MTC:# Why Lawyers Should Embrace Podcasting Conferences: A Gateway to Digital Influence πŸŽ™οΈπŸ’Ό

On my way to orlando for podfest on a brightline train!

In today's digital age, lawyers must adapt to new forms of communication to stay relevant and attract clients. Podcasting has emerged as a powerful medium for legal professionals to showcase their expertise, connect with potential clients, and establish themselves as thought leaders. Attending podcasting conferences, like the recent Podfest 2025 in Orlando I attended, can provide invaluable insights and opportunities for lawyers looking to leverage this medium.

Why Podcast? πŸ€”

Podcasting offers numerous benefits for lawyers:

  1. Improved Internet SEO: Regular podcast content can significantly boost your online visibility.

  2. Establish Authority: Share your legal knowledge and become a go-to expert in your practice area.

  3. Client Connection: Allow potential clients to get to know you and your approach to law.

  4. Networking: Connect with other legal professionals and potential referral sources.

What to Podcast About πŸ—£οΈ

Finding your voice is crucial. Focus on your area of expertise and address common client concerns. Discuss recent legal developments, offer practical advice, or share case studies (while maintaining client confidentiality). The key is to provide value to your listeners while showcasing your knowledge.

How to Podcast 🎧

  1. Format: Choose between solo shows, interviews, or panel discussions.

  2. Equipment: Invest in quality microphones and headphones. Utilize your existing computer and internet bandwidth.

  3. Production: Create show notes and repurpose content for other platforms (e.g., social media snippets).

  4. Consistency: Establish a regular publishing schedule to build an audience.

Where to Publish πŸ“‘

lawyers can enhance their firm’s brand with a podcast!

Popular podcasting platforms include Apple Podcasts, Spotify, and YouTube Podcasts. Consider using a podcast hosting service like one of the following to distribute your show across multiple platforms easily:

  • 5Simplecast 🎚️
       simplecast.com
       Good for teams and offers audiogram creation features.

  • Blubrry πŸ”΅
       blubrry.com
       Integrates well with WordPress and offers IAB-certified statistics.

  • Buzzsprout 🐝
       buzzsprout.com
       Easy to use with great analytics and a user-friendly interface.

  • Captivate πŸ“ˆ
       captivate.fm
       Provides growth tools for audience building.

  • Castos πŸŽ›οΈ
       castos.com
       Provides unlimited storage and downloads.

  • Libsyn* 🎧
       libsyn.com
       One of the oldest and most reliable podcast hosting platforms.

  • Podbean 🫘
       podbean.com
       Offers unlimited storage and bandwidth with monetization options.

Podcast conferences are a great place for attorneys to dip their toe into the wolrd of podcasting to better their overall marketing strategy! Β©Podfest

  • Spreaker 🎀
       spreaker.com
       Offers live streaming capabilities.

  • Transistor πŸ“»
       transistor.fm
       Great for hosting multiple shows with advanced analytics.

Each of these platforms offers unique features and pricing structures, so it's essential to evaluate your specific needs and budget when choosing a hosting service. Consider factors such as storage limits, analytics, distribution capabilities, and monetization options to find the best fit for your podcast.

When to Podcast πŸ“…

Frequency depends on your schedule and content. Weekly or bi-weekly episodes can help maintain audience engagement without overwhelming your workload.

Learning from Others 🀝

catching up with friend and fellow podcaster larry roberts of Red hat media - can you guest where i got the idea for the yellow TSL Hat?!

At podcasting conferences like Podfest or Podcast Movement, you can learn from successful podcasters, including fellow lawyers. They can share insights on growing an audience, monetizing your show (and can perhaps grow into a second source of income), and balancing podcasting with legal practice.

As discussed in our recent The Tech-Savvy Lawyer.Page blog post, "My Two Cents: Harnessing The Power Of Podcasting: How Lawyers Can Benefit From A Podcasting Marketing Strategy - Why I went to Podfest 2024!," embracing this medium can transform your practice. By attending podcasting conferences, you'll gain the knowledge and connections needed to launch a successful legal podcast.

Final Thoughts 🧐

Remember, podcasting is not just about broadcasting; it's about building relationships and establishing trust with your audience. So, take the plunge, attend a podcasting conference, and start sharing your legal expertise with the world. Your future clients are listening! πŸŽ‰πŸ‘¨β€βš–οΈπŸ“š

πŸŽ™οΈ Ep. 104: The Importance of Data Backup & Cybersecurity w "Mr. Backup", Curtis Preston!

Our next guest is Curtis Preston, AKA "Mr. Backup". Curtis is a backup and cyber recovery expert, author, podcast host, and technical evangelist for S2Data.com, a firm specializing in helping companies leverage their legacy data. He has been working in the space since 1993 and has written four books on the subject: Modern Data Protection, Backup & Recovery, Using SANs and NAS, and Unix Backup & Recovery. He joined us today to talk about the importance of cybersecurity for lawyers.

Join Curtis and me as we talk about the following three questions and more!

  1. What are the top three things lawyers are doing wrong with their own cyber security, and how can they correct it?

  2. What are the top three issues lawyers are missing or not understanding when it comes to E-discovery?

  3. What are the top three things lawyers should be doing when they're under a ransomware attack?

In our conversation, we cover:

[01.13] Tech Setup – Curtis’s current tech setup.

[03.13] Challenges - Challenges of using Windows and Mac operating systems.

[07.07] Tips & Tricks - Curtis shares his top three tips for balancing between Windows and Mac.

[08.52] Multi-Factor Authentication - Importance of multi-factor authentication and password managers.

[13.00] Data Backup - Curtis explains why not backing up your data is a mistake.

[19.43] Recovery Services - The importance of having a third-party cloud backup.

[20.14] E-Discovery - Curtis explains the E-Discovery challenges and best practices.

[22.49] Documented Process – The importance of having a documented, well-tested process for e-discovery.

[24.38] Ransomware Attack – Curtis explains the initial steps of handling a ransomware attack.

[28.25] The importance of having an authentication and authorization system for a backup.

[32.10] Air Gap Backup - Curtis explains how to make an Air Gap backup.

[36.07] Relationships - Developing a relationship with cyber professionals.

[38.38] Security Questionnaire - The top three things to look for in a security questionnaire from a provider.

RESOURCES

Connect with Curtis

Books by W. Curtis Preston

Equipment Mentioned in the Podcast

Software & Services Mentioned in the Podcast

 Transcript:

The Tech Savvy Lawyer Ep 104Curtis Preston

[00:00:00] Title Read

[00:00:00] Michael D.J. Eisenberg: Episode 104, Protecting Your Practices Technology, W. Curtis Preston on Legal Cybersecurity and Device Management for Lawyers.

[00:00:20] Introducing Our Guest!

[00:00:20] Michael D.J. Eisenberg: My next guest is Curtis Preston. A technology evangelist and host of the podcast, The Backup Wrap Up, where listeners learn how to better protect their organizations from data loss, be it from accidents, disasters, or ransomware. Chris and I discussed the challenges of balancing window and Mac operating systems and the importance of cybersecurity measures.

[00:00:38] Michael D.J. Eisenberg: Curtis shares his top suggestions to improve cybersecurity for lawyers, including the need for multi factor authentication. Password managers and proper data backup. Join us as we discuss all this and more. Enjoy. 

[00:00:52] Michael D.J. Eisenberg: Have you been enjoying the techsavvylor. page podcast? Consider giving us a five star review on Apple Podcasts or wherever you get your podcast feeds.

[00:01:03] Michael D.J. Eisenberg: Curtis! Welcome to the podcast.

[00:01:04] W. Curtis Preston: Happy to be here.

[00:01:05] Michael D.J. Eisenberg: I appreciate you being here.

[00:01:06] Our Guests Current Tech Stack!

[00:01:06] Michael D.J. Eisenberg: And please tell us what your current tech setup is.

[00:01:09] W. Curtis Preston: Well, that's quite the question as I look over my desk because I am a Mac user. I have a MacBook Pro, one of the newer ones, like a 13 inch MacBook Pro. It's one of the newer, the M, I think it's the M2 chip.

[00:01:24] W. Curtis Preston: And I also have a Windows, uh, Dell. Latitude laptop that I use for literally one purpose. I do a lot of writing and I use voice to text and I, I've used Dragon for years and it only runs on windows. So I have a laptop that literally has one purpose and that's it. Got a Logitech Brio. Camera, I have a Audio Technica 2500X, uh, is the microphone that I'm using at the moment.

[00:01:50] W. Curtis Preston: Ring light behind me. And I got a, um, I don't know, what else? I don't know, some big old headphones that I'm not wearing at the moment. That's what about,

[00:01:57] Michael D.J. Eisenberg: uh, mobile devices and tablets? Oh,

[00:02:00] W. Curtis Preston: mobile devices. I'm not a big tablet guy, but I am an iPhone 15 user, which just yesterday got its screen replaced.

[00:02:07] W. Curtis Preston: Thanks to me stomping on it a week or so.

[00:02:12] Michael D.J. Eisenberg: Did you get that repaired under the Apple care program or did you do it on your own?

[00:02:16] W. Curtis Preston: No, via Verizon. I had the Asurion, you know. Oh,

[00:02:20] Michael D.J. Eisenberg: okay. Cool. The guy

[00:02:21] W. Curtis Preston: just showed up at my house. It was very nice. I, you know, I clicked some buttons and the guy showed up at my house, took my phone out in his van, brought it back a half hour later.

[00:02:29] W. Curtis Preston: All beautiful. It was beautiful.

[00:02:30] Michael D.J. Eisenberg: You know. David Sparks of Mac Sparky and Mac Power Users fame. He was, I remember him for many years using Dragon Dictation on his Apple devices. And apparently that's no longer allowed by Apple or no longer supported or

[00:02:46] W. Curtis Preston: No, it, it, it was a Microsoft decision. Microsoft now owns Dragon, naturally speaking, and all they ever had was Dragon Dictate.

[00:02:54] W. Curtis Preston: They never had Dragon, naturally speaking, which is the much more powerful product. And then they decided to just kill that off. Oh, okay. Yeah. Yeah,

[00:03:02] Michael D.J. Eisenberg: well, how do you like kind of like switching between the 2 operating systems windows and Mac?

[00:03:07] W. Curtis Preston: Oh, it's maddening. Luckily. I don't have to do a whole lot. I mean, I was a longtime windows user and, you know, I'm an I.

[00:03:13] W. Curtis Preston: T. guy. So you kind of have to go back and forth between the 2 anyway. And I'm also a Linux user. So, you know, I'm, I'm. Perfectly fine with that as well, but it is maddening, especially if you have to do anything on the command line where, you know, it's the whole backslash versus the forward slash thing.

[00:03:30] W. Curtis Preston: It's it's absolutely maddening. So I wouldn't recommend it for anybody, but the very dedicated person.

[00:03:37] Michael D.J. Eisenberg: Well, let me surprise you with a question here.

[00:03:39] Q?B: β€ŠWhat are your top three suggestions when you have to balance between Windows and Mac, having done it yourself?

[00:03:39] Michael D.J. Eisenberg: What are your top three suggestions when you have to balance between Windows and Mac, having done it yourself? And I really, I'm a little surprised question.

[00:03:47] Michael D.J. Eisenberg: It's not part of my three plans.

