         Attorney-client privilege; privileged documents and email communications

B.         Case/litigation strategy, including settlement parameters

C.         Intellectual property

D.         Information about non-clients

            1.             Adversaries

            2.             Witnesses; expert and otherwise

            3.             Employees

            4.             General business data, including financials and

                            banking information

 

III.        ETHICAL AND LEGAL OBLIGATIONS FOR LAW FIRMS                                               

A.         Legal requirements, state-by-state

B.         Ethical obligation to safeguard data

             1.          What is a reasonable standard of care?

             2.          Is failure to protect data subject to disciplinary action?

             3.          Is failure to protect data considered legal malpractice?

C.         Governmental inquiries and investigations

D.         Does your firm have a written information security policy? 

             When was it last reviewed?

 

IV.       SOURCES OF A DATA BREACH                                                                     

A.        Offshore cyber-criminals; hackers - “The Boogeyman”

B.        Internal, inadvertent

C.        Internal, malicious

D.        Lost devices; the smartphone in the back of that taxicab

E.         Wireless communications; coffee shop Wi-Fi

 

V.        AFTER A DATA BREACH; NOW WHAT?                                                         

A.        Reporting obligations; to whom and how quickly?

B.        Notifying the Courts; adversaries

C.        Reputational issues; crisis management

            

VI.       I.T. SYSTEMS AND POLICIES; AN OUNCE OF PREVENTION                         

A.        Why your current I.T. staff/consultants may not have your back

B.        3rd-party security audits; “White Hats”

C.        Firewalls, anti-spam, anti-malware; who can keep track of all of this?

D.        Data encryption: Pros & Cons

E.        Passwords: the good, the bad & the ugly

F.        The Cloud: what is it, exactly?  Is it the answer to all of your concerns?

 

VII.      INSURANCE ISSUES TO CONSIDER                                                                             

A.        Coverage triggers and exclusions

B.        Coverage available under commercial general liability?

C.        What about professional liability?

D.        Coverage gaps and overlaps

E.         3rd-party coverage vs. 1st-party coverage

 

 

Faculty:

 

Annamarie Bondi-Stoddard, Esq. -  Chair  

Pegalis & Erickson, LLC

 

Raj Goel

CISSP, Co-Founder & CTO, Brainlink International, Inc.

 

Ryan C. Loughlin, Esq.
Lewis Brisbois Bisgaard & Smith LLP

 

Bruce R. Swicker

Vice President, Lawyers Program, Frenkel & Company