One of the most overlooked aspects of security is training for employees. Employees are unwittingly involved in more than 80% of successful attacks. It has never been more critical for organizations to implement effective risk mitigation strategies, enhance security posture and protect information assets – which is hard to do without educating your employees.
This is very important training
Law and medicine were always the pair: well-respected professions, pathways to middle class (or better!) comfort, and laggards with technology. Whether you went to a doctor’s office or a lawyer’s office, paper ruled the day. But that’s changing. One of the last bastions of “paper is king” is the executed document – “wet” signatures serving as proof ...
The Rules of Professional Conduct indicate that an attorney who possesses unprivileged information that a judge has violated the Rules of Judicial Conduct shall inform the appropriate authority. And it is professional misconduct for a lawyer to knowingly assist a judge in conduct that is a violation of applicable rules of judicial conduct. Therefore, it is incumbent for every attorney ...
Learn the ins-and-outs of collecting, analyzing, and recovering evidence from mobile devices. Discover how digital forensic capabilities have grown by reviewing real-world situations. What seems hidden may be revealed after all. Game on!
Participants can expect to learn the following during this session:
• Explore forensic process from preservation to reporting.
• Identify the latest types...
Join veteran attorney Cindy Sharp and certified contemplative practices teacher and attorney Becky Howlett as they unpack age bias in the legal field—what it is, why it matters, and ways to enhance collaboration across all age levels. Addressing ageism in the legal profession can strengthen cross-generational collaboration, meaning better service for clients and more fulfilling workplaces ...
Encryption is now a generally accepted security measure for protecting confidential data – both when stored and transmitted. Data breaches have become a common occurrence, and hackers cannot only get confidential details about a case or deal, but steal your client's information as well. Fortunately, easy-to-use options are available today for encryption.
Smartphones are in reality powerful computers that store massive amounts of data, potentially including information that lawyers are required to keep confidential under the Rules of Professional Conduct, such as client names, dates of birth, Social Security numbers, and other information.
This program will discuss the data stored by smartphones, and the dangers created by apps that can access ...
In this program, attorney/songwriter Jim Jesse discusses the unique issues faced when representing an organization as a client, particularly one as unique as a musical group. in this case, Jesse uses The Beatles and Rolling Stones as examples. Picture yourself as General Counsel for the two biggest bands in the world. And there's plenty of overlap between the two bands...
Ethical conduct is a key to being an effective attorney. Each week we read about disciplinary cases where attorneys are suspended for misconduct involving clients, the courts, or other attorneys.
In this presentation we examine disciplinary cases involving the misuse of social media and the types of conduct that result in disciplinary action and suspensions. We will examine the rules of professional...
“Many lawyers use Facebook®, the world’s most popular social networking platform, to communicate with friends and family across the globe. But lawyers are missing a major opportunity if they do not consider the business possibilities of their Facebook® accounts. With a few simple steps, lawyers can harness Facebook® to market their services, grow their practices,
Note: Attendance at approved live course events are required to be reported by the Maine State Bar Association (course sponsor) to the Board of Overseers within 30 days following the program. Certificates of completion are for attorney records only and should not be submitted individually to the Board and will not be accepted by the Board.