[00:03:48] W. Curtis Preston: Yeah, it's definitely a surprise question. Well, the difference between the two, I think the Windows laptop needs a little bit more protection than, I think there's a little bit more protection built into the Mac platform. Right, you know, I just like the way that it notifies you when you're downloading things when you're installing things.

[00:04:08] W. Curtis Preston: I just like the way that runs a little bit better. I also like the way the Mac backs up. I'm a backup guy, right? The fact that time machine, which works really well is built into the to the Mac platform is, um, and by the way, I don't use it. I don't use time machine. I use like a third party, uh, software to backup my Mac, but I like it.

[00:04:30] W. Curtis Preston: I'm machine. I like how it works, but why don't you use time machine? If I may ask? Yeah, that's a really good backup question because time machine assumes that the device you're backing up to is right next to it. And that's a really bad thing to do from a backup design standpoint. You want your backup as far away from your primary as possible.

[00:04:47] W. Curtis Preston: And so the best way to do that, especially for, you know, for, Casual users is to, uh, is to have a cloud service that does that.

[00:04:56] Michael D.J. Eisenberg: Well, isn't the whole 3 2 1 concept of, you know, one computer, uh, two different locations for backups, three different backup sources. So tell me, you know, what are your thoughts about the whole 3 2 1 concept of backing up?

[00:05:09] W. Curtis Preston: Well, it's literally by one of my favorite things to talk about, right? It comes up a lot on, on my podcast. Uh, you know, the idea with 3 2 1 rules, you want three copies of your data. On two different types of media, one of which should be offsite and the cloud backup conforms with all of that. Right? So three different copies.

[00:05:27] W. Curtis Preston: Uh, it is really a historical thing. Just make sure, you know, you just don't want one copy two different copies. The primary is considered one of those two copies and then one being offsite. So the cloud, the cloud backup being entirely offsite time machine is a wonderful thing. And it's the best thing.

[00:05:42] W. Curtis Preston: For copying old laptop to new laptop, right? So it's nice to have it's nice to have a time machine backup when you're doing that. But to make sure that you have a backup of all your files, including the files on your phone, right? You need cloud backup software and iCloud is not a backup software. iCloud is a is a synchronization tool.

[00:06:01] W. Curtis Preston: And it's a great synchronization tool, but it's not a backup software because if you delete the primary on your phone, it also deletes it in the cloud. So that's why it's not a backup software, but doesn't

[00:06:10] Michael D.J. Eisenberg: like iCloud. And for instance, my favorite, my personal favorite Dropbox, they have different versions.

[00:06:16] Michael D.J. Eisenberg: So can't you look at the older version?

[00:06:18] W. Curtis Preston: I cloud iCloud doesn't do versioning. Dropbox does basically iCloud. The best iCloud will do for you is if you accidentally deleted, let's say hundreds or thousands of photos, they'll be like in a, in a, um, recycle bin, and you can get them back out if you notice that in advance and all of that, right?

[00:06:36] W. Curtis Preston: But the point is, it's not really, it doesn't behave the way I think of when I think of, you know, backup software. Because there are hacks, by the way, there are attacks against you where you can go in and you can very easily disable. And delete the iCloud account and poof, it's gone. You can do, you can do that from your phone, right?

[00:06:54] W. Curtis Preston: So yeah, so I'm not a big fan of that.

[00:06:55] Michael D.J. Eisenberg: So going back to my question though, my original question was, my surprise question, what are three tips or tricks that you would suggest for people who have to balance out both Windows and Mac operating systems in their lives?

[00:07:07] W. Curtis Preston: Yeah, you know, um, I mean, I think both of them need antivirus software, right?

[00:07:12] W. Curtis Preston: It's something to keep out, you know, keep looking for that. And then my usual thing for any device is that it needs some kind of backup. And so you're going to whether you're doing Windows, Mac or iOS or Android, you need a backup software that runs all the time and always keeps a copy of your data in some other location.

[00:07:30] W. Curtis Preston: And that's regardless of whether you're not Uh, you're doing Windows or Mac, and then I would say it would be nice if you're going back and forth between the two, it would be nice if you do have some kind of, assuming that you have work that you need to access on one versus the other, that's what synchronization tools are for, right?

[00:07:50] W. Curtis Preston: So things like Dropbox, uh, and similar tools where you can access the data on both sides. Me personally, I don't really have that particular, um, problem, but I, I think it's a really useful one. Okay, cool.

[00:08:02] Michael D.J. Eisenberg: Well, let's get into the

[00:08:02] Q?#1: β€ŠWhat are the top three things lawyers are doing wrong with their own cybersecurity and how can they correct it?

[00:08:02] Michael D.J. Eisenberg: questions. question number one. What are the top three things lawyers are doing wrong with their own cybersecurity and how can they correct it?

[00:08:09] W. Curtis Preston: Well, I'd say the first thing they're doing wrong is not using MFA wherever they can, right? So multi factor authentication is, uh, it's a huge, huge thing to stop cyber attacks because there are myriad ways for your password to ultimately get stolen, right?

[00:08:27] W. Curtis Preston: There are password trackers. There are, there are key stroke trackers. There are all kinds of things. That can be used to steal your password and sometimes you just do dumb things and you enter your password where you're not supposed to, right? So the way to stop those attacks is MFA, right? So you'll, you'll get a notification.

[00:08:45] W. Curtis Preston: Hey, someone is trying to log into your account, you know, and you need to enter that other factor. The, and if possible, there was a great message that came out from the FBI actually in this last week. Where they announced about how that, uh, the SMS is just simply not secure and that they believe that many of these, uh, networks have been infiltrated.

[00:09:07] W. Curtis Preston: And so along with MFA, uh, or part of that is to make sure that you, that you're not using Ms. That SMS. As that MFA, if at all possible, many of the vendors, unfortunately, SMS and email are the only ways that they offer as a, as another factor, if you can use a one time password system, like Google Authenticator, or I happen to like Authy, if you can use that, you will be much better off, much more secure.

[00:09:33] W. Curtis Preston: So that's the first one is MFA. The second one is not using a password manager that I am a huge proponent of password managers. And, uh, they are not all created equal and, you know, and you need to do, uh, some research, uh, perhaps you should look into recent news. Uh, and see which ones have, have been, uh, compromised.

[00:09:52] W. Curtis Preston: And I wouldn't recommend using one that's been compromised, but the, uh, you know, you want to have a unique password for every site and you want to have that password be really long, like beyond 16 characters, right? Because fewer than 16 characters is guessable by modern day computers in a relatively short period of time.

[00:10:12] W. Curtis Preston: So you want to have a very long password and you want to have a unique password for every site. And the only way you're going to do that is password management, right? And so, yeah, so number two would be password managers. And number three? It's not backing up your data. We live in a world, especially younger people, they've lived in a world where everything is a solid state and solid state drives fail much less often than regular or than old school hard drives.

[00:10:38] W. Curtis Preston: And so I don't think they have the fear of the hard drive dying that older folks like me have. But the thing is, it's more than just hard drives dying, there's stupid things, and there's cyber attacks, and there's ransomware, and there's all these other things that can take out your data, and you need a third party cloud copy of your, uh, data, encrypted, stored in a completely separate system.

[00:11:00] W. Curtis Preston: So not backing up your data is a huge mistake.

[00:11:03] Michael D.J. Eisenberg: So let's take a pause in the question. And sort of give you an opportunity to talk about what you do over at S2Data.

[00:11:11] Learning a Little More about Our Guest's Work at S2Data!

[00:11:11] W. Curtis Preston: So thanks. S2Data is a company that specializes in, I like the way, the way our CEO puts it is we specialize in data that everyone else is trying to forget.

[00:11:24] W. Curtis Preston: Right? So love working with legacy data, things like backups and archives. We also love looking into forensic data. So pulling data off of hard drives. And mobile devices, laptops, all of those kinds of things for both, both of these are for lawsuit purposes as well as a compliance purposes. Management of employees purposes, basically, it's all of the really hard, gritty stuff when we start talking about managing data in a, in a large or small company.

[00:11:58] Michael D.J. Eisenberg: And are you tailored for large companies, small companies, any size company?

[00:12:03] W. Curtis Preston: Really any size company, because very few companies have the kind of expertise that we have in handling these, these data sets. Very few companies have any kind of forensics, obviously, uh, expertise, right? So that comes into play pretty much in any size company.

[00:12:19] W. Curtis Preston: And then the other side, the backup side, we deal a lot with really both really large and really Old backup sets, backup and recovery. It's what I've spent most of my career in and backup and recovery is designed to do one thing and that's restore old data, except restore a server to the way it looked yesterday.

[00:12:38] W. Curtis Preston: I mean, just backup and recovery is designed to do one thing and that's restore something to the way it looked yesterday. Maybe to the way it looked last week. The problem is everybody has this tool that's designed to do that and they wanted to do something else. They want to find all the emails that Steve wrote, uh, that said this word, right?

[00:12:57] W. Curtis Preston: They're looking for the, they're looking for the smoking gun. They're looking for proof of malfeasance, et cetera. The backup tools are not designed to do that. Right. And that's where we, we have custom software that's able to go directly into the backups and then extract that data.

[00:13:12] Michael D.J. Eisenberg: So let's say I'm an attorney and whatever, you know, working one day and there's a huge power surge.

[00:13:18] Michael D.J. Eisenberg: And my computer is completely fried. I call you. What could you do to help me recover that hard drive?

[00:13:24] W. Curtis Preston: So that is under the data recovery service. It's a call that honestly, I hope we don't get from you, right? I hope that you listened. It's the call that I hope that you listened to the first part of the episode and you backed up your data and you have it in some sort of third party service.

[00:13:40] Michael D.J. Eisenberg: Let's just say I'm panicking. It's like, Oh my God, it's fried. I'm screwed. You know, the court's going to kill me.

[00:13:46] W. Curtis Preston: Yeah, this is when talking about literally forensic examination of that drive. And this is clean room data recovery situation. It's the hardest thing that we do. We're happy to do it for you.

[00:14:01] W. Curtis Preston: It's just, it's the call that we don't want to take. Right. Right. Of saying, Hey, I mean, we'll take it. Right. But it's, we're hoping that the attorney is doing the things that they're doing to save the data that they're supposed to say, right? Typically, the reason that we're dealing with your hard drive is a forensic type examination where there's a lawsuit again, or, uh, perhaps you have an employee, uh, it off boarding system so that every time a company, an employee leaves your company, you image their hard drive, you image their phone, you image all of these different things.

[00:14:37] W. Curtis Preston: Right. Or potential resources later, right? But it is possible to do digital recovery of a device that's been fried. you know, and I'll just put a but there, that is one of the hardest things to do in IT. So again, I don't want you to have to call us for that. I want you to do, save your data first.

[00:14:57] Michael D.J. Eisenberg: So I'm guessing that it's not cheap, and I'm not asking for you to quote any prices right now.

[00:15:02] Michael D.J. Eisenberg: And how long would something like that take?

[00:15:05] W. Curtis Preston: Yeah, at a minimum, it's going to be many days, right? It'd be longer than that to be. It's just, it's, it is a giant, incredibly variable process. The cost and the complexity all depends on what type of damage has been done to the device. You know, whether or not it's a magnetic rotational device or an SSD.

[00:15:24] W. Curtis Preston: I'll be honest, if it's an SSD, you probably have less success. Then if it's magnetic, uh, yeah, because SSDs are just a giant collection of electrical voltages. Right? Just like you look at, it's just a bunch of little cells that are holding a bunch of voltages. And when you, the scenario that you gave me, where I just get a big electronic from an EMP, right?

