Technology Tuesday's: 1-Hr. Live Webcasts Every Tuesday in August

ICLEF's Law Office Technology Series will be showing a live webcast highlighting technology issues for lawyers and the law office every Tuesday at lunch time (12:15 P.M. - 1:15 P.M.).


_______________________________


Ethics: Security is Only as Good as the Weakest Link - Legal Tech Security Measures Every Lawyer Must Take

1 CLE / 1 E - Tuesday, August 2; 12:15 P.M. - 1:15 P.M. Live Webcast Only!


OVERVIEW: Rule 1.6 stipulates that a lawyer must make reasonable efforts to prevent the disclosure of confidential client information. The comments to Rule 1.6 require lawyers to act competently to safeguard client information and use reasonable safety precautions when transmitting a client communication. The exact meanings of "reasonable efforts," "act competently" and "reasonable precautions" may be subject to debate. However, doing nothing certainly won't meet the standard. The good news is that you don't have to be a security expert or techie to protect yourself and your office. Learn how to cover all the bases of computer, smartphone, tablet, email, wireless and document encryption. We'll also cover the fundamentals of backing up your electronic data. Half of the battle is simply knowing what questions to ask and it's not nearly as complicated as it sounds. Establish best practices in your office to make sure your confidential information remains confidential.


FACULTY: Barron K. Henley, Affinity Consulting Group, LLC, Columbus, OH


_______________________________


Get the Waste Out of Your Practice: How to Apply Lean Six Sigma Principles to a Law Office

1 CLE (NLS) - Tuesday, August 9; 12:15 P.M. - 1:15 P.M. Live Webcast Only!


OVERVIEW: The business of law isn't what it used to be. Clients demand value from their lawyers and are willing to shop around to find it. Lawyers face increasing competition from customary rivals as well as emerging online DIY companies that have commoditized many legal services. These pressures are forcing lawyers to re-examine their practices and processes. Lean Six Sigma is a managerial approach that improves performance by eliminating the waste of physical resources, time, effort and talent while assuring that the work is done right the first time. Waste is defined as anything that doesn't add value in your client's eyes (your perception is irrelevant). In this seminar, you'll learn how to identify and remove the 8 most common types of waste from your practice.


FACULTY: Barron K. Henley, Affinity Consulting Group, LLC, Columbus, OH


_______________________________


Ethics: How to Protect Yourself & Preserve Confidentiality When Negotiating Instruments

1 CLE / 1 E - Tuesday, August 16; 12:15 P.M. - 1:15 P.M. - Live Webcast Only


OVERVIEW: Opposing lawyers routinely email versions of a document back and forth during the negotiation process; and many instruments are never reduced to paper until they’re ready to sign. This approach is unquestionably fast and convenient compared to mailing or faxing paper documents. However, electronic document exchange presents many issues that practitioners need to be aware of and risks to protect against. In this seminar, you'll learn when it's appropriate to use word processor files and when it's appropriate to use PDFs. We'll cover how to track your changes in a document and how to ascertain what changes were made by others (even if there are attempts to conceal those changes). You'll also learn how to add comments and annotations to Word or PDF files, how to lock documents down to prevent further changes, and how to avoid including hidden (and potentially damaging) information in the files you're working with (this hidden information is known as metadata). Finally, using plain email arguably affords you no reasonable expectation of privacy. We'll also discuss your email encryption options which ensure that only the intended recipient can open your emails and/or attachments thereto.


FACULTY: Barron K. Henley, Affinity Consulting Group, LLC, Columbus, OH


_______________________________


Microsoft PowerPoint Power Tips for Legal Professionals

1 CLE (NLS) - Tuesday, August 23; 12:15 P.M. - 1:15 P.M. - Live Webcast Only


OVERVIEW: PowerPoint's use in the legal profession, both in and out of the courtroom, has become nearly invaluable. The course specifically focuses on presentations that are unique to lawyers. The topics contrast starkly with every popular PowerPoint manual on the market today, none of which teaches the features used specifically for the presentation of evidence in the courtroom or how to build a flow chart to explain the benefits of an AB Trust. Just a few of the ways in which PowerPoint can help legal professionals include opening statements and closing arguments in trial, presentations at mediation or arbitration, and presenting complicated legal concepts to clients so they can understand the legal issues involved in their matter. For judges, more and more are using PowerPoint to introduce rules and protocols in the courtroom, and instructions to the jury.


FACULTY: Paul J. Unger, Esq., Affinity Consulting Group, LLC, Columbus, OH


_______________________________


Ethics: How to Develop Your Firm’s Cybersecurity Policy

1 CLE / 1 E - Tuesday, August 30; 12:15 P.M. - 1:15 P.M. - Live Webcast Only


OVERVIEW: Start taking steps today to secure your law firm and your client’s confidential data! Written Information Security Programs (WISPs) are becoming essential in many states that have enacted data protection and business shield legislation. Many cybersecurity insurance carriers covering lawyers are starting to require WISPs. Setting aside legislative and insurance requirements, under the Rules of Professional Conduct, lawyers still must implement safe technologies and processes to safeguard client confidential data. Join us for this very practical session to learn the essential elements of a Written Information Security Program. In this session, we will cover ransomware attacks, phishing schemes, cloud computing, mobile device management, full disk encryption, secure document management, shadow-IT, two-factor authentication, password management, VPNs, anti-virus, backup, user education, and more.


FACULTY: Paul J. Unger, Esq., Affinity Consulting Group, LLC, Columbus, OH




ICLEF • Indiana Continuing Legal Education Forum • Indiana CLE


46 views