Latest & Greatest – The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms, and Business Professionals

Edited by Jill D. Rhodes and Robert S. Litt  Published by American Bar Association. Cybersecurity Legal Task Force.  KF 318 .A7518 2017  Photo Credit: Helen Hartman

Edited by Jill D. Rhodes and Robert S. Litt

Published by American Bar Association. Cybersecurity Legal Task Force.

KF 318 .A7518 2017

Photo Credit: Helen Hartman

The Law Library’s newest addition to its Legal Tech Collection is The ABA Cybersecurity Handbook. Sponsored by the ABA’s Cybersecurity Legal Task Force, The ABA Cybersecurity Handbook strives to provide attorneys and business professionals with an overview of the many aspects of cybersecurity and some practical considerations in the event of a cyber breach. 

The book begins with some background for aid in understanding a cybersecurity threat and its attendant risks. The writers provide examples of the most common threats and how law firms can address them. There is also an explanation of the cyber network, its organization, and potential threats, and how defensive systems work and respond to perceived threats. There is a discussion of the lawyer’s obligation to provide data security under the ethics rules and ABA formal opinion 477R and some advice as to when the lawyer should discuss the issue of cybersecurity with her client. The book concludes with some best practices for becoming prepared through international business community management system series of standards and the international information security management system series of standards. The authors also address the cyber-related challenges faced by large law firms, solo practitioners and small firms, in-house counsel, government lawyers, and public interest attorneys. 

No one is immune from the increasing number of cyber threats and breaches and the confidential data that can be targeted in these attacks. The cost of being prepared is minimal compare to the cost of corrupted data and loss of trust. The ABA Cybersecurity Handbook can help you become better prepared.

Other titles on this topic include: Encryption Made Simple for Lawyers, Locked Down: Practical Information Security for Lawyers, and Technology Tips for Lawyers and Other Business Professionals.

Renewed On-Demand Learning Opportunities from the Legal Tech Institute

The Legal Tech Institute at Harris County Law Library is happy to announce that one of the most popular programs in our LTI Lecture Series is once again available on the LTI On-demand Learning page. The Robot Lawyer: Artificial Intelligence in the Practice of Law can be viewed on our YouTube channel, accessible via our Legal Tech Institute web pages. Licensed Texas attorneys can earn 1.0 hour of CLE credit from now until September 30, 2019. Guest speaker, Saskia Mehlhorn, Director of Knowledge Management & Library Services for Norton Rose Fulbright US, provides a basic overview of AI in the legal profession, gives specific examples of tools that incorporate AI technology, and discusses opportunities for lawyers and other legal professionals to benefit from the power of AI technology.

While visiting our On-demand Learning page, be sure to check out our other recorded CLE programs, which carry a total of 3.0 hours of CLE credit and .75 hours of ethics credit. Included in the series are the following:

Finding & Formatting Legal Forms (1.0 hour CLE)

Legal Practice Technology (1.0 hour CLE)

The Ethics of Cloud Computing (1.0 hoiur CLE, .75 hour ethics)

The Robot Lawyer (1.0 hour CLE)

Don’t forget that we also offer a Hands-on Legal Tech Training session every Thursday at 2:00 pm in the Law Library’s Legal Tech Lab. Join us!

Celebrate the Texas Day of Civility in the Law by Earning Free CLE Credit in Ethics

ETHICS.jpg

Tomorrow, Friday, April 20, is the Texas Day of Civility in the Law. The State Bar of Texas calls upon legal professionals to observe this day by reaffirming their commitment to the Texas Lawyer's Creed, which calls for attorneys to conduct themselves with courtesy and professionalism toward judges, adversaries, peers, colleagues, and clients.

Local bar associations across the state will be celebrating, marking the day with a variety of events, several of which will offer free CLE credit in ethics.

The Dallas Bar Association, along with the Dallas Bar Foundation, American Board of Trial Advocates, AlixPartners, Inns of Court, and the State Bar of Texas Professionalism Committee will be hosting the Day of Civility at the Belo Mansion in downtown Dallas and offering 4.5 hours of CLE in ethics.

A live stream of the seminar will be available for those who are unable to attend. State Bar President Tom Vick will give the opening remarks. For more information, contact Kathryn Zack at (214) 220-7450 or kzack@dallasbar.org.

The Houston Bar Association will be hosting a number of events as well, including an open CLE video-watching event, the perfect opportunity to earn CLE/ethics credit at no charge. Bring your lunch or snacks the HBA office between the hours of 8:30 am and 4:30 pm to view the videos. The office is located at 1111 Bagby Street, FLB 200, Houston, 77002.

Finally, the Texas Center for Legal Ethics will be offering free online CLE ethics credit online. Topics include The Noble Lawyer and Developing Your Professional Reputation.

Whether you're approaching your birth date and need to earn CLE credit in a hurry, or you'd just like to log your ethics credit now in preparation for your Bar license renewal date, these offerings are excellent opportunities to reflect on professionalism and civility in the law as you learn. 

 

Latest & Greatest – Encryption Made Simple for Lawyers

Normal 
 0 
 
 
 
 
 false 
 false 
 false 
 
 EN-US 
 X-NONE 
 X-NONE 
 
  
  
  
  
  
  
  
  
  
 
 
  
  
  
  
  
  
  
  
  
  
  
  
    
  
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  
   
 
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:8.0pt;
	mso-para-margin-left:0in;
	line-height:107%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
 
   By David G. Ries, Sharon D. Nelson, and John W. Simek  Published by ABA Law Practice Division  QA 76.9 .A25 N455 2015

By David G. Ries, Sharon D. Nelson, and John W. Simek

Published by ABA Law Practice Division

QA 76.9 .A25 N455 2015

Seeking to take the fear out of encryption and what it entails, the authors of Encryption Made Simple for Lawyers set upon the task of proving that encrypting information is not as complicated and difficult as it may seem to those not fully versed in the language of “techspeak”. From its earliest forms, e.g. ciphers and secret decoder rings, encryption has been used to make communications secret and secure, and in this age of cyberterrorism and data breaches, understanding how to encrypt confidential information has taken on even greater importance. The authors begin by explaining, in simple terms, the basics of encryption technology, such as the Data Encryption Standard algorithm, digital certificates, and symmetric and asymmetric encryption before discussing the nuances of encrypting laptops and desktops, smartphones, and portable drives. The authors also stress the need to protect data as it travels through various networks or into the cloud as well as the practicality of securing individual documents.

If you don’t think that you need to encrypt or further secure your documents, you may be mistaken. As the authors readily point out: lawyers have an ethical obligation to keep communications confidential. Encryption Made Simple for Lawyers can help you perform that duty or, at a minimum, convince you that you need to obtain the services of a qualified professional. Don’t wait until a data breach to take action.