[00:15:47] W. Curtis Preston: Electronic magnetic pulse, it can just basically just wipe out all those voltages, right? Whereas with a mechanical hard drive. Typically, what we're talking about is it's a mechanical failure of one of the components and you can disassemble the hard drive and read the remaining components. So,

[00:16:04] Michael D.J. Eisenberg: well, thank you.

[00:16:05] Michael D.J. Eisenberg: I appreciate that's just a lot of complex solutions that could be made easier. Ideally, if we back up, not a guarantee, of course, but not only a backup on site, but a backup as you prefer off site. I prefer both, and I've got a little bit of a mix between the two. Let's continue the questions.

[00:16:23] Q?#2: β€ŠWhat are the top three issues lawyers are missing or not understanding when it comes to e discovery?

[00:16:23] Michael D.J. Eisenberg: Question number two.

[00:16:24] Michael D.J. Eisenberg: What are the top three issues lawyers are missing or not understanding when it comes to e discovery?

[00:16:29] W. Curtis Preston: So, the first, it's a continuation of what I was talking about previously, about the fact that, so my summary statement is, not understanding just how hard. It is to do, uh, e discovery against backups. So we're almost always wanting to do email, right?

[00:16:48] W. Curtis Preston: We want to get all of the emails that have this word in them. And just understanding that that one thing alone is the hardest thing to do. It's the most common thing that's done. And it's also the hardest thing to do for, for multiple reasons. One is that backup isn't designed to do this. It's just none of the backup and recovery tools are designed to extract data the way that you're wanting it to be extracted.

[00:17:12] W. Curtis Preston: Number one. Number two. It's a container inside a container inside a container, it's an email that's stored inside of some words inside an email that's inside a database that's inside a backup encapsulated container, right? So it's a, it's a multi depth. It's sort of like, uh, that movie Inception. Right? The deeper you go, the lot, the slower it gets.

[00:17:32] W. Curtis Preston: Right? By the way, I've never made that analogy before, but I like it. Right? And so it's the hardest thing to do, and it's the most common thing that we do. So, so understanding that it's just really, really difficult to do if you're using the standard tools. And so the second thing I'm going to say that's going to sound like I'm, I'm conflicting with the first thing is, How easy it is to do if you have the right tools, right?

[00:17:53] W. Curtis Preston: If they're a lot of times, they're, they're directing a client to, you know, go take, let's say, pick your favorite backup software, that backup network or TSM rubric, Cohesity, any, any of these guys take these tools and go and, uh, you know, extract this email and they're not realizing that there is some alternative that can be done, right?

[00:18:15] W. Curtis Preston: And so the idea is that again, it sounds like I'm being contradictory. But if you use a third party service that is actually able to understand this format and pull it out, understanding just how easy it is to do it, if you do that. And then the third would be, not, a mistake would be not understanding the value of a documented process.

[00:18:38] W. Curtis Preston: So if you, You know, when you're standing in front of a judge, right, and you're making an argument in a particular matter, when you can say, we followed this documented, well tested, well vetted process, and we didn't find the smoking gun, right, especially when you're a defendant, right, we followed, we were given the e discovery request, we followed this process that has been used, you know, in many other places, and we didn't find the smoking gun, The value of that process is huge, right, being able to say, as opposed to, let's say, the contrast of that is, well, we had our tech guys look at the net backup backups and they didn't find it.

[00:19:18] W. Curtis Preston: Right? And so not understanding the value of that of that process. I think is another mistake that they make right that they just try to sort of do it themselves, right? And especially this is even stronger when the defendant, you know, the recipient of the discovery request, whether it's a defendant or the or the plaintiff when that recipient is not used to receiving such requests.

[00:19:44] W. Curtis Preston: So if it's a first time discovery request for somebody who's never searched email, they're not going to have the slightest clue. So putting all of these things together. They're not going to be able to easily do it. Uh, they're not going to have the tools that we have, and they're not going to have the process that we have to be able to fill out an affidavit and say, hey, we searched for this and these were the things that we found.

[00:20:05] W. Curtis Preston: And we used a process that's been used in, you know, hundreds of clients before you.

[00:20:08] Ad #2: Consider Buying The Tech-Savvy Lawyer a Cup of Coffee β˜•οΈ or Two β˜•οΈβ˜•οΈ!

[00:20:08] Michael D.J. Eisenberg:

Pardon the interruption.

[00:20:11] Michael D.J. Eisenberg: I hope you're enjoying the techsavvily. page podcast as much as I enjoy making them. Consider buying us a cup of coffee or two to help defray some of the production costs. Thanks and enjoy.

[00:20:21] Q?B: What are the Top 3 Gaps in Documented Processes that Attorney Overlook?

[00:20:21] Michael D.J. Eisenberg: Can you suggest, I'm going to ask for the top three of course, top three common holes that either attorneys who are producing or attorneys who are receiving aren't necessarily thinking about when they look at these documented processes that maybe it needs to be filled in?

[00:20:36] W. Curtis Preston: Well, I don't know if I can come up with three, you know, a list of three things, but um, I think it's just, it's just a matter of whether or not there is a process that has been used before, is properly documented, and can be testified to via an affidavit. I don't know, there's your three, right? So it's documented, it's been used before, and you can easily explain it.

[00:21:00] Michael D.J. Eisenberg: You know, it just as you're saying this, it's got me thinking of a couple of cases in my past where, you know, during discovery, you know, came out later that they produced the smoking gun, not because it wasn't asked for properly in discovery, but because the opposing party thought, you know, it wasn't relevant, you know, although it's the smoking gun, it says, yeah, we screwed up or yeah, we did something wrong.

[00:21:23] Michael D.J. Eisenberg: They just decided it wasn't relevant at the time, which was hogwash. Yeah. And then they got in trouble for it later. But are, have you seen, or are there ways that parties have tried to say, you know, well, we ran this, but we didn't think this one, this part was relevant. So we didn't Produce it.

[00:21:39] W. Curtis Preston: Yeah, I think the key here is to be able to say we used this tool.

[00:21:46] W. Curtis Preston: Right? Right? Like we looked, we use this tool. We read, you know, the more specific you can be on. We ran, you know, I'm going to use some tech terms, right? We ran a regular expression search on this phrase. Did not find the thing that you're looking for. So that's very specific, right? And we use this tool relativity or whatever, whatever the right tool is.

[00:22:08] W. Curtis Preston: Right. I use this tool and we didn't find it right. That's not the same as saying it's nowhere near the same as saying. Well, we looked at our stuff and we didn't find anything that was relevant. You asked for this phrase, right? You asked for this phrase. We ran a regular express and search against that phrase.

[00:22:26] W. Curtis Preston: We did not find it anywhere in the data or the metadata.

[00:22:30] Michael D.J. Eisenberg: Have you ever found like, you know, a party, a replying party saying, you know, we ran the phrase. Actually, we came across that, but we didn't think it was really well lit. So we didn't bother to give it to you.

[00:22:39] W. Curtis Preston: I haven't seen that. To me, that's not a valid production.

[00:22:43] W. Curtis Preston: And if you requested the phrase, any emails with this phrase in them, that is discoverable, right? And relevant. I'm not saying that

[00:22:51] Michael D.J. Eisenberg: the party is proper in doing that. I'm just, just kind of curious if they tried, you know, anyone has tried to do the loopholes, if you will.

[00:22:58] W. Curtis Preston: Well, what we produced the data. Our client, which is the attorney or the right, the, you know, the, the person, what they did with the data.

[00:23:07] W. Curtis Preston: It we're not party to that. So,

[00:23:09] Michael D.J. Eisenberg: okay. And, and mind you, I'm not accusing you guys of doing anything. Yeah. I'm specifically referring to the, the attor, the attorney or the company or whoever the, you know, party may be. Cool. Well, let's move on to our last question,

[00:23:20] # Q?#3: β€ŠWhat are the top three things lawyers should be doing when they're under a ransomware attack?

[00:23:20] Michael D.J. Eisenberg: what are the top three things lawyers should be doing when they're under a ransomware attack?

[00:23:24] W. Curtis Preston: Well, I'd say the first thing that they should be doing is Hopefully, hopefully they have a time machine and hopefully before the ransomware attack happened They developed a relationship with cyber professionals, right? And this is incredibly important when we talk about things like from a cyber attack standpoint, any kind of protection is better than no protection and any protection has to be done before the event, right?

[00:23:51] W. Curtis Preston: It's time to talk to someone now. Talk to, because this is absolutely not something that you should be doing yourself. Whether you're an attorney or a multi billion dollar multinational conglomerate, you should not be handling a cyber attack by yourself. And so the time is now to develop a relationship, to find yourself, they're, they're called blue teams, right?

[00:24:17] W. Curtis Preston: In the cyber defense world, there's the red team and the blue team. The red team is one that you pay to attack you. To see how your defenses are. The blue team is someone who comes to your defense. There are myriad companies out there that you can talk to that you can talk to now so that when a cyber attack happens and notice I said when, not if, right?

[00:24:35] W. Curtis Preston: The odds just go up every day when a cyber attack happens, you can call your blue team. They come by your side you've got cyber insurance, right? If you've got cyber insurance, talk to them about. Who they have access to and who you would have access to in an attack. And so the, the, the 1st thing you should be doing is contacting their, their cyber defense team.

[00:24:56] W. Curtis Preston: And by the way, shutting off everything should probably be the 1st 1st thing, right? Just shutting off everything and then contacting the cyber defense team. The other thing that this is like a mistake that they often make is like, we're just going to keep this quiet, right? We're not going to tell anybody.

[00:25:10] W. Curtis Preston: And again, I think maybe there was more stigma to that. I don't know, five, six, 10 years ago. Now everybody assumes everybody's getting. So there's no point, there's no value in concealing the fact that you were attacked. The next thing is to be open with your clients, your customers, your partners. About the things that are happening, what's being done, what, you know, don't say what you don't know, right?

[00:25:38] W. Curtis Preston: Don't say things like no client data was compromised. You can say things like there is no evidence yet that client data was compromised, right? Don't make statements that you can't ultimately backed up. Things are being looked into again. We have a cyber defense blue team on, you know, that is working hard figuring all this out and the communicate.

[00:25:58] W. Curtis Preston: Early and regularly throughout the event, just the more open. The way I like to do is I like to send everybody an email, send, point them to a webpage that you will then update as the event is, is, uh, unveiling. Right. So communicate early and often, and then finally, and that is hopefully, and again, this is a, you know, a broken record for me, hopefully you had a offsite cloud based backup that is not accessible.

[00:26:27] W. Curtis Preston: Via your system, right? So we talked about, uh, something as little as time. Machine time machine's great, but I can wipe out a time machine backup if it's physically connected to my system, right?

[00:26:37] Michael D.J. Eisenberg: What if it's wirelessly or does that make no difference?

[00:26:40] W. Curtis Preston: It doesn't make any difference, right? My my point is if, if it's online and it's connected, you know, and it's, it's accessible to my computer.

[00:26:47] W. Curtis Preston: If I know what I'm doing and I have administrator access. I can wipe out that backup, right? So you really want to have a backup. And this is true whether you're 1 lawyer and a laptop or again, a giant, you know, right. You want to have a cloud based copy that has a completely different authentication and authorization system.

[00:27:09] W. Curtis Preston: And hopefully you have 1. That has this concept of immutability, right? So, you know, it's, it's a term that comes up in the law a lot where you say, you know, can you prove that this email is the same as it was, you know, a year ago when it was written, right? The one that you're producing is the same. You can say, yes, we use this immutable system.

[00:27:27] W. Curtis Preston: In this case, what we're talking about is that the best system is one that you can't delete, right? If you can create a system. I will say it's, it's the hardest feature to get in consumer or prosumer backups. But if you can find that, it's much better in that because the ransomware attackers are getting more savvy and more savvy, and they're learning how to attack your backup system.

[00:27:50] W. Curtis Preston: And they do that, and they, they know to do that because they know that if they're able to successfully attack your backups and take out your backups, then you're more, uh, You're more liable to to pay the, you know, the ransom.

[00:28:01] Michael D.J. Eisenberg: I have some follow up questions for each of your answers on this last answer.

[00:28:05] Michael D.J. Eisenberg: It's a concept that I'm in the process of learning. But what is it called when you you have a backup and then you make another backup on the same backup service device and the two backups are independent of each other. So if I made a backup for day one and then a backup for day two, those two backups are completely independent of one another.

[00:28:27] W. Curtis Preston: I would just say that there is two full backups, two traditional needful backups.

[00:28:32] Michael D.J. Eisenberg: Okay. So they're just not connected. They're not, they're not,

[00:28:35] W. Curtis Preston: they're, they're independent of each other.

[00:28:37] Michael D.J. Eisenberg: So if like, if day two somehow got a virus or some sort of ransomware, it won't affect back up day one,

[00:28:44] W. Curtis Preston: right? It's really important.

[00:28:46] W. Curtis Preston: To make sure that the authentication and authorization system for your backup, which hopefully is a cloud based system is completely separate. You're not storing the password in a place that if someone you're not storing it in a spreadsheet on your laptop for God's sakes. Right? Which is a thing, right?

[00:29:03] W. Curtis Preston: That is technically a password management system. That is not what I'm talking about. Right? And hopefully you also have, uh, MFA and you have like the best kind of MFA on that. Right? So that they just cannot log into that system as you and especially from another location. Right? Uh, that, that's the whole point of MFA is even if they got the password, they wouldn't be able to log into that backup system as you and then they wouldn't be able to.

[00:29:27] W. Curtis Preston: Corrupt, encrypt, delete, whatever those backups. Gotcha. So, it's not just that they're independent of each other. An air gapped backup is one that's stored in a way that's just, literally, it meant there was a gap of error between the thing being protected and the protected copy. That has become, it's a term that gets thrown out a lot in the cloud backup space.

[00:29:49] W. Curtis Preston: Technically, none of the backups in the cloud are air gapped. Right? Not any traditional long term sense of the word because they're still online, right? They're still online. They're not really air gap there. But having said that, if you can make a copy into a fully immutable storage system, so that if not even you, this is the key, not even you.

[00:30:13] W. Curtis Preston: Can delete that backup for some period of time that's fully immutable, really immutable again, immutable should be a binary condition like dead. You're either dead or you're not right immutable should be a binary condition. Unfortunately, it's like a lot of things they marketed it and they'll say it's immutable and it's not really immutable.

[00:30:32] W. Curtis Preston: But if even you cannot delete that backup, if you wanted to, then that is going to be as protected as it can be in the cloud world.

[00:30:41] Michael D.J. Eisenberg: And then how do you make an air gap backup?

[00:30:44] W. Curtis Preston: Well, the only way truly to do that, you know, for real would be to make like an. In the case of, uh, either Windows or to make a physical copy onto a hard drive or tape drive.

[00:30:57] W. Curtis Preston: In most cases, it's going to be a hard drive, right? Right. I'll just use one example. Make a time machine backup to a time machine physical hard drive, and then unplug that hard drive and put it somewhere else. It's offline. That would be an air gap back up the downside to that and the reason why this is I don't recommend this as a normal everyday case is that you didn't have to plug it back in tomorrow when you're making the next backup and then you got to unplug it and put it back.

[00:31:22] W. Curtis Preston: So, you know, and so that's why I prefer the cloud backup because it just happens. Gotcha. You know, all the time.

[00:31:27] Michael D.J. Eisenberg: Gotcha. Okay. And actually that, that answered, well, two questions. One I knew and the other one I didn't. So going back still, what do you suggest about informing the bar association when you've had a ransomware breach?

[00:31:40] W. Curtis Preston: I would recommend that you follow the laws in your state, right? I don't know what the laws are in different states, but number one, I would recommend that you be aware of those now, learn what the notification laws are, especially if you are aware of. Client data being compromised and then just simply follow those regulations.

[00:31:58] W. Curtis Preston: I do think that again, early and often notification is advised. And that I think it's better for you that you notify and then notify of what, you know, what remediation steps that you've done, how you protected to data, uh, et cetera. And the ultimate case from what I've seen again, I can't speak specifically to bar associations, how they've handled it, but historically in breaches the what.

[00:32:27] W. Curtis Preston: Regulatory bodies in general, when they seek to hold a party responsible for a breach, what they're looking for is, did you follow the industry best practices? Did you do the things that you were supposed to do? Everybody can get hacked, like companies that do security get hacked, right? And so the simple fact that you got hacked or that you got ransomware isn't enough to get to, I would not think again, not giving legal advice.

[00:32:56] W. Curtis Preston: I'm just thinking that is not something that a bar associate would seek to hold you liable for, right? But, if it's clear that you didn't do any of the things that you were supposed to do, you didn't protect your data, you didn't put in, you know, antivirus, you didn't put in a firewall, you didn't put any, you didn't do any of these things, that's where I think you might have some liability.

[00:33:17] W. Curtis Preston: And I'll just give you one example. There was, uh, you're familiar, I'm sure, with the GDPR. There was a hospital in Portugal that wasn't a breach. There was a hospital in Portugal that had a GDPR violation. And when the body looked at what they did, their response was Okay, it was clear that you didn't try at all, right?

[00:33:40] W. Curtis Preston: So one of the things that they did was for ease of administration, they gave every employee in the hospital doctor level access to patient records. Oh, because it was easiest to just make everybody a doctor than to figure out who was a doctor and who was a nurse and who was a janitor. They just gave everybody access.

[00:33:58] W. Curtis Preston: So they were like, Hey, it's clear that you didn't even try. So that's the thing I think you should be focusing on is making sure that you're doing the industry best practices to protect your data, to protect your clients, and then, you know, notify your bar association as appropriate based on the laws in your state.

[00:34:15] Michael D.J. Eisenberg: And thank you. Let me ask you one more follow up question and to your first your first answer to the third question. You talk about developing a relationship with a cyber professional. I'm Joe lawyer. I call you and your company, what are the three questions I should be asking?

[00:34:32] W. Curtis Preston: Michael, that is a tough one.

[00:34:33] W. Curtis Preston: Let me just think about that for a second. I would say that the first thing you want to establish is that they're a blue team versus a red team. That's what you're looking for. I mean, you might have interest if you want to take it to the next step. The idea of using a red team is that's something you're going to proactively use.

[00:34:50] W. Curtis Preston: Right. To see how your cyber defenses are, right? You can do, uh, what's called a pen test or a penetration test. Those are great teams to have, but what you want at your side in an attack is you want to, you want a blue team. You want to establish that they're a blue team company. And the next question is, do they have a security posture questionnaire and can you see it?

[00:35:11] W. Curtis Preston: Right? So that's going to be the question, basically a questionnaire that they're going to give to you and to see what your security posture is, which is just a term to say, how good is your cyber security, right? You can learn a lot if you talk to half a dozen companies, you can learn a lot just by reading those, uh, security questionnaires, by the way, and if their answer is, we just ask if you have antivirus, not really the, you know, the company that maybe you should be looking at.

[00:35:36] W. Curtis Preston: Gotcha. And then third would be. If they have tools that they use on a regular basis with clients to monitor your cyber posture, right? And the answer you're really looking for is yes there, that hopefully what they've got is something that they've contracted with that they can use as opposed to you going out and choosing one of the 700 cybersecurity tools that are available to you.

[00:36:01] W. Curtis Preston: You have a, you're contracting a cybersecurity professional, this is what they do and they say, yes, we have a tool, you know, like an XDR tools, what they call extended detection and response. We have a SIM tool. These are the various tools. That they can install on any devices that you use to help protect you and to help you respond.

[00:36:21] W. Curtis Preston: And also, even more importantly, to be able to forensically figure out what happened after it happens. Because that's really the most important part of the response. Assuming you did everything you were supposed to do in advance of protecting your data and backing it up and all of these things. The hardest part of the entire process is figuring out what happened and good forensic tool that you installed in advance will be your best friend in that case.

[00:36:50] W. Curtis Preston: So,

[00:36:51] Michael D.J. Eisenberg: well, then what are the top three things a lawyer should be looking for, or anyone for that matter, when it comes to a security questionnaire from a provider?

[00:36:58] W. Curtis Preston: Well, I'd say that the first thing I would say it's depth, right? It is the degree to which they're asking. The appropriate questions, the 2nd, I would say, is it focused entirely on just defense, right?

[00:37:13] W. Curtis Preston: Meaning, is it only focused on preventing you from, uh, doing it and or is it also does it have questions that are asking about, like, for example, do they ask you about your backups? Do they ask you about what are you doing to be able to respond to an attack when it happens? And then finally, I would say, this is very touchy feely.

[00:37:35] W. Curtis Preston: Does the questionnaire seem like it's just designed to show you some software? Or is it designed to see how well you have prepared yourself for an attack?

[00:37:47] Michael D.J. Eisenberg: Gotcha.

[00:37:47] W. Curtis Preston: Right? It's really a touchy feely thing. That'd be my final one.

[00:37:51] Michael D.J. Eisenberg: Excellent. Well, Curtis, I appreciate you sharing all that with us. Tell us, where can people find you?

[00:37:56] W. Curtis Preston: So you can find me at BackupCentral. com and also Backup Wrap Up. That is my podcast. And you can find my company at, that's the number two, Data. com. Obviously, contact us to help you with your, especially e discovery requests against backups.

[00:38:12] Michael D.J. Eisenberg: Excellent. Well, Curtis, again, I want to thank you for being here, and I hope you have a great day.

[00:38:16] Michael D.J. Eisenberg: Thanks.

[00:38:17] See You in Two Weeks!

[00:38:17] Michael D.J. Eisenberg: Thank you for joining me on this episode of the techsavvylawyer. page podcast. Our next episode will be posted in about two weeks. If you have any ideas about a future episode, please contact me at michaeldj at the techsavvylawyer. page. Have a great day and happy Lawering.

MTC: Mobile Hotspots Outpace Hotel Wi-Fi: A Game-Changer for Tech-Savvy Lawyers πŸ“±πŸ’Ό"

Lawyers on the road can Stay productive with mobile hotspots!

As a seasoned legal professional and tech enthusiast, I've experienced a paradigm shift in connectivity during recent travels. My recent trips to Charolette, Chicago, Ft. Lauderdale, Orlando and Panama, revealed a stark reality: hotel Wi-Fi often falls short, especially in crucial areas like conference rooms. This realization led me to an important reminder– my smartphone's hotspot consistently outperforms hotel networks.

