2018 SC BAR CONVENTION Breakfast Ethics Sunday, January 21
Total Page:16
File Type:pdf, Size:1020Kb
2018 SC BAR CONVENTION Breakfast Ethics Sunday, January 21 presented by The South Carolina Bar Continuing Legal Education Division http://www.scbar.org/CLE SC Supreme Court Commission on CLE Course No. 180813 2018 SC BAR CONVENTION Breakfast Ethics Sunday, January 21 Security Is Only As Good As the Weakest Link: Legal Tech Security Measures Every Lawyer Must Take Barron K. Henley Digital Security Measures Every Lawyer Must Take Barron K. Henley, Esq. [email protected] Affinity Consulting Group, LLC 1550 Old Henderson Rd., Suite S-150 Columbus, OH 43220 614.340.3444 www.affinityconsulting.com ©2017 Affinity Consulting Group Digital Security Measures Every Lawyer Must Take Table of Contents I. Premise of This Seminar ............................................................................................. 1 II. Definitions ................................................................................................................. 1 A. Business Disaster .................................................................................................... 1 B. Disaster Avoidance.................................................................................................. 1 III. Causes of Business Disasters ....................................................................................... 2 A. Data Loss or Data Disclosure................................................................................... 2 1. Human error................................................................................................ 2 2. Hardware failure ......................................................................................... 2 3. Fire or natural disaster ................................................................................ 2 4. Temperature ............................................................................................... 2 5. Virus - ransomware - malware .................................................................... 2 6. Synchronization issues ................................................................................ 2 7. Criminal Acts of Others ............................................................................... 2 8. Malicious acts of employees ....................................................................... 2 B. Natural Disasters ..................................................................................................... 3 C. Fire .......................................................................................................................... 3 D. Power Failure .......................................................................................................... 3 E. Internet Failure ....................................................................................................... 3 F. Death, Disability or Departure of Principal or Key Employee ................................. 3 G. Theft ........................................................................................................................ 3 IV. Your Ethical Duties ..................................................................................................... 4 A. SC RULE 1.1 - Competence ...................................................................................... 4 B. SC RULE 1.1 - Maintaining Competence Comment [6] ........................................... 4 C. ABA MODEL RULE 1.1 - Maintaining Competence Comment [8] ........................... 4 D. SC RULE 1.6 - Confidentiality of Information .......................................................... 4 E. ABA MODEL RULE 1.6 - Confidentiality of Information .......................................... 4 F. SC RULE 1.6 - Comment 19 ..................................................................................... 5 G. ABA MODEL RULE 1.6 Comment 18 ....................................................................... 5 H. SC RULE 1.6 Comment 20 ....................................................................................... 5 Table of Contents Page 2 I. SC RULE 5.1 - Responsibilities of partners, managers and supervisory lawyers .................................................................................................................... 5 J. SC RULE 5.3 - Responsibilities Regarding Nonlawyer Assistants ............................ 6 V. Tools and Protocols To Protect Client Data ................................................................. 7 A. Encryption Defined ................................................................................................. 7 B. Lawyers Must Encrypt Laptops, Tablets and Phones ............................................. 7 1. Duty To Protect ........................................................................................... 7 2. PC Encryption .............................................................................................. 8 a. BitLocker ......................................................................................... 8 b. Mac FileVault .................................................................................. 8 c. SecuriKey Pro .................................................................................. 8 d. Symantec Drive Encryption ............................................................. 8 e. AlertBoot ......................................................................................... 8 f. Folder Lock ...................................................................................... 8 g. SecureDoc Full Disk Encryption ...................................................... 8 3. Smartphones ............................................................................................... 8 4. Tablets ......................................................................................................... 8 C. Email Encryption ..................................................................................................... 8 1. Revisit SC Rule 1.6, Comment 20 ................................................................ 8 2. What The Experts Say ................................................................................. 9 3. Email Encryption Services ........................................................................... 9 a. Protected Trust ............................................................................. 10 b. SenditCertified .............................................................................. 10 c. EchoWorx Encrypted Mail ............................................................ 10 d. Hightail .......................................................................................... 10 e. Hushmail ....................................................................................... 10 f. RMail ............................................................................................. 10 g. ZixMail ........................................................................................... 10 h. ShareFile ........................................................................................ 10 4. Encrypt Email Attachments....................................................................... 10 D. Wireless Encryption .............................................................................................. 10 1. Home or Work Wireless Connections ....................................................... 10 2. Risk of Using Public WiFi ........................................................................... 10 3. How To Protect Yourself ........................................................................... 11 a. Cellphone WiFi Hotspot ................................................................ 11 b. Consumer VPN Services ................................................................ 11 E. Firewall .................................................................................................................. 12 1. What Is a Firewall ...................................................................................... 12 2. Your Obligation ......................................................................................... 12 F. Password Manager ............................................................................................... 12 Table of Contents Page 3 1. What Is a Password Manager ................................................................... 13 2. Why You Need A Password Manager ....................................................... 13 3. Good Options ............................................................................................ 13 a. Dashlane ........................................................................................ 13 b. LastPass ......................................................................................... 13 c. Sticky Password ............................................................................. 13 d. LogMeOnce ................................................................................... 13 e. TrueKey ......................................................................................... 13 f. RoboForm ..................................................................................... 13 g. Keeper Desktop ............................................................................. 13 G. Two Factor Authentication ................................................................................... 13 1. What Is Two Factor Authentication? ........................................................ 13 2. How Do You Get 2FA?