2018 SC BAR CONVENTION Breakfast Ethics Sunday, January 21

2018 SC BAR CONVENTION Breakfast Ethics Sunday, January 21

2018 SC BAR CONVENTION Breakfast Ethics Sunday, January 21 presented by The South Carolina Bar Continuing Legal Education Division http://www.scbar.org/CLE SC Supreme Court Commission on CLE Course No. 180813 2018 SC BAR CONVENTION Breakfast Ethics Sunday, January 21 Security Is Only As Good As the Weakest Link: Legal Tech Security Measures Every Lawyer Must Take Barron K. Henley Digital Security Measures Every Lawyer Must Take Barron K. Henley, Esq. [email protected] Affinity Consulting Group, LLC 1550 Old Henderson Rd., Suite S-150 Columbus, OH 43220 614.340.3444 www.affinityconsulting.com ©2017 Affinity Consulting Group Digital Security Measures Every Lawyer Must Take Table of Contents I. Premise of This Seminar ............................................................................................. 1 II. Definitions ................................................................................................................. 1 A. Business Disaster .................................................................................................... 1 B. Disaster Avoidance.................................................................................................. 1 III. Causes of Business Disasters ....................................................................................... 2 A. Data Loss or Data Disclosure................................................................................... 2 1. Human error................................................................................................ 2 2. Hardware failure ......................................................................................... 2 3. Fire or natural disaster ................................................................................ 2 4. Temperature ............................................................................................... 2 5. Virus - ransomware - malware .................................................................... 2 6. Synchronization issues ................................................................................ 2 7. Criminal Acts of Others ............................................................................... 2 8. Malicious acts of employees ....................................................................... 2 B. Natural Disasters ..................................................................................................... 3 C. Fire .......................................................................................................................... 3 D. Power Failure .......................................................................................................... 3 E. Internet Failure ....................................................................................................... 3 F. Death, Disability or Departure of Principal or Key Employee ................................. 3 G. Theft ........................................................................................................................ 3 IV. Your Ethical Duties ..................................................................................................... 4 A. SC RULE 1.1 - Competence ...................................................................................... 4 B. SC RULE 1.1 - Maintaining Competence Comment [6] ........................................... 4 C. ABA MODEL RULE 1.1 - Maintaining Competence Comment [8] ........................... 4 D. SC RULE 1.6 - Confidentiality of Information .......................................................... 4 E. ABA MODEL RULE 1.6 - Confidentiality of Information .......................................... 4 F. SC RULE 1.6 - Comment 19 ..................................................................................... 5 G. ABA MODEL RULE 1.6 Comment 18 ....................................................................... 5 H. SC RULE 1.6 Comment 20 ....................................................................................... 5 Table of Contents Page 2 I. SC RULE 5.1 - Responsibilities of partners, managers and supervisory lawyers .................................................................................................................... 5 J. SC RULE 5.3 - Responsibilities Regarding Nonlawyer Assistants ............................ 6 V. Tools and Protocols To Protect Client Data ................................................................. 7 A. Encryption Defined ................................................................................................. 7 B. Lawyers Must Encrypt Laptops, Tablets and Phones ............................................. 7 1. Duty To Protect ........................................................................................... 7 2. PC Encryption .............................................................................................. 8 a. BitLocker ......................................................................................... 8 b. Mac FileVault .................................................................................. 8 c. SecuriKey Pro .................................................................................. 8 d. Symantec Drive Encryption ............................................................. 8 e. AlertBoot ......................................................................................... 8 f. Folder Lock ...................................................................................... 8 g. SecureDoc Full Disk Encryption ...................................................... 8 3. Smartphones ............................................................................................... 8 4. Tablets ......................................................................................................... 8 C. Email Encryption ..................................................................................................... 8 1. Revisit SC Rule 1.6, Comment 20 ................................................................ 8 2. What The Experts Say ................................................................................. 9 3. Email Encryption Services ........................................................................... 9 a. Protected Trust ............................................................................. 10 b. SenditCertified .............................................................................. 10 c. EchoWorx Encrypted Mail ............................................................ 10 d. Hightail .......................................................................................... 10 e. Hushmail ....................................................................................... 10 f. RMail ............................................................................................. 10 g. ZixMail ........................................................................................... 10 h. ShareFile ........................................................................................ 10 4. Encrypt Email Attachments....................................................................... 10 D. Wireless Encryption .............................................................................................. 10 1. Home or Work Wireless Connections ....................................................... 10 2. Risk of Using Public WiFi ........................................................................... 10 3. How To Protect Yourself ........................................................................... 11 a. Cellphone WiFi Hotspot ................................................................ 11 b. Consumer VPN Services ................................................................ 11 E. Firewall .................................................................................................................. 12 1. What Is a Firewall ...................................................................................... 12 2. Your Obligation ......................................................................................... 12 F. Password Manager ............................................................................................... 12 Table of Contents Page 3 1. What Is a Password Manager ................................................................... 13 2. Why You Need A Password Manager ....................................................... 13 3. Good Options ............................................................................................ 13 a. Dashlane ........................................................................................ 13 b. LastPass ......................................................................................... 13 c. Sticky Password ............................................................................. 13 d. LogMeOnce ................................................................................... 13 e. TrueKey ......................................................................................... 13 f. RoboForm ..................................................................................... 13 g. Keeper Desktop ............................................................................. 13 G. Two Factor Authentication ................................................................................... 13 1. What Is Two Factor Authentication? ........................................................ 13 2. How Do You Get 2FA?

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    92 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us