Using an iPhone Pro Max 16 on AT&T and a Galaxy S22 on Verizon, I've found that mobile hotspots often offer faster, more reliable connections. This dual-carrier approach provides a safety net, as coverage can vary. Notably, AT&T as plans for unlimited talk and data in Central America that proved invaluable in Panama, incurring no additional fees and my Verizon plan provided much better coverage at the hotel in Orlando.

This shift questions the necessity of prioritizing hotel Wi-Fi when booking accommodations. The table below illustrates the stark contrast in average speeds:

Additionally, the landscape of mobile data pricing has undergone a dramatic transformation in recent years, making the use of smartphone hotspots increasingly attractive for travelers. Carriers have significantly reduced their data prices, with many now offering "unlimited" data plans at competitive rates.

  • AT&T offers their Value Plus VL plan with unlimited data for $51 per month.

  • Mint Mobile has slashed its unlimited data plan to just $15 per month for a full year, while US Mobile's Unlimited Starter plan provides 35GB of high-speed data for as low as $25 per month.

  • Verizon offers competitive options, including its Unlimited Welcome plan, which costs $65 per month for one line and includes unlimited talk, text, and data.

    * Note these offers are subject to change.

Warning: Make sure the data plan you have with your carrier is sufficient for your travels! You don’t want to pay overage charges!!!

🚨

Warning: Make sure the data plan you have with your carrier is sufficient for your travels! You don’t want to pay overage charges!!! 🚨

Lawyers can Boost conference productivity with mobile hotspots!

Plus, you get additional security through mobile data versus wifi, as cellular networks typically offer stronger encryption and built-in security protocols compared to public Wi-Fi networks. Mobile carriers actively manage and update their security measures, making it significantly more challenging for cybercriminals to intercept your data. This enhanced protection is particularly crucial when handling sensitive client information or accessing confidential legal documents while traveling.

This shift towards more affordable and generous data allowances has made relying on mobile hotspots a viable and often superior alternative to hotel Wi-Fi, especially for tech-savvy professionals on the go. πŸ“±πŸ’Ό Cellular data provides a more secure connection, with encryption that makes it difficult for attackers to exploit, unlike many public Wi-Fi networks that may be unencrypted or poorly secured. For legal professionals navigating the digital landscape, embracing mobile hotspots could be the key to uninterrupted productivity. It's time to reconsider our reliance on hotel Wi-Fi and leverage the power in our pockets. πŸš€βš–οΈ

MTC

πŸ›οΈ MTC: The Perils of Hot Mics and Hasty Clicks: A Wake-Up Call for Tech-Savvy Lawyers 🚨

Always proofread your e-mails β€œbefore” you send them!

In the digital age, lawyers must navigate a minefield of potential ethical pitfalls as they embrace technology in their practice. A recent non-disciplinary admonition of an attorney highlighted by Professor Mike Frisch on the Legal Profession Blog serves as a stark reminder of the dangers lurking in our everyday digital interactions.

The case involved an attorney who faced a non-disciplinary admonition for two separate incidents of inappropriate behavior. 😬 In the first incident, the attorney made inappropriate comments during a June 2023 Aroostook County Unified Criminal Zoom docket call that was overheard by other participants. In a separate event, the attorney sent emails containing perceivably sexist language to a continuing legal education (CLE) provider. These cases vividly illustrate how easily digital missteps can occur in various professional settings and the consequences they can bring.

The Virtual Courtroom Conundrum πŸ›οΈπŸ’»

As courts have increasingly adopted virtual proceedings, attorneys must adapt to new norms of professional conduct. The incident during the Zoom docket call highlights the critical importance of maintaining courtroom decorum, even in a virtual setting. It's essential to remember that the same standards of professionalism apply whether you're physically present in a courtroom or appearing via videoconference.

The Zoom Trap πŸŽ₯πŸ”Š

watch out for hot mic moments when in zoom courtroom hearing!

Zoom and other videoconferencing platforms have become indispensable tools for legal professionals, especially in the wake of the COVID-19 pandemic. However, they also present unique challenges. The line between formal and informal communication can blur, leading to a false sense of privacy or casualness. It's crucial to remember that even when you think you're muted, or your camera is off, there's always a risk of being heard or seen.

πŸ’‘ TIP: I use a device called β€œMuteMe.” It’s a big button that is USB-wired to my computer. I have it set for β€œgreen” when my mic is β€œon” and β€œred” when I’m muted. It’s a clear indicator for me when not to speak less than professionally.

The Email Eternity πŸ“§β³

Emails and instant messages pose a different but equally significant risk. Unlike verbal conversations, these written communications create a permanent record that can be easily forwarded, screenshotted, or retrieved long after you've clicked "send." What might seem like a harmless quip or offhand remark at the moment can come back to haunt you months or even years later.

Ethical Implications πŸ€”βš–οΈ

e-mails with inappropriate comments or language can take a life of their own - they live forever on the internet!!!

The ABA Model Rules of Professional Conduct require lawyers to maintain client confidentiality and to avoid conduct that could prejudice the administration of justice. While these rules don't impose strict liability for technology use, they do expect lawyers to exercise reasonable care. This includes being mindful of the potential for inadvertent disclosure or inappropriate behavior in digital spaces.

Best Practices for Tech-Savvy Lawyers πŸ“šπŸ’Ό

  1. Assume you're always "on": Treat every virtual court proceeding and Zoom meeting as if your microphone and camera are live at all times. πŸŽ™οΈπŸ‘€

  2. Think before you type: Before sending any electronic communication, ask yourself if you'd be comfortable with it being read aloud in court. πŸ’­βœοΈ

  3. Use secure platforms: Ensure that the technology you're using meets appropriate security and privacy standards. πŸ”’πŸ›‘οΈ

  4. Educate yourself: Stay informed about the latest developments in legal technology ethics and court rules for virtual proceedings. πŸ“šπŸ§ 

  5. Implement safeguards: Use features like waiting rooms and passwords for Zoom meetings to prevent unauthorized access. πŸšͺπŸ”‘

learn from others mistakes!

The incidents highlighted by Professor Frisch serve as valuable learning opportunities for all legal professionals. They remind us that in our increasingly digital world, the boundaries between professional and personal, public and private, are more porous than ever.

As we continue to embrace technology in our legal practice, we must remain vigilant about our ethical obligations. The convenience and efficiency offered by digital tools should never come at the expense of professionalism and integrity. By staying mindful of the potential risks and implementing best practices, we can harness the power of technology while upholding the highest standards of our profession.

Final Thoughts 🧐

Being a tech-savvy lawyer isn't just about knowing how to use the latest toolsβ€”it's about using them wisely and ethically. Let this serve as a reminder to all of us to pause, think, and double-check before we unmute that mic or hit that send button, whether in a virtual courtroom or in our daily communications.

MTC

Happy Lawyering! πŸ˜Šβš–οΈπŸ–₯️

ABA Repost! My Article "What to Do if Your Social Media Is Hacked"!

Hey Tech-Savvy Lawyers!

I’m excited to share that my article β€œWhat to Do if Your Social Media Is Hacked” was recently published on ABA’s β€œThe Marketing Issue” for Law Practice Management!

For those of you who can’t get behind the paywall, I’m allowed to share it below (after it had been published on the ABA’s webpage). Note the pictures are my own

Enjoy!

Don’t panic when your social media is hacked!

As a legal professional, your social media presence is more than just a personal outletβ€”it's an extension of your professional identity and a critical tool for networking, client communication, and brand building. When your social media account is compromised, the consequences can be far-reaching, affecting both your personal and professional life. Social media security is crucial, and legal professionals should take these steps to address hacks across various platforms.

The Professional and Personal Impact of Social Media Hacks

Professional consequences. A hacked social media account can severely damage your professional reputation. Unauthorized posts or messages sent from your account could potentially impact your work by violating client confidentiality or by spreading misinformation about ongoing cases. If the hack involves personal comments, it could damage relationships with colleagues and clients and undermine your credibility in the legal community. For judges, a compromised account could raise questions about impartiality and potentially influence ongoing cases. For lawyers, it could lead to loss of clients and damage to the firm's reputation.

Personal ramifications. On a personal level, a social media hack can be equally devastating when it involves identity theft or financial fraud. Additionally, do not underestimate the potential damage to personal relationships or the emotional distress and loss of privacy that may result.

The interconnected nature of personal and professional lives in the legal field means that personal social media breaches can have professional consequences and vice versa.

Ethical Considerations and State Bar Issues

Social media hacks pose significant ethical challenges for legal professionals. Many state bars have specific rules regarding attorneys' use of social media, and a compromised account could lead to unintended violations if negligence on the lawyers’ part is involved. Keep in mind that many states have adopted an ethical duty of technological competence.

There are many possible rules implicated if a hack occurs. These may include:

Plan ahead for when/if your or your firm’s social media is every hacked!

Confidentiality. Unauthorized access to your account could lead to the disclosure of confidential client information, violating ABA Model Rule 1.6[3].

Advertising and Solicitation. Hacked accounts might post content that violates rules on lawyer advertising and solicitation. See ABA Model Rules 7.1, 7.2 and 7.3.

Competence. Failure to adequately secure your social media accounts could be seen as a lack of technological competence, which is increasingly considered part of a lawyer's duty of competence under ABA Model Rule 1.1[8].

Communication. Inappropriate messages sent from a hacked account could violate rules on communication with clients, opposing parties or the court. See ABA Model Rules 1.6, 3.3, 4.1, 5.1, 5.2 and 5.3.

Supervision. Law firm leaders may be held responsible for the social media conduct of their subordinates, even in cases of hacking, under ABA Model Rules 5.1, 5.2 and 5.3.

Any of these violations may also lead to ABA Model Rule 8.4 for misconduct leading to the failure of maintaining the integrity of the profession.

Given these ethical implications, it's crucial for legal professionals to not only secure their accounts but also to act swiftly and transparently in the event of a hack.

Steps to Take When Your Social Media Is Hacked

Immediately change your password on the affected account and any other accounts that share the same password. Use a password manager like Keeper, NordPass, Bitwarden Bitdefender or Dashlane to make complex passwords that are not easy to hack. A password manager securely stores your credentials, synchronizes them across your devices, and restricts access to only those you authorize.

Take action when your social media is hacked - your professional reputation could be on the line!

For additional security, enable two-factor authentication (2FA) on all your social media accounts. 2FA is an extra layer of security that requires users to provide two different pieces of evidence to prove their identity when logging into an account. In addition to a password, 2FA typically requires something the user physically possesses, like a smartphone to receive a verification code, or something unique to the user, like a fingerprint. This makes it much harder for unauthorized people to access accounts, even if they manage to obtain the password.

You also need to consider outside relationships. Review and revoke access for any suspicious third-party apps connected to your account. Be cautious about accepting connections or friend requests. Inform your professional network, clients and colleagues about the hack to prevent them from falling victim to any malicious content or requests.

Some states require you to contact your state bar association(s) depending on the severity of the breach. Contact your bar hotline or private counsel if you have questions about what to do regarding your state bar obligations. You likely have obligations to inform any clients potentially impacted.

Make sure to document everything. Keep a record of unauthorized posts, messages or changes made to your account. This documentation may be necessary for reporting to the platform, your state bar or law enforcement.

Platform-Specific Steps

Follow these steps if your account on any of your outside platforms is hacked.

