Category: Technology

AI and Real World Ethics

Ethics and Technology on the Cutting Edge

By Edward McIntyre

Slowly — as though pushing through a parting cloud — some of us only now are beginning to realize that AI (artificial intelligence) is shaping, and likely will dominate, our lives and futures. Well beyond our expectations. Beyond our imaginations, even. Yet this is the precise environment that California Western School of Law’s Second Annual Legal Ethics Symposium sought to tackle — with the added dimension of its ethical implications. Read More

4 Tips for Securing Mobile Devices

By Adriana Linares

In today’s world, it’s common, if not downright expected that you and your support staff use mobile devices to timely communicate with clients and access firm documents and resources. While this may be great for productivity and reacting to client needs while away from the office, the influx of laptops, tablets and mobile phones in the workplace can pose a significant risk to a firm’s data if they are lost or stolen. On top of that, California, like most other states, has breach notification laws that require all business entities (yes, law firms included) to report breaches that may have lead to the unauthorized access of “personally identifiable information” of 500+ California residents (if your practice is multi-jurisdictional you’ll have to comply with those state laws too). Read More

The General Data Protection Regulation

By William Marshall

The General Data Protection Regulation (GDPR) is the European Union’s new data protection law. It was passed in the spring of 2016 and following a two year grace period, and enforced on May 25, 2018, replacing the current Data Protection Directive in effect since 1995. The purpose of the GDPR is to provide a single uniform law governing the protection of personal data across the European Economic Area (the EU plus three other European countries) replacing the individual national laws passed under the 1995 Directive.  The GDPR was also intended to clarify, strengthen, and modernize data protection, particularly given the profound changes since 1995 in how personal information is collected and processed on the Internet and otherwise. Read More

Legal Ethics and Portable Electronic Devices: Some Basic Considerations

By Eric Deitz

The utility, portability and convenience of laptops, tablets and smartphones make them an integral part of our daily practice lives, but our reliance upon and the ubiquity of these devices requires us to be mindful of the ethical considerations affecting their use. This is particularly true when an electronic storage device contains privileged or confidential client information and is lost or stolen. Read More

Cryptocurrency in the Law & Tax Considerations

By Julie Houth

Cryptocurrency has recently caught the attention of the public and government regulators. Since then, most people have heard the term cryptocurrency and more specifically, Bitcoin. There are some people who believe it is a form of currency. Other people don’t know enough about it to have an opinion. Attorneys as legal advocates and advisers are confronted with the fact that some of their clients may own or would like to invest in cryptocurrency. This article is intended to provide a brief summary about cryptocurrency and the tax consequences that should be considered.

What Are Cryptocurrencies and Where Do They Come From? Read More

Elementary Cybersecurity: 7 Basic Precautions Every Lawyer Should Consider

By Bill Kammer

Most commentators believe that the bad guys are becoming more sophisticated while cybersecurity defenses are not keeping up with the threats. Our profession is vulnerable because many lawyers don’t like math and don’t benefit from in-house IT support or the resources of cybersecurity professionals. Lawyers continue to be soft targets in the possession of valuable financial and client material. We must reasonably try to avoid responsibility for losing that data, and those efforts should include these seven basic steps.

1. Determine Whether or Not You and Your Staff Have Been Hacked.

Almost daily we read of another company or website such as Target or Equifax whose stored personal information has been stolen and is now for sale on the dark internet. For years, many used work emails to conduct personal business because we had no other reliable email accounts. If any legacy account were hacked, our usernames, email addresses and passwords have been compromised. The simplest way to check is the website https://haveibeenpwned.com. Enter any username or office email address into that search engine, and you will learn whether you have been part of a prior named compromise. That should serve as an initial warning to cease use of all passwords you may have used for those accounts.

2. Beef Up Your Passwords.

A recent headline read “Lackadaisical Employee Attitudes to Cyber Security are the Biggest Risks to Enterprises.” Poor passwords are common and prone to security breaches. The risk is real: 43 percent of login attempts are malicious. But that risk can be solved: length is everything. Our offices should never allow passwords of less than 10 or 12 characters. The longer the better, and you can even use passphrases to avoid the challenge of remembering indecipherable passwords.

3. Use a Password Manager.

Lawyers should never use the same password on multiple sites. However, avoiding redundancy will tax your memory and resources. The simple way around that is a password manager that allows use of a different password for all sites of any consequence. That avoids having to memorize anything other than a master password used to open the manager. Two managers frequently recommended are 1Password and LastPass, and they are inexpensive or even free.

4. Encrypt Everything.

All of the data and documents on office systems should be encrypted . If the bad guys somehow gain access to your data, it will be relatively worthless without the key to your encrypted files. Encrypt your communications and the documents you attach to them, particularly those sent to your clients. Ensure that all of your mobile devices, laptops, phones and tablets are encrypted. We have all heard stories of lost or stolen phones or laptops and the consequences to clients, attorneys and reputations. Finally, encrypt all of the USB drives you and your staff use. A recent study found that 8 out of 10 USB drives used by employees are unencrypted. Easily lost, those devices can contain valuable and confidential client and attorney data.

5. Use a VPN.

Whenever we travel, we probably use public Wi-Fi. We can expose data, passwords and credentials to hackers monitoring or intercepting that network traffic. A virtual private network is the simple solution. Some VPNs such as TunnelBear are free. Others, perhaps more robust and with better options, are reasonably inexpensive. When you have your VPN in place, all of your communications across public Wi-Fi networks are encrypted, and the threat of compromise is diminished.

6. Use Two-Factor Authentication.

We are probably familiar with two-factor authentication because it has been imposed upon us by the banks and financial firms we deal with. Two-factor authentication requires not only a user name and a password to log into a site, but then a second entry of a code received by some other means, usually a text message. Even if your primary credentials have been hacked or stolen, the thief must also have your mobile phone to overcome the barrier posed by two-factor authentication. If we remotely log into our office networks, we should never do so without using two-factor authentication.

7. Be Aware of Cloud Site Security.

Many are switching to cloud-based applications for the creation and storage of professional documents. Similarly, many use cloud sites to exchange electronic discovery or to transmit documents to and from clients. Use due diligence from the outset to determine whether those applications or sites are password-protected, require two-factor authentication and store the data in an encrypted form.

These tasks don’t get easier. For instance, many have only recently discovered the pervasive use of email tracking, particularly by merchants such as Amazon and social media sites such as Facebook. The emails we receive and read contain no apparent indication that information about the receipt or the opening of an email message is being sent back to the originator. Current estimates suggest that 80 percent of commercial email contains trackers and almost 40 percent of private email does also. Claims that someone never received an email or never read it are belied by the tracking information returned to the sender.

We all have ethical and professional responsibilities to safeguard our clients’ data, and we should be motivated by business instincts to protect our own data in the same fashion. Sound cybersecurity practices will also ensure that you can pass client inspections or audits to determine whether the clients feel we are a security risk and subject to the compromise of their strategies or confidential information. It’s not just good housekeeping — it could mean professional and business survival.

Bill Kammer is a partner with Solomon Ward Seidenwurm & Smith, LLP.

This article originally appeared in the March/April 2018 issue of 

San Diego Lawyer Read More

Your Virtual Front Door

By Philip Mauriello Jr.

In the age of social media, it seems everyone is obsessed with their personal image. For good reason too, we are viewed through our phone and computer screens. When people are looking for you, they often Google you, or they check out your Facebook or Linkedin profile. The image you put out there on the “world wide web” is usually your first impression whether you know it or not.

The same is true for attorneys when it comes to their websites. While it is still common practice to acquire clients via referral and word of mouth, your virtual presence is just as important. When clients are looking for an attorney, they often whip out their phones and punch into Google what they are looking for. What they are met with is a long list of attorney websites.

How do they choose? Well they can read through every single website and hope they find something they like. They can go on Yelp or Avvo to see what people think of certain attorneys. Or they can be blown away by your website and click the “call us now” button to immediately get in contact with you.

This brings me to my three principles that I think every attorney should adhere to when they are building out their website.

First, convey your unique message. Every law firm or solo is different. Personal Injury Attorney A and Personal Injury B most likely have the same set of skills. They both have a certain amount of damages they have collected for their clients. But the difference is what kind of attorney you are. Are you an aggressive litigator who stops at nothing to get the job done? Are you friendly and consoling to your clients? Do you have a personal touch? These are things that set you apart from the sea of other attorneys in your area and help you connect with your potential clients. So think hard about what message you are putting out there.

Second, make your website appealing and informative with less words. People consume a lot of information throughout the day, and most of it is in the form of tweets, images, and short updates. They are conditioned to take in information in small bits. So it doesn’t benefit you to have ton of words on your site for the potential client to read. They want to get a good feel for your firm quickly. The more efficiently you can convey your firm’s capabilities with less words the better.

Finally, and most importantly, include lots of “calls to action”. A call to action is asking the potential client to “call now” or “fill out a form to contact us for a free case evaluation”. You have to make it incredibly easy for potential clients to reach you. A number or email address in the footer of your website is not enough. I suggest including a contact form on every page at minimum. This is not a situation where you want to skimp, you want to give them plenty of options to contact you at every turn. Also don’t forget to make every number on your site a linked “click to call” function. Most people search on their phones, and the easier they can hit that number and call you the faster you get in contact with your next client. Bonus tip, always make sure your website is mobile optimized because so many people do search on their phones, and making it friendly to their phone will help them contact you faster.

Your firm’s website is like the “virtual” front door to your business. They get an impression from the minute they log onto your site. If it looks old and outdated, most people will think twice. If you aren’t taking the time to update or care for your site, what else are you not taking care of in your business? Think hard about the message you are putting out there. Make sure to put forth a great first impression so these potential clients are pushing the “contact us now” button and not the “back” button.

Philip Mauriello Jr. is a graduate from Thomas Jefferson School of Law.

This article originally appeared as part of the 

SDCBA Business & Corporate Law Section’s column series Read More