Facebook

  1. Visit Facebook's Hacked Accounts page and follow the prompts.

  2. Use the β€œSomeone else got into my account without my permission" option if you're locked out of your account.

  3. Review your account's login history and update/change your security settings.

Instagram

  1. Visit Instagram’s Hacked Accounts page and follow the prompts.

  2. Use the β€œMy account was hacked" option if you're locked out of your account.

  3. Review your account's login history and update/change your security settings.

LinkedIn

  1. Report the compromised account to LinkedIn immediately.

  2. If you can still access your account, change your password and review recent connections and activity.

  3.  If you are locked out, use LinkedIn's account recovery process.

  4. Review and update/change your privacy settings once access is restored.

X (formerly known as Twitter)

  1. Request a password reset via email or phone number by going to X” login and click on Forgot password?

  2. If unable to reset, contact X support directly.

  3. Review and revoke access for any suspicious third-party apps.

  4. Review and update/change your privacy settings once access is restored.

Post-Recovery Actions

To prevent future hacks, take the following steps. Begin with a security audit. Review all your social media and online accounts for any signs of unauthorized access or suspicious activity. You may wish to, or need to, hire a professional to assist you. Change your security questions and answers on all accounts. As with your computer, use a password manager to create and store strong, unique passwords for each account. Finally, adjust your privacy settings to limit the information visible to the public.

Preparing for the future, educate your team. If you're in a leadership position, conduct training sessions on social media security for your staff. Consider setting up trusted contacts who can help you regain access if you are locked out. In severe cases, consult with a cybersecurity professional to ensure your accounts and devices are secure.

Preventive Measures

First and foremost, be transparent about the breach and any potential impacts on client confidentiality or ongoing cases.

To minimize the risk of future hacks, regularly update your passwords and use a password manager. Current best practices include using a password that is between 15 and 20 characters, which may alleviate the need to update passwords. Be cautious about clicking on links or downloading attachments from unknown sources. Keep your software and apps updated to patch security vulnerabilities. Use separate email addresses for personal and professional social media accounts. - Use a virtual private network (VPN)––it’s a best practice, but particularly necessary when accessing social media on public Wi-Fi.

Reporting to Relevant Authorities

Depending on the severity of the hack and any resulting damages, you may need to report the incident to your state bar association, law enforcement agencies, clients or other affected parties and your firm's IT department or cybersecurity team.

Rebuilding Trust and Reputation

After securing your account, focus on rebuilding trust with your network. First, post a clear explanation of the hack and the steps you've taken to secure your account and your client’s personally identifiable information (PII) if affected.

Going forward, consider sharing lessons learned to help others in your professional network improve their social media security. Be proactive in monitoring your online reputation and addressing any lingering concerns from clients or colleagues.

Safeguard Your Professional Reputation

For legal professionals, a social media hack is more than just an inconvenienceβ€”it's a threat to your professional integrity and ethical standing. By understanding the risks, taking swift action when compromised and implementing robust preventive measures, you can protect your online presence and maintain the trust of your clients and colleagues.

Remember, in the digital age, your online security is an integral part of your professional responsibility. Stay vigilant, stay informed and don't hesitate to seek help when needed. Your career and reputation are worth the extra effort in safeguarding your social media presence.

Article Reprint

My article from the ABA’s β€œThe Marketing Issue” on Law Practice Management!

I’m excited to share that my article β€œWhat to Do if Your Social Media Is Hacked” was recently published on ABA’s β€œThe Marketing Issue” for Law Practice Management!

For those of you who can’t get behind the paywall, I’m allowed to share it below (after it had been published on the ABA’s webpage). Note the pictures are my own AI generation.

Enjoy!

As a legal professional, your social media presence is more than just a personal outletβ€”it's an extension of your professional identity and a critical tool for networking, client communication, and brand building. When your social media account is compromised, the consequences can be far-reaching, affecting both your personal and professional life. Social media security is crucial, and legal professionals should take these steps to address hacks across various platforms.

The Professional and Personal Impact of Social Media Hacks

Professional consequences. A hacked social media account can severely damage your professional reputation. Unauthorized posts or messages sent from your account could potentially impact your work by violating client confidentiality or by spreading misinformation about ongoing cases. If the hack involves personal comments, it could damage relationships with colleagues and clients and undermine your credibility in the legal community. For judges, a compromised account could raise questions about impartiality and potentially influence ongoing cases. For lawyers, it could lead to loss of clients and damage to the firm's reputation.

Personal ramifications. On a personal level, a social media hack can be equally devastating when it involves identity theft or financial fraud. Additionally, do not underestimate the potential damage to personal relationships or the emotional distress and loss of privacy that may result.

The interconnected nature of personal and professional lives in the legal field means that personal social media breaches can have professional consequences and vice versa.

Ethical Considerations and State Bar Issues

Social media hacks pose significant ethical challenges for legal professionals. Many state bars have specific rules regarding attorneys' use of social media, and a compromised account could lead to unintended violations if negligence on the lawyers’ part is involved. Keep in mind that many states have adopted an ethical duty of technological competence.

There are many possible rules implicated if a hack occurs. These may include:

Confidentiality. Unauthorized access to your account could lead to the disclosure of confidential client information, violating ABA Model Rule 1.6[3].

Advertising and Solicitation. Hacked accounts might post content that violates rules on lawyer advertising and solicitation. See ABA Model Rules 7.1, 7.2 and 7.3.

Competence. Failure to adequately secure your social media accounts could be seen as a lack of technological competence, which is increasingly considered part of a lawyer's duty of competence under ABA Model Rule 1.1[8].

Communication. Inappropriate messages sent from a hacked account could violate rules on communication with clients, opposing parties or the court. See ABA Model Rules 1.6, 3.3, 4.1, 5.1, 5.2 and 5.3.

Supervision. Law firm leaders may be held responsible for the social media conduct of their subordinates, even in cases of hacking, under ABA Model Rules 5.1, 5.2 and 5.3.

Any of these violations may also lead to ABA Model Rule 8.4 for misconduct leading to the failure of maintaining the integrity of the profession.

Given these ethical implications, it's crucial for legal professionals to not only secure their accounts but also to act swiftly and transparently in the event of a hack.

Steps to Take When Your Social Media Is Hacked

Immediately change your password on the affected account and any other accounts that share the same password. Use a password manager like Keeper, NordPass, Bitwarden Bitdefender or Dashlane to make complex passwords that are not easy to hack. A password manager securely stores your credentials, synchronizes them across your devices, and restricts access to only those you authorize.

For additional security, enable two-factor authentication (2FA) on all your social media accounts. 2FA is an extra layer of security that requires users to provide two different pieces of evidence to prove their identity when logging into an account. In addition to a password, 2FA typically requires something the user physically possesses, like a smartphone to receive a verification code, or something unique to the user, like a fingerprint. This makes it much harder for unauthorized people to access accounts, even if they manage to obtain the password.

You also need to consider outside relationships. Review and revoke access for any suspicious third-party apps connected to your account. Be cautious about accepting connections or friend requests. Inform your professional network, clients and colleagues about the hack to prevent them from falling victim to any malicious content or requests.

Some states require you to contact your state bar association(s) depending on the severity of the breach. Contact your bar hotline or private counsel if you have questions about what to do regarding your state bar obligations. You likely have obligations to inform any clients potentially impacted.

Make sure to document everything. Keep a record of unauthorized posts, messages or changes made to your account. This documentation may be necessary for reporting to the platform, your state bar or law enforcement.

Platform-Specific Steps

Follow these steps if your account on any of your outside platforms is hacked.

Facebook

  1. Visit Facebook's Hacked Accounts page and follow the prompts.

  2. Use the β€œSomeone else got into my account without my permission" option if you're locked out of your account.

  3. Review your account's login history and update/change your security settings.

Instagram

  1. Visit Instagram’s Hacked Accounts page and follow the prompts.

  2. Use the β€œMy account was hacked" option if you're locked out of your account.

  3. Review your account's login history and update/change your security settings.

LinkedIn

  1. Report the compromised account to LinkedIn immediately.

  2. If you can still access your account, change your password and review recent connections and activity.

  3.  If you are locked out, use LinkedIn's account recovery process.

  4. Review and update/change your privacy settings once access is restored.

X (formerly known as Twitter)

  1. Request a password reset via email or phone number by going to X” login and click on Forgot password?

  2. If unable to reset, contact X support directly.

  3. Review and revoke access for any suspicious third-party apps.

  4. Review and update/change your privacy settings once access is restored.

Post-Recovery Actions

To prevent future hacks, take the following steps. Begin with a security audit. Review all your social media and online accounts for any signs of unauthorized access or suspicious activity. You may wish to, or need to, hire a professional to assist you. Change your security questions and answers on all accounts. As with your computer, use a password manager to create and store strong, unique passwords for each account. Finally, adjust your privacy settings to limit the information visible to the public.

Preparing for the future, educate your team. If you're in a leadership position, conduct training sessions on social media security for your staff. Consider setting up trusted contacts who can help you regain access if you are locked out. In severe cases, consult with a cybersecurity professional to ensure your accounts and devices are secure.

Preventive Measures

First and foremost, be transparent about the breach and any potential impacts on client confidentiality or ongoing cases.

To minimize the risk of future hacks, regularly update your passwords and use a password manager. Current best practices include using a password that is between 15 and 20 characters, which may alleviate the need to update passwords. Be cautious about clicking on links or downloading attachments from unknown sources. Keep your software and apps updated to patch security vulnerabilities. Use separate email addresses for personal and professional social media accounts. - Use a virtual private network (VPN)––it’s a best practice, but particularly necessary when accessing social media on public Wi-Fi.

Reporting to Relevant Authorities

Depending on the severity of the hack and any resulting damages, you may need to report the incident to your state bar association, law enforcement agencies, clients or other affected parties and your firm's IT department or cybersecurity team.

Rebuilding Trust and Reputation

After securing your account, focus on rebuilding trust with your network. First, post a clear explanation of the hack and the steps you've taken to secure your account and your client’s personally identifiable information (PII) if affected.

Going forward, consider sharing lessons learned to help others in your professional network improve their social media security. Be proactive in monitoring your online reputation and addressing any lingering concerns from clients or colleagues.

Safeguard Your Professional Reputation

For legal professionals, a social media hack is more than just an inconvenienceβ€”it's a threat to your professional integrity and ethical standing. By understanding the risks, taking swift action when compromised and implementing robust preventive measures, you can protect your online presence and maintain the trust of your clients and colleagues.

Remember, in the digital age, your online security is an integral part of your professional responsibility. Stay vigilant, stay informed and don't hesitate to seek help when needed. Your career and reputation are worth the extra effort in safeguarding your social media presence.

πŸŽ™οΈ Ep. 103: Mastering Briefs – How TypeLaw Transforms Legal Writing and Compliance.

In this episode, Chris Dralla, co-founder & CEO of TypeLaw, shares his journey from the legal profession to developing the AI-powered platform that assists with court brief formatting and compliance. He discusses the platform's features, including citation checking, table of contents creation, and dynamic editing.

Chris explains how TypeLaw helps save lawyers 20-40 hours per brief by handling technical aspects and ensuring compliance with local court rules. This allows lawyers to focus on more meaning tasks. He also emphasizes the platform's security measures, compatibility with multiple document formats, and adaptability to evolving legal requirements. Additionally, Chris touches on customer support and the future of digital legal documentation.

Join Chris and me as we discuss the following three questions and more!

  1. What are the top three key benefits of using TypeLaw's brief editing features, and how does it compare to traditional word processing software for legal documents?

  2. What are the top three security concerns lawyers should consider when using a product like TypeLaw?

  3. How does TypeLaw ensure compliance with local court rules across different jurisdictions, and how frequently are these rules updated in the system?

In our conversation, we cover the following:

[00:43] Chris's Current Tach Setup

[11:38] Key Benefits of TypeLaw's Brief Editing vs. Traditional Word Processors

[16:27] How TypeLaw Boosts Efficiency for Lawyers

[23:08] Top 3 Security Concerns for Lawyers Using

[37:15] How TypeLaw Stays Compliant with Local Court Rules

[42:40] Contact Information

Resources:

Connect with Chris:

Software & Cloud Services mentioned in the conversation:

MTC: 🍎 Apple's $95M Siri Settlement - A Wake-Up Call for Legal Professionals! β°πŸ’Όβš–οΈπŸš¨

Lawyers need to remember they may have an unintended guest during their private confidential meetings!

Apple's recent $95 million settlement over privacy concerns related to its voice assistant Siri  serves as a stark reminder of the potential risks associated with AI-powered technologies in legal practice 🚨. While Apple has long championed user privacy πŸ›‘οΈ, this case highlights that even well-intentioned companies can face challenges in safeguarding sensitive information.

The lawsuit alleged that Siri recorded users' conversations without consent, even when not activated by the "Hey Siri" command πŸŽ™οΈ. This raises significant concerns for lawyers who frequently handle confidential client information 🀐. As we discussed in our recent Tech-Savvy Lawyer.Page post, "My Two Cents/BOLO: Privacy Alert for Legal Pros: Navigating Discord's Data Vulnerabilities and Maintaining Client Confidentiality on the Internet," protecting sensitive data is paramount in legal practice and extends to all forms of communication, including those facilitated by AI assistants.

Voice assistants like Siri and Amazon's Alexa have become ubiquitous in both personal and professional settings πŸ πŸ’Ό. Their convenience is undeniable, but legal professionals must remain vigilant about the potential privacy implications. As a CBS News report highlighted, these devices are often listening more than users realize πŸ‘‚.

Key concerns for lawyers include:

lawyers need to be mindful of what electronic devices may be listening in their confidential settings!

  • Unintended data collection: Voice assistants may capture sensitive conversations, even when not explicitly activated πŸ”Š.

  • Data security: Collected information could be vulnerable to breaches or unauthorized access πŸ”“.

  • Third-party sharing: Voice data might be shared with contractors or other entities for analysis or improvement purposes 🀝.

  • Lack of transparency: Users may not fully understand the extent of data collection or how it's used πŸ•΅οΈβ€β™€οΈ.

While Apple has taken steps to improve Siri's privacy protections, such as implementing opt-in consent for voice recording storage, legal professionals should remain cautious ⚠️. The same applies to other voice assistants like Alexa, which has faced its own share of privacy scrutiny.

To mitigate risks, lawyers should consider the following best practices:

  • Inform clients about potential privacy limitations when using voice assistants during consultations πŸ’¬.

  • Disable or physically remove smart devices from areas where confidential discussions occur πŸ”‡.

  • Regularly review and update privacy settings on all devices and applications βš™οΈ.

  • Stay informed about evolving privacy policies and terms of service for AI-powered tools πŸ“š.

confidential client information may be unintenTionally shared with the world through smart devices.

As we emphasized in our Tech-Savvy Lawyer.Page editorial, "My Two Cents: Embracing the Future: Navigating the Ethical Use of AI in Legal Practice,” and TSL.P Podcast episode β€œ#67: Ethical considerations of AI integration with Irwin Kramer," lawyers have an ethical obligation to protect client information when using AI tools βš–οΈ. This duty extends to understanding and managing the risks associated with emerging technologies like AI voice assistants.

The Apple settlement serves as a reminder that even companies with strong privacy reputations can face challenges in this rapidly evolving landscape 🌐. Legal professionals must remain proactive in assessing and addressing potential privacy risks associated with AI-powered tools.

Final Thoughts

While voice assistants offer convenience and efficiency, legal professionals must approach their use with caution and a thorough understanding of the potential risks 🧠. By staying vigilant and implementing robust privacy practices, lawyers can harness the benefits of AI technology while upholding their ethical obligations to clients πŸ€–πŸ‘¨β€βš–οΈ. A crucial drumbeat I've made on The Tech-Savvy Lawyer.Page, it's crucial to stay informed about these issues and continuously adapt our practices to protect client confidentiality in an increasingly connected world 🌍.

MTC

πŸŽ„ Holiday Special Tip of the Day! 🎁 Eco-Friendly Tech Tips for the Holiday Season: Recycle and Repurpose with Care and Safety! πŸŒΏπŸ”’

lawyers, celebrate the holidays by being responsible with your old technology! ♻️

As the holiday season is upon us, many of us eagerly anticipate gifting and receiving the latest gadgets and tech innovations. However, it's crucial to consider the environmental impact of our tech consumption and disposal habits. This year, let's embrace a more sustainable approach to our holiday tech celebrations while also keeping our homes and offices secure. 🌎

The Gift of Responsible Tech Consumption πŸŽπŸ’»

Whether you are a tech-savvy lawyer or not, the joy of unwrapping a shiny new device is undeniable, but it's equally important to consider what happens to our old tech. Instead of letting outdated gadgets gather dust or end up in landfills, consider giving them a second life. As discussed in Episode 87 of The Tech-Savvy Lawyer.Page Podcast, "Finding New Homes for Old Tech with Loren Williams of PCs for People!", there are numerous ways to repurpose and recycle old technology. πŸ”„

Loren shared valuable insights on how lawyers can responsibly manage their tech waste. One key takeaway is the importance of securely removing data before recycling. This not only protects sensitive information but also ensures that devices can be safely refurbished and donated to those in need. πŸ”

Recycling Done Right ♻️

When it comes to recycling tech, it's not just about tossing items in the blue bin. Many electronic components require special handling. Check with local recycling programs or electronics stores for proper disposal methods. Some companies even offer trade-in programs, allowing you to offset the cost of new purchases while ensuring your old devices are recycled correctly. Apple has a great trade-in/recycling program that I use to get a little money back, repurpose older machines, and recycle ancient devices with all of my Mac devices! πŸ’°πŸ

repurposing your old tech is a great way to recycle ♻️ your old tech!

Remember, recycling goes beyond just devices. During the holiday season, we generate 25% more waste than usual. Be mindful of packaging materials, wrapping paper, and decorations. Opt for recyclable options and consider creative reuse ideas to minimize waste. πŸ“¦πŸŽ¨

Repurposing: A Tech-Savvy Solution πŸ”§

Before rushing to recycle, consider repurposing your old tech. An outdated smartphone can become a dedicated e-reader or a smart home controller. Don't forget the younger generation! Giving them an old, disconnected, wiped device can serve as a platform for games and learning. Old phones can help those in need. Old tablets make excellent digital photo frames or kitchen recipe displays. By finding new uses for old devices, we extend their lifespan and reduce the demand for new products. πŸ“±βž‘οΈπŸ“š

Security First: Protecting Your Home and Office πŸ πŸ”’

While we're excited about our new tech acquisitions, it's crucial to be discreet about our holiday hauls. Leaving empty boxes of expensive gadgets outside for recycling can inadvertently signal potential thieves that valuable items are inside. Instead, break down boxes and dispose of them discreetly or wait until after the holiday season to recycle them. πŸ“¦

Creating New, Sustainable Traditions 🌟

This holiday season, why not start new traditions that combine tech-savviness with sustainability? Host a tech swap party where friends and colleagues can exchange gadgets they no longer need. Organize a group recycling day to ensure everyone's old tech is disposed of properly. These activities not only promote sustainability but also foster community among tech-savvy professionals. πŸ€πŸ’š (DON'T FORGET TO WIPE YOUR DATA OFF THE DEVICE BEFORE THE EXCHANGE - Check out these The Tech-Savvy Lawyer.Page articles!).

FINAL THOUGHTS πŸ’­ 🧐

While enjoying your new tech gift, don’t forget to be responsible with your old tech!

As tech-savvy legal professionals this Holiday Season (let alone any time of the year), we have a unique opportunity to lead by example in responsible tech use and disposal. By embracing these eco-friendly practices in our offices and sharing knowledge with clients, we can make a significant impact. This holiday season, let's give the gift of sustainability to our planet and carry these habits into our daily lives and professional practices for a greener future in law and technology. πŸŒβš–οΈ

Happy Holidays and Wishing You a Healthy, Prosperous, and more Environmentally Friendly New Year! πŸŽ‰πŸŒ²πŸ₯‚

MTC: When AI Stumbles: Apple's Misstep and Its Lessons for Tech-Savvy Lawyers πŸŽπŸ’»βš–οΈ

Members of the legal profession have a due diligence to ensure l human oversight in any of their AI-driven legal work!

Apple's recent AI blunder serves as a stark reminder that even industry leaders can falter in the rapidly evolving world of artificial intelligence πŸ€–. The tech giant's new AI feature, Apple Intelligence, made headlines for all the wrong reasons when it generated a false news summary attributed to the BBC πŸ“°βŒ. Apple is considered a Blue Ribbon star when it comes to cutting-edge technology; this misstep tarnishes its reputation πŸ…βž‘οΈπŸ’”. This incident should be a wake-up call for lawyers embracing AI in their practice β°πŸ‘¨β€βš–οΈ.

As we've discussed in previous episodes of The Tech-Savvy Lawyer.Page Podcast.πŸŽ™οΈ, AI tools can significantly enhance legal work efficiency. However, the Apple incident underscores a critical point: AI is not infallible πŸš«πŸ’―. In Episode #92: Finding the Right Crossroads for AI Use, Success, and the Law, Troy Doucette of AI. law., Troy Doucet of AI.Law emphasized the importance of preventing AI hallucinations in legal document drafting πŸ“„πŸ”. This recent event proves that even tech behemoths like Apple are not immune to such issues πŸŽπŸ›‘οΈβŒ.

Lawyers must approach AI with a blend of enthusiasm and caution πŸ€”πŸ’‘. While AI can streamline tasks like document review and legal research, it should never replace human oversight πŸ§ πŸ‘€. As highlighted in our blog post, "My Two Cents: With AI Creeping Into Our Computers, Tablets, and Smartphones, Lawyers Need to Be Diligent About The Software They Use," due diligence is crucial when incorporating AI into legal practice πŸ•΅οΈβ€β™‚οΈπŸ’».

Its the lawyers general responsibility to make sure that the β€œfacts” they generate with AI are indeed facts and not fake! 🧐

The Apple Intelligence mishap involved a false headline about a high-profile murder case, demonstrating how AI errors can have serious implications πŸ—žοΈπŸ”ͺ❌. For lawyers, such inaccuracies in legal documents or case summaries could be catastrophic, potentially leading to malpractice claims and ethical violations βš–οΈπŸ’₯.

To mitigate these risks, lawyers should:

  1. Always verify AI-generated content against primary sources πŸ”πŸ“š.

  2. Understand the limitations of the AI tools they use πŸ§ πŸ”§.

  3. Maintain a critical eye when reviewing AI outputs πŸ‘οΈπŸ“.

  4. Keep abreast of AI developments and potential pitfalls πŸ“ˆπŸ“‰.

In πŸŽ™οΈEp. 98: Streamlining legal workflows with Michael Anderson, Chief Product Officer at Filevine, on LPM evolution, Michael Anderson of FileVine discussed the ethical use of AI in legal practice management πŸ€πŸ’Ό. This conversation gains new relevance in light of Apple's misstep. Lawyers must ensure that their use of AI aligns with ethical standards and doesn't compromise client confidentiality or the integrity of their work πŸ”’βœ….

Furthermore, as Jayne Reardon explored in a recent podcast episode 99: Navigating the Intersection of Law Ethics and Technology with Jayne Reardon, the ABA Model Rules of Ethics provide crucial guidance for lawyers using AI πŸ“œπŸ‘¨β€βš–οΈ. These rules emphasize the need for competence, which extends to understanding the technologies used in legal practice πŸ§ πŸ’».  See Rule 1.1(8).

The Apple incident also highlights the importance of transparency πŸ”. If AI is used in legal work, clients should be informed, and its role should be clearly defined πŸ—£οΈπŸ“Š. This aligns with the ethical considerations discussed in our podcasts like episodes #18: Learn How to "Do It Yourself" with DIY Software - My conversation with "Hello Divorce" creator Attorney Erin Levine! and #70: Growing your firm with Chatbots & Artificial Intelligence with Jared Jaskot about lawyers creating DIY legal services using AI and chatbots πŸ€–πŸ› οΈ.

Final Thoughts

lawyers must examine potential inaccuracies when they use ai-generated results in their work.

While AI remains a powerful tool for the legal profession, the Apple Intelligence debacle serves as a timely reminder of its limitations β³βš–οΈ. As tech-savvy lawyers, we must harness the benefits of AI while remaining vigilant about its potential pitfalls πŸ¦…πŸ‘€. By doing so, we can ensure that our use of AI enhances rather than compromises the quality and integrity of our legal services πŸ“ˆπŸ‘.

Remember, in the world of legal tech, an Apple a day doesn't always keep bar counsel away – but diligence and critical thinking certainly help πŸŽπŸš«πŸ‘¨β€βš–οΈβž‘οΈπŸ§ πŸ’‘.

MTC

Tip of the Day! πŸ’‘ 20 Affordable Gifts (10 tech and 10 non-tech) for Tech-Savvy Lawyers: Top Picks Under $50 for 2024 πŸ’ΌπŸ’»πŸŽ

Time to find holiday gifts 🎁 that won’t break the bank for your favorite tech-savvy lawyer! πŸ’»βœ¨

As we approach the holiday season πŸŽ„πŸŽ, finding the perfect gift for the tech-savvy lawyer in your life can be a challenge πŸ€”. To help you navigate this task, I’ve compiled a list of top ten tech gifts πŸ’»πŸ”§ and ten non-tech gifts πŸ“šβ˜• under $50 that are sure to delight any legal professional with a penchant for technology πŸ‘¨β€βš–οΈπŸ‘©β€βš–οΈ. Whether it's for your boss πŸ‘”, colleague 🀝, or significant other πŸ’‘, these selections are inspired by the latest trends and discussions from The Tech-Savvy Lawyer.Page blog and podcasts πŸŽ™οΈ throughout 2024 πŸ“….

Top Ten Tech Gifts Under $50 πŸŽπŸ’»

1. Linq Digital Business Cards πŸ“‡

These innovative digital business cards are a game-changer for networking.* With a simple tap, lawyers can share their contact information, social media profiles, and even their latest podcast episode. Perfect for conferences and client meetings.

https://buy.linqapp.com/collections/cards

2. MacSparky Monthly Subscription Gift Card πŸŽ“

Previous podcast guest david sparks popular blog is a great resource for the tech-savvy lawyer who wants to learn more about apple devices! πŸ‘©πŸ»β€πŸ’»

A gift card for a month's subscription to MacSparky offers access to valuable productivity tips and tech that can help any legal professional using the Mac platform.* This resource can help lawyers streamline their workflow and stay updated on the latest tech trends in the legal industry.

https://www.macsparky.com/join/

3. Anker 633 Magnetic Battery, 10,000 mAh Foldable Wireless Portable Charger, 20W USB-C Power Delivery Power Bank with Stand, Magsafe-Compatible for iPhone 16/15/14/13/12 Series πŸ”‹

This portable charger ensures your lawyer's devices stay powered up during long days in court, on the road in or client meetings.* Its slim design fits easily in a briefcase or pocket, providing peace of mind for those crucial moments when a dead cell phone battery could be disastrous.

Click on this link to go to Amazon as the link itself is too long! πŸ™ƒ

4. Logitech Pebble M350 Wireless Mouse 🐭 πŸ–±οΈ

A sleek, silent mouse that's perfect for working in quiet environments like libraries or shared office spaces. Its compact design and long battery life make it ideal for lawyers who frequently work on-the-go or in various locations.

https://www.logitech.com/en-us/products/mice/pebble-2-m350s-wireless-mouse.html

5. Blue Light Blocking Glasses πŸ‘“

Help protect your lawyer's eyes during long hours of screen time with these stylish blue light blocking glasses. These can reduce eye strain and potentially improve sleep quality, essential for lawyers who often work late nights reviewing documents.

https://www.diffeyewear.com/collections/blue-light-blocking-glasses

6. Bluetooth Trackers πŸ”

Show your tech-savvy colleague a little love 🎁 with a thoughtful gift that won’t break your budget! πŸ’»

Never let your lawyer misplace their keys or bag again with these handy Bluetooth trackers:

- Apple AirTag*: Perfect for iOS users, offering seamless integration with Apple devices.

https://www.apple.com/airtag/

- Tile Mate: A versatile option compatible with both iOS and Android devices.

https://www.thetileapp.com/en-us/store/tiles/mate

7. Amazon Echo Dot (4th Gen) πŸ”Š

This smart speaker can help manage schedules, set reminders, and even brief on the latest legal news. It's a versatile assistant for lawyers, helping them stay organized and informed hands-free. (Warning:  Check terms of service and make sure Amazon is not eavesdropping on privileged/private communication! Personally, I’d go for the Apple Air Pod* (but its $99 and didn’t meet the criteria of this list).

https://www.amazon.com/Echo-Dot/dp/B07XJ8C8F5

8. Anker PowerWave Pad Qi-Certified Wireless Charger ⚑

A fast, efficient wireless charging pad for smartphones and other Qi-enabled devices. Universally friendly to most Qi-enabled smartphones (check with the manufacture). This charger eliminates cable clutter on a lawyer's desk and ensures their devices are always ready to go.

https://www.amazon.com/Anker-PowerWave-Qi-Certified-Compatible-Fast-Charging/dp/B07DBX67NC

9. Jabra soundcore V30i 🎧

These affordable earbuds offer great sound quality for podcast listening and clear audio for calls. Perfect for lawyers who need to take confidential calls on-the-go or want to catch up on legal podcasts during their commute. πŸ€—

https://www.soundcore.com/products/v30i-a3873-open-ear-earbuds?ref=open-ear-headphones

10. Rocketbook Smart Reusable Notebook πŸ““

This eco-friendly notebook allows lawyers to digitize their handwritten notes easily. It's perfect for those who prefer handwriting but need the convenience of digital storage and organization.

https://getrocketbook.com/products/rocketbook-core

Top Ten Non-Tech Gifts Under $50 🎁

1. Staufs Coffee Sampler β˜•οΈ

My favorite regional coffee shop/brewer that was recently rated #3 in a national pole on regional coffee shops!

A selection of rich, flavorful blends from this regional coffee brewery to fuel long work hours.* This is my personal favorite! I’ve been a customer of theirs for years.  The last place I moved to while living in Columbus, OH was in part because it was four to five blocks away from their main store in Grandview, OH. πŸ€—
Note free shipping for orders over $50!

https://www.staufs.com/shop-all-coffee

2. "The Tech Contracts Handbook" by David W. Tollen πŸ“š

This comprehensive guide to technology contracts is a valuable resource for any tech-savvy lawyer.

Click on this link to go to Amazon as the link itself is too long! πŸ™ƒ

3. Personalized Desk Nameplate 🏷️

Add a touch of professionalism to your lawyer's workspace with a custom nameplate.

https://www.etsy.com/search?q=lawyer+Personalized+Desk+Nameplate&is_personalizable=true

4. Lawyer-Themed Socks 🧦

Inject some fun into your lawyer's wardrobe with these quirky, profession-specific socks.

https://shop.nypl.org/products/lawyer-socks

5. "The Anxious Lawyer" by Jeena Cho and Karen Gifford πŸ§˜β€β™€οΈ

A book offering an eight-week program on meditation and mindfulness, created by lawyers for lawyers.

https://jeenacho.com/the-anxious-lawyer-book/

6. Legal-Themed Art Print πŸ–ΌοΈ

Stand out at your holiday party πŸŽ‰ by giving a gift that gets you noticedβ€”thoughtful, tech-savvy, and memorable! 🎁✨

Decorate your lawyer's office with a tasteful print featuring legal motifs or famous courthouses.

https://www.fulcrumgallery.com/c37592/law-office-art.htm

7. Money Clip w Air Tag Holder πŸ’΅ 🏷️

This practical gift combines a stylish money clip with an AirTag holder, ensuring your lawyer's wallet is always traceable and organized. These money clips offers a blend of technology and functionality at an affordable price.*

Click on this link to go to Amazon as the link itself is too long! πŸ™ƒ

8. Gavel-Shaped Whiskey Decanter Set πŸ₯ƒ

A unique and conversation-starting gift for the lawyer who enjoys a good drink after a long day.

Click on this link to go to Amazon as the link itself is too long! πŸ™ƒ 

9. Moleskine Precious and Ethical Notebook πŸ“”

A high-quality notebook for jotting down ideas, whether in the courtroom or during podcast brainstorming sessions.

https://www.moleskine.com/en-us/gift-guide/best-gifts-under-50/precious-ethical-notebook-petroleum-8056598859430.html

10. Lawyer-Themed Coffee Mug βš–οΈ

A witty mug to brighten up their morning coffee routine.

Click on this link to go to Amazon as the link itself is too long! πŸ™ƒ 

A Personal Note on Gift-Giving πŸŽπŸ’­

During this season of gathering with friends, colleagues, and family, show your appreciation with a thoughtful giftβ€”perfect for the tech-savvy lawyer who makes every day brighter. 🎁

Whether you opt for a cutting-edge gadget πŸ”§ or a classic non-tech item πŸ“š, each gift on our list is designed to enhance productivity πŸ“ˆ, foster well-being πŸ§˜β€β™€οΈ, or simply bring a smile 😊 to your favorite legal eagle πŸ¦…βš–οΈ. Remember, it's not just about the gift itself, but the thought behind it πŸ’­β€οΈ. By choosing one of these items, you're showing that you understand and appreciate the unique challenges and interests of the modern, tech-savvy lawyer πŸ’ΌπŸ’».

Here's to making the season brighter 🌟 for the legal professionals in your life, one thoughtful gift at a time! Happy gifting! πŸŽ‰πŸŽŠ

Have a Happy Holiday Season!

β„οΈβ…β˜ƒοΈβ†β„οΈ

Have a Happy Holiday Season! β„οΈβ…β˜ƒοΈβ†β„